Journal articles on the topic 'Computer users Internet users Computer crimes Computer users Internet users Crime forecasting'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 48 journal articles for your research on the topic 'Computer users Internet users Computer crimes Computer users Internet users Crime forecasting.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kaur, Prof Simranpreet. "Security in Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 694–98. http://dx.doi.org/10.22214/ijraset.2021.38023.

Full text
Abstract:
Abstract: The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Due to gradually increase of the internet users and netizens, abusage of technology is broadening gradually which tends to cyber-crimes. Cybercrime causes loss of billions of USD every year. Cyber Security, a mechanism by which computer information and the equipments are protected from unauthorized and illegal access. This paper illustrates and focuses on cybercrime, how society suffered, types of threats, and cyber security. Keywords: Cybercrime, Types, Protection, Cyber security, Hackers, Impact.
APA, Harvard, Vancouver, ISO, and other styles
2

Blank, Grant. "The Digital Divide Among Twitter Users and Its Implications for Social Research." Social Science Computer Review 35, no. 6 (October 12, 2016): 679–97. http://dx.doi.org/10.1177/0894439316671698.

Full text
Abstract:
Hundreds of papers have been published using Twitter data, but few previous papers report the digital divide among Twitter users. British Twitter users are younger, wealthier, and better educated than other Internet users, who in turn are younger, wealthier, and better educated than the off-line British population. American Twitter users are also younger and wealthier than the rest of the population, but they are not better educated. Twitter users are disproportionately members of elites in both countries. Twitter users also differ from other groups in their online activities and their attitudes. These biases and differences have important implications for research based on Twitter data. The unrepresentative characteristics of Twitter users suggest that Twitter data are not suitable for research where representativeness is important, such as forecasting elections or gaining insight into attitudes, sentiments, or activities of large populations. In general, Twitter data seem to be more suitable for corporate use than for social science research.
APA, Harvard, Vancouver, ISO, and other styles
3

Tennakoon, Hemamali, George Saridakis, and Anne-Marie Mohammed. "Child online safety and parental intervention: a study of Sri Lankan internet users." Information Technology & People 31, no. 3 (June 4, 2018): 770–90. http://dx.doi.org/10.1108/itp-09-2016-0213.

Full text
Abstract:
PurposeToday’s world of digital and mobile media does not require actual physical contact, between the suitable target and the motivated offender, as with traditional crime. In fact, as Mesch (2009) contended that the internet is not merely an information channel but it creates a new space of activities for children, where they are exposed to motivated offenders and the actors of fourth party. Therefore, for the sake of children’s safety, the practice of parental mediation control is increasingly becoming more pertinent everyday. Thus, the purpose of this paper is to examine how parental mediation control in Sri Lanka is influenced by their internet self-efficacy, their experience as online victims and their trust in online users.Design/methodology/approachThis paper uses a unique data set of computer and internet users from Sir Lanka to examine parental intervention in their children’s online activities. Specifically, the data set contains 347 responses from computer and internet users. To analyze the data, the authors use a binary dependent (probit) model.FindingsThe results show that such factors alter the baseline probability of parental intervention. However, some differences are found between younger and older parents, with the latter group responding more to trust in online users and victimization experience while the former is mainly driven from computer self-efficacy. In particular, the older group is less likely to trust online internet users in terms of never adding unknown persons in the social media. Finally, being self-employed and an older parent has a positive effect on the likelihood of adopting parental controls, possibly because of the non-pecuniary attributes of self-employment.Originality/valueThis study adds to the emerging parental mediation control literature by looking at the likelihood of younger and older parents who were victims of cybercrimes, who have greater internet self-efficacy and lower online third-party trust to adopt parental mediation control behaviors. Also another contribution to the literature is the role of occupation type on parental monitoring behaviors.
APA, Harvard, Vancouver, ISO, and other styles
4

Kirilenko, Viktor, and Georgy Alekseev. "The Harmonization of Russian Criminal Legislation on Counteracting Cybercrime with the Legal Standards of the Council of Europe." Russian Journal of Criminology 14, no. 6 (December 30, 2020): 898–913. http://dx.doi.org/10.17150/2500-4255.2020.14(6).898-913.

Full text
Abstract:
Crimes that happen in the virtual environment created by digital technologies inflict considerable economic damage. Mercenary motives of criminals in the information society are giving rise to increasingly more and more sophisticated methods of abusing the trust of computer networks’ users. The harmonization of Russian legislation on counteracting cybercrimes with the legal standards of the Council of Europe is inevitable due to the trans-border character of crimes committed using information and telecommunication technologies, and to their high public danger. The methodology of researching cybercrime is based on the comparative analysis of Russian law enforcement practice on crimes in the sphere of computer information and the most progressive practices of counteracting cybercrime in the member states of the Council of Europe. The methods of inclusive observation and discursive analysis make it possible to identify latent delicts in contemporary information space. The analysis of criminal legislation and the practices of criminal behavior in cyberspace are aimed at improving the measures of counteracting the violations of fundamental human rights in the process of the digitization of economy, when fraud based on the abuse of network users’ trust becomes the most typical virtual crime. Internet users are interested in reporting the facts of offences in the information space on the condition that the state protects their fundamental freedoms. The creation of closed social networks by criminal organizations and the widening technical opportunities for extortion result in the creation of universal schemes that enrich criminals, who are not only interested in reducing the state’s influence on public relations, but are also trying to establish their dominance in the economic space of information society. The effective policy of law enforcement bodies on counteracting economic crimes in the global information space requires an international consensus regarding the development of public-private partnership in identifying cybercrimes and suppressing criminal practices connected with the use of information technologies.
APA, Harvard, Vancouver, ISO, and other styles
5

Olukolu, Rasul Oriyomi. "An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria." African Journal of Legal Studies 11, no. 2-3 (September 16, 2018): 234–53. http://dx.doi.org/10.1163/17087384-12340034.

Full text
Abstract:
AbstractInternet crime can be defined as unlawful acts using the computer as either a tool or a target or both. Internet networks are used positively to conduct businesses, manage industrial and governmental activities, engage in personal communications, and conduct research. Also, certain confidential information is stored or passed through the medium of the internet. Credit cards containing information of users are used as the major means of buying and selling on the internet. Information infrastructure has become a critical part of the backbone of global economies; therefore, it is imperative that the general public be able to rely on the availability of such informational services with confidence that their communications and data are safe from unauthorized access or modification. It then becomes important for these and other information to be more secured. However, the speed of the internet, its affordability, and its elimination of distance make the internet the hotbed of crimes globally. Cybercrime growth has skyrocketed in recent times, especially in Nigeria; hence, the need for immediate action by law makers to stem the tide. This research, therefore, examines the adequacy or otherwise of the Nigerian legal framework in checking crimes being perpetrated using the internet as a platform with a view to making useful suggestions.
APA, Harvard, Vancouver, ISO, and other styles
6

Nurdin, Rizki. "ANALISA KEAMANAN INTERNET MENGGUNAKAN NESSUS DAN ETHEREAL UNIVERSITAS PUTRA INDONESIA “YPTK” PADANG." Jurnal Teknologi Informasi dan Pendidikan 10, no. 3 (April 10, 2018): 11–25. http://dx.doi.org/10.24036/tip.v10i3.9.

Full text
Abstract:
With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security
APA, Harvard, Vancouver, ISO, and other styles
7

Sekhavat, Yoones A. "Nowcasting Mobile Games Ranking Using Web Search Query Data." International Journal of Computer Games Technology 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9859813.

Full text
Abstract:
In recent years, the Internet has become embedded into the purchasing decision of consumers. The purpose of this paper is to study whether the Internet behavior of users correlates with their actual behavior in computer games market. Rather than proposing the most accurate model for computer game sales, we aim to investigate to what extent web search query data can be exploited to nowcast (contraction of “now” and “forecasting” referring to techniques used to make short-term forecasts) (predict the present status of) the ranking of mobile games in the world. Google search query data is used for this purpose, since this data can provide a real-time view on the topics of interest. Various statistical techniques are used to show the effectiveness of using web search query data to nowcast mobile games ranking.
APA, Harvard, Vancouver, ISO, and other styles
8

Soni, Soni, Afdhil Hafid, and Didik Sudyana. "ANALISIS KESADARAN MAHASISWA UMRI TERKAIT PENGGUNAAN TEKNOLOGI & MEDIA SOSIAL TERHADAP BAHAYA CYBERCRIME." JURNAL FASILKOM 9, no. 3 (November 14, 2019): 28–34. http://dx.doi.org/10.37859/jf.v9i3.1664.

Full text
Abstract:
Abstract Students are one of the many users of technology and the internet. Based on data from the Association of Indonesian Internet Service Providers, it states that as many as 100% of student respondents stated using the internet every day. So that the potential for students to become victims of cyber crime continues to increase. This is because many internet users are not careful in using it. Cyber ​​crimes that often occur include identity theft, kidnapping, online fraud, burglary and so forth. During this time many users who write their personal identity on social media, not even a few who post about the location they visit. Then many students are fond of using free wifi. Cyber​​crime will not occur if there is vigilance and caution from its users. Students should be able to realize the negative effects of cyberspace. For this reason, an analysis is needed regarding the presence of social media users. In this research, analysis of student awareness in the informatics engineering study program, computer science faculty, Muhammadiyah University of Riau to find out how much the level of student awareness about the dangers of cybercrime is based on the social media and user awareness categories. From the results of the study, it was concluded that students of the Department of Informatics had a fairly good level of awareness. This is evidenced from the average results obtained in the social media category, 83.4% of students have a fairly good awareness while the average user awareness category of 72.7%. However, the university, faculty and study programs must still provide assistance, education or outreach to those who do not have a good level of vigilance because there are still a few percent who still do not have a good level of vigilance. Keywords: cybercrime, students, awareness, social media, internet Abstrak Mahasiswa merupakan salah satu pengguna teknologi dan internet yang cukup banyak. Berdasarkan data dari Asosiasi Penyedia Jasa Internet Indonesia, menyebutkan bahwa sebanyak 100% responden dari mahasiswa menyatakan menggunakan internet setiap harinya. Sehingga potensi mahasiswa menjadi korban kejahatan siber pun terus meningkat. Hal ini disebabkan karena banyak pengguna internet yang tidak berhati-hati dalam menggunakannya. Kejahatan cyber yang sering terjadi diantaranya adalah pencurian identitas, pembulian, penipuan online, perampokan dan lain sebagainya. Selama ini banyak pengguna yang menuliskan identitas pribadinya di media social, bahkan tidak sedikit yang memposting tentang lokasi yang mereka kunjungi. Kemudian banyak mahasiswa yang gemar menggunakan wifi gratis. Kejahatan cyber tidak akan terjadi jika ada kewaspadaan dan kehati-hati dari para penggunanya. Seharusnya para mahasiswa dapat menyadari dampak negatif dari dunia maya. Untuk itu perlu dilakukan analisis terkait kesadaarn pengguna media sosial. Dalam penelitian ini, analisis kesadaran mahasiswa di program studi teknik informatika, fakultas ilmu komputer, universitas muhammadiyah riau untuk mengetahui seberapa besar tingkat kesadaran mahasiswa tentang bahaya cybercrime didasarkan pada kategori media sosial dan kesadaran pengguna. Dari hasil penelitian, disimpulkan bahwa mahasiswa Jurusan Teknik Informatika memiliki tingkat kesadaran yang cukup baik. Hal ini dibuktikan dari hasil rata-rata yang diperoleh pada kategori media sosial, 83,4% mahasiswa mempunyai kesadaran yang cukup baik sedangkan pada kategori kesadaran pengguna rata-rata sebanyak 72,7%. Namun pihak universitas, fakultas dan juga program studi tetap harus memberikan pendampingan, edukasi ataupun sosialisasi bagi yang belum memiliki tingkat kewaspadaan yang baik karena masih ada beberapa persen masih masih belum mempunyai tingkat kewaspadaan yang baik. Kata kunci: cybercrime, mahasiswa, kesadaran, media social, internet
APA, Harvard, Vancouver, ISO, and other styles
9

Putri, M.Kom, Anggia Dasa. "SISTEM PAKAR MENDETEKSI TINDAK PIDANA CYBERCRIME MENGGUNAKAN METODE FORWARD CHAINING BERBASIS WEB DI KOTA BATAM." Edik Informatika 3, no. 2 (October 9, 2017): 197–210. http://dx.doi.org/10.22202/ei.2017.v3i2.2244.

Full text
Abstract:
Advances in information technology provides much convenience for human life, but even this progress simultaneously cause a variety of problems that are not easy to find a way out. One of the problems arising from the development of information technology, namely the birth of crimes that refers to activities undertaken in the virtual world using a computer or computer network technology, known as cybercrime (cybercrime). Crime cybercrime common daily life such Decency, Gambling, humiliation or defamation, extortion or threatening, Spreading false news, Abuse, Hacker, Cracker, falsification of data, due to internet users, or lack of awareness about the Law Number 11 Year 2008 Information and Electronic Transaction applicable. Therefore, this study aims to develop an expert system using programming language PHP (Hypertext Preprocessor) and MySQL database-based web using a forward chaining method to make it easier, knowing, and assist in taking an answer or conclusion of cases and sanctions crime cyberspace (cybercrime) based on Law No. 11 of 2008 on Information and Electronic Transactions applicable.
APA, Harvard, Vancouver, ISO, and other styles
10

Hikmatulloh, Reza, and Evy Nurmiati. "Analisis Strategi Pencegahan Cybercrime Berdasarkan UU ITE Di Indonesia (Studi Kasus: Penipuan Pelanggan Gojek)." Kosmik Hukum 20, no. 2 (July 22, 2020): 121. http://dx.doi.org/10.30595/kosmikhukum.v20i2.6449.

Full text
Abstract:
Cybercrime can be defined as illegal activities with computer intermediaries that can be carried out through global electronic networks. In computer networks such as the internet, the problem of crime is becoming increasingly complex due to its wide scope. The purpose of this study is to see what strategies are suitable for preventing cybercrime actions via cell phones based on the ITE Law in Indonesia. The data analysis method used in this study is to use routine activity theory. Cohen and Felson's incidence that crime against crime is related to three variables, namely someone who is motivated, the target who is the target, and the absence of protection from the target (absence of a capable guard). The suggestion is that Gojek provides education about awareness in this fraud case. Gojek appeals to users on their social media to be more careful in trusting information. In addition, the government should not only give warnings to its users as a form of vigilance, but the government should be more optimal in giving more effort.Keywords: Cybercrime, ITE Law, Routine Activity Theory
APA, Harvard, Vancouver, ISO, and other styles
11

Aditama, Ryan. "Penegakan Hukum Cyber Crime Terhadap Tindak Pidana Pencurian Uang Nasabah Dengan Cara Pembajakan Akun Internet Banking Lewat Media Sosial." Wajah Hukum 5, no. 1 (April 23, 2021): 118. http://dx.doi.org/10.33087/wjh.v5i1.360.

Full text
Abstract:
Crime in the field of cyberspace or commonly known as cyber crime basically refers to computer devices and technological devices that use a system connected to the internet as an element of its use. Progress in the field of information technology, which is the origin of the emergence of cyber crime, will legally bring both positive and negative impacts to the law itself. On the other hand, criminals, especially hackers who deliberately commit acts illegally to take someone's personal data, especially like Internet Banking users who are connected to the whatsapp number belonging to their bank account, of course many criminals have used this opportunity to break into the account. Someone's Internet Banking lately often happens because the operator asks for an OTP (One-Time-Passwrord) code. Related to the research made by this writer with the use of the type of research that is normative juridical here is related to research aimed at the rules of norms contained in a rule of law, while the conceptual approach used is an approach of legislation and a conceptual approach through disclosing several principles Laws relating to Law Enforcement of Cyber Crime Against Crime of Theft of Customer Money By Hijacking Internet Banking Accounts Through Social Media, discussions are conducted in a deductive manner to obtain qualitative conclusions. Related to the crime of cyber crime against the crime of theft of customer money by hijacking internet banking accounts via social media is a very urgent issue to be followed up, because in today's modern era, all human activities cannot be separated and kept away from the Internet and its users. Internet Banking account, where everything is currently being demanded to be modern due to the rapid development of technology and information at this time and is also something that must be resolved immediately. The Indonesian government in this case is part of the Ministry of Information and Communication which works with all stakeholders and strives to realize this hope.
APA, Harvard, Vancouver, ISO, and other styles
12

Kotwal, Shallu, and Jatinder Manhas. "Investigation of Different Constraints in Cybercrime & Digital Forensics." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 222. http://dx.doi.org/10.23956/ijarcsse/v7i7/0209.

Full text
Abstract:
With rapid changes in technology and its increased use in different organizations, the cybercrime and digital forensics methods are also making advancement in new ways to tackle the latest trends in cyber crime. Cybercrime refers to any crime that involves a computer network or any public or private system. Cyber crime is emerging as a serious threat worldwide. The government organizations, police departments and various intelligence units of different countries have started to act accordingly. To control and investigate cybercrime, the investigators use various Digital forensics methods and mechanisms. Digital forensics is the procedure of investigating computer crimes in cyber world. Many researchers have been done a lot in this area to help forensic investigators to resolve the existing challenges with different methodologies designed by them. Experts provided with different tools and technologies to resolve the threats related to cyber crime in a more efficient and speedy manner with minimum loss to the victim. Still the desired technologies and tools are not that much efficient that they can control the occurrence of different types of cyber crime activities. This paper reviews the complete details regarding the growth of cybercrime and its various modes of occurrence at different level. Authors in this paper tries to bring few facts and figures which would be an eye-opener for computer and internet users. Therefore, the current manuscript provides the understanding of various types of cyber crimes and its impact on different section of the society.
APA, Harvard, Vancouver, ISO, and other styles
13

Bagavieva, E. A. "THE CONCEPT AND MEANING OF INFORMATION ABOUT CONNECTIONS BETWEEN SUBSCRIBERS AND (OR) SUBSCRIBER DEVICES IN THE CRIMINAL PROCEEDINGS OF THE RUSSIAN FEDERATION." Bulletin of Udmurt University. Series Economics and Law 31, no. 1 (February 12, 2021): 142–47. http://dx.doi.org/10.35634/2412-9593-2021-31-1-142-147.

Full text
Abstract:
In the article, based on the analysis of the practice of applying the procedural action "obtaining information about connections between subscribers and (or) subscriber devices", its significance in the criminal process of the Russian Federation is noted. The essential features inherent in information about connections between subscribers and (or) subscriber devices when applying the above-mentioned procedural action are considered, its definition is formulated. It is relevant to obtain information not only about telephone, but also about computer connections in the process of investigating crimes, taking into account the growth of crime using digital technologies. The features of the use of information about Internet connections of users of communication services in establishing the circumstances to be proved in a criminal case are outlined, in particular, the lack of an unambiguous answer to the question of the subscriber's location, which, for example, in the absence of direct evidence, may cast doubt on the guilt of a person in committing a crime.
APA, Harvard, Vancouver, ISO, and other styles
14

Liao, Zitian, Shah Nazir, Anwar Hussain, Habib Ullah Khan, and Muhammad Shafiq. "Software Piracy Awareness, Policy, and User Perspective in Educational Institutions." Scientific Programming 2020 (December 11, 2020): 1–14. http://dx.doi.org/10.1155/2020/6647819.

Full text
Abstract:
Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive rights of the developer in the form of an individual or organization as described in the relevant sale agreement (license). Owing to the evolution in software development and Internet, software piracy has become a main concern for many software companies. Software companies are confronted with extremely high losses due to the piracy of software. Pirates achieve a lot of money by doing business with pirated software. General end-users of the software are not aware of this serious crime and of the legal consequences of breaking the law. Even most of the time, end-users and consumers think that it is none of their concern and not an important issue for them. Although, in reality, if an organization is working with pirated software, there is a risk of failure of the software, and it might put their organization at risk as pirated software does not receive any support from the development organization. This ultimately puts the consumer organization in huge financial loss. Due to these reasons, software piracy has turned out to be a major concern, more emergent due to the extravagant development of the software industry and the availability of software(s) on the Internet. In this paper, we analyzed and identified the ratio of software piracy, awareness regarding piracy, and the policy of the licensed software provided. Based on the results of the study, some suggestions are proposed by which the level of piracy can be reduced.
APA, Harvard, Vancouver, ISO, and other styles
15

Guo, Xifeng, Qiannan Zhao, Shoujin Wang, Dan Shan, and Wei Gong. "A Short-Term Load Forecasting Model of LSTM Neural Network considering Demand Response." Complexity 2021 (April 14, 2021): 1–7. http://dx.doi.org/10.1155/2021/5571539.

Full text
Abstract:
As one of the key technologies for accelerating the construction of the ubiquitous Internet of Things, demand response (DR) not only guides users to participate in power market operations but also increases the randomness of grid operations and the difficulty of load forecasting. In order to solve the problem of rough feature engineering processing and low prediction accuracy, a short-term load forecasting model of LSTM neural network considering demand response is proposed. First of all, in view of the strong randomness and complexity of input features, the weighted method is used to process multiple input features to strengthen the contribution of effective features and tap the potential value of features. Secondly, an improved genetic algorithm (IGA) is used to obtain the best LSTM parameters; finally, the special gate structure of the LSTM model is used to selectively control the influence of input variables on the model parameters and perform load forecasting. The experimental results show that the research has high prediction accuracy and application value and provides a new way for the development of power load forecasting.
APA, Harvard, Vancouver, ISO, and other styles
16

Fadlil, Abdul, Imam Riadi, and Sukma Aji. "Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics." Bulletin of Electrical Engineering and Informatics 6, no. 2 (June 1, 2017): 140–48. http://dx.doi.org/10.11591/eei.v6i2.605.

Full text
Abstract:
Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and more costs mitigation to increase in this era. Attackers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
17

Xu, Zonggang. "Social Governance Structure Construction and Resource Allocation Methods under the Management Mode of the Internet of Things." Wireless Communications and Mobile Computing 2021 (July 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/7963311.

Full text
Abstract:
Aiming at the problems in the social governance structure level under the management mode of the Internet of Things, this paper designs a network agent based on the idea of service grid construction that has the functions of service resource configuration discovery, load balancing, and protocol conversion. Using it as a service governance infrastructure reduces the coupling between business services and service governance, and the network agent will intercept the service call traffic within the platform to achieve cross-protocol and cross-frame service communication. Through the proposed global query decomposition strategy and algorithm, a global query mapping is realized, which solves the problem of global query decomposition based on the global data model. We designed the unified management mechanism of two commonly used IoT databases based on XML. This process involves the realization of heterogeneous Internet of Things database resource configuration, data mode conversion, and global query mapping. Among them, in the process of data schema conversion, the conflict of the data in the schema mapping is resolved, the XML Schema is generated, the schema mapping metadata is established, and the XML document of the data is generated. We build a framework for optimal allocation of cloud computing resources based on load forecasting and propose an adaptive elastic control system for resource allocation based on resource status monitoring and demand forecasting. In view of the low resource utilization problem caused by the resource management mode of single virtual machine serving single user adopted by Internet of Things service providers, this paper constructs a new public cloud architecture with a five-layer structure. On the basis of this architecture, an adaptive configuration mode of virtualized resources based on a single virtual machine serving multiple users is proposed. This mode can automatically search for optimal virtualization resources for application resource requests made by different users and run different applications on the same virtual machine without affecting the quality of service, so that IoT providers can guarantee services. At the same time, it improves the utilization efficiency of IoT resources and reduces energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
18

Yuda, Putu Agus Prawira Dharma, and I. Putu Gede Hendra Suputra. "Implementation of the Support Vector Machine (SVM) Algorithm in Classifying Website Phishing." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 4 (May 29, 2021): 467. http://dx.doi.org/10.24843/jlk.2021.v09.i04.p03.

Full text
Abstract:
The development of the internet is so significant, if we look at the growth of the internet in the world, it has reached more than 4 billion and in Indonesia, there are more than 171 million users out of a total population of more than 273 million people. This is due to the very fast development of information technology and various kinds of media and functions. However, of the advances in internet technology, it did not escape the existing internet attacks. One of them is phishing. Phishing is a form of activity that threatens or traps someone with the concept of luring that person. Namely by tricking someone so that the person indirectly provides all the information the trapper needs. Phishing is included in cybercrime, where crime is rampant through computer networks. Along with the times, crime is also increasingly widespread throughout the world. So that the threats that are happening today are also via computers. With such cases, this study aims to predict phishing sites with a classification algorithm. One of them is by using the SVM (Support Vector Machine) Algorithm. This research was conducted by classifying the phishing website data set and then calculating the accuracy for each kernel. From the study, the results are SVM with Gaussian RBF has the best performance with 88.92% accuracy, and SVM with Sigmoid kernel has the worst performance with 79.33% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
19

Salhi, Dhai Eddine, Abdelkamel Tari, and Mohand Tahar Kechadi. "Email Classification for Forensic Analysis by Information Gain Technique." International Journal of Software Science and Computational Intelligence 13, no. 4 (October 2021): 40–53. http://dx.doi.org/10.4018/ijssci.2021100103.

Full text
Abstract:
One of the most interesting fields nowadays is forensics. This field is based on the works of scientists who study evidence to help the police solve crimes. In the domain of computer science, the crimes within computer forensics are usually network attacks, and most attacks are over the email (the case of this study). Email has become a daily means of communication which is mainly accessible via internet. People receive thousands of emails in their inboxes and mail servers (in which people can find emails in those lists). The aim of this study is to secure email users by building an automatic checking and detecting system on servers to filter the bad emails from the good ones. In this paper, the authors will do a study based on a new method of emails clustering to extract the bad and good ones. The authors use the gain information technique like an algorithm of clustering, whose principle is to calculate the importance of each attribute (in this study, the authors talk about the attributes that constitute the email) to draw the importance tree and at the end extract the clusters.
APA, Harvard, Vancouver, ISO, and other styles
20

Mahlous, Ahmed, and Houssam Mahlous. "Private Browsing Forensic Analysis: A Case Study of Privacy Preservation in the Brave Browser." International Journal of Intelligent Engineering and Systems 13, no. 6 (December 31, 2020): 294–306. http://dx.doi.org/10.22266/ijies2020.1231.26.

Full text
Abstract:
The Internet and its users are in continual growth. With it grows the number of organized crimes on the Internet and the potential for individuals to carry out illegal activities. These criminals have gained more awareness of private browsing facilities, and many have found a haven in privacy designed browsers that cover up their tracks and shield their nefarious actions. The development of these privacy features has proven to be a challenge for digital forensic investigators. They strive to perform a thorough analysis of web browsers to collect artefacts relating to illegal activity to be presented as evidence to the court of law and used to convict criminals. “Brave” browser is one of the most recent and fastest-growing private browsers that, up to this point, has not been studied in-depth, and its privacy preservation functionality remains unclear. In this paper, we studied Brave’s private browsing mode, examined its privacy-preserving and forensic data acquisition, and outlined the location and type of evidence available through live and post-mortem state analysis. The unique approach taken included a set of experiments that unveiled how the browser functions and showed the appropriate tools that could be utilized to extract leftover artefacts. Analysis of our results showed that despite Brave leaving no traces of browsing activity on the Hard Disk, visited URLs, images, keyword searches, and even cached videos were retrievable from the RAM, which shows that Brave is not entirely private.
APA, Harvard, Vancouver, ISO, and other styles
21

Junaidi, Junaidi. "Kajian Yuridis Pasal 362 Kitab Undang-Undang Hukum Pidana dan Pasal 30 Undang-Undang Nomor 11 tahun 2008 tentang Informasi Dan Transaksi Elektronik Terhadap Pencurian Internet Wifi." Wajah Hukum 4, no. 2 (October 19, 2020): 325. http://dx.doi.org/10.33087/wjh.v4i2.190.

Full text
Abstract:
The use of private wifi internet, especially at home, has become commonplace, wifi internet is used without permission from the owner, especially without his knowledge, if this happens it will result in the owner experiencing losses. Home wifi internet that should be used by the family but is also enjoyed by other people without the permission and knowledge of the owner, the owner who pays but other people use it. The crime of theft is regulated in Article 362 of the Criminal Code, while Article 3o of Law Number 11 of 2008 concerning Electronic Information and Transactions is more about illegal access. The application of criminal law ini the crime of theft of internet wifi, as regulated in : a) Article362 of the Criminal Code, internet wifi can be interpreted extensively as one form of “goods” which in an element of Article 362 of the Criminal Code, this can be equated with “electricity” and “gas” although it does not have a from, is not visible and felt, but has an economic value to be said as “goods” because to be able to use or enjoy wifi internet service users must purchase a wifi internet package first; b) Article 30 paragraph (1), (2) dan (3) Law Number 11 of 2008 concerning Electronic Information and Transaction may be imposed on perpetrators of wifi internet theft because it is related to illegal access. The act of stealing internet quota by using software or computer applications to break into the internet network to obtain a wifi internet username and password in order to gain access using wifi internet. In the settlement of a criminal act, proof is essential, because in the settlement of a criminal case what is sought is a material truth.
APA, Harvard, Vancouver, ISO, and other styles
22

Komarov, Anton Anatolevich. "The results of assorted research on the questions of dynamics of victimization from Internet fraud in the Russian Federation (2010-2019)." Право и политика, no. 12 (December 2020): 15–33. http://dx.doi.org/10.7256/2454-0706.2020.12.32966.

Full text
Abstract:
The object of this research is the process of victimization of population of the Russian Federation from Internet fraud in the period from 2010 to 2019. The subject of this research is a number of criminological indicators that characterize the dynamics of victimization and criminal victimization. Using the empirical data, the author determines the actual number of the Internet fraud victims; built a retrospective model of development of this process based on calculation of the average annual rate of growth; increases awareness on the dynamics of the number of victims until 2013. The conclusion is made on the growing scope of victimization, which according to the data of assorted research of 2013-2019 carries an exponential function. Each three years the total number of victims doubles, which continues to grow since 2012 (associated with the reform of criminal legislation aimed at identification of the additional types of fraud using computer technologies). This pattern was used for structuring the projection models of victimization of users of the Russian segment of the Internet until 2021 (inclusively). The results of additional assorted research of 2020 demonstrate that only in 20% of cases the damage from Internet fraud exceeds 1,000 rubles. In accordance of the principle of recurrence of the Internet fraud, the structure of victimization is as follows: 52% are the victims of such crimes in recent year; 1/3 of respondents were the victims in previous years, but not in recent year; and only 13% became the victims in past years and recent year.  
APA, Harvard, Vancouver, ISO, and other styles
23

Li, Xiaohui, and Hongbin Dong. "A Transaction Trade-Off Utility Function Approach for Predicting the End-Price of Online Auctions in IoT." Wireless Communications and Mobile Computing 2021 (February 2, 2021): 1–10. http://dx.doi.org/10.1155/2021/6656421.

Full text
Abstract:
To stimulate large-scale users to participate in the big data construction of IoT (internet of things), auction mechanisms based on game theory are used to select participants and calculate the corresponding reward in the process of crowdsensing data collection from IoT. In online auctions, bidders bid many times and increase their bid price. All the bidders want to maximize their utility in auctions. An effective incentive mechanism can maximize social welfare in online auctions. It is complicated for auction platforms to calculate social welfare and the utility of each bidder’s bidding items in online auctions. In this paper, a transaction trade-off utility incentive mechanism is introduced. Based on the transaction trade-off utility incentive mechanism, it can make the forecasting process consistent with bidding behaviors. Furthermore, an end-price dynamic forecasting agent is proposed for predicting end prices of online auctions. The agent develops a novel trade-off methodology for classifying online auctions by using the transaction trade-off utility function to measure the distance of auction items in KNN. Then, it predicts the end prices of online auctions by regression. The experimental results demonstrate that an online auction process considering the transaction utility is more consistent with the behaviors of bidders, and the proposed prediction algorithm can obtain higher prediction accuracy.
APA, Harvard, Vancouver, ISO, and other styles
24

Jondong, Zephirinus. "Kebijakan Hukum Pidana bagi Tindak Pidana Cyber Terrorism dalam Rangka Pembentukan Hukum Positif di Indonesia." Jurnal Preferensi Hukum 1, no. 2 (September 15, 2020): 21–27. http://dx.doi.org/10.22225/jph.1.2.2337.21-27.

Full text
Abstract:
The advancement of internet-based computer technology has not only a positive impact on its users but also a negative impact, one of which is the creation of new forms of crime such as terrorism. Based on this background, this research was conducted with the aim of revealing how the regulation of criminal acts of terrorism committed through cyberspace (cyber terrorism) in positive law in Indonesia and how criminal law policies in Indonesia in the future in regulating criminal acts of terrorism committed through cyberspace (cyber terrorism). This research was designed using normative legal research methods. The results of this study reveal that in Indonesia, the criminal act of cyber terrorism is not regulated in the Criminal Code (KUHP) or the Laws and Regulations that regulate the field of terrorism. In a situation like this, the perpetrator of the crime of cyber terrorism can be declared free from punishment because there is no element against the law regulated in the Act attached to the act. Therefore, in order to be convicted of a crime, the crime of cyber terrorism must be formulated clearly. In addition, in establishing a criminal law policy regarding cyber terrorism, cyber terrorism must be considered so that it can be made a criminal act and sanctions can be imposed on the perpetrator
APA, Harvard, Vancouver, ISO, and other styles
25

Babanina, Viktoria, Iryna Tkachenko, Olena Matiushenko, and Mykola Krutevych. "Cybercrime: History of formation, current state and ways of counteraction." Revista Amazonia Investiga 10, no. 38 (April 12, 2021): 113–22. http://dx.doi.org/10.34069/ai/2021.38.02.10.

Full text
Abstract:
The article examines the history of the emergence and development of cybercrime, the specifics of the current situation in society, which contributes to an increase in the number of cybercrimes and ways of countering cybercrime. It has been established that cybercrime first appeared in the middle of the last century. This was due to the emergence and subsequent intensive growth in the number of computers, and then smartphones. However, cybercrime that exists today is significantly different from what it was in its early days. Today, the number of devices and services provided via the Internet is growing, the number of users is growing, and, accordingly, the number of cybercrimes and the level of their organization is growing. In the course of the study, the differences between the concepts of "cybercrime" and "computer crimes" were identified, as well as the main features of cybercrimes. The problems that law enforcement agencies face in the investigation and fight against cybercrimes were revealed. The factors contributing to the growth of cybercrime were also analyzed. Based on the analysis, the main directions of combating cybercrime and preventing the growth of the number of cybercrimes in society were developed.
APA, Harvard, Vancouver, ISO, and other styles
26

Martínez-Caro, Eva, Gabriel Cepeda-Carrión, Juan G. Cegarra-Navarro, and Alexeis Garcia-Perez. "The effect of information technology assimilation on firm performance in B2B scenarios." Industrial Management & Data Systems 120, no. 12 (July 14, 2020): 2269–96. http://dx.doi.org/10.1108/imds-10-2019-0554.

Full text
Abstract:
PurposeThe spread of the Internet in the business world has led to the development of new business-to-business (B2B) settings. Although a large number of companies have adopted B2B strategies, many of these fail to implement such strategies effectively. The most common barriers encompass the technology assimilation by users. This study investigates how IT assimilation can encourage potential and realised absorptive capacity and how these can, in turn, facilitate organisational agility and performance.Design/methodology/approachA survey was conducted in Spanish companies that make use of Editran, a platform to support B2B strategies. In total, 110 valid responses were obtained. Advanced analytical methods of PLS-SEM as fit measures and prediction procedure recently developed by Shmueli et al. (2019) were used.FindingsThe results show that there is a positive relationship between the three preceding constructs (IT assimilation, potential and realised absorptive capacity) and organisational agility. This study also finds support for a direct relationship between organisational agility and firm performance.Originality/valueThis study provides a further understanding and forecasting through the theoretical development and empirical investigation of the role of IT assimilation on firm performance in a B2B scenario by: (1) examining the link between IT and the firm's absorptive capacity and, more specifically, with the two subsets of potential and realised absorptive capacity, which have not received much attention from previous literature; and (2) exploring how an improvement in potential and realised absorptive capacity may place firms in a better position to develop their organisational agility.
APA, Harvard, Vancouver, ISO, and other styles
27

Okibo, Bichanga Walter, and Obara Brigit Ochiche. "Challenges Facing Information Systems Security Management in Higher Learning Institutions: A Case Study of the Catholic University of Eastern Africa - Kenya." International Journal of Management Excellence 3, no. 1 (April 30, 2014): 336–49. http://dx.doi.org/10.17722/ijme.v3i1.122.

Full text
Abstract:
With the popularity of internet applications, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of attention from both academia and practitioners. However, there is lacking a theoretical framework for the challenges facing information security management in higher learning institutions. Thus this research looked into the challenges facing information systems security management in higher learning institutions. The study was guided by understanding the major challenges facing Information Systems Security Management and establishing the extent of the use of Information Systems Security Management in higher learning institutions. The study used descriptive survey design. It targeted information systems projects managers, administrators or top management and other users (staff) of the systems in key departments. Systematic sampling strategy was used. Descriptive statistics of SPSS were used to analyze the data. Factor analysis technique was used to identify the major challenges that affect management of an institution’s information system security. Pearson’s Chi-Square was used to test the relationships that exist between the categorical variables. The study found out that system vulnerability, computer crime and abuse, environmental security and financial backing/security are key challenges institutions of higher learning are experiencing in the management of their information systems. The study recommends the implementation of new policies and procedures to guide information system security. Programs for monitoring and evaluating information systems security in relation to performance indicators should be put in place. Institutions should invest heavily in developing their staff through training programmes such as seminars, workshops and conferences to further develop staff skills and abilities on information systems security issues.
APA, Harvard, Vancouver, ISO, and other styles
28

Bhandari, Sandeepak, and Vacius Jusas. "An Abstraction Based Approach for Reconstruction of TimeLine in Digital Forensics." Symmetry 12, no. 1 (January 6, 2020): 104. http://dx.doi.org/10.3390/sym12010104.

Full text
Abstract:
Acquiring a clear perspective of events and artefacts that occur over time is a challenging objective to accomplish in digital forensics. Reconstruction of the timeline of events and artefacts, which enables digital investigators to understand the timeline of digital crime and interpret the conclusion in the form of digital evidence, is one of the most paramount and challenging tasks in digital forensics. This challenging task requires the analysis of immense amounts of events because of the explosive growth of the internet, interconnected devices, and innovative technology nowadays. Various approaches have been developed during the last decade, but most of them are not able to handle huge volumes of data, explore evidence, and enhance the understandability of timelines in a competent way to assist the investigator. For this purpose, we introduce a methodology backed by an abstraction concept and forensic tools that can support investigators during the reconstruction, understanding of the timeline of events and artefacts, and interpretation of evidence by tracing the activities performed by users of the typical computer system. The Java programming language is used to implement the proposed methodology, which is object-oriented and follows the symmetry definition in software. Generally, symmetry in software can be viewed as an invariant change that aims to preserve a specific property of the system, namely its structure, behaviour, regularity, similarity, familiarity and uniformity. Similarly, the abstraction-based methodology also permits us to follow the properties of symmetry. For instance, a uniform structure is stipulated for all the sources at the particular level of abstraction, such as the number of fields to be considered to provide the abstract level of timeline. The primary purpose of this approach is to assist with the analysis of the timeline in an optimum way. This paper illustrates the approach and then focuses on conceptual aspects of the methodology. The performed experiment shows that the proposed approach enhanced the analysis of the timeline.
APA, Harvard, Vancouver, ISO, and other styles
29

"Some Types of Computer Crime and Cybercrime in Ukraine." Access to Justice in Eastern Europe 4, no. 3 (August 1, 2021): 191–97. http://dx.doi.org/10.33327/ajee-18-4.3-n000078.

Full text
Abstract:
In this note, the most frequent types of computer crime on the Internet in Ukraine are analysed. It is suggested that international experience in computer crime investigation should be used to combat this because cybercrime has become an international problem, causing enormous damage to governments, commercial entities, and computer systems of individual users. Governments and commercial entities spend significant funds to prevent losing information and ensure its protection. Cybercrime is based on technical knowledge, which is difficult to detect or prevent. This type of criminal activity has a high latency because of the difficulty of determining the qualification of a criminal offence.
APA, Harvard, Vancouver, ISO, and other styles
30

Mamade, Bayisa Kune, and Diriba Mangasha Dabala. "Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University’s Academic Staffs." Journal of Cyber Security and Mobility, June 15, 2021. http://dx.doi.org/10.13052/jcsm2245-1439.1044.

Full text
Abstract:
The advancement of information communication technology has triggered a revolution in using the Internet for legitimate educational purposes on university campuses. Therefore, the Internet has changed the way of human communication and contributed to the development of mankind. On the other hand it is regrettable that its revolution has helped malicious users to exploit it for the malign purpose to commit a cyberspace crime that has in turn negatively affected fellow users who were preyed on by cyber predators. This work aimed to examine the awareness of cybersecurity, the measures taken to protect against cyberattacks and the state of victimization among professors at Ambo University. Thus, the present study comes up with the following findings. First, the result shows that the respondents’ cybersecurity awareness was significantly influenced by cyber-crime victimization, fields of study, and protection measures. Second, the current study also depicts that the respondents’ protection measures were connected to and influenced by cyber-crime victimization, education level, and cyber-security awareness. Finally, the study’s findings show that being a cyber-crime victim has been linked to predictors’ variables: protection measures and the level of cybersecurity awareness.
APA, Harvard, Vancouver, ISO, and other styles
31

Kumari, Madhu. "Cyber Crime and Children in Digital Era." International Journal of Scientific Research in Science and Technology, February 1, 2021, 151–60. http://dx.doi.org/10.32628/ijsrst218124.

Full text
Abstract:
Cyberspace is a virtual world or online world. It is an artificial world created by computers or internet enabled devices or components to communicate. It is digital platform where users interact and communicate with one another with the help of internet. The cybercrime is a rapid growing area of crime in the world. It is defined as a crime in which computers or internet enabled devices to commit an offenses which is categorized into two types such as property crimes (hacking, spamming, identity theft, fraud and copyright infringement) and crimes against the person ( child pornography, sexual abuse of children, cyber stalking, cyber bullying). Crimes in the virtual world is serious threat to the people as cybercriminals uses computer technology to access the personal and professional information or documents of person or organization for evil or malevolently reasons. The aim of the paper is to render the psychology of child predation and child pornography online in India. This paper will discuss about the different measures which should be taken to protect and educate the children about cyber bullying and cyber stalking in India. It will also highlight the legal intervention, effects on victims, punishment and preventative measures for a broad range of cybercrimes. The study will also understand the psychology behind the cybercrimes such as child sex offences and how such crimes can be prevented. The aim of the study is to discuss the role of government and policy makers for the rehabilitation of victims against cybercrimes. The paper will suggest some measures for the holistic development and security of children.
APA, Harvard, Vancouver, ISO, and other styles
32

Pitaksantayothin, Jompon. "INTERNET CENSORSHIP BY LAW: A CHALLENGE TO THE CONSTITUTIONAL RIGHT TO FREEDOM OF EXPRESSION IN THAILAND." UUM Journal of Legal Studies, December 1, 2014. http://dx.doi.org/10.32890/uumjls.5.2014.4575.

Full text
Abstract:
In Thailand, at present, content on the Internet is subject to a legal regulatory framework. The Ministry of Information and Communication Technology (MICT) takes a leading role in enforcing the Computer-Related Crime Act 2007 to censor content on the Internet which is deemed ‘illegal’. In this article, it is contended that the legal regulation of Internet content which Thailand adopts is problematic in several aspects. This could pose a serious threat to the constitutional right to freedom of expression of Internet users in Thailand. Keywords: Internet censorship, freedom of expression, Thailand.
APA, Harvard, Vancouver, ISO, and other styles
33

Nanang, Herlino. "Otentikasi Data Menggunakan Algoritma Asimetrik Riverst Shamir Adleman (RSA)." JURNAL TEKNIK INFORMATIKA 2, no. 1 (September 28, 2011). http://dx.doi.org/10.15408/jti.v2i1.5.

Full text
Abstract:
The development of computer systems and their interconnection via the Internet has increased the dependence of both individuals and organizations. The Internet is a public network whose existence is very necessary as an information and communication medium, which is free. This, in turn, has led to a heightened awareness of security issues Security problem are importaint. At information system many issuer about computer crime and difficult to differend which true data. Many models which used togain unauthorized access to data. In order for information to be used only by authorized people to avoid fraud and to ensure the security of users and server, a system needs to be developed which separates users and servers. One technology that can meet the requirement above is cryptography. In data, the needed assurances are that only intended recipients are able to access the appropriate information (confidentiality), that the information was not altered during transmission (integrity), that the information came from the appropriate sender (authentication). Keywords: Security, Authentication, Data
APA, Harvard, Vancouver, ISO, and other styles
34

Dodel, Matías, Daniela Kaiser, and Gustavo Mesch. "Determinants of cyber-safety behaviors in a developing economy." First Monday, June 12, 2020. http://dx.doi.org/10.5210/fm.v25i7.10830.

Full text
Abstract:
In a world increasingly driven by digital technology, cyber-safety is becoming a pressing concern for Internet users. This article contributes to sociological, psychological, and criminological literature on digital risks by investigating the determinants of individuals’ cyber-safety behaviors. Our study adds new insights to digital inequalities studies, cognitive health behavior models, and fear of crime literature by developing and testing a comprehensive theoretical model in a developing economy (Uruguay). To validate our model, we fit structural equations with data from the 2017 WIP+DiSTO Uy survey, a representative sample of Uruguayans (N=653). We found that operational digital skills were the strongest predictor of cyber-safety, while also providing support for the sequentiality of the digital divide hypothesis, as education and age-based disparities affect cyber-safety through their effect on Internet use, which in turn affects digital skills. Additionally, findings contribute both to cognitive behaviors and fear of crime literature, by attesting that gender and age-based disparities only have an indirect effect on cyber-safety, which is mediated by user beliefs regarding the severity of cyber-victimization. The study also provides evidence for the generalization of cyber-safety behavior theories — originally formulated based on data from developed economies — to developing ones, by stressing the role of digital skills and perceptions of victimization severity as the main direct antecedents of cyber-safety.
APA, Harvard, Vancouver, ISO, and other styles
35

Wu, Min-Hao, Ting-Cheng Chang, and Yi Li-Min. "Digital Forensics Security Analysis on iOS Devices." Journal of Web Engineering, June 9, 2021. http://dx.doi.org/10.13052/jwe1540-9589.20310.

Full text
Abstract:
With the rapid development of the Internet era, cell phones play an essential and indispensable role in nowadays life. Smartphones have profoundly influenced our social relationships and our daily lives. Generally speaking, the most common tools we hear about in our daily lives are QQ, WeChat, and other Internet communication services that allow users to send text messages, pictures, and documents, providing a more convenient and faster medium for people to communicate and chat. The popularity and convenience of mobile technology have changed people’s habits of communication. People no longer need to rely on computers to communicate, and computers cannot communicate anytime and anywhere. In the kernel of Linux and Windows, as long as the Message Hooker will install, it can monitor the messages of other programs, including WeChat and QQ, in this research. We can provide relevant law enforcement officers with effective evidence collection so that criminals will not be able to hide. The suspects often delete their WeChat or QQ records after committing the crime. It impossible for our law enforcement agencies to obtain evidence directly from the cell phone and the crime facts. Our research hopes to use some technology to help law enforcement units effectively obtain strong evidence in the iPhone not to hide the crime facts.
APA, Harvard, Vancouver, ISO, and other styles
36

MacDougall, Alan. "'And the Word Was Made Flesh and Dwelt among Us...'." M/C Journal 2, no. 3 (May 1, 1999). http://dx.doi.org/10.5204/mcj.1751.

Full text
Abstract:
And the Word was made flesh, and dwelt amongst us, ... full of grace and truth. -- John 1, 14. So you use the Internet. Perhaps during the course of today you have interacted with an individual with whom you have had no direct real life experience. In email, on ICQ, or within one of the Activeworlds, you may have come to understand and recognise the personality of someone with whom you interact regularly. Even though you've never met them in the flesh, they have a presence in your life. They may give no clues as to their location or hints at any form of personal identifier. You even accept what they show of themselves as a sort of truth, although it may be unverifiable. What else can you do? In effect, you have been dealing with a pseudonymous individual. The use of pseudonyms "creates a context of 'managed ambiguity', permitting relationship, while offering an opportunity to actively conceal or reveal elements of real-life identity" (Chester & Gwynne). Pseudonymity differs from anonymity in that an alias is bestowed upon or chosen by the user, and used consistently over time. New technologies will allow this idea to be taken even further, with users able to construct untraceable identities for use online. These identities will be the "bodies", the new flesh, the vehicle in which users will conduct their online lives. Like Baudrillard's simulacra, this new flesh may even be a representation of something that does not exist in the real world. The driving forces for Internet pseudonymity may include users' desires to play with the concept of identity and explore their own personalities. As Sherry Turkle notes, "computer-mediated communications can serve as a place for the construction and reconstruction of identities" (Turkle 14). With more and more of our everyday activities occurring online the opportunities increase for creation of an online identity that may be different to that presented in real life. Even in choosing a name for use online, we are creating the new flesh in embryonic form. For example on Internet Relay Chat, like many communication forms on the Internet, there is a lack of visual cues associated with participants. To overcome the lack of information which would otherwise be obtained by viewing participants face to face, a self-chosen name becomes the "only initial way of saying who we are, in literally one word or one expression" (Bechar-Israeli). Thus the chosen name becomes a very important token of identity, and may communicate a quite different picture of its owner than exists in reality. However some Internet users lack the opportunity or inclination for this sort of "play". In particular, for many professional, academic and business users, "their institutional connection is a highly relevant fact" (Wynn & Katz). Conducting themselves pseudonymously would require a long period of reputation and credential building that would interfere with their purpose in using the Internet. Pseudonymity is thus unlikely to be an attractive option for these users. However, out in the wider Internet community, another driver for the development of technological solutions to pseudonymity is a broadly felt concern for privacy on the Internet. In October last year a major survey of Internet users found that respondents ranked privacy as the "single most critical issue facing the Internet" (Graphic, Visualization, & Usability Center). Internet users need assurance that they may conduct online activities without fear of surveillance. The concerns about Internet privacy have expanded beyond the traditional fears of government intrusion to include fears about commercial interests reaching further into our private lives. This latter concern may be best expressed in terms of the commoditisation of private information. Information about the behaviour and patterns of individuals is becoming increasingly valuable in our societies. If information about ourselves is becoming valuable, we hope to respond by controlling access to that information and even requiring something in exchange for its use. Think of a customer loyalty card on which you are collecting "points". In effect, the user has swapped their demographic details and a full purchase history for a prize, or a discount on some future purchase. This allows a commercially useful correlation between the individual and their personal situation, likes, dislikes, wants and needs, and behaviour as a consumer. At the same time the user has (hopefully) gained something from the exchange. For commercial interests on the Internet, such an arrangement is unnecessary because the correlation of individuals with their online behaviour patterns is easier to uncover. One example of this is the recent move of database marketers onto the Internet. Last year IntelliQuest, owners of a large database comprising "over 50% of Internet-enabled households" (IntelliQuest), announced a plan to join forces with 24/7, an Internet advertising firm. Unless the user indicates otherwise, Intelliquest will collect demographic data when a software product is registered online. An identifying file (a "cookie") is placed on the user's hard-drive which can be "read" by Websites visited subsequently. 24/7, in cooperation with the visited Website, are then able to serve advertisements targeted to the specific user. 24/7 will track the movements of specific users, and can then "supply IntelliQuest with online surfing habits to supplement [Intelliquest's] demographic information" (Bicknell). In effect, the Internet user has given away their demographic data and a full browsing history for nothing in return. In response to issues of this nature, researchers around the world are developing methods to separate the content of online communications from association with individual senders and receivers. An example is "Crowds", which "operates by grouping users into a large and geographically diverse group (crowd) that collectively issues requests on behalf of its members" (Reiter & Rubin). This prevents a Webserver from identifying the original user requesting a Web page. At the same time, the user could also employ the "Lucent Personal Web Page Assistant" which inserts randomly generated pseudonyms "into Web forms that request a user's name". The system is designed to "consistently use the same pseudonyms every time a particular user returns to the same site, but use a different pseudonym at each Web site" (Cranor). Although each Website may gain information about the browsing habits of a particular pseudonymous user on their own site, it is unable to cross-reference that information with other sites and databases. Taking these and related ideas further is Zero-Knowledge Systems, whose unreleased "Freedom" product reportedly allows the user to create multiple untraceable digital pseudonyms. The company even states that using Freedom to create different pseudonyms gives the user the "opportunity to separately explore completely different areas of the Internet and avoid being profiled by Internet marketers" (Zero-Knowledge Systems). As yet, all of these technologies are immature and often require a motivation and degree of proficiency possibly beyond that of many Internet users. But increasingly the trend is for the technologies to be built invisibly into the lower levels of Internet infrastructure, so that the user may only need to overtly choose who or what they want to be today. The technical details of presenting a consistent and pseudonymous identity will be taken care of automatically. Pseudonymity, and especially anonymity, on the Internet are subject to abuse. Several anonymous remailers, forerunners of systems like Freedom, have had to shut down or restrict their services. In most cases this was not because of criminal or libellous abuse (which would be difficult to prove given the nature of the systems concerned), but because of mass email spam being routed through them. Authorities worldwide are naturally concerned that anonymising and pseudonymising systems may shield the activities of serious criminals. The Cypherpunks, a loose grouping of Internet cryptography and anonymity advocates, term this the "Four Horsemen of the Infocalypse" scenario. Cypherpunks see authorities exaggerating the spectres of "terrorists, paedophiles, drug dealers, and money launderers" ("Adam") in their arguments for greater regulation of the Internet. Despite the hyperbole on both sides, these are serious issues over which debate will intensify. Up until now a deterrent to crime has been the possibility that a criminal might be held responsible for their actions and be bodily removed from society by being taken to prison. With a real life crime committed under conditions of untraceable pseudonymity, only the criminal's pseudonym may be identified. The pseudonymous identity may be removed from society by perhaps somehow being prevented from using the network. But the actual criminal is still free to create another pseudonym and resume activities. Thus, the pseudonymous identity is not subject to the same physical controls or constraints on behaviour as the bodies we use in real life. Perhaps even more alarmingly, the new flesh may still be subject to what could arguably be seen as derivations of real life crimes, such as rape. By the same token this freedom from constraint could also be a positive thing. A person could choose to shape a pseudonymous identity quite different from their real life identity. They might choose a different name, gender, age, body or personality type; and if they are unsatisfied with their experiment, they may try another. Here, the new flesh allows changes in appearence and personality without therapy or surgery. Explorations of the possibilities inherent in the new flesh might help reconcile people to their problems with the old. The improvement and eventual transparency of pseudonymity enhancing technologies will have wide ranging effects. David Post, of the Cyberspace Law Institute, believes pseudonymous speech "is valuable in a way that anonymous speech is not and cannot be, because it permits the accumulation of reputational capital and 'goodwill' over time in the pseudonym itself, while simultaneously serving as a liability limitation insulating the speaker's 'true identity' from exposure" (Post). Given enough time, we may come to accept and trust a pseudonymous identity without needing to question its real life owner. An individual may ultimately be judged less on who or what they are and more on what they are actually seen to do. Pseudonymous life will permit individuals to take part in all aspects of Internet society, to build communities, participate in electronic commerce, and explore aspects of human existence independently and without compromising their real life identities. As the use of the Internet broadens we shall likely see not only pseudonyms in use, but also avatars, representations of a physical form that the user has chosen as their outward appearance. These may be seen now in some three-dimensional interactive spaces, such as Activeworlds, where the user can construct their own body. The avatar is "seen" by other users as the form and location of a pseudonymous individual. One wonders if the new flesh will be a replacement for the old, rather than a sort of supplement. Certainly there is not the technology available now or in the near future for pseudonymous life as a full replacement for the real, The Matrix notwithstanding. Would anyone really want a full replacement which is technically inferior to the real thing? But perhaps without wanting to divorce themselves from the real world, users will still take up pseudonyms for varied reasons -- among them a desire for experiment, privacy, or simply because their Internet Service provider offers the facility. Stewart Brand once said "we are as gods and might as well get good at it". In terms of the Internet, the potential for an almost godlike power to create identities and appearances could lead to a virtual world of the word made flesh. This new flesh may not necessarily be full of grace and truth, but it will dwell amongst us. References "Adam". "The Four Horsemen of the Infocalyse." 1995. 16 Apr. 1999 <http://www.decode.com/fourhorsemen.php>. Bechar-Israeli, Haya. "From <Bonehead&gt to <cLoNehEAd&gt: Nicknames, Play, and Identity on Internet Relay Chat." 1995. 3 May 1999 <http://www.ascusc.org/jcmc/vol1/issue2/bechar.php>. Bicknell, Craig. "Database Marketing on the Web." 1998. 8 Apr. 1999 <http://www.wired.com/news/news/business/story/15456.php>. Chester, Andrea, and Gillian Gwynne. "Online Teaching: Encouraging Collaboration through Anonymity." Journal of Computer Mediated Communication 4.2 (1998). 12 Apr. 1999 <http://www.ascusc.org/jcmc/vol4/issue2/chester.php>. Cranor, Lorrie. "Internet Privacy: A Public Concern." 1998. 7 Apr. 1999 <http://www.research.att.com/~lorrie/pubs/networker-privacy.php>. Graphic, Visualization, & Usability Center. "10th WWW User Survey." 1999. 7 Apr. 1999 <http://www.gvu.gatech.edu/gvu/user_surveys/survey-1998-10/>. IntelliQuest. "IntelliQuest's Rapidly Growing High-Tech Household Database Now Identifies More Than 11.5 Million Internet-User Households." 1999. 8 Apr. 1999 <http://www.iq2.net/news/hthh.htm>. Post, David. "Pooling Intellectual Capital: Thoughts on Anonymity, Pseudonymity, and Limited Liability in Cyberspace." 1996. 14 Apr. 1999 <http://www.cli.org/DPost/paper8.htm>. Reiter, Mike, and Avi Rubin. "Anonymity Loves Company." 1999. 14 Apr. 1999 <http://www.research.att.com/projects/crowds/>. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Touchstone, 1995. Wynn, Eleanor, and James Katz. "Hyperbole over Cyberspace: Self-presentation & Social Boundaries in Internet Home Pages and Discourse." The Information Society 13.4 (1998). 13 Apr. 1999 <http://www.slis.indiana.edu/TIS/hyperbole.php>. Zero-Knowledge Systems. "What is Freedom?" 1999. 14 Apr. 1999 <http://www.zeroknowledge.com/products/what.asp>. Citation reference for this article MLA style: Alan Macdougall. "'And the Word Was Made Flesh and Dwelt among Us...': Towards Pseudonymous Life on the Internet." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/life.php>. Chicago style: Alan Macdougall, "'And the Word Was Made Flesh and Dwelt among Us...': Towards Pseudonymous Life on the Internet," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/life.php> ([your date of access]). APA style: Alan Macdougall. (1999) 'And the word was made flesh and dwelt among us...': towards pseudonymous life on the Internet. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/life.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
37

Alduailij, Mona A., Ioan Petri, Omer Rana, Mai A. Alduailij, and Abdulrahman S. Aldawood. "Forecasting peak energy demand for smart buildings." Journal of Supercomputing, December 8, 2020. http://dx.doi.org/10.1007/s11227-020-03540-3.

Full text
Abstract:
AbstractPredicting energy consumption in buildings plays an important part in the process of digital transformation of the built environment, and for understanding the potential for energy savings. This also contributes to reducing the impact of climate change, where buildings need to increase their adaptability and resilience while reducing energy consumption and maintain user comfort. The use of Internet of Things devices for monitoring and control of energy consumption in buildings can take into account user preferences, event monitoring and building optimization. Detecting peak energy demand from historical building data can enable users to manage their energy use more efficiently, while also enabling real-time response strategies (including control and actuation) to known or future scenarios. Several statistical, time series, and machine learning techniques are proposed in this work to predict electricity consumption for five different building types, by using peak demand forecasting to achieve energy efficiency. We have used several indigenous and exogenous variables with a view to test different energy forecasting scenarios. The suggested techniques are evaluated for creating predictive models, including linear Regression, dynamic regression, ARIMA time series, exponential smoothing time series, artificial neural network, and deep neural network. We conduct the analysis on an energy consumption dataset of five buildings from 2014 until 2019. Our results show that for a day ahead prediction, the ARIMA model outperforms the other approaches with an accuracy of 98.91% when executed over a 168 h (1 week) of uninterrupted data for five government buildings.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhmurov, Dmitry, and Rimma Klyuchko. "Cyber-Victimology as a New Reality of the Technotronic Society (Gender Research)." Baikal Research Journal 11, no. 1 (March 31, 2020). http://dx.doi.org/10.17150/2411-6262.2020.11(1).18.

Full text
Abstract:
The article studies some issues of cyber-victimology development. This is a doctrine of the crime victim committed with the help of computer technology. The purpose of the study is to identify the real situation of еру cases regarding the victimization of different sexes on the Internet (in the regional aspect). For this purpose, a poll of 584 students of all major universities of Irkutsk Oblast was conduсted. The respondents were asked to assess the dangers of using the Internet and indicate instances of individual victimization in this environment. To obtain information on gender differences of cyber-victimization, the respondents were divided in term of genders (221 men and 363 women). The study showed that, like in ordinary life, in the virtual space, men more often demonstrate risky behavior, neglect of safety rules and frivolous attitude to possible threats. Victims on the Internet are often those who have already been a victim in real life. At the same time, women are more often exposed to victimization effects (there are almost four ypes of discriminatory acts per one female user, while there are three acts per a man on the average). Types of victimization effects are also gender-specific. The largest discrepancy in the structure of victimization was recorded for hacking into an account on social networks (6 % for men against 49 % for women); installation of malicious programs on the computer (14 % against 8 %); insults (20 % against 10 %) and indecent proposals (10 % against 25 %), as well as embezzlement of confidential information (3 % against 1 %). Thus, men are more likely to become victims of the theft of passport data (payment cards), are subjected to attacks by extortionists, verbal aggression, or suffer from dishonest sellers of goods. Women with a higher frequency become victims of hacking into accounts in social networks and sexually colored cyber-stalking. Significant damage, despite a small number of such cases, was almost twice as often caused to men. The results of the study indicate that more than 90 % of the surveyed age group were victims of cybercrimes, as a rule, of several ones. According to the respondents reports, about 15 various forms of victimization effects on the Internet were identified. Among them there is hacking of a mailbox or an account, dissemination of false information on behalf of the users name, indecent offers, sexual harassment, registration of paid Internet subscriptions, false repayment of the fine, and so on.
APA, Harvard, Vancouver, ISO, and other styles
39

Ruch, Adam, and Steve Collins. "Zoning Laws: Facebook and Google+." M/C Journal 14, no. 5 (October 18, 2011). http://dx.doi.org/10.5204/mcj.411.

Full text
Abstract:
As the single most successful social-networking Website to date, Facebook has caused a shift in both practice and perception of online socialisation, and its relationship to the offline world. While not the first online social networking service, Facebook’s user base dwarfs its nearest competitors. Mark Zuckerberg’s creation boasts more than 750 million users (Facebook). The currently ailing MySpace claimed a ceiling of 100 million users in 2006 (Cashmore). Further, the accuracy of this number has been contested due to a high proportion of fake or inactive accounts. Facebook by contrast, claims 50% of its user base logs in at least once a day (Facebook). The popular and mainstream uptake of Facebook has shifted social use of the Internet from various and fragmented niche groups towards a common hub or portal around which much everyday Internet use is centred. The implications are many, but this paper will focus on the progress what Mimi Marinucci terms the “Facebook effect” (70) and the evolution of lists as a filtering mechanism representing one’s social zones within Facebook. This is in part inspired by the launch of Google’s new social networking service Google+ which includes “circles” as a fundamental design feature for sorting contacts. Circles are an acknowledgement of the shortcomings of a single, unified friends list that defines the Facebook experience. These lists and circles are both manifestations of the same essential concept: our social lives are, in fact, divided into various zones not defined by an online/offline dichotomy, by fantasy role-play, deviant sexual practices, or other marginal or minority interests. What the lists and circles demonstrate is that even very common, mainstream people occupy different roles in everyday life, and that to be effective social tools, social networking sites must grant users control over their various identities and over who knows what about them. Even so, the very nature of computer-based social tools lead to problematic definitions of identities and relationships using discreet terms, in contrast to more fluid, performative constructions of an individual and their relations to others. Building the Monolith In 1995, Sherry Turkle wrote that “the Internet has become a significant social laboratory for experimenting with the constructions and reconstructions of self that characterize postmodern life” (180). Turkle describes the various deliberate acts of personnae creation possible online in contrast to earlier constraints placed upon the “cycling through different identities” (179). In the past, Turkle argues, “lifelong involvement with families and communities kept such cycling through under fairly stringent control” (180). In effect, Turkle was documenting the proliferation of identity games early adopters of Internet technologies played through various means. Much of what Turkle focused on were MUDs (Multi-User Dungeons) and MOOs (MUD Object Oriented), explicit play-spaces that encouraged identity-play of various kinds. Her contemporary Howard Rheingold focused on what may be described as the more “true to life” communities of the WELL (Whole Earth ‘Lectronic Link) (1–38). In particular, Rheingold explored a community established around the shared experience of parenting, especially of young children. While that community was not explicitly built on the notion of role-play, the parental identity was an important quality of community members. Unlike contemporary social media networks, these early communities were built on discreet platforms. MUDs, MOOs, Bulletin Board Systems, UseNet Groups and other early Internet communication platforms were generally hosted independently of one another, and even had to be dialled into via modem separately in some cases (such as the WELL). The Internet was a truly disparate entity in 1995. The discreetness of each community supported the cordoning off of individual roles or identities between them. Thus, an individual could quite easily be “Pete” a member of the parental WELL group and “Gorak the Destroyer,” a role-player on a fantasy MUD without the two roles ever being associated with each other. As Turkle points out, even within each MUD ample opportunity existed to play multiple characters (183–192). With only a screen name and associated description to identify an individual within the MUD environment, nothing technical existed to connect one player’s multiple identities, even within the same community. As the Internet has matured, however, the tendency has been shifting towards monolithic hubs, a notion of collecting all of “the Internet” together. From a purely technical and operational perspective, this has led to the emergence of the ISP (Internet service provider). Users can make a connection to one point, and then be connected to everything “on the Net” instead of individually dialling into servers and services one at a time as was the case in the early 1980s with companies such as Prodigy, the Source, CompuServe, and America On-Line (AOL). The early information service providers were largely walled gardens. A CompuServe user could only access information on the CompuServe network. Eventually the Internet became the network of choice and services migrated to it. Standards such as HTTP for Web page delivery and SMTP for email became established and dominate the Internet today. Technically, this has made the Internet much easier to use. The services that have developed on this more rationalised and unified platform have also tended toward monolithic, centralised architectures, despite the Internet’s apparent fundamental lack of a hierarchy. As the Internet replaced the closed networks, the wider Web of HTTP pages, forums, mailing lists and other forms of Internet communication and community thrived. Perhaps they required slightly more technological savvy than the carefully designed experience of walled-garden ISPs such as AOL, but these fora and IRC (Internet Relay Chat) rooms still provided the discreet environments within which to role-play. An individual could hold dozens of login names to as many different communities. These various niches could be simply hobby sites and forums where a user would deploy their identity as model train enthusiast, musician, or pet owner. They could also be explicitly about role-play, continuing the tradition of MUDs and MOOs into the new millennium. Pseudo- and polynymity were still very much part of the Internet experience. Even into the early parts of the so-called Web 2.0 explosion of more interactive Websites which allowed for easier dialog between site owner and viewer, a given identity would be very much tied to a single site, blog or even individual comments. There was no “single sign on” to link my thread from a music forum to the comments I made on a videogame blog to my aquarium photos at an image gallery site. Today, Facebook and Google, among others, seek to change all that. The Facebook Effect Working from a psychological background Turkle explored the multiplicity of online identities as a valuable learning, even therapeutic, experience. She assessed the experiences of individuals who were coming to terms with aspects of their own personalities, from simple shyness to exploring their sexuality. In “You Can’t Front on Facebook,” Mimi Marinucci summarizes an analysis of online behaviour by another psychologist, John Suler (67–70). Suler observed an “online disinhibition effect” characterised by users’ tendency to express themselves more openly online than offline (321). Awareness of this effect was drawn (no pun intended) into popular culture by cartoonist Mike Krahulik’s protagonist John Gabriel. Although Krahulik’s summation is straight to the point, Suler offers a more considered explanation. There are six general reasons for the online disinhibition effect: being anonymous, being invisible, the communications being out of sync, the strange sensation that a virtual interlocutor is all in the mind of the user, the general sense that the online world simply is not real and the minimisation of status and authority (321–325). Of the six, the notion of anonymity is most problematic, as briefly explored above in the case of AOL. The role of pseudonymity has been explored in more detail in Ruch, and will be considered with regard to Facebook and Google+ below. The Facebook effect, Marinucci argues, mitigates all six of these issues. Though Marinucci explains the mitigation of each factor individually, her final conclusion is the most compelling reason: “Facebook often facilitates what is best described as an integration of identities, and this integration of identities in turn functions as something of an inhibiting factor” (73). Ruch identifies this phenomenon as the “aggregation of identities” (219). Similarly, Brady Robards observes that “social network sites such as MySpace and Facebook collapse the entire array of social relationships into just one category, that of ‘Friend’” (20). Unlike earlier community sites, Ruch notes “Facebook rejects both the mythical anonymity of the Internet, but also the actual pseudo- or polynonymous potential of the technologies” (219). Essentially, Facebook works to bring the offline social world online, along with all the conventional baggage that accompanies the individual’s real-world social life. Facebook, and now Google+, present a hard, dichotomous approach to online identity: anonymous and authentic. Their socially networked individual is the “real” one, using a person’s given name, and bringing all (or as many as the sites can capture) their contacts from the offline world into the online one, regardless of context. The Facebook experience is one of “friending” everyone one has any social contact with into one homogeneous group. Not only is Facebook avoiding the multiple online identities that interested Turkle, but it is disregarding any multiplicity of identity anywhere, including any online/offline split. David Kirkpatrick reports Mark Zuckerberg’s rejection of this construction of identity is explained by his belief that “You have one identity … having two identities for yourself is an example of a lack of integrity” (199). Arguably, Zuckerberg’s calls for accountability through identity continue a perennial concern for anonymity online fuelled by “on the Internet no one knows you’re a dog” style moral panics. Over two decades ago Lindsy Van Gelder recounted the now infamous case of “Joan and Alex” (533) and Julian Dibbell recounted “a rape in cyberspace” (11). More recent anxieties concern the hacking escapades of Anonymous and LulzSec. Zuckerberg’s approach has been criticised by Christopher Poole, the founder of 4Chan—a bastion of Internet anonymity. During his keynote presentation at South by SouthWest 2011 Poole argued that Zuckerberg “equates anonymity with a lack of authenticity, almost a cowardice.” Yet in spite of these objections, Facebook has mainstream appeal. From a social constructivist perspective, this approach to identity would be satisfying the (perceived?) need for a mainstream, context-free, general social space online to cater for the hundreds of millions of people who now use the Internet. There is no specific, pre-defined reason to join Facebook in the way there is a particular reason to join a heavy metal music message board. Facebook is catering to the need to bring “real” social life online generally, with “real” in this case meaning “offline and pre-existing.” Very real risks of missing “real life” social events (engagements, new babies, party invitations etc) that were shared primarily via Facebook became salient to large groups of individuals not consciously concerned with some particular facet of identity performance. The commercial imperatives towards monolithic Internet and identity are obvious. Given that both Facebook and Google+ are in the business of facilitating the sale of advertising, their core business value is the demographic information they can sell to various companies for target advertising. Knowing a user’s individual identity and tastes is extremely important to those in the business of selling consumers what they currently want as well as predicting their future desires. The problem with this is the dawning realisation that even for the average person, role-playing is part of everyday life. We simply aren’t the same person in all contexts. None of the roles we play need to be particularly scandalous for this to be true, but we have different comfort zones with people that are fuelled by context. Suler proposes and Marinucci confirms that inhibition may be just as much part of our authentic self as the uninhibited expression experienced in more anonymous circumstances. Further, different contexts will inform what we inhibit and what we express. It is not as though there is a simple binary between two different groups and two different personal characteristics to oscillate between. The inhibited personnae one occupies at one’s grandmother’s home is a different inhibited self one plays at a job interview or in a heated discussion with faculty members at a university. One is politeness, the second professionalism, the third scholarly—yet they all restrain the individual in different ways. The Importance of Control over Circles Google+ is Google’s latest foray into the social networking arena. Its previous ventures Orkut and Google Buzz did not fare well, both were variously marred by legal issues concerning privacy, security, SPAM and hate groups. Buzz in particular fell afoul of associating Google accounts with users” real life identities, and (as noted earlier), all the baggage that comes with it. “One user blogged about how Buzz automatically added her abusive ex-boyfriend as a follower and exposed her communications with a current partner to him. Other bloggers commented that repressive governments in countries such as China or Iran could use Buzz to expose dissidents” (Novak). Google+ takes a different approach to its predecessors and its main rival, Facebook. Facebook allows for the organisation of “friends” into lists. Individuals can span more than one list. This is an exercise analogous to what Erving Goffman refers to as “audience segregation” (139). According to the site’s own statistics the average Facebook user has 130 friends, we anticipate it would be time-consuming to organise one’s friends according to real life social contexts. Yet without such organisation, Facebook overlooks the social structures and concomitant behaviours inherent in everyday life. Even broad groups offer little assistance. For example, an academic’s “Work People” list may include the Head of Department as well as numerous other lecturers with whom a workspace is shared. There are things one might share with immediate colleagues that should not be shared with the Head of Department. As Goffman states, “when audience segregation fails and an outsider happens upon a performance that was not meant for him, difficult problems in impression management arise” (139). By homogenising “friends” and social contexts users are either inhibited or run the risk of some future awkward encounters. Google+ utilises “circles” as its method for organising contacts. The graphical user interface is intuitive, facilitated by an easy drag and drop function. Use of “circles” already exists in the vocabulary used to describe our social structures. “List” by contrast reduces the subject matter to simple data. The utility of Facebook’s friends lists is hindered by usability issues—an unintuitive and convoluted process that was added to Facebook well after its launch, perhaps a reaction to privacy concerns rather than a genuine attempt to emulate social organisation. For a cogent breakdown of these technical and design problems see Augusto Sellhorn. Organising friends into lists is a function offered by Facebook, but Google+ takes a different approach: organising friends in circles is a central feature; the whole experience is centred around attempting to mirror the social relations of real life. Google’s promotional video explains the centrality of emulating “real life relationships” (Google). Effectively, Facebook and Google+ have adopted two different systemic approaches to dealing with the same issue. Facebook places the burden of organising a homogeneous mass of “friends” into lists on the user as an afterthought of connecting with another user. In contrast, Google+ builds organisation into the act of connecting. Whilst Google+’s approach is more intuitive and designed to facilitate social networking that more accurately reflects how real life social relationships are structured, it suffers from forcing direct correlation between an account and the account holder. That is, use of Google+ mandates bringing online the offline. Google+ operates a real names policy and on the weekend of 23 July 2011 suspended a number of accounts for violation of Google’s Community Standards. A suspension notice posted by Violet Blue reads: “After reviewing your profile, we determined the name you provided violates our Community Standards.” Open Source technologist Kirrily Robert polled 119 Google+ users about their experiences with the real names policy. The results posted to her on blog reveal that users desire pseudonymity, many for reasons of privacy and/or safety rather than the lack of integrity thought by Zuckerberg. boyd argues that Google’s real names policy is an abuse of power and poses danger to those users employing “nicks” for reasons including being a government employment or the victim of stalking, rape or domestic abuse. A comprehensive list of those at risk has been posted to the Geek Feminism Wiki (ironically, the Wiki utilises “Connect”, Facebook’s attempt at a single sign on solution for the Web that connects users’ movements with their Facebook profile). Facebook has a culture of real names stemming from its early adopters drawn from trusted communities, and this culture became a norm for that service (boyd). But as boyd also points out, “[r]eal names are by no means universal on Facebook.” Google+ demands real names, a demand justified by rhetoric of designing a social networking system that is more like real life. “Real”, in this case, is represented by one’s given name—irrespective of the authenticity of one’s pseudonym or the complications and dangers of using one’s given name. Conclusion There is a multiplicity of issues concerning social networks and identities, privacy and safety. This paper has outlined the challenges involved in moving real life to the online environment and the contests in trying to designate zones of social context. Where some earlier research into the social Internet has had a positive (even utopian) feel, the contemporary Internet is increasingly influenced by powerful and competing corporations. As a result, the experience of the Internet is not necessarily as flexible as Turkle or Rheingold might have envisioned. Rather than conducting identity experimentation or exercising multiple personnae, we are increasingly obligated to perform identity as it is defined by the monolithic service providers such as Facebook and Google+. This is not purely an indictment of Facebook or Google’s corporate drive, though they are obviously implicated, but has as much to do with the new social practice of “being online.” So, while there are myriad benefits to participating in this new social context, as Poole noted, the “cost of failure is really high when you’re contributing as yourself.” Areas for further exploration include the implications of Facebook positioning itself as a general-purpose user authentication tool whereby users can log into a wide array of Websites using their Facebook credentials. If Google were to take a similar action the implications would be even more convoluted, given the range of other services Google offers, from GMail to the Google Checkout payment service. While the monolithic centralisation of these services will have obvious benefits, there will be many more subtle problems which must be addressed. References Blue, Violet. “Google Plus Deleting Accounts en Masse: No Clear Answers.” zdnet.com (2011). 10 Aug. 2011 ‹http://www.zdnet.com/blog/violetblue/google-plus-deleting-accounts-en-masse-no-clear-answers/56›. boyd, danah. “Real Names Policies Are an Abuse of Power.” zephoria.org (2011). 10 Aug. 2011 ‹http://www.zephoria.org/thoughts/archives/2011/08/04/real-names.html›. Cashmore, Pete. “MySpace Hits 100 Million Accounts.” mashable.com (2006). 10 Aug. 2011 ‹http://mashable.com/2006/08/09/myspace-hits-100-million-accounts›. Dibble, Julian. My Tiny Life: Crime and Passion in a Virtual World. New York: Henry Holt & Company, 1998. Facebook. “Fact Sheet.” Facebook (2011). 10 Aug. 2011 ‹http://www.facebook.com/press/info.php?statistic›. Geek Feminism Wiki. “Who Is Harmed by a Real Names Policy?” 2011. 10 Aug. 2011 ‹http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy› Goffman, Erving. The Presentation of Self in Everyday Life. London: Penguin, 1959. Google. “The Google+ Project: Explore Circles.” Youtube.com (2011). 10 Aug. 2011 ‹http://www.youtube.com/watch?v=ocPeAdpe_A8›. Kirkpatrick, David. The Facebook Effect. New York: Simon & Schuster, 2010. Marinucci, Mimi. “You Can’t Front on Facebook.” Facebook and Philosophy. Ed. Dylan Wittkower. Chicago & La Salle, Illinois: Open Court, 2010. 65–74. Novak, Peter. “Privacy Commissioner Reviewing Google Buzz.” CBC News: Technology and Science (2010). 10 Aug. 2011 ‹http://www.cbc.ca/news/technology/story/2010/02/16/google-buzz-privacy.html›. Poole, Christopher. Keynote presentation. South by SouthWest. Texas, Austin, 2011. Robards, Brady. “Negotiating Identity and Integrity on Social Network Sites for Educators.” International Journal for Educational Integrity 6.2 (2010): 19–23. Robert, Kirrily. “Preliminary Results of My Survey of Suspended Google Accounts.” 2011. 10 Aug. 2011 ‹http://infotrope.net/2011/07/25/preliminary-results-of-my-survey-of-suspended-google-accounts/›. Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper Perennial, 1993. Ruch, Adam. “The Decline of Pseudonymity.” Posthumanity. Eds. Adam Ruch and Ewan Kirkland. Oxford: Inter-Disciplinary.net Press, 2010: 211–220. Sellhorn, Augusto. “Facebook Friend Lists Suck When Compared to Google+ Circles.” sellmic.com (2011). 10 Aug. 2011 ‹http://sellmic.com/blog/2011/07/01/facebook-friend-lists-suck-when-compared-to-googleplus-circles›. Suler, John. “The Online Disinhibition Effect.” CyberPsychology and Behavior 7 (2004): 321–326. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon & Schuster, 1995. Van Gelder, Lindsy. “The Strange Case of the Electronic Lover.” Computerization and Controversy: Value Conflicts and Social Choices Ed. Rob Kling. New York: Academic Press, 1996: 533–46.
APA, Harvard, Vancouver, ISO, and other styles
40

Ali, Kawsar. "Zoom-ing in on White Supremacy." M/C Journal 24, no. 3 (June 21, 2021). http://dx.doi.org/10.5204/mcj.2786.

Full text
Abstract:
The Alt Right Are Not Alright Academic explorations complicating both the Internet and whiteness have often focussed on the rise of the “alt-right” to examine the co-option of digital technologies to extend white supremacy (Daniels, “Cyber Racism”; Daniels, “Algorithmic Rise”; Nagle). The term “alt-right” refers to media organisations, personalities, and sarcastic Internet users who promote the “alternative right”, understood as extremely conservative, political views online. The alt-right, in all of their online variations and inter-grouping, are infamous for supporting white supremacy online, “characterized by heavy use of social media and online memes. Alt-righters eschew ‘establishment’ conservatism, skew young, and embrace white ethnonationalism as a fundamental value” (Southern Poverty Law Center). Theoretical studies of the alt-right have largely focussed on its growing presence across social media and websites such as Twitter, Reddit, and notoriously “chan” sites 4chan and 8chan, through the political discussions referred to as “threads” on the site (Nagle; Daniels, “Algorithmic Rise”; Hawley). As well, the ability of online users to surpass national boundaries and spread global white supremacy through the Internet has also been studied (Back et al.). The alt-right have found a home on the Internet, using its features to cunningly recruit members and to establish a growing community that mainstream politically extreme views (Daniels, “Cyber Racism”; Daniels, “Algorithmic Rise; Munn). This body of knowledge shows that academics have been able to produce critically relevant literature regarding the alt-right despite the online anonymity of the majority of its members. For example, Conway et al., in their analysis of the history and social media patterns of the alt-right, follow the unique nature of the Christchurch Massacre, encompassing the use and development of message boards, fringe websites, and social media sites to champion white supremacy online. Positioning my research in this literature, I am interested in contributing further knowledge regarding the alt-right, white supremacy, and the Internet by exploring the sinister conducting of Zoom-bombing anti-racist events. Here, I will investigate how white supremacy through the Internet can lead to violence, abuse, and fear that “transcends the virtual world to damage real, live humans beings” via Zoom-bombing, an act that is situated in a larger co-option of the Internet by the alt-right and white supremacists, but has been under theorised as a hate crime (Daniels; “Cyber Racism” 7). Shitposting I want to preface this chapter by acknowledging that while I understand the Internet, through my own external investigations of race, power and the Internet, as a series of entities that produce racial violence both online and offline, I am aware of the use of the Internet to frame, discuss, and share anti-racist activism. Here we can turn to the work of philosopher Michel de Certeau who conceived the idea of a “tactic” as a way to construct a space of agency in opposition to institutional power. This becomes a way that marginalised groups, such as racialised peoples, can utilise the Internet as a tactical material to assert themselves and their non-compliance with the state. Particularly, shitposting, a tactic often associated with the alt-right, has also been co-opted by those who fight for social justice and rally against oppression both online and offline. As Roderick Graham explores, the Internet, and for this exploration, shitposting, can be used to proliferate deviant and racist material but also as a “deviant” byway of oppositional and anti-racist material. Despite this, a lot can be said about the invisible yet present claims and support of whiteness through Internet and digital technologies, as well as the activity of users channelled through these screens, such as the alt-right and their digital tactics. As Vikki Fraser remarks, “the internet assumes whiteness as the norm – whiteness is made visible through what is left unsaid, through the assumption that white need not be said” (120). It is through the lens of white privilege and claims to white supremacy that online irony, by way of shitposting, is co-opted and understood as an inherently alt-right tool, through the deviance it entails. Their sinister co-option of shitposting bolsters audacious claims as to who has the right to exist, in their support of white identity, but also hides behind a veil of mischief that can hide their more insidious intention and political ideologies. The alt-right have used “shitposting”, an online style of posting and interacting with other users, to create a form of online communication for a translocal identity of white nationalist members. Sean McEwan defines shitposting as “a form of Internet interaction predicated upon thwarting established norms of discourse in favour of seemingly anarchic, poor quality contributions” (19). Far from being random, however, I argue that shitposting functions as a discourse that is employed by online communities to discuss, proliferate, and introduce white supremacist ideals among their communities as well as into the mainstream. In the course of this article, I will introduce racist Zoom-bombing as a tactic situated in shitposting which can be used as a means of white supremacist discourse and an attempt to block anti-racist efforts. By this line, the function of discourse as one “to preserve or to reproduce discourse (within) a closed community” is calculatingly met through shitposting, Zoom-bombing, and more overt forms of white supremacy online (Foucault 225-226). Using memes, dehumanisation, and sarcasm, online white supremacists have created a means of both organising and mainstreaming white supremacy through humour that allows insidious themes to be mocked and then spread online. Foucault writes that “in every society the production of discourse is at once controlled, selected, organised and redistributed according to a certain number of procedures, whose role is to avert its powers and danger, to cope with chance events, to evade ponderous, awesome materiality” (216). As Philippe-Joseph Salazar recontextualises to online white supremacists, “the first procedure of control is to define what is prohibited, in essence, to set aside that which cannot be spoken about, and thus to produce strategies to counter it” (137). By this line, the alt-right reorganises these procedures and allocates a checked speech that will allow their ideas to proliferate in like-minded and growing communities. As a result, online white supremacists becoming a “community of discourse” advantages them in two ways: first, ironic language permits the mainstreaming of hate that allows sinister content to enter the public as the severity of their intentions is doubted due to the sarcastic language employed. Second, shitposting is employed as an entry gate to more serious and dangerous participation with white supremacist action, engagement, and ideologies. It is important to note that white privilege is embodied in these discursive practices as despite this exploitation of emerging technologies to further white supremacy, there are approaches that theorise the alt-right as “crazed product(s) of an isolated, extremist milieu with no links to the mainstream” (Moses 201). In this way, it is useful to consider shitposting as an informal approach that mirrors legitimised white sovereignties and authorised white supremacy. The result is that white supremacist online users succeed in “not only in assembling a community of actors and a collective of authors, on the dual territory of digital communication and grass-roots activism”, but also shape an effective fellowship of discourse that audiences react well to online, encouraging its reception and mainstreaming (Salazar 142). Continuing, as McBain writes, “someone who would not dream of donning a white cap and attending a Ku Klux Klan meeting might find themselves laughing along to a video by the alt-right satirist RamZPaul”. This idea is echoed in a leaked stylistic guide by white supremacist website and message board the Daily Stormer that highlights irony as a cultivated mechanism used to draw new audiences to the far right, step by step (Wilson). As showcased in the screen capture below of the stylistic guide, “the reader is at first drawn in by curiosity or the naughty humor and is slowly awakened to reality by repeatedly reading the same points” (Feinburg). The result of this style of writing is used “to immerse recruits in an online movement culture built on memes, racial panic and the worst of Internet culture” (Wilson). Figure 1: A screenshot of the Daily Stormer’s playbook, expanding on the stylistic decisions of alt-right writers. Racist Zoom-Bombing In the timely text “Racist Zoombombing”, Lisa Nakamura et al. write the following: Zoombombing is more than just trolling; though it belongs to a broad category of online behavior meant to produce a negative reaction, it has an intimate connection with online conspiracy theorists and white supremacy … . Zoombombing should not be lumped into the larger category of trolling, both because the word “trolling” has become so broad it is nearly meaningless at times, and because zoombombing is designed to cause intimate harm and terrorize its target in distinct ways. (30) Notwithstanding the seriousness of Zoom-bombing, and to not minimise its insidiousness by understanding it as a form of shitposting, my article seeks to reiterate the seriousness of shitposting, which, in the age of COVID-19, Zoom-bombing has become an example of. I seek to purport the insidiousness of the tactical strategies of the alt-right online in a larger context of white violence online. Therefore, I am proposing a more critical look at the tactical use of the Internet by the alt-right, in theorising shitposting and Zoom-bombing as means of hate crimes wherein they impose upon anti-racist activism and organising. Newlands et al., receiving only limited exposure pre-pandemic, write that “Zoom has become a household name and an essential component for parties (Matyszczyk, 2020), weddings (Pajer, 2020), school and work” (1). However, through this came the strategic use of co-opting the application by the alt-right to digitise terror and ensure a “growing framework of memetic warfare” (Nakamura et al. 31). Kruglanski et al. label this co-opting of online tools to champion white supremacy operations via Zoom-bombing an example of shitposting: Not yet protesting the lockdown orders in front of statehouses, far-right extremists infiltrated Zoom calls and shared their screens, projecting violent and graphic imagery such as swastikas and pornography into the homes of unsuspecting attendees and making it impossible for schools to rely on Zoom for home-based lessons. Such actions, known as “Zoombombing,” were eventually curtailed by Zoom features requiring hosts to admit people into Zoom meetings as a default setting with an option to opt-out. (128) By this, we can draw on existing literature that has theorised white supremacists as innovation opportunists regarding their co-option of the Internet, as supported through Jessie Daniels’s work, “during the shift of the white supremacist movement from print to digital online users exploited emerging technologies to further their ideological goals” (“Algorithmic Rise” 63). Selfe and Selfe write in their description of the computer interface as a “political and ideological boundary land” that may serve larger cultural systems of domination in much the same way that geopolitical borders do (418). Considering these theorisations of white supremacists utilising tools that appear neutral for racialised aims and the political possibilities of whiteness online, we can consider racist Zoom-bombing as an assertion of a battle that seeks to disrupt racial justice online but also assert white supremacy as its own legitimate cause. My first encounter of local Zoom-bombing was during the Institute for Culture and Society (ICS) Seminar titled “Intersecting Crises” by Western Sydney University. The event sought to explore the concatenation of deeply inextricable ecological, political, economic, racial, and social crises. An academic involved in the facilitation of the event, Alana Lentin, live tweeted during the Zoom-bombing of the event: Figure 2: Academic Alana Lentin on Twitter live tweeting the Zoom-bombing of the Intersecting Crises event. Upon reflecting on this instance, I wondered, could efforts have been organised to prevent white supremacy? In considering who may or may not be responsible for halting racist shit-posting, we can problematise the work of R David Lankes, who writes that “Zoom-bombing is when inadequate security on the part of the person organizing a video conference allows uninvited users to join and disrupt a meeting. It can be anything from a prankster logging on, yelling, and logging off to uninvited users” (217). However, this beckons two areas to consider in theorising racist Zoom-bombing as a means of isolated trolling. First, this approach to Zoom-bombing minimises the sinister intentions of Zoom-bombing when referring to people as pranksters. Albeit withholding the “mimic trickery and mischief that were already present in spaces such as real-life classrooms and town halls” it may be more useful to consider theorising Zoom-bombing as often racialised harassment and a counter aggression to anti-racist initiatives (Nakamura et al. 30). Due to the live nature of most Zoom meetings, it is increasingly difficult to halt the threat of the alt-right from Zoom-bombing meetings. In “A First Look at Zoom-bombings” a range of preventative strategies are encouraged for Zoom organisers including “unique meeting links for each participant, although we acknowledge that this has usability implications and might not always be feasible” (Ling et al. 1). The alt-right exploit gaps, akin to co-opting the mainstreaming of trolling and shitposting, to put forward their agenda on white supremacy and assert their presence when not welcome. Therefore, utilising the pandemic to instil new forms of terror, it can be said that Zoom-bombing becomes a new means to shitpost, where the alt-right “exploits Zoom’s uniquely liminal space, a space of intimacy generated by users via the relationship between the digital screen and what it can depict, the device’s audio tools and how they can transmit and receive sound, the software that we can see, and the software that we can’t” (Nakamura et al. 29). Second, this definition of Zoom-bombing begs the question, is this a fair assessment to write that reiterates the blame of organisers? Rather, we can consider other gaps that have resulted in the misuse of Zoom co-opted by the alt-right: “two conditions have paved the way for Zoom-bombing: a resurgent fascist movement that has found its legs and best megaphone on the Internet and an often-unwitting public who have been suddenly required to spend many hours a day on this platform” (Nakamura et al. 29). In this way, it is interesting to note that recommendations to halt Zoom-bombing revolve around the energy, resources, and attention of the organisers to practically address possible threats, rather than the onus being placed on those who maintain these systems and those who Zoom-bomb. As Jessie Daniels states, “we should hold the platform accountable for this type of damage that it's facilitated. It's the platform's fault and it shouldn't be left to individual users who are making Zoom millions, if not billions, of dollars right now” (Ruf 8). Brian Friedberg, Gabrielle Lim, and Joan Donovan explore the organised efforts by the alt-right to impose on Zoom events and disturb schedules: “coordinated raids of Zoom meetings have become a social activity traversing the networked terrain of multiple platforms and web spaces. Raiders coordinate by sharing links to Zoom meetings targets and other operational and logistical details regarding the execution of an attack” (14). By encouraging a mass coordination of racist Zoom-bombing, in turn, social justice organisers are made to feel overwhelmed and that their efforts will be counteracted inevitably by a large and organised group, albeit appearing prankster-like. Aligning with the idea that “Zoombombing conceals and contains the terror and psychological harm that targets of active harassment face because it doesn’t leave a trace unless an alert user records the meeting”, it is useful to consider to what extent racist Zoom-bombing becomes a new weapon of the alt-right to entertain and affirm current members, and engage and influence new members (Nakamura et al. 34). I propose that we consider Zoom-bombing through shitposting, which is within “the location of matrix of domination (white supremacy, heteropatriarchy, ableism, capitalism, and settler colonialism)” to challenge the role of interface design and Internet infrastructure in enabling racial violence online (Costanza-Chock). Conclusion As Nakamura et al. have argued, Zoom-bombing is indeed “part of the lineage or ecosystem of trollish behavior”, yet these new forms of alt-right shitposting “[need] to be critiqued and understood as more than simply trolling because this term emerged during an earlier, less media-rich and interpersonally live Internet” (32). I recommend theorising the alt-right in a way that highlights the larger structures of white power, privilege, and supremacy that maintain their online and offline legacies beyond Zoom, “to view white supremacy not as a static ideology or condition, but to instead focus on its geographic and temporal contingency” that allows acts of hate crime by individuals on politicised bodies (Inwood and Bonds 722). This corresponds with Claire Renzetti’s argument that “criminologists theorise that committing a hate crime is a means of accomplishing a particular type of power, hegemonic masculinity, which is described as white, Christian, able-bodied and heterosexual” – an approach that can be applied to theorisations of the alt-right and online violence (136). This violent white masculinity occupies a hegemonic hold in the formation, reproduction, and extension of white supremacy that is then shared, affirmed, and idolised through a racialised Internet (Donaldson et al.). Therefore, I recommend that we situate Zoom-bombing as a means of shitposting, by reiterating the severity of shitposting with the same intentions and sinister goals of hate crimes and racial violence. References Back, Les, et al. “Racism on the Internet: Mapping Neo-Fascist Subcultures in Cyber-Space.” Nation and Race: The Developing Euro-American Racist Subculture. Eds. Jeffrey Kaplan and Tore Bjørgo. Northeastern UP, 1993. 73-101. Bonds, Anne, and Joshua Inwood. “Beyond White Privilege: Geographies of White Supremacy and Settler Colonialism.” Progress in Human Geography 40 (2015): 715-733. Conway, Maura, et al. “Right-Wing Extremists’ Persistent Online Presence: History and Contemporary Trends.” The International Centre for Counter-Terrorism – The Hague. Policy Brief, 2019. Costanza-Chock, Sasha. “Design Justice and User Interface Design, 2020.” Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology. Association for Computing Machinery, 2020. Daniels, Jessie. “The Algorithmic Rise of the ‘Alt-Right.’” Contexts 17 (2018): 60-65. ———. “Race and Racism in Internet Studies: A Review and Critique.” New Media & Society 15 (2013): 695-719. ———. Cyber Racism: White Supremacy Online and the New Attack on Civil Rights. Rowman and Littlefield, 2009. De Certeau, Michel. The Practice of Everyday Life. First ed. U of California P, 1980. Donaldson, Mike. “What Is Hegemonic Masculinity?” Theory and Society 22 (1993): 643-657. Feinburg, Ashley. “This Is The Daily Stormer’s Playbook.” Huffington Post 13 Dec. 2017. <http://www.huffpost.com/entry/daily-stormer-nazi-style-guide_n_5a2ece19e4b0ce3b344492f2>. Foucault, Michel. “The Discourse on Language.” The Archaeology of Knowledge and the Discourse on Language. Ed. A.M. Sheridan Smith. Pantheon, 1971. 215-237. Fraser, Vicki. “Online Bodies and Sexual Subjectivities: In Whose Image?” The Racial Politics of Bodies, Nations and Knowledges. Eds. Barbara Baird and Damien W. Riggs. Newcastle: Cambridge Scholars Publishing, 2015. 116-132. Friedberg, Brian, Gabrielle Lim, and Joan Donovan. “Space Invaders: The Networked Terrain of Zoom Bombing.” Harvard Shorenstein Center, 2020. Graham, Roderick. “Race, Social Media and Deviance.” The Palgrave Handbook of International Cybercrime and Cyberdeviance. Eds. Thomas J. Holt and Adam M. Bossler, 2019. 67-90. Hawley, George. Making Sense of the Alt-Right. Columbia UP, 2017. Henry, Matthew G., and Lawrence D. Berg. “Geographers Performing Nationalism and Hetero-Masculinity.” Gender, Place & Culture 13 (2006): 629-645. Kruglanski, Arie W., et al. “Terrorism in Time of the Pandemic: Exploiting Mayhem.” Global Security: Health, Science and Policy 5 (2020): 121-132. Lankes, R. David. Forged in War: How a Century of War Created Today's Information Society. Rowman & Littlefield, 2021. Ling, Chen, et al. “A First Look at Zoombombing, 2021.” Proceedings of the 42nd IEEE Symposium on Security and Privacy. Oakland, 2021. McBain, Sophie. “The Alt-Right, and How the Paranoia of White Identity Politics Fuelled Trump’s Rise.” New Statesman 27 Nov. 2017. <http://www.newstatesman.com/culture/books/2017/11/alt-right-and-how-paranoia-white-identity-politics-fuelled-trump-s-rise>. McEwan, Sean. “Nation of Shitposters: Ironic Engagement with the Facebook Posts of Shannon Noll as Reconfiguration of an Australian National Identity.” Journal of Media and Communication 8 (2017): 19-39. Morgensen, Scott Lauria. “Theorising Gender, Sexuality and Settler Colonialism: An Introduction.” Settler Colonial Studies 2 (2012): 2-22. Moses, A Dirk. “‘White Genocide’ and the Ethics of Public Analysis.” Journal of Genocide Research 21 (2019): 1-13. Munn, Luke. “Algorithmic Hate: Brenton Tarrant and the Dark Social Web.” VoxPol, 3 Apr. 2019. <http://www.voxpol.eu/algorithmic-hate-brenton-tarrant-and-the-dark-social-web>. Nagle, Angela. Kill All Normies: Online Culture Wars from 4chan and Tumblr to Trump and the Alt-Right. Zero Books, 2017. Nakamura, Lisa, et al. Racist Zoom-Bombing. Routledge, 2021. Newlands, Gemma, et al. “Innovation under Pressure: Implications for Data Privacy during the COVID-19 Pandemic.” Big Data & Society July-December (2020): 1-14. Perry, Barbara, and Ryan Scrivens. “White Pride Worldwide: Constructing Global Identities Online.” The Globalisation of Hate: Internationalising Hate Crime. Eds. Jennifer Schweppe and Mark Austin Walters. Oxford UP, 2016. 65-78. Renzetti, Claire. Feminist Criminology. Routledge, 2013. Ruf, Jessica. “‘Spirit-Murdering' Comes to Zoom: Racist Attacks Plague Online Learning.” Issues in Higher Education 37 (2020): 8. Salazar, Philippe-Joseph. “The Alt-Right as a Community of Discourse.” Javnost – The Public 25 (2018): 135-143. Selfe, Cyntia L., and Richard J. Selfe, Jr. “The Politics of the Interface: Power and Its Exercise in Electronic Contact Zones.” College Composition and Communication 45 (1994): 480-504. Southern Poverty Law Center. “Alt-Right.” <http://www.splcenter.org/fighting-hate/extremist-files/ideology/alt-right>. Wilson, Jason. “Do the Christchurch Shootings Expose the Murderous Nature of ‘Ironic’ Online Fascism?” The Guardian, 16 Mar. 2019. <http://www.theguardian.com/world/commentisfree/2019/mar/15/do-the-christchurch-shootings-expose-the-murderous-nature-of-ironic-online-fascism>.
APA, Harvard, Vancouver, ISO, and other styles
41

Kadivar, Jamileh. "Government Surveillance and Counter-Surveillance on Social and Mobile Media: The Case of Iran (2009)." M/C Journal 18, no. 2 (April 29, 2015). http://dx.doi.org/10.5204/mcj.956.

Full text
Abstract:
Human history has witnessed varied surveillance and counter-surveillance activities from time immemorial. Human beings could not surveille others effectively and accurately without the technology of their era. Technology is a tool that can empower both people and governments. The outcomes are different based on the users’ intentions and aims. 2,500 years ago, Sun Tzu noted that ‘If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy’. His words still ring true. To be a good surveiller and counter-surveiller it is essential to know both sides, and in order to be good at these activities access to technology is vital. There is no doubt that knowledge is power, and without technology to access the information, it is impossible to be powerful. As we become more expert at technology, we will learn what makes surveillance and counter-surveillance more effective, and will be more powerful.“Surveillance” is one of the most important aspects of living in the convergent media environment. This essay illustrates government surveillance and counter-surveillance during the Iranian Green Movement (2009) on social and mobile media. The Green Movement refers to a non-violent movement that arose after the disputed presidential election on June 2009. After that Iran was facing its most serious political crisis since the 1979 revolution. Claims of vote fraud triggered massive street protests. Many took to the streets with “Green” signs, chanting slogans such as ‘the government lied’, and ‘where is my vote?’ There is no doubt that social and mobile media has played an important role in Iran’s contemporary politics. According to Internet World Stats (IWS) Internet users in 2009 account for approximately 48.5 per cent of the population of Iran. In 2009, Iran had 30.2 million mobile phone users (Freedom House), and 72 cellular subscriptions for every 100 people (World Bank). Today, while Iran has the 19th-largest population in the world, its blogosphere holds the third spot in terms of number of users, just behind the United States and China (Beth Elson et al.). In this essay the use of social and mobile media (technology) is not debated, but the extent of this use, and who, why and how it is used, is clearly scrutinised.Visibility and Surveillance There have been different kinds of surveillance for a very long time. However, all types of surveillance are based on the notion of “visibility”. Previous studies show that visibility is not a new term (Foucault Discipline). The new things in the new era, are its scale, scope and complicated ways to watch others without being watched, which are not limited to a specific time, space and group, and are completely different from previous instruments for watching (Andrejevic). As Meikle and Young (146) have mentioned ‘networked digital media bring with them a new kind of visibility’, based on different kinds of technology. Internet surveillance has important implications in politics to control, protect, and influence (Marx Ethics; Castells; Fuchs Critique). Surveillance has been improved during its long history, and evolved from very simple spying and watching to complicated methods of “iSpy” (Andrejevic). To understand the importance of visibility and its relationship with surveillance, it is essential to study visibility in conjunction with the notion of “panopticon” and its contradictory functions. Foucault uses Bentham's notion of panopticon that carries within itself visibility and transparency to control others. “Gaze” is a central term in Bentham’s view. ‘Bentham thinks of a visibility organised entirely around a dominating, overseeing gaze’ (Foucault Eye). Moreover, Thomson (Visibility 11) notes that we are living in the age of ‘normalizing the power of the gaze’ and it is clear that the influential gaze is based on powerful means to see others.Lyon (Surveillance 2) explains that ‘surveillance is any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been granted…’. He mentions that today the most important means of surveillance reside in computer power which allows collected data to be sorted, matched, retrieved, processed, marketed and circulated.Nowadays, the Internet has become ubiquitous in many parts of the world. So, the changes in people’s interactions have influenced their lives. Fuchs (Introduction 15) argues that ‘information technology enables surveillance at a distance…in real time over networks at high transmission speed’. Therefore, visibility touches different aspects of people’s lives and living in a “glasshouse” has caused a lot of fear and anxiety about privacy.Iran’s Green Movement is one of many cases for studying surveillance and counter-surveillance technologies in social and mobile media. Government Surveillance on Social and Mobile Media in Iran, 2009 In 2009 the Iranian government controlled technology that allowed them to monitor, track, and limit access to the Internet, social media and mobiles communication, which has resulted in the surveillance of Green Movement’s activists. The Iranian government had improved its technical capabilities to monitor the people’s behavior on the Internet long before the 2009 election. The election led to an increase in online surveillance. Using social media the Iranian government became even more powerful than it was before the election. Social media was a significant factor in strengthening the government’s power. In the months after the election the virtual atmosphere became considerably more repressive. The intensified filtering of the Internet and implementation of more advanced surveillance systems strengthened the government’s position after the election. The Open Net Initiative revealed that the Internet censorship system in Iran is one of the most comprehensive and sophisticated censorship systems in the world. It emphasized that ‘Advances in domestic technical capacity have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies’.On the other hand, the authorities attempted to block all access to political blogs (Jaras), either through cyber-security methods or through threats (Tusa). The Centre for Investigating Organized Cyber Crimes, which was founded in 2007 partly ‘to investigate and confront social and economic offenses on the Internet’ (Cyber Police), became increasingly important over the course of 2009 as the government combated the opposition’s online activities (Beth Elson et al. 16). Training of "senior Internet lieutenants" to confront Iran's "virtual enemies online" was another attempt that the Intelligence minister announced following the protests (Iran Media Program).In 2009 the Iranian government enacted the Computer Crime Law (Jaras). According to this law the Committee in Charge of Determining Unauthorized Websites is legally empowered to identify sites that carry forbidden content and report that information to TCI and other major ISPs for blocking (Freedom House). In the late fall of 2009, the government started sending threatening and warning text messages to protesters about their presence in the protests (BBC). Attacking, blocking, hacking and hijacking of the domain names of some opposition websites such as Jaras and Kaleme besides a number of non-Iranian sites such as Twitter were among the other attempts of the Iranian Cyber Army (Jaras).It is also said that the police and security forces arrested dissidents identified through photos and videos posted on the social media that many imagined had empowered them. Furthermore, the online photos of the active protesters were posted on different websites, asking people to identify them (Valizadeh).In late June 2009 the Iranian government was intentionally permitting Internet traffic to and from social networking sites such as Facebook and Twitter so that it could use a sophisticated practice called Deep Packet Inspection (DPI) to collect information about users. It was reportedly also applying the same technology to monitor mobile phone communications (Beth Elson et al. 15).On the other hand, to cut communication between Iranians inside and outside the country, Iran slowed down the Internet dramatically (Jaras). Iran also blocked access to Facebook, YouTube, Wikipedia, Twitter and many blogs before, during and after the protests. Moreover, in 2009, text message services were shut down for over 40 days, and mobile phone subscribers could not send or receive text messages regardless of their mobile carriers. Subsequently it was disrupted on a temporary basis immediately before and during key protests days.It was later discovered that the Nokia Siemens Network provided the government with surveillance technologies (Wagner; Iran Media Program). The Iranian government built a complicated system that enabled it to monitor, track and intercept what was said on mobile phones. Nokia Siemens Network confirmed it supplied Iran with the technology needed to monitor, control, and read local telephone calls [...] The product allowed authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic (Cellan-Jones). Media sources also reported that two Chinese companies, Huawei and ZTE, provided surveillance technologies to the government. The Nic Payamak and Saman Payamak websites, that provide mass text messaging services, also reported that operator Hamrah Aval commonly blocked texts with words such as meeting, location, rally, gathering, election and parliament (Iran Media Program). Visibility and Counter-Surveillance The panopticon is not limited to the watchers. Similarly, new kinds of panopticon and visibility are not confined to government surveillance. Foucault points out that ‘the seeing machine was once a sort of dark room into which individuals spied; it has become a transparent building in which the exercise of power may be supervised by society as a whole’ (Discipline 207). What is important is Foucault's recognition that transparency, not only of those who are being observed but also of those who are observing, is central to the notion of the panopticon (Allen) and ‘any member of society will have the right to come and see with his own eyes how schools, hospitals, factories, and prisons function’ (Foucault, Discipline 207). Counter-surveillance is the process of detecting and mitigating hostile surveillance (Burton). Therefore, while the Internet is a surveillance instrument that enables governments to watch people, it also improves the capacity to counter-surveille, and draws public attention to governments’ injustice. As Castells (185) notes the Internet could be used by citizens to watch their government as an instrument of control, information, participation, and even decision-making, from the bottom up.With regards to the role of citizens in counter-surveillance we can draw on Jay Rosen’s view of Internet users as ‘the people formerly known as the audience’. In counter-surveillance it can be said that passive citizens (formerly the audience) have turned into active citizens. And this change was becoming impossible without mobile and social media platforms. These new techniques and technologies have empowered people and given them the opportunity to have new identities. When Thompson wrote ‘the exercise of power in modern societies remains in many ways shrouded in secrecy and hidden from the public gaze’ (Media 125), perhaps he could not imagine that one day people can gaze at the politicians, security forces and the police through the use of the Internet and mobile devices.Furthermore, while access to mobile media allows people to hold authorities accountable for their uses and abuses of power (Breen 183), social media can be used as a means of representation, organization of collective action, mobilization, and drawing attention to police brutality and reasons for political action (Gerbaudo).There is no doubt that having creativity and using alternative platforms are important aspects in counter-surveillance. For example, images of Lt. Pike “Pepper Spray Cop” from the University of California became the symbol of the senselessness of police brutality during the Occupy Movement (Shaw). Iranians’ Counter-Surveillance on Social and Mobile Media, 2009 Iran’s Green movement (2009) triggered a lot of discussions about the role of technology in social movements. In this regard, there are two notable attitudes about the role of technology: techno-optimistic (Shriky and Castells) and techno-pessimistic (Morozov and Gladwell) views should be taken into account. While techno-optimists overrated the role of social media, techno-pessimists underestimated its role. However, there is no doubt that technology has played a great role as a counter-surveillance tool amongst Iranian people in Iran’s contemporary politics.Apart from the academic discussions between techno-optimists and techno-pessimists, there have been numerous debates about the role of new technologies in Iran during the Green Movement. This subject has received interest from different corners of the world, including Western countries, Iranian authorities, opposition groups, and also some NGOs. However, its role as a means of counter-surveillance has not received adequate attention.As the tools of counter-surveillance are more or less the tools of surveillance, protesters learned from the government to use the same techniques to challenge authority on social media.Establishing new websites (such as JARAS, RASA, Kalemeh, and Iran green voice) or strengthening some previous ones (such as Saham, Emrooz, Norooz), also activating different platforms such as Facebook, Twitter, and YouTube accounts to broadcast the voice of the Iranian Green Movement and neutralize the government’s propaganda were the most important ways to empower supporters of Iran’s Green Movement in counter-surveillance.‘Reporters Without Borders issued a statement, saying that ‘the new media, and particularly social networks, have given populations collaborative tools with which they can change the social order’. It is also mentioned that despite efforts by the Iranian government to prevent any reporting of the protests and due to considerable pressure placed on foreign journalists inside Iran, social media played a significant role in sending the messages and images of the movement to the outside world (Axworthy). However, at that moment, many thought that Twitter performed a liberating role for Iranian dissenters. For example, Western media heralded the Green Movement in Iran as a “Twitter revolution” fuelled by information and communication technologies (ICTs) and social media tools (Carrieri et al. 4). “The Revolution Will Be Twittered” was the first in a series of blog posts published by Andrew Sullivan a few hours after the news of the protests was released.According to the researcher’s observation the numbers of Twitter users inside Iran who tweeted was very limited in 2009 and social media was most useful in the dissemination of information, especially from those inside Iran to outsiders. Mobile phones were mostly influential as an instrument firstly used for producing contents (images and videos) and secondly for the organisation of protests. There were many photos and videos that were filmed by very simple mobile cell phones, uploaded by ordinary people onto YouTube and other platforms. The links were shared many times on Twitter and Facebook and released by mainstream media. The most frequently circulated story from the Iranian protests was a video of Neda Agha-Sultan. Her final moments were captured by some bystanders with mobile phone cameras and rapidly spread across the global media and the Internet. It showed that the camera-phone had provided citizens with a powerful means, allowing for the creation and instant sharing of persuasive personalised eyewitness records with mobile and globalised target populations (Anden-Papadopoulos).Protesters used another technique, DDOS (distributed denial of service attacks), for political protest in cyber space. Anonymous people used DDOS to overload a website with fake requests, making it unavailable for users and disrupting the sites set as targets (McMillan) in effect, shutting down the site. DDOS is an important counter-surveillance activity by grassroots activists or hackers. It was a cyber protest that knocked the main Iranian governmental websites off-line and caused crowdsourcing and false trafficking. Amongst them were Mahmoud Ahmadinejad, Iran's supreme leader’s websites and those which belong to or are close to the government or security forces, including news agencies (Fars, IRNA, Press TV…), the Ministry of Foreign Affairs, the Ministry of Justice, the Police, and the Ministry of the Interior.Moreover, as authorities uploaded the pictures of protesters onto different platforms to find and arrest them, in some cities people started to put the pictures, phone numbers and addresses of members of security forces and plain clothes police officers who attacked them during the protests and asked people to identify and report the others. They also wanted people to send information about suspects who infringed human rights. Conclusion To sum up, visibility, surveillance and counter-surveillance are not new phenomena. What is new is the technology, which increased their complexity. As Foucault (Discipline 200) mentioned ‘visibility is a trap’, so being visible would be the weakness of those who are being surveilled in the power struggle. In the convergent era, in order to be more powerful, both surveillance and counter-surveillance activities aim for more visibility. Although both attempt to use the same means (technology) to trap the other side, the differences are in their subjects, objects, goals and results.While in surveillance, visibility of the many by the few is mostly for the purpose of control and influence in undemocratic ways, in counter-surveillance, the visibility of the few by the many is mostly through democratic ways to secure more accountability and transparency from the governments.As mentioned in the case of Iran’s Green Movement, the scale and scope of visibility are different in surveillance and counter-surveillance. The importance of what Shaw wrote about Sydney occupy counter-surveillance, applies to other places, such as Iran. She has stressed that ‘protesters and police engaged in a dance of technology and surveillance with one another. Both had access to technology, but there were uncertainties about the extent of technology and its proficient use…’In Iran (2009), both sides (government and activists) used technology and benefited from digital networked platforms, but their levels of access and domains of influence were different, which was because the sources of power, information and wealth were divided asymmetrically between them. Creativity was important for both sides to make others more visible, and make themselves invisible. Also, sharing information to make the other side visible played an important role in these two areas. References Alen, David. “The Trouble with Transparency: The Challenge of Doing Journalism Ethics in a Surveillance Society.” Journalism Studies 9.3 (2008): 323-40. 8 Dec. 2013 ‹http://www.tandfonline.com/doi/full/10.1080/14616700801997224#.UqRFSuIZsqN›. Anden-Papadopoulos, Kari. “Citizen Camera-Witnessing: Embodied Political Dissent in the Age of ‘Mediated Mass Self-Communication.’” New Media & Society 16.5 (2014). 753-69. 9 Aug. 2014 ‹http://nms.sagepub.com/content/16/5/753.full.pdf+html›. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence, Kan: UP of Kansas, 2007. Axworthy, Micheal. Revolutionary Iran: A History of the Islamic Republic. London: Penguin Books, 2014. Bentham, Jeremy. Panopticon Postscript. London: T. Payne, 1791. Beth Elson, Sara, Douglas Yeung, Parisa Roshan, S.R. Bohandy, and Alireza Nader. Using Social Media to Gauge Iranian Public Opinion and Mood after the 2009 Election. Santa Monica: RAND Corporation, 2012. 1 Aug. 2014 ‹http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1161.pdf›. Breen, Marcus. Uprising: The Internet’s Unintended Consequences. Champaign, Ill: Common Ground Pub, 2011. Burton, Fred. “The Secrets of Counter-Surveillance.” Stratfor Global Intelligence. 2007. 19 April 2015 ‹https://www.stratfor.com/secrets_countersurveillance›. Carrieri, Matthew, Ali Karimzadeh Bangi, Saad Omar Khan, and Saffron Suud. After the Green Movement Internet Controls in Iran, 2009-2012. OpenNet Initiative, 2013. 17 Dec. 2013 ‹https://opennet.net/sites/opennet.net/files/iranreport.pdf›. Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP: 2001. Cellan-Jones, Rory. “Hi-Tech Helps Iranian Monitoring.” BBC, 2009. 26 July 2014 ‹http://news.bbc.co.uk/1/hi/technology/8112550.stm›. “Cyber Crimes’ List.” Iran: Cyber Police, 2009. 17 July 2014 ‹http://www.cyberpolice.ir/page/2551›. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Foucault, Michel. “The Eye of Power.” 1980. 12 Dec. 2013 ‹https://nbrokaw.files.wordpress.com/2010/12/the-eye-of-power.doc›. Freedom House. “Special Report: Iran.” 2009. 14 June 2014 ‹http://www.sssup.it/UploadDocs/4661_8_A_Special_Report_Iran_Feedom_House_01.pdf›. Fuchs, Christian. “Introduction.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 1-28. Fuchs, Christian. “Critique of the Political Economy of Web 2.0 Surveillance.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 30-70. Gerbaudo, Paolo. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto, 2012. “Internet: Iran’s New Imaginary Enemy.” Jaras Mar. 2009. 28 June 2014 ‹http://www.rahesabz.net/print/12143›.Iran Media Program. “Text Messaging as Iran's New Filtering Frontier.” 2013. 25 July 2014 ‹http://www.iranmediaresearch.org/en/blog/227/13/04/25/136›. Internet World Stats News. The Internet Hits 1.5 Billion. 2009. 3 July 2014 ‹ http://www.internetworldstats.com/pr/edi038.htm›. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open UP, 2001. Lyon, David. “9/11, Synopticon, and Scopophilia: Watching and Being Watched.” The New Politics of Surveillance and Visibility. Eds. Richard V. Ericson and Kevin D. Haggerty. Toronto: UP of Toronto, 2006. 35-54. Marx, Gary T. “What’s New about the ‘New Surveillance’? Classify for Change and Continuity.” Surveillance & Society 1.1 (2002): 9-29. McMillan, Robert. “With Unrest in Iran, Cyber-Attacks Begin.” PC World 2009. 17 Apr. 2015 ‹http://www.pcworld.com/article/166714/article.html›. Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. London: Palgrave Macmillan, 2012. Morozov, Evgeny. “How Dictators Watch Us on the Web.” Prospect 2009. 15 June 2014 ‹http://www.prospectmagazine.co.uk/magazine/how-dictators-watch-us-on-the-web/#.U5wU6ZRdU00›.Open Net. “Iran.” 2009. 26 June 2014 ‹https://opennet.net/research/profiles/iran›. Reporters without Borders. “Web 2.0 versus Control 2.0.” 2010. 27 May 2014 ‹http://en.rsf.org/web-2-0-versus-control-2-0-18-03-2010,36697›.Rosen, Jay. The People Formerly Known as the Audience. 2006. 7 Dec. 2013 ‹http://www.huffingtonpost.com/jay-rosen/the-people-formerly-known_1_b_24113.html›. Shaw, Frances. “'Walls of Seeing': Protest Surveillance, Embodied Boundaries, and Counter-Surveillance at Occupy Sydney.” Transformation 23 (2013). 9 Dec. 2013 ‹http://www.transformationsjournal.org/journal/issue_23/article_04.shtml›. “The Warning of the Iranian Revolutionary Guard Corps (IRGC) to the Weblogs and Websites.” BBC, 2009. 27 July 2014 ‹http://www.bbc.co.uk/persian/iran/2009/06/090617_ka_ir88_sepah_internet.shtml›. Thompson, John B. The Media And Modernity: A Social Theory of the Media. Cambridge: Polity Press, 1995. Thompson, John B. “The New Visibility.” Theory, Culture & Society 22.6 (2005): 31-51. 10 Dec. 2013 ‹http://tcs.sagepub.com/content/22/6/31.full.pdf+html›. Tusa, Felix. “How Social Media Can Shape a Protest Movement: The Cases of Egypt in 2011 and Iran in 2009.” Arab Media and Society 17 (Winter 2013). 15 July 2014 ‹http://www.arabmediasociety.com/index.php?article=816&p=0›. Tzu, Sun. Sun Tzu: The Art of War. S.l.: Pax Librorum Pub. H, 2009. Valizadeh, Reza. “Invitation to the Public Shooting with the Camera.” RFI, 2011. 19 June 2014 ‹http://www.persian.rfi.fr/%D8%AF%D8%B9%D9%88%D8%AA-%D8%A8%D9%87-%D8%B4%D9%84%DB%8C%DA%A9-%D8%B9%D9%85%D9%88%D9%85%DB%8C-%D8%A8%D8%A7-%D8%AF%D9%88%D8%B1%D8%A8%DB%8C%D9%86-%D8%B9%DA%A9%D8%A7%D8%B3%DB%8C-20110307/%D8%A7%DB%8C%D8%B1%D8%A7%D9%86›. Wagner, Ben. Exporting Censorship and Surveillance Technology. Netherlands: Humanist Institute for Co-operation with Developing Countries (Hivos), 2012. 7 July 2014 ‹https://hivos.org/sites/default/files/exporting_censorship_and_surveillance_technology_by_ben_wagner.pdf›. World Bank. Mobile Cellular Subscriptions (per 100 People). The World Bank. N.d. 27 June 2014 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›.
APA, Harvard, Vancouver, ISO, and other styles
42

Marcheva, Marta. "The Networked Diaspora: Bulgarian Migrants on Facebook." M/C Journal 14, no. 2 (November 17, 2010). http://dx.doi.org/10.5204/mcj.323.

Full text
Abstract:
The need to sustain and/or create a collective identity is regularly seen as one of the cultural priorities of diasporic peoples and this, in turn, depends upon the existence of a uniquely diasporic form of communication and connection with the country of origin. Today, digital media technologies provide easy information recording and retrieval, and mobile IT networks allow global accessibility and participation in the redefinition of identities. Vis-à-vis our understanding of the proximity and connectivity associated with globalisation, the role of ICTs cannot be underestimated and is clearly more than a simple instrument for the expression of a pre-existing diasporic identity. Indeed, the concept of “e-diaspora” is gaining popularity. Consequently, research into the role of ICTs in the lives of diasporic peoples contributes to a definition of the concept of diaspora, understood here as the result of the dispersal of all members of a nation in several countries. In this context, I will demonstrate how members of the Bulgarian diaspora negotiate not only their identities but also their identifications through one of the most popular community websites, Facebook. My methodology consists of the active observation of Bulgarian users belonging to the diaspora, the participation in groups and forums on Facebook, and the analysis of discourses produced online. This research was conducted for the first time between 1 August 2008 and 31 May 2009 through the largest 20 (of 195) Bulgarian groups on the French version of Facebook and 40 (of over 500) on the English one. It is important to note that the public considered to be predominantly involved in Facebook is a young audience in the age group of 18-35 years. Therefore, this article is focused on two generations of Bulgarian immigrants: mostly recent young and second-generation migrants. The observed users are therefore members of the Bulgarian diaspora who have little or no experience of communism, who don’t feel the weight of the past, and who have grown up as free and often cosmopolitan citizens. Communist hegemony in Bulgaria began on 9 September 1944, when the army and the communist militiamen deposed the country’s government and handed power over to an anti-fascist coalition. During the following decades, Bulgaria became the perfect Soviet satellite and the imposed Stalinist model led to sharp curtailing of the economic and social contacts with the free world beyond the Iron Curtain. In 1989, the fall of the Berlin Wall marked the end of the communist era and the political and economic structures that supported it. Identity, Internet, and Diaspora Through the work of Mead, Todorov, and boyd it is possible to conceptualise the subject in terms of both of internal and external social identity (Mead, Todorov, boyd). In this article, I will focus, in particular, on social and national identities as expressions of the process of sharing stories, experiences, and understanding between individuals. In this respect, the phenomenon of Facebook is especially well placed to mediate between identifications which, according to Freud, facilitate the plural subjectivities and the establishment of an emotional network of mutual bonds between the individual and the group (Freud). This research also draws on Goffman who, from a sociological point of view, demystifies the representation of the Self by developing a dramaturgical theory (Goffman), whereby identity is constructed through the "roles" that people play on the social scene. Social life is a vast stage where the actors are required to adhere to certain socially acceptable rituals and guidelines. It means that we can consider the presentation of Self, or Others, as a facade or a construction of socially accepted features. Among all the ICTs, the Internet is, by far, the medium most likely to facilitate free expression of identity through a multitude of possible actions and community interactions. Personal and national memories circulate in the transnational space of the Internet and are reshaped when framed from specific circumstances such as those raised by the migration process. In an age of globalisation marked by the proliferation of population movements, instant communication, and cultural exchanges across geographic boundaries, the phenomenon of the diaspora has caught the attention of a growing number of scholars. I shall be working with Robin Cohen’s definition of diaspora which highlights the following common features: (1) dispersal from an original homeland; (2) the expansion from a homeland in search of work; (3) a collective memory and myth about the homeland; (4) an idealisation of the supposed ancestral homeland; (5) a return movement; (6) a strong ethnic group consciousness sustained over a long time; (7) a troubled relationship with host societies; (8) a sense of solidarity with co-ethnic members in other countries; and (9) the possibility of a distinctive creative, enriching life in tolerant host countries (Cohen). Following on this earlier work on the ways in which diasporas give rise to new forms of subjectivity, the concept of “e-diaspora” is now rapidly gaining in popularity. The complex association between diasporic groups and ICTs has led to a concept of e-diasporas that actively utilise ICTs to achieve community-specific goals, and that have become critical for the formation and sustenance of an exilic community for migrant groups around the globe (Srinivasan and Pyati). Diaspora and the Digital Age Anderson points out two key features of the Internet: first, it is a heterogeneous electronic medium, with hardly perceptible contours, and is in a state of constant development; second, it is a repository of “imagined communities” without geographical or legal legitimacy, whose members will probably never meet (Anderson). Unlike “real” communities, where people have physical interactions, in the imagined communities, individuals do not have face-to-face communication and daily contact, but they nonetheless feel a strong emotional attachment to the nation. The Internet not only opens new opportunities to gain greater visibility and strengthen the sense of belonging to community, but it also contributes to the emergence of a transnational public sphere where the communities scattered in various locations freely exchange their views and ideas without fear of restrictions or censorship from traditional media (Appadurai, Bernal). As a result, the Web becomes a virtual diasporic space which opens up, to those who have left their country, a new means of confrontation and social participation. Within this new diasporic space, migrants are bound in their disparate geographical locations by a common vision or myth about the homeland (Karim). Thanks to the Internet, the computer has become a primary technological intermediary between virtual networks, bringing its members closer in a “global village” where everyone is immediately connected to others. Thus, today’s diasporas are not the diaspora of previous generations in that the migration is experienced and negotiated very differently: people in one country are now able to continue to participate actively in another country. In this context, the arrival of community sites has increased the capacity of users to create a network on the Internet, to rediscover lost links, and strengthen new ones. Unlike offline communities, which may weaken once their members have left the physical space, online communities that are no longer limited by the requirement of physical presence in the common space have the capacity to endure. Identity Strategies of New Generations of Bulgarian Migrants It is very difficult to quantify migration to or from Bulgaria. Existing data is not only partial and limited but, in some cases, give an inaccurate view of migration from Bulgaria (Soultanova). Informal data confirm that one million Bulgarians, around 15 per cent of Bulgaria’s entire population (7,620,238 inhabitants in 2007), are now scattered around the world (National Statistical Institute of Bulgaria). The Bulgarian migrant is caught in a system of redefinition of identity through the duration of his or her relocation. Emigrating from a country like Bulgaria implies a high number of contingencies. Bulgarians’ self-identification is relative to the inferiority complex of a poor country which has a great deal to do to catch up with its neighbours. Before the accession of Bulgaria to the European Union, the country was often associated with what have been called “Third World countries” and seen as a source of crime and social problems. Members of the Bulgarian diaspora faced daily prejudice due to the bad reputation of their country of origin, though the extent of the hostility depended upon the “host” nation (Marcheva). Geographically, Bulgaria is one of the most eastern countries in Europe, the last to enter the European Union, and its image abroad has not facilitated the integration of the Bulgarian diaspora. The differences between Bulgarian migrants and the “host society” perpetuate a sentiment of marginality that is now countered with an online appeal for national identity markers and shared experiences. Facebook: The Ultimate Social Network The Growing Popularity of Facebook With more than 500 million active members, Facebook is the most visited website in the world. In June 2007, Facebook experienced a record annual increase of 270 per cent of connections in one year (source: comScore World Metrix). More than 70 translations of the site are available to date, including the Bulgarian version. What makes it unique is that Facebook positively encourages identity games. Moreover, Facebook provides the symbolic building blocks with which to build a collective identity through shared forms of discourse and ways of thinking. People are desperate to make a good impression on the Internet: that is why they spend so much time managing their online identity. One of the most important aspects of Facebook is that it enables users to control and manage their image, leaving the choice of how their profile appears on the pages of others a matter of personal preference at any given time. Despite some limitations, we will see that Facebook offers the Bulgarian community abroad the possibility of an intense and ongoing interaction with fellow nationals, including the opportunity to assert and develop a complex new national/transnational identity. Facebook Experiences of the Bulgarian Diaspora Created in the United States in 2004 and extended to use in Europe two or three years later, Facebook was quickly adopted by members of the Bulgarian diaspora. Here, it is very important to note that, although the Internet per se has enabled Bulgarians across the globe to introduce Cyrillic script into the public arena, it is definitely Facebook that has made digital Cyrillic visible. Early in computer history, keyboards with the Cyrillic alphabet simply did not exist. Thus, Bulgarians were forced to translate their language into Latin script. Today, almost all members of the Bulgarian population who own a computer use a keyboard that combines the two alphabets, Latin and Cyrillic, and this allows alternation between the two. This is not the case for the majority of Bulgarians living abroad who are forced to use a keyboard specific to their country of residence. Thus, Bulgarians online have adopted a hybrid code to speak and communicate. Since foreign keyboards are not equipped with the same consonants and vowels that exist in the Bulgarian language, they use the Latin letters that best suit the Bulgarian phonetic. Several possible interpretations of these “encoded” texts exist which become another way for the Bulgarian migrants to distinguish and assert themselves. One of these encoded scripts is supplemented by figures. For example, the number “6” written in Bulgarian “шест” is applied to represent the Bulgarian letter “ш.” Bulgarian immigrants therefore employ very specific codes of communication that enhance the feeling of belonging to a community that shares the same language, which is often incomprehensible to others. As the ultimate social networking website, Facebook brings together Bulgarians from all over the world and offers them a space to preserve online memorials and digital archives. As a result, the Bulgarian diaspora privileges this website in order to manage the strong links between its members. Indeed, within months of coming into online existence, Facebook established itself as a powerful social phenomenon for the Bulgarian diaspora and, very soon, a virtual map of the Bulgarian diaspora was formed. It should be noted, however, that this mapping was focused on the new generation of Bulgarian migrants more familiar with the Internet and most likely to travel. By identifying the presence of online groups by country or city, I was able to locate the most active Bulgarian communities: “Bulgarians in UK” (524 members), “Bulgarians in Chicago” (436 members), “Bulgarians studying in the UK” (346 members), “Bulgarians in America” (333 members), “Bulgarians in the USA” (314 members), “Bulgarians in Montreal” (249 members), “Bulgarians in Munich” (241 members), and so on. These figures are based on the “Groups” Application of Facebook as updated in February 2010. Through those groups, a symbolic diasporic geography is imagined and communicated: the digital “border crossing,” as well as the real one, becomes a major identity resource. Thus, Bulgarian users of Facebook are connecting from the four corners of the globe in order to rebuild family links and to participate virtually in the marriages, births, and lives of their families. It sometimes seems that the whole country has an appointment on Facebook, and that all the photos and stories of Bulgarians are more or less accessible to the community in general. Among its virtual initiatives, Facebook has made available to its users an effective mobilising tool, the Causes, which is used as a virtual noticeboard for activities and ideas circulating in “real life.” The members of the Bulgarian diaspora choose to adhere to different “causes” that may be local, national, or global, and that are complementary to the civic and socially responsible side of the identity they have chosen to construct online. Acting as a virtual realm in which distinct and overlapping trajectories coexist, Facebook thus enables users to articulate different stories and meanings and to foster a democratic imaginary about both the past and the future. Facebook encourages diasporas to produce new initiatives to revive or create collective memories and common values. Through photos and videos, scenes of everyday life are celebrated and manipulated as tools to reconstruct, reconcile, and display a part of the history and the identity of the migrant. By combating the feelings of disorientation, the consciousness of sharing the same national background and culture facilitates dialogue and neutralises the anxiety and loneliness of Bulgarian migrants. When cultural differences become more acute, the sense of isolation increases and this encourages migrants to look for company and solidarity online. As the number of immigrants connected and visible on Facebook gets larger, so the use of the Internet heightens their sense of a substantial collective identity. This is especially important for migrants during the early years of relocation when their sense of identity is most fragile. It can therefore be argued that, through the Internet, some Bulgarian migrants are replacing alienating face-to-face contact with virtual friends and enjoying the feeling of reassurance and belonging to a transnational community of compatriots. In this sense, Facebook is a propitious ground for the establishment of the three identity strategies defined by Herzfeld: cultural intimacy (or self-stereotypes); structural nostalgia (the evocation of a time when everything was going better); and the social poetic (the strategies aiming to retrieve a particular advantage and turn it into a permanent condition). In this way, the willingness to remain continuously in virtual contact with other Bulgarians often reveals a desire to return to the place of birth. Nostalgia and outsourcing of such sentiments help migrants to cope with feelings of frustration and disappointment. I observed that it is just after their return from summer holidays spent in Bulgaria that members of the Bulgarian diaspora are most active on the Bulgarian forums and pages on Facebook. The “return tourism” (Fourcade) during the summer or for the winter holidays seems to be a central theme in the forums on Facebook and an important source of emotional refuelling. Tensions between identities can also lead to creative formulations through Facebook’s pages. Thus, the group “You know you’re a Bulgarian when...”, which enjoys very active participation from the Bulgarian diaspora, is a space where everyone is invited to share, through a single sentence, some fact of everyday life with which all Bulgarians can identify. With humour and self-irony, this Facebook page demonstrates what is distinctive about being Bulgarian but also highlights frustration with certain prejudices and stereotypes. Frequently these profiles are characterised by seemingly “glocal” features. The same Bulgarian user could define himself as a Parisian, adhering to the group “You know you’re from Paris when...”, but also a native of a Bulgarian town (“You know you’re from Varna when...”). At the same time, he is an architect (“All architects on Facebook”), supporting the candidacy of Barack Obama, a fan of Japanese manga (“maNga”), of a French actor, an American cinema director, or Indian food. He joins a cause to save a wild beach on the Black Sea coast (“We love camping: Gradina Smokinia and Arapia”) and protests virtually against the slaughter of dolphins in the Faroe Islands (“World shame”). One month, the individual could identify as Bulgarian, but next month he might choose to locate himself in the country in which he is now resident. Thus, Facebook creates a virtual territory without borders for the cosmopolitan subject (Negroponte) and this confirms the premise that the Internet does not lead to the convergence of cultures, but rather confirms the opportunities for diversification and pluralism through multiple social and national affiliations. Facebook must therefore be seen as an advantageous space for the representation and interpretation of identity and for performance and digital existence. Bulgarian migrants bring together elements of their offline lives in order to construct, online, entirely new composite identities. The Bulgarians we have studied as part of this research almost never use pseudonyms and do not seem to feel the need to hide their material identities. This suggests that they are mature people who value their status as migrants of Bulgarian origin and who feel confident in presenting their natal identities rather than hiding behind a false name. Starting from this material social/national identity, which is revealed through the display of surname with a Slavic consonance, members of the Bulgarian diaspora choose to manage their complex virtual identities online. Conclusion Far from their homeland, beset with feelings of insecurity and alienation as well as daily experiences of social and cultural exclusion (much of it stemming from an ongoing prejudice towards citizens from ex-communist countries), it is no wonder that migrants from Bulgaria find relief in meeting up with compatriots in front of their screens. Although some migrants assume their Bulgarian identity as a mixture of different cultures and are trying to rethink and continuously negotiate their cultural practices (often through the display of contradictory feelings and identifications), others identify with an imagined community and enjoy drawing boundaries between what is “Bulgarian” and what is not. The indispensable daily visit to Facebook is clearly a means of forging an ongoing sense of belonging to the Bulgarian community scattered across the globe. Facebook makes possible the double presence of Bulgarian immigrants both here and there and facilitates the ongoing processes of identity construction that depend, more and more, upon new media. In this respect, the role that Facebook plays in the life of the Bulgarian diaspora may be seen as a facet of an increasingly dynamic transnational world in which interactive media may be seen to contribute creatively to the formation of collective identities and the deformation of monolithic cultures. References Anderson, Benedict. L’Imaginaire National: Réflexions sur l’Origine et l’Essor du Nationalisme. Paris: La Découverte, 1983. Appadurai, Ajun. Après le Colonialisme: Les Conséquences Culturelles de la Globalisation. Paris: Payot, 2001. Bernal, Victoria. “Diaspora, Cyberspace and Political Imagination: The Eritrean Diaspora Online.” Global Network 6 (2006): 161-79. boyd, danah. “Social Network Sites: Public, Private, or What?” Knowledge Tree (May 2007). Cohen, Robin. Global Diasporas: An Introduction. London: University College London Press. 1997. Goffman, Erving. La Présentation de Soi. Paris: Editions de Minuit, Collection Le Sens Commun, 1973. Fourcade, Marie-Blanche. “De l’Arménie au Québec: Itinéraires de Souvenirs Touristiques.” Ethnologies 27.1 (2005): 245-76. Freud, Sigmund. “Psychologie des Foules et Analyses du Moi.” Essais de Psychanalyse. Paris: Petite Bibliothèque Payot, 2001 (1921). Herzfeld, Michael. Intimité Culturelle. Presse de l’Université de Laval, 2008. Karim, Karim-Haiderali. The Media of Diaspora. Oxford: Routledge, 2003. Marcheva, Marta. “Bulgarian Diaspora and the Media Treatment of Bulgaria in the French, Italian and North American Press (1992–2007).” Unpublished PhD dissertation. Paris: University Panthéon – Assas Paris 2, 2010. Mead, George Herbert. L’Esprit, le Soi et la Société. Paris: PUF, 2006. Negroponte, Nicholas. Being Digital. Vintage, 2005. Soultanova, Ralitza. “Les Migrations Multiples de la Population Bulgare.” Actes du Dolloque «La France et les Migrants des Balkans: Un État des Lieux.” Paris: Courrier des Balkans, 2005. Srinivasan, Ramesh, and Ajit Pyati. “Diasporic Information Environments: Reframing Immigrant-Focused Information Research.” Journal of the American Society for Information Science and Technology 58.12 (2007): 1734-44. Todorov, Tzvetan. Nous et les Autres: La Réflexion Française sur la Diversité Humaine. Paris: Seuil, 1989.
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Peter. "Community without Flesh." M/C Journal 2, no. 3 (May 1, 1999). http://dx.doi.org/10.5204/mcj.1750.

Full text
Abstract:
On Wednesday 21 April the Minister for Communications, Information Technology and the Arts introduced a piece of legislation into the Australian Senate to regulate the way Australians use the Internet. This legislation is presented within Australia's existing system of content regulation, a scheme that the Minister describes is not censorship, but merely regulation (Alston 55). Underlying Senator Alston's rhetoric about the protection of children from snuff film makers, paedophiles, drug pushers and other criminals, this long anticipated bill is aimed at reducing the amount of pornographic materials available via computer networks, a censorship regime in an age when regulation and classification are the words we prefer to use when society draws the line under material we want to see, but dare not allow ourselves access to. Regardless of any noble aspirations expressed by free-speech organisations such as Electronic Frontiers Australia relating to the defence of personal liberty and freedom of expression, this legislation is about porn. Under the Bill, Australia would proscribe our citizens from accessing: explicit depictions of sexual acts between consenting adults; mild non-violent fetishes; depictions of sexual violence, coercion or non-consent of any kind; depictions of child sexual abuse, bestiality, sexual acts accompanied by offensive fetishes, or exploitative incest fantasies; unduly detailed and/or relished acts of extreme violence or cruelty; explicit or unjustifiable depictions of sexual violence against non-consenting persons; and detailed instruction or encouragement in matters of crime or violence or the abuse of proscribed drugs. (OFLC) The Australian public, as a whole, favour the availability of sexually explicit materials in some form, with OFLC data indicating a relatively high degree of public support for X rated videos, the "high end" of the porn market (Paterson et al.). In Australia strict regulation of X rated materials in conventional media has resulted in a larger illegal market for these materials than the legalised sex industries of the ACT and Northern Territory (while 1.2 million X rated videos are legally sold out of the territories, 2 million are sold illegally in other jurisdictions, according to Patten). In Australia, censorship of media content has traditionally been based on the principles of the protection of society from moral harm and individual degradation, with specific emphasis on the protection of innocents from material they are not old enough for, or mentally capable of dealing with (Joint Select Committee on Video Material). Even when governments distanced themselves from direct personal censorship (such as Don Chipp's approach to the censorship of films and books in the late 1960s and early 1970s) and shifted the rationale behind censorship from prohibition to classification, the publicly stated aims of these decisions have been the support of existing community standards, rather than the imposition of strict legalistic moral values upon an unwilling society. In the debates surrounding censorship, and especially the level of censorship applied (rather than censorship as a whole), the question "what is the community we are talking about here?" has been a recurring theme. The standards that are applied to the regulation of media content, both online and off, are often the focus of community debate (a pluralistic community that obviously lacks "standards" by definition of the word). In essence the problem of maintaining a single set of moral and ethical values for the treatment of media content is a true political dilemma: a problem that lacks any form of solution acceptable to all participants. Since the introduction of the Internet as a "mass" medium (or more appropriately, a "popular" one), government indecision about how best to treat this new technology has precluded any form or content regulation other than the ad hoc use of existing non-technologically specific law to deal with areas of criminal or legally sanctionable intent (such as the use of copyright law, or the powers under the Crimes Act relating to the improper use of telecommunications services). However, indecision in political life is often associated with political weakness, and in the face of pressure to act decisively (motivated again by "community concern"), the Federal government has decided to extend the role of the Australian Broadcasting Authority to regulate and impose a censorship regime on Australian access of morally harmful materials. It is important to note the government's intention to censor access, rather than content of the Internet. While material hosted in Australia (ignoring, of course, the "cyberspace" definitions of non-territorial existence of information stored in networks) will be censored (removed from Australia computers), the government, lacking extraterritorial powers to compel the owners of machines located offshore, intends to introduce of some form of refused access list to materials located in other nations. What is interesting to consider in this context is the way that slight shifts of definitional paradigm alter the way this legislation can be considered. If information flows (upon which late capitalism is becoming more dependent) were to be located within the context of international law governing the flow of waterways, does the decision to prevent travel of morally dubious material through Australia's informational waterways impinge upon the riparian rights of other nations (the doctrine of fair usage without impeding flow; Godana 50)? Similarly, if we take Smith's extended definition of community within electronic transactional spaces (the maintenance of members' commitment to the group, monitoring and sanctioning behaviour and the production and distribution of resources), then the current Bill proposes the regulation of the activities of one community by another (granted, a larger community that incorporates the former). Seen in this context, this legislation is the direct intervention in an established social order by a larger and less homogeneous group. It may be trite to quote the Prime Minister's view of community in this context, where he states ...It is free individuals, strong communities and the rule of law which are the best defence against the intrusive power of the state and against those who think they know what is best for everyone else. (Howard 21) possibly because the paradigm in which this new legislation is situated does not classify those Australians online (who number up to 3 million) as a community in their own right. In a way the Internet users of Australia have never identified themselves as a community, nor been asked to act in a communitarian manner. While discussions about the value of community models when applied to the Internet are still divided, there are those who argue that their use of networked services can be seen in this light (Worthington). What this new legislation does, however, is preclude the establishment of public communities in order to meet the desires of government for some limits to be placed on Internet content. The Bill does allow for the development of "restricted access systems" that would allow pluralistic communities to develop and engage in a limited amount of self-regulation. These systems include privately accessible Intranets, or sites that restrict access through passwords or some other form of age verification technique. Thus, ignoring the minimum standards that will be required for these communities to qualify for some measure of self-regulatory freedom, what is unspoken here is that specific subsections of the Internet population may exist, provided they keep well away from the public gaze. A ghetto without physical walls. Under the Bill, a co-regulatory approach is endorsed by the government, favouring the establishment of industry codes of practice by ISPs and (or) the establishment of a single code of practice by the content hosting industry (content developers are relegated to yet undetermined complementary state legislation). However, this section of the Bill, in mandating a range of minimum requirements for these codes of practice, and denying plurality to the content providers, places an administrative imperative above any communitarian spirit. That is, that the Internet should have no more than one community, it should be an entity bound by a single guiding set of principles and be therefore easier to administer by Australian censors. This administrative imperative re-encapsulates the dilemma faced by governments dealing with the Internet: that at heart, the broadcast and print press paradigms of existing censorship regimes face massive administrative problems when presented with a communications technology that allows for wholesale publication of materials by individuals. Whereas the limited numbers of broadcasters and publishers have allowed the development of Australia's system of classification of materials (on a sliding scale from G to RC classifications or the equivalent print press version), the new legislation introduced into the Senate uses the classification scheme simply as a censorship mechanism: Internet content is either "ok" or "not ok". From a public administration perspective, this allows government to drastically reduce the amount of work required by regulators and eases the burden of compliance costs by ISPs, by directing clear and unambiguous statements about the acceptability of existing materials placed online. However, as we have seen in other areas of social policy (such as the rationalisation of Social Security services or Health), administrative expedience is often antipathetic to small communities that have special needs, or cultural sensitivities outside of mainstream society. While it is not appropriate to argue that public administration creates negative social impacts through expedience, what can be presented is that, where expedience is a core aim of legislation, poor administration may result. For many Australian purveyors of pornography, my comments will be entirely unhelpful as they endeavour to find effective ways to spoof offshore hosts or bone up (no pun intended) on tunnelling techniques. Given the easy way in which material can be reconstituted and relocated on the Internet, it seems likely that some form of regulatory avoidance will occur by users determined not to have their content removed or blocked. For those regulators given the unenviable task of censoring Internet access it may be worthwhile quoting from Sexing the Cherry, in which Jeanette Winterson describes the town: whose inhabitants are so cunning that to escape the insistence of creditors they knock down their houses in a single night and rebuild them elsewhere. So the number of buildings in the city is always constant but they are never in the same place from one day to the next. (43) Thus, while Winterson saw this game as a "most fulfilling pastime", it is likely to present real administrative headaches to ABA regulators when attempting to enforce the Bill's anti-avoidance clauses. The Australian government, in adapting existing regulatory paradigms to the Internet, has overlooked the informal communities who live, work and play within the virtual world of cyberspace. In attempting to meet a perceived social need for regulation with political and administrative expedience, it has ignored the potentially cohesive role of government in developing self-regulating communities who need little government intervention to produce socially beneficial outcomes. In proscribing activity externally to the realm in which these communities reside, what we may see is a new type of community, one whose desire for a feast of flesh leads them to evade the activities of regulators who operate in the "meat" world. What this may show us is that in a virtual environment, the regulators' net is no match for a world wide web. References Alston, Richard. "Regulation is Not Censorship." The Australian 13 April 1999: 55. Paterson, K., et. al. Classification Issues: Film, Video and Television. Sydney: The Office of Film and Literature Classification, 1993. Patten, F. Personal interview. 9 Feb. 1999. Godana, B.A. Africa's Shared Water Resources: Legal and Institutional Aspects of the Nile, Niger and Senegal River Systems. London: Frances Pinter, 1985. Howard, John. The Australia I Believe In: The Values, Directions and Policy Priorities of a Coalition Government Outlined in 1995. Canberra: Liberal Party, 1995. Joint Select Committee On Video Material. Report of the Joint Select Committee On Video Material. Canberra: APGS, 1988. Office of Film and Literature Classification. Cinema & Video Ratings Guide. 1999. 1 May 1999 <http://www.oflc.gov.au/classinfo.php>. Smith, Marc A. "Voices from the WELL: The Logic of the Virtual Commons." 1998. 2 Mar. 1999 <http://www.sscnet.ucla.edu/soc/csoc/papers/voices/Voices.htm>. Winterson, Jeanette. Sexing the Cherry. New York: Vintage Books. 1991. Worthington, T. Testimony before the Senate Select Committee on Information Technologies. Unpublished, 1999. Citation reference for this article MLA style: Peter Chen. "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/bill.php>. Chicago style: Peter Chen, "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]). APA style: Author. (1999) Community without flesh: first thoughts on the new broadcasting services amendment (online services) bill 1999. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
44

Deck, Andy. "Treadmill Culture." M/C Journal 6, no. 2 (April 1, 2003). http://dx.doi.org/10.5204/mcj.2157.

Full text
Abstract:
Since the first days of the World Wide Web, artists like myself have been exploring the new possibilities of network interactivity. Some good tools and languages have been developed and made available free for the public to use. This has empowered individuals to participate in the media in ways that are quite remarkable. Nonetheless, the future of independent media is clouded by legal, regulatory, and organisational challenges that need to be addressed. It is not clear to what extent independent content producers will be able to build upon the successes of the 90s – it is yet to be seen whether their efforts will be largely nullified by the anticyclones of a hostile media market. Not so long ago, American news magazines were covering the Browser War. Several real wars later, the terms of surrender are becoming clearer. Now both of the major Internet browsers are owned by huge media corporations, and most of the states (and Reagan-appointed judges) that were demanding the break-up of Microsoft have given up. A curious about-face occurred in U.S. Justice Department policy when John Ashcroft decided to drop the federal case. Maybe Microsoft's value as a partner in covert activity appealed to Ashcroft more than free competition. Regardless, Microsoft is now turning its wrath on new competitors, people who are doing something very, very bad: sharing the products of their own labour. This practice of sharing source code and building free software infrastructure is epitomised by the continuing development of Linux. Everything in the Linux kernel is free, publicly accessible information. As a rule, the people building this "open source" operating system software believe that maintaining transparency is important. But U.S. courts are not doing much to help. In a case brought by the Motion Picture Association of America against Eric Corley, a federal district court blocked the distribution of source code that enables these systems to play DVDs. In addition to censoring Corley's journal, the court ruled that any programmer who writes a program that plays a DVD must comply with a host of license restrictions. In short, an established and popular media format (the DVD) cannot be used under open source operating systems without sacrificing the principle that software source code should remain in the public domain. Should the contents of operating systems be tightly guarded secrets, or subject to public review? If there are capable programmers willing to create good, free operating systems, should the law stand in their way? The question concerning what type of software infrastructure will dominate personal computers in the future is being answered as much by disappointing legal decisions as it is by consumer choice. Rather than ensuring the necessary conditions for innovation and cooperation, the courts permit a monopoly to continue. Rather than endorsing transparency, secrecy prevails. Rather than aiming to preserve a balance between the commercial economy and the gift-economy, sharing is being undermined by the law. Part of the mystery of the Internet for a lot of newcomers must be that it seems to disprove the old adage that you can't get something for nothing. Free games, free music, free pornography, free art. Media corporations are doing their best to change this situation. The FBI and trade groups have blitzed the American news media with alarmist reports about how children don't understand that sharing digital information is a crime. Teacher Gail Chmura, the star of one such media campaign, says of her students, "It's always been interesting that they don't see a connection between the two. They just don't get it" (Hopper). Perhaps the confusion arises because the kids do understand that digital duplication lets two people have the same thing. Theft is at best a metaphor for the copying of data, because the original is not stolen in the same sense as a material object. In the effort to liken all copying to theft, legal provisions for the fair use of intellectual property are neglected. Teachers could just as easily emphasise the importance of sharing and the development of an electronic commons that is free for all to use. The values advanced by the trade groups are not beyond question and are not historical constants. According to Donald Krueckeberg, Rutgers University Professor of Urban Planning, native Americans tied the concept of property not to ownership but to use. "One used it, one moved on, and use was shared with others" (qtd. in Batt). Perhaps it is necessary for individuals to have dominion over some private data. But who owns the land, wind, sun, and sky of the Internet – the infrastructure? Given that publicly-funded research and free software have been as important to the development of the Internet as have business and commercial software, it is not surprising that some ambiguity remains about the property status of the dataverse. For many the Internet is as much a medium for expression and the interplay of languages as it is a framework for monetary transaction. In the case involving DVD software mentioned previously, there emerged a grass-roots campaign in opposition to censorship. Dozens of philosophical programmers and computer scientists asserted the expressive and linguistic bases of software by creating variations on the algorithm needed to play DVDs. The forbidden lines of symbols were printed on T-shirts, translated into different computer languages, translated into legal rhetoric, and even embedded into DNA and pictures of MPAA president Jack Valenti (see e.g. Touretzky). These efforts were inspired by a shared conviction that important liberties were at stake. Supporting the MPAA's position would do more than protect movies from piracy. The use of the algorithm was not clearly linked to an intent to pirate movies. Many felt that outlawing the DVD algorithm, which had been experimentally developed by a Norwegian teenager, represented a suppression of gumption and ingenuity. The court's decision rejected established principles of fair use, denied the established legality of reverse engineering software to achieve compatibility, and asserted that journalists and scientists had no right to publish a bit of code if it might be misused. In a similar case in April 2000, a U.S. court of appeals found that First Amendment protections did apply to software (Junger). Noting that source code has both an expressive feature and a functional feature, this court held that First Amendment protection is not reserved only for purely expressive communication. Yet in the DVD case, the court opposed this view and enforced the inflexible demands of the Digital Millennium Copyright Act. Notwithstanding Ted Nelson's characterisation of computers as literary machines, the decision meant that the linguistic and expressive aspects of software would be subordinated to other concerns. A simple series of symbols were thereby cast under a veil of legal secrecy. Although they were easy to discover, and capable of being committed to memory or translated to other languages, fair use and other intuitive freedoms were deemed expendable. These sorts of legal obstacles are serious challenges to the continued viability of free software like Linux. The central value proposition of Linux-based operating systems – free, open source code – is threatening to commercial competitors. Some corporations are intent on stifling further development of free alternatives. Patents offer another vulnerability. The writing of free software has become a minefield of potential patent lawsuits. Corporations have repeatedly chosen to pursue patent litigation years after the alleged infringements have been incorporated into widely used free software. For example, although it was designed to avoid patent problems by an array of international experts, the image file format known as JPEG (Joint Photographic Experts Group) has recently been dogged by patent infringement charges. Despite good intentions, low-budget initiatives and ad hoc organisations are ill equipped to fight profiteering patent lawsuits. One wonders whether software innovation is directed more by lawyers or computer scientists. The present copyright and patent regimes may serve the needs of the larger corporations, but it is doubtful that they are the best means of fostering software innovation and quality. Orwell wrote in his Homage to Catalonia, There was a new rule that censored portions of the newspaper must not be left blank but filled up with other matter; as a result it was often impossible to tell when something had been cut out. The development of the Internet has a similar character: new diversions spring up to replace what might have been so that the lost potential is hardly felt. The process of retrofitting Internet software to suit ideological and commercial agendas is already well underway. For example, Microsoft has announced recently that it will discontinue support for the Java language in 2004. The problem with Java, from Microsoft's perspective, is that it provides portable programming tools that work under all operating systems, not just Windows. With Java, programmers can develop software for the large number of Windows users, while simultaneously offering software to users of other operating systems. Java is an important piece of the software infrastructure for Internet content developers. Yet, in the interest of coercing people to use only their operating systems, Microsoft is willing to undermine thousands of existing Java-language projects. Their marketing hype calls this progress. The software industry relies on sales to survive, so if it means laying waste to good products and millions of hours of work in order to sell something new, well, that's business. The consequent infrastructure instability keeps software developers, and other creative people, on a treadmill. From Progressive Load by Andy Deck, artcontext.org/progload As an Internet content producer, one does not appeal directly to the hearts and minds of the public; one appeals through the medium of software and hardware. Since most people are understandably reluctant to modify the software running on their computers, the software installed initially is a critical determinant of what is possible. Unconventional, independent, and artistic uses of the Internet are diminished when the media infrastructure is effectively established by decree. Unaccountable corporate control over infrastructure software tilts the playing field against smaller content producers who have neither the advance warning of industrial machinations, nor the employees and resources necessary to keep up with a regime of strategic, cyclical obsolescence. It seems that independent content producers must conform to the distribution technologies and content formats favoured by the entertainment and marketing sectors, or else resign themselves to occupying the margins of media activity. It is no secret that highly diversified media corporations can leverage their assets to favour their own media offerings and confound their competitors. Yet when media giants AOL and Time-Warner announced their plans to merge in 2000, the claim of CEOs Steve Case and Gerald Levin that the merged companies would "operate in the public interest" was hardly challenged by American journalists. Time-Warner has since fought to end all ownership limits in the cable industry; and Case, who formerly championed third-party access to cable broadband markets, changed his tune abruptly after the merger. Now that Case has been ousted, it is unclear whether he still favours oligopoly. According to Levin, global media will be and is fast becoming the predominant business of the 21st century ... more important than government. It's more important than educational institutions and non-profits. We're going to need to have these corporations redefined as instruments of public service, and that may be a more efficient way to deal with society's problems than bureaucratic governments. Corporate dominance is going to be forced anyhow because when you have a system that is instantly available everywhere in the world immediately, then the old-fashioned regulatory system has to give way (Levin). It doesn't require a lot of insight to understand that this "redefinition," this slight of hand, does not protect the public from abuses of power: the dissolution of the "old-fashioned regulatory system" does not serve the public interest. From Lexicon by Andy Deck, artcontext.org/lexicon) As an artist who has adopted telecommunications networks and software as his medium, it disappoints me that a mercenary vision of electronic media's future seems to be the prevailing blueprint. The giantism of media corporations, and the ongoing deregulation of media consolidation (Ahrens), underscore the critical need for independent media sources. If it were just a matter of which cola to drink, it would not be of much concern, but media corporations control content. In this hyper-mediated age, content – whether produced by artists or journalists – crucially affects what people think about and how they understand the world. Content is not impervious to the software, protocols, and chicanery that surround its delivery. It is about time that people interested in independent voices stop believing that laissez faire capitalism is building a better media infrastructure. The German writer Hans Magnus Enzensberger reminds us that the media tyrannies that affect us are social products. The media industry relies on thousands of people to make the compromises necessary to maintain its course. The rapid development of the mind industry, its rise to a key position in modern society, has profoundly changed the role of the intellectual. He finds himself confronted with new threats and new opportunities. Whether he knows it or not, whether he likes it or not, he has become the accomplice of a huge industrial complex which depends for its survival on him, as he depends on it for his own. He must try, at any cost, to use it for his own purposes, which are incompatible with the purposes of the mind machine. What it upholds he must subvert. He may play it crooked or straight, he may win or lose the game; but he would do well to remember that there is more at stake than his own fortune (Enzensberger 18). Some cultural leaders have recognised the important role that free software already plays in the infrastructure of the Internet. Among intellectuals there is undoubtedly a genuine concern about the emerging contours of corporate, global media. But more effective solidarity is needed. Interest in open source has tended to remain superficial, leading to trendy, cosmetic, and symbolic uses of terms like "open source" rather than to a deeper commitment to an open, public information infrastructure. Too much attention is focussed on what's "cool" and not enough on the road ahead. Various media specialists – designers, programmers, artists, and technical directors – make important decisions that affect the continuing development of electronic media. Many developers have failed to recognise (or care) that their decisions regarding media formats can have long reaching consequences. Web sites that use media formats which are unworkable for open source operating systems should be actively discouraged. Comparable technologies are usually available to solve compatibility problems. Going with the market flow is not really giving people what they want: it often opposes the work of thousands of activists who are trying to develop open source alternatives (see e.g. Greene). Average Internet users can contribute to a more innovative, free, open, and independent media – and being conscientious is not always difficult or unpleasant. One project worthy of support is the Internet browser Mozilla. Currently, many content developers create their Websites so that they will look good only in Microsoft's Internet Explorer. While somewhat understandable given the market dominance of Internet Explorer, this disregard for interoperability undercuts attempts to popularise standards-compliant alternatives. Mozilla, written by a loose-knit group of activists and programmers (some of whom are paid by AOL/Time-Warner), can be used as an alternative to Microsoft's browser. If more people use Mozilla, it will be harder for content providers to ignore the way their Web pages appear in standards-compliant browsers. The Mozilla browser, which is an open source initiative, can be downloaded from http://www.mozilla.org/. While there are many people working to create real and lasting alternatives to the monopolistic and technocratic dynamics that are emerging, it takes a great deal of cooperation to resist the media titans, the FCC, and the courts. Oddly enough, corporate interests sometimes overlap with those of the public. Some industrial players, such as IBM, now support open source software. For them it is mostly a business decision. Frustrated by the coercive control of Microsoft, they support efforts to develop another operating system platform. For others, including this writer, the open source movement is interesting for the potential it holds to foster a more heterogeneous and less authoritarian communications infrastructure. Many people can find common cause in this resistance to globalised uniformity and consolidated media ownership. The biggest challenge may be to get people to believe that their choices really matter, that by endorsing certain products and operating systems and not others, they can actually make a difference. But it's unlikely that this idea will flourish if artists and intellectuals don't view their own actions as consequential. There is a troubling tendency for people to see themselves as powerless in the face of the market. This paralysing habit of mind must be abandoned before the media will be free. Works Cited Ahrens, Frank. "Policy Watch." Washington Post (23 June 2002): H03. 30 March 2003 <http://www.washingtonpost.com/ac2/wp-dyn/A27015-2002Jun22?la... ...nguage=printer>. Batt, William. "How Our Towns Got That Way." 7 Oct. 1996. 31 March 2003 <http://www.esb.utexas.edu/drnrm/WhatIs/LandValue.htm>. Chester, Jeff. "Gerald Levin's Negative Legacy." Alternet.org 6 Dec. 2001. 5 March 2003 <http://www.democraticmedia.org/resources/editorials/levin.php>. Enzensberger, Hans Magnus. "The Industrialisation of the Mind." Raids and Reconstructions. London: Pluto Press, 1975. 18. Greene, Thomas C. "MS to Eradicate GPL, Hence Linux." 25 June 2002. 5 March 2003 <http://www.theregus.com/content/4/25378.php>. Hopper, D. Ian. "FBI Pushes for Cyber Ethics Education." Associated Press 10 Oct. 2000. 29 March 2003 <http://www.billingsgazette.com/computing/20001010_cethics.php>. Junger v. Daley. U.S. Court of Appeals for 6th Circuit. 00a0117p.06. 2000. 31 March 2003 <http://pacer.ca6.uscourts.gov/cgi-bin/getopn.pl?OPINION=00a0... ...117p.06>. Levin, Gerald. "Millennium 2000 Special." CNN 2 Jan. 2000. Touretzky, D. S. "Gallery of CSS Descramblers." 2000. 29 March 2003 <http://www.cs.cmu.edu/~dst/DeCSS/Gallery>. Links http://artcontext.org/lexicon/ http://artcontext.org/progload http://pacer.ca6.uscourts.gov/cgi-bin/getopn.pl?OPINION=00a0117p.06 http://www.billingsgazette.com/computing/20001010_cethics.html http://www.cs.cmu.edu/~dst/DeCSS/Gallery http://www.democraticmedia.org/resources/editorials/levin.html http://www.esb.utexas.edu/drnrm/WhatIs/LandValue.htm http://www.mozilla.org/ http://www.theregus.com/content/4/25378.html http://www.washingtonpost.com/ac2/wp-dyn/A27015-2002Jun22?language=printer Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Deck, Andy. "Treadmill Culture " M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0304/04-treadmillculture.php>. APA Style Deck, A. (2003, Apr 23). Treadmill Culture . M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0304/04-treadmillculture.php>
APA, Harvard, Vancouver, ISO, and other styles
45

McGuire, Mark. "Ordered Communities." M/C Journal 7, no. 6 (January 1, 2005). http://dx.doi.org/10.5204/mcj.2474.

Full text
Abstract:
A rhetoric of freedom characterises much of the literature dealing with online communities: freedom from fixed identity and appearance, from the confines of geographic space, and from control. The prevailing view, a combination of futurism and utopianism, is that the lack of order in cyberspace enables the creation of social spaces that will enhance personal freedom and advance the common good. Sherry Turkle argues that computer-mediated communication allows us to create a new form of community, in which identity is multiple and fluid (15-17). Marcos Novak celebrates the possibilities of a dematerialized, ethereal virtual architecture in which the relationships between abstract elements are in a constant state of flux (250). John Perry Barlow employs the frontier metaphor to frame cyberspace as an unmapped, ungoverned territory in which a romantic and a peculiarly American form of individualism can be enjoyed by rough and ready pioneers (“Crime” 460). In his 1993 account as an active participant in The WELL (Whole Earth ‘Lectronic Link), one of the earliest efforts to construct a social space online, Howard Rheingold celebrates the freedom to create a “new kind of culture” and an “authentic community” in the “electronic frontier.” He worries, however, that the freedom enjoyed by early homesteaders may be short lived, because “big power and big money” might soon find ways to control the Internet, just as they have come to dominate and direct other communications media. “The Net,” he states, “is still out of control in fundamental ways, but it might not stay that way for long” (Virtual Community 2-5). The uses of order and disorder Some theorists have identified disorder as a necessary condition for the development of healthy communities. In The Uses of Disorder (1970), Richard Sennett argues that “the freedom to accept and to live with disorder” is integral to our search for community (xviii). In his 1989 study of social space, Ray Oldenburg maintains that public hangouts, which constitute the heart of vibrant communities, support sociability best when activities are unplanned, unorganized, and unrestricted (33). He claims that without the constraints of preplanned control we will be more in control of ourselves and more aware of one another (198). More recently, Charles Landry suggests that “structured instability” and “controlled disruption,” resulting from competition, conflict, crisis, and debate, make cities less comfortable but more exciting. Further, he argues that “endemic structural disorder” requiring ongoing adjustments can generate healthy creative activity and stimulate continual innovation (156-58). Kevin Robins, too, believes that any viable social system must be prepared to accept a level of uncertainty, disorder, and fear. He observes, however, that techno-communities are “driven by the compulsion to neutralize,” and they therefore exclude these possibilities in favour of order and security (90-91). Indeed, order and security are the dominant characteristics that less idealistic observers have identified with cyberspace. Alexander Galloway explains how, despite its potential as a liberating development, the Internet is based on technologies of control. This control is exercised at the code level through technical protocols, such as TCP/IP, DNS, and HTM, that determine disconnections as well as connections (Galloway). Lawrence Lessig suggests that in our examination of the ownership, regulation, and governance of the virtual commons, we must take into account three distinct layers. As well as the “logical” or “code” layer that Galloway foregrounds, we should also consider the “physical” layer, consisting of the computers and wires that carry Internet communications, and the “content” layer, which includes everything that we see and hear over the network. In principle, each of these layers could be free and unorganized, or privately owned and controlled (Lessig 23). Dan Schiller documents the increasing privatization of the Net and argues that corporate cyberspace extends the reach of the market, enabling it to penetrate into areas that have previously been considered to be part of the public domain. For Schiller, the Internet now serves as the main production and control mechanism of a global market system (xiv). Checking into Habbo Hotel Habbo Hotel is an example of a highly ordered and controlled online social space that uses community and game metaphors to suggest something much more open and playful. Designed to attract the teenage market, this graphically intensive cartoon-like hotel is like an interactive Legoland, in which participants assemble a toy-like “Habbo” character and chat, play games, and construct personal environments. The first Habbo Hotel opened its doors in the United Kingdom in 2000, and, by September 2004, localized sites were based in a dozen countries, including Canada, the Unites States, Finland, Japan, Switzerland and Spain, with further expansion planned. At that time, there were more than seventeen million registered Habbo characters worldwide with 2.3 million unique visitors each month (“Strong Growth”). The hotel contains thousands of private rooms and twenty-two public spaces, including a welcome lounge, three lobbies, cinema, game hall, café, pub, and an extensive hallway. Anyone can go to the Room-O-Matic and instantly create a free guest room. However, there are a limited number of layouts to choose from and the furnishings, which must be purchased, have be chosen from a catalog of fixed offerings. All rooms are located on one of five floors, which categorize them according to use (parties, games, models, mazes, and trading). Paradoxically, the so-called public spaces are more restricted and less public than the private guest quarters. The limited capacity of the rooms means that all of the public spaces are full most of the time. Priority is given to paying Habbo Club members and others are denied entry or are unceremoniously ejected from a room when it becomes full. Most visitors never make it into the front lobby. This rigid and restricted construction is far from Novak’s vision of a “liquid architecture” without barriers, that morphs in response to the constantly changing desires of individual inhabitants (Novak 250). Before entering the virtual hotel, individuals must first create a Lego-like avatar. Users choose a unique name for their Habbo (no foul language is allowed) and construct their online persona from a limited selection and colour of body parts. One of two different wardrobes is available, depending on whether “Boy” or “Girl” is chosen. The gender of every Habbo is easily recognizable and the restricted wardrobe results in remarkably similar looking young characters. The lack of differentiation encourages participants to treat other Habbos as generic “Boys” or “Girls” and it encourages limited and predictable conversations that fit the stereotype of male-female interactions in most chat sites. Contrary to Turkle’s contention that computer mediated communication technologies expose the fallacy of a single, fixed, identity, and free participants to experiment with alternative selves (15-17), Habbo characters are permitted just one unchangeable name, and are capable of only limited visual transformations. A fixed link between each Habbo character and its registered user (information that is not available to other participants) allows the hotel management to track members through the site and monitor their behavior. Habbo movements are limited to walking, waving, dancing and drinking virtual alcohol-free beverages. Movement between spaces is accomplished by entering a teleport booth, or by selecting a location by name from the hotel Navigator. Habbos cannot jump, fly or walk through objects or other Habbos. They have no special powers and only a limited ability to interact with objects in their environment. They cannot be hurt or otherwise affected by anything in their surroundings, including other Habbos. The emphasis is on safety and avoidance of conflict. Text chat in Habbo Hotel is limited to one sixty-one-character line, which appears above the Habbo, floats upward, and quickly disappears off the top of the screen. Text must be typed in real time while reading on-going conversations and it is not possible to archive a chat sessions or view past exchanges. There is no way of posting a message on a public board. Using the Habbo Console, shorter messages can also be exchanged between Habbos who may be occupying different rooms. The only other narratives available on the site are in the form of official news and promotions. Before checking into the hotel, Habbos can stop to read Habbo Today, which promotes current offers and activities, and HabboHood Happenings, which offers safety tips, information about membership benefits, jobs (paid in furniture), contest winners, and polls. According to Rheingold, a virtual community can form online when enough people participate in meaningful public discussions over an extended period of time and develop “webs of personal relationships” (Virtual Community 5). By restricting communication to short, fleeting messages between individual Habbos, the hotel frustrates efforts by members to engage in significant dialogue and create a viable social group. Although “community” is an important part of the Habbo Hotel brand, it is unlikely to be a substantial part of the actual experience. The virtual hotel is promoted as a safe, non-threatening environment suitable for the teenagers is designed to attract. Parents’ concerns about the dangers of an unregulated chat space provide the hotel management with a justification for creating a highly controlled social space. The hotel is patrolled twenty-four hours a day by professional moderators backed-up by a team of 180 volunteer “Hobbas,” or guides, who can issue warnings to misbehaving Habbos, or temporarily ban them from the site. All text keyed in by Habbos passes through an automated “Bobba Filter” that removes swearing, racist words, explicit sexual comments and “anything that goes against the “Habbo Way” (“Bad Language”). Stick to the rules and you’ll have fun, Habbos are told, “break them and you’ll get yourself banned” (“Habbo Way”). In Big Brother fashion, messages are displayed throughought the hotel advising members to “Stay safe, read the Habbohood Watch,” “Never give out your details!” and “Obey the Habbo way and you’ll be OK.” This miniature surveillance society contradicts Barlow’s observation that cyberspace serves as “a perfect breeding ground for both outlaws and new ideas about liberty” (“Crime” 460). In his manifesto declaring the independence of cyberspace from government control, he maintains that the state has no authority in the electronic “global social space,” where, he asserts, “[w]e are forming our own Social Contract” based on the Golden Rule (“Declaration”). However, Habbo Hotel shows how the rule of the marketplace, which values profits more than social practices, can limit the freedoms of online civil society just as effectively as the most draconian government regulation. Place your order Far from permitting the “controlled disruption” advocated by Landry, the hotel management ensures that nothing is allowed to disrupt their control over the participants. Without conflict and debate, there are few triggers for creative activity in the site, which is designed to encourage consumption, not community. Timo Soininen, the managing director of the company that designed the hotel, states that, because teenagers like to showcase their own personal style, “self-expression is the key to our whole concept.” However, since it isn’t possible to create a Habbo from scratch, or to import clothing or other objects from outside the site, the only way for members to effectively express themselves is by decorating and furnishing their room with items purchased from the Habbo Catalogue. “You see, this,” admits Soininen, “is where our revenue model kicks in” (Shalit). Real-world products and services are also marketed through ads and promotions that are integrated into chat, news, and games. The result, according to Habbo Ltd, is “the ideal vehicle for third party brands to reach this highly desired 12-18 year-old market in a cost-effective and creative manner” (“Habbo Company Profile”). Habbo Hotel is a good example of what Herbert Schiller describes as the corporate capture of sites of public expression. He notes that, when put at the service of growing corporate power, new technologies “provide the instrumentation for organizing and channeling expression” (5-6). In an afterword to a revised edition of The Virtual Community, published in 2000, Rheingold reports on the sale of the WELL to a privately owned corporation, and its decline as a lively social space when order was imposed from the top down. Although he believes that there is a place for commercial virtual communities on the Net, he acknowledges that as economic forces become more entrenched, “more controls will be instituted because there is more at stake.” While remaining hopeful that activists can leverage the power of many-to-many communications for the public good, he wonders what will happen when “the decentralized network infrastructure and freewheeling network economy collides with the continuing growth of mammoth, global, communication empires” (Virtual Community Rev. 375-7). Although the company that built Habbo Hotel is far from achieving global empire status, their project illustrates how the dominant ethos of privatization and the increasing emphasis on consumption results in gated virtual communities that are highly ordered, restricted, and controlled. The popularity of the hotel reflects the desire of millions of Habbos to express their identities and ideas in a playful environment that they are free to create and manipulate. However, they soon find that the rules are stacked against them. Restricted design options, severe communication limitations, and fixed architectural constraints mean that the only freedom left is the freedom to choose from a narrow range of provided options. In private cyberspaces like Habbo Hotel, the logic of the market rules out unrestrained many-to-many communications in favour of controlled commercial relationships. The liberating potential of the Internet that was recognized by Rheingold and others has been diminished as the forces of globalized commerce impose their order on the electronic frontier. References “Bad Language.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/badlanguage/>. Barlow, John Perry. “Crime and Puzzlement.” High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Ed. Peter Ludlow. Cambridge, Mass.: MIT P, 1996. 459-86. ———. “A Declaration of the Independence of Cyberspace.” 8 Feb. 1996. 3 July 2004 http://www.eff.org/~barlow/Declaration-Final.html>. Galloway, Alexander R. Protocol: How Control Exists after Decentralization. Cambridge, Mass.: MIT P, 2004. “Habbo Company Profile.” Habbo Hotel. 2002. Habbo Ltd. 20 Jan. 2003 http://www.habbogroup.com>. “The Habbo Way.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/habboway/>. Landry, Charles. The Creative City: A Toolkit for Urban Innovators. London: Earthscan, 2000. Lessig, Lawrence. The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random, 2001. Novak, Marcos. “Liquid Architecture in Cyberspace.” Cyberspace: First Steps. Ed. Michael Benedikt. Cambridge, Mass.: MIT P, 1991. 225-54. Oldenburg, Ray. The Great Good Place: Cafés, Coffee Shops, Community Centers, Beauty Parlors, General Stores, Bars, Hangouts and How They Get You through the Day. New York: Paragon, 1989. Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper, 1993. ———. The Virtual Community: Homesteading on the Electronic Frontier. Rev. ed. Cambridge, Mass.: MIT P, 2000. Robins, Kevin. “Cyberspace and the World We Live In.” The Cybercultures Reader. Eds. David Bell and Barbara M. Kennedy. London: Routledge, 2000. 77-95. Schiller, Dan. Digital Capitalism: Networking the Global Market System. Cambridge, Mass.: MIT P, 1999. Schiller, Herbert I. Culture Inc.: The Corporate Takeover of Public Expression. New York: Oxford UP, 1991. Sennett, Richard. The Uses of Disorder: Personal Identity & City Life. New York: Vintage, 1970. Shalit, Ruth. “Welcome to the Habbo Hotel.” mpulse Magazine. Mar. 2002. Hewlett-Packard. 1 Apr. 2004 http://www.cooltown.com/cooltown/mpulse/0302-habbo.asp>. “Strong Growth in Sulake’s Revenues and Profit – Habbo Hotel Online Game Will Launch in the US in September.” 3 Sept. 2004. Sulake. Sulake Corp. 9 Jan. 2005 http://www.sulake.com/>. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon, 1997. Citation reference for this article MLA Style McGuire, Mark. "Ordered Communities." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/06-mcguire.php>. APA Style McGuire, M. (Jan. 2005) "Ordered Communities," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/06-mcguire.php>.
APA, Harvard, Vancouver, ISO, and other styles
46

Burns, Alex. "Oblique Strategies for Ambient Journalism." M/C Journal 13, no. 2 (April 15, 2010). http://dx.doi.org/10.5204/mcj.230.

Full text
Abstract:
Alfred Hermida recently posited ‘ambient journalism’ as a new framework for para- and professional journalists, who use social networks like Twitter for story sources, and as a news delivery platform. Beginning with this framework, this article explores the following questions: How does Hermida define ‘ambient journalism’ and what is its significance? Are there alternative definitions? What lessons do current platforms provide for the design of future, real-time platforms that ‘ambient journalists’ might use? What lessons does the work of Brian Eno provide–the musician and producer who coined the term ‘ambient music’ over three decades ago? My aim here is to formulate an alternative definition of ambient journalism that emphasises craft, skills acquisition, and the mental models of professional journalists, which are the foundations more generally for journalism practices. Rather than Hermida’s participatory media context I emphasise ‘institutional adaptiveness’: how journalists and newsrooms in media institutions rely on craft and skills, and how emerging platforms can augment these foundations, rather than replace them. Hermida’s Ambient Journalism and the Role of Journalists Hermida describes ambient journalism as: “broad, asynchronous, lightweight and always-on communication systems [that] are creating new kinds of interactions around the news, and are enabling citizens to maintain a mental model of news and events around them” (Hermida 2). His ideas appear to have two related aspects. He conceives ambient journalism as an “awareness system” between individuals that functions as a collective intelligence or kind of ‘distributed cognition’ at a group level (Hermida 2, 4-6). Facebook, Twitter and other online social networks are examples. Hermida also suggests that such networks enable non-professionals to engage in ‘communication’ and ‘conversation’ about news and media events (Hermida 2, 7). In a helpful clarification, Hermida observes that ‘para-journalists’ are like the paralegals or non-lawyers who provide administrative support in the legal profession and, in academic debates about journalism, are more commonly known as ‘citizen journalists’. Thus, Hermida’s ambient journalism appears to be: (1) an information systems model of new platforms and networks, and (2) a normative argument that these tools empower ‘para-journalists’ to engage in journalism and real-time commentary. Hermida’s thesis is intriguing and worthy of further discussion and debate. As currently formulated however it risks sharing the blind-spots and contradictions of the academic literature that Hermida cites, which suffers from poor theory-building (Burns). A major reason is that the participatory media context on which Hermida often builds his work has different mental models and normative theories than the journalists or media institutions that are the target of critique. Ambient journalism would be a stronger and more convincing framework if these incorrect assumptions were jettisoned. Others may also potentially misunderstand what Hermida proposes, because the academic debate is often polarised between para-journalists and professional journalists, due to different views about institutions, the politics of knowledge, decision heuristics, journalist training, and normative theoretical traditions (Christians et al. 126; Cole and Harcup 166-176). In the academic debate, para-journalists or ‘citizen journalists’ may be said to have a communitarian ethic and desire more autonomous solutions to journalists who are framed as uncritical and reliant on official sources, and to media institutions who are portrayed as surveillance-like ‘monitors’ of society (Christians et al. 124-127). This is however only one of a range of possible relationships. Sole reliance on para-journalists could be a premature solution to a more complex media ecology. Journalism craft, which does not rely just on official sources, also has a range of practices that already provides the “more complex ways of understanding and reporting on the subtleties of public communication” sought (Hermida 2). Citizen- and para-journalist accounts may overlook micro-studies in how newsrooms adopt technological innovations and integrate them into newsgathering routines (Hemmingway 196). Thus, an examination of the realities of professional journalism will help to cast a better light on how ambient journalism can shape the mental models of para-journalists, and provide more rigorous analysis of news and similar events. Professional journalism has several core dimensions that para-journalists may overlook. Journalism’s foundation as an experiential craft includes guidance and norms that orient the journalist to information, and that includes practitioner ethics. This craft is experiential; the basis for journalism’s claim to “social expertise” as a discipline; and more like the original Linux and Open Source movements which evolved through creative conflict (Sennett 9, 25-27, 125-127, 249-251). There are learnable, transmissible skills to contextually evaluate, filter, select and distil the essential insights. This craft-based foundation and skills informs and structures the journalist’s cognitive witnessing of an event, either directly or via reconstructed, cultivated sources. The journalist publishes through a recognised media institution or online platform, which provides communal validation and verification. There is far more here than the academic portrayal of journalists as ‘gate-watchers’ for a ‘corporatist’ media elite. Craft and skills distinguish the professional journalist from Hermida’s para-journalist. Increasingly, media institutions hire journalists who are trained in other craft-based research methods (Burns and Saunders). Bethany McLean who ‘broke’ the Enron scandal was an investment banker; documentary filmmaker Errol Morris first interviewed serial killers for an early project; and Neil Chenoweth used ‘forensic accounting’ techniques to investigate Rupert Murdoch and Kerry Packer. Such expertise allows the journalist to filter information, and to mediate any influences in the external environment, in order to develop an individualised, ‘embodied’ perspective (Hofstadter 234; Thompson; Garfinkel and Rawls). Para-journalists and social network platforms cannot replace this expertise, which is often unique to individual journalists and their research teams. Ambient Journalism and Twitter Current academic debates about how citizen- and para-journalists may augment or even replace professional journalists can often turn into legitimation battles whether the ‘de facto’ solution is a social media network rather than a media institution. For example, Hermida discusses Twitter, a micro-blogging platform that allows users to post 140-character messages that are small, discrete information chunks, for short-term and episodic memory. Twitter enables users to monitor other users, to group other messages, and to search for terms specified by a hashtag. Twitter thus illustrates how social media platforms can make data more transparent and explicit to non-specialists like para-journalists. In fact, Twitter is suitable for five different categories of real-time information: news, pre-news, rumours, the formation of social media and subject-based networks, and “molecular search” using granular data-mining tools (Leinweber 204-205). In this model, the para-journalist acts as a navigator and “way-finder” to new information (Morville, Findability). Jaron Lanier, an early designer of ‘virtual reality’ systems, is perhaps the most vocal critic of relying on groups of non-experts and tools like Twitter, instead of individuals who have professional expertise. For Lanier, what underlies debates about citizen- and para-journalists is a philosophy of “cybernetic totalism” and “digital Maoism” which exalts the Internet collective at the expense of truly individual views. He is deeply critical of Hermida’s chosen platform, Twitter: “A design that shares Twitter’s feature of providing ambient continuous contact between people could perhaps drop Twitter’s adoration of fragments. We don’t really know, because it is an unexplored design space” [emphasis added] (Lanier 24). In part, Lanier’s objection is traceable back to an unresolved debate on human factors and design in information science. Influenced by the post-war research into cybernetics, J.C.R. Licklider proposed a cyborg-like model of “man-machine symbiosis” between computers and humans (Licklider). In turn, Licklider’s framework influenced Douglas Engelbart, who shaped the growth of human-computer interaction, and the design of computer interfaces, the mouse, and other tools (Engelbart). In taking a system-level view of platforms Hermida builds on the strength of Licklider and Engelbart’s work. Yet because he focuses on para-journalists, and does not appear to include the craft and skills-based expertise of professional journalists, it is unclear how he would answer Lanier’s fears about how reliance on groups for news and other information is superior to individual expertise and judgment. Hermida’s two case studies point to this unresolved problem. Both cases appear to show how Twitter provides quicker and better forms of news and information, thereby increasing the effectiveness of para-journalists to engage in journalism and real-time commentary. However, alternative explanations may exist that raise questions about Twitter as a new platform, and thus these cases might actually reveal circumstances in which ambient journalism may fail. Hermida alludes to how para-journalists now fulfil the earlier role of ‘first responders’ and stringers, in providing the “immediate dissemination” of non-official information about disasters and emergencies (Hermida 1-2; Haddow and Haddow 117-118). Whilst important, this is really a specific role. In fact, disaster and emergency reporting occurs within well-established practices, professional ethics, and institutional routines that may involve journalists, government officials, and professional communication experts (Moeller). Officials and emergency management planners are concerned that citizen- or para-journalism is equated with the craft and skills of professional journalism. The experience of these officials and planners in 2005’s Hurricane Katrina in the United States, and in 2009’s Black Saturday bushfires in Australia, suggests that whilst para-journalists might be ‘first responders’ in a decentralised, complex crisis, they are perceived to spread rumours and potential social unrest when people need reliable information (Haddow and Haddow 39). These terms of engagement between officials, planners and para-journalists are still to be resolved. Hermida readily acknowledges that Twitter and other social network platforms are vulnerable to rumours (Hermida 3-4; Sunstein). However, his other case study, Iran’s 2009 election crisis, further complicates the vision of ambient journalism, and always-on communication systems in particular. Hermida discusses several events during the crisis: the US State Department request to halt a server upgrade, how the Basij’s shooting of bystander Neda Soltan was captured on a mobile phone camera, the spread across social network platforms, and the high-velocity number of ‘tweets’ or messages during the first two weeks of Iran’s electoral uncertainty (Hermida 1). The US State Department was interested in how Twitter could be used for non-official sources, and to inform people who were monitoring the election events. Twitter’s perceived ‘success’ during Iran’s 2009 election now looks rather different when other factors are considered such as: the dynamics and patterns of Tehran street protests; Iran’s clerics who used Soltan’s death as propaganda; claims that Iran’s intelligence services used Twitter to track down and to kill protestors; the ‘black box’ case of what the US State Department and others actually did during the crisis; the history of neo-conservative interest in a Twitter-like platform for strategic information operations; and the Iranian diaspora’s incitement of Tehran student protests via satellite broadcasts. Iran’s 2009 election crisis has important lessons for ambient journalism: always-on communication systems may create noise and spread rumours; ‘mirror-imaging’ of mental models may occur, when other participants have very different worldviews and ‘contexts of use’ for social network platforms; and the new kinds of interaction may not lead to effective intervention in crisis events. Hermida’s combination of news and non-news fragments is the perfect environment for psychological operations and strategic information warfare (Burns and Eltham). Lessons of Current Platforms for Ambient Journalism We have discussed some unresolved problems for ambient journalism as a framework for journalists, and as mental models for news and similar events. Hermida’s goal of an “awareness system” faces a further challenge: the phenomenological limitations of human consciousness to deal with information complexity and ambiguous situations, whether by becoming ‘entangled’ in abstract information or by developing new, unexpected uses for emergent technologies (Thackara; Thompson; Hofstadter 101-102, 186; Morville, Findability, 55, 57, 158). The recursive and reflective capacities of human consciousness imposes its own epistemological frames. It’s still unclear how Licklider’s human-computer interaction will shape consciousness, but Douglas Hofstadter’s experiments with art and video-based group experiments may be suggestive. Hofstadter observes: “the interpenetration of our worlds becomes so great that our worldviews start to fuse” (266). Current research into user experience and information design provides some validation of Hofstadter’s experience, such as how Google is now the ‘default’ search engine, and how its interface design shapes the user’s subjective experience of online search (Morville, Findability; Morville, Search Patterns). Several models of Hermida’s awareness system already exist that build on Hofstadter’s insight. Within the information systems field, on-going research into artificial intelligence–‘expert systems’ that can model expertise as algorithms and decision rules, genetic algorithms, and evolutionary computation–has attempted to achieve Hermida’s goal. What these systems share are mental models of cognition, learning and adaptiveness to new information, often with forecasting and prediction capabilities. Such systems work in journalism areas such as finance and sports that involve analytics, data-mining and statistics, and in related fields such as health informatics where there are clear, explicit guidelines on information and international standards. After a mid-1980s investment bubble (Leinweber 183-184) these systems now underpin the technology platforms of global finance and news intermediaries. Bloomberg LP’s ubiquitous dual-screen computers, proprietary network and data analytics (www.bloomberg.com), and its competitors such as Thomson Reuters (www.thomsonreuters.com and www.reuters.com), illustrate how financial analysts and traders rely on an “awareness system” to navigate global stock-markets (Clifford and Creswell). For example, a Bloomberg subscriber can access real-time analytics from exchanges, markets, and from data vendors such as Dow Jones, NYSE Euronext and Thomson Reuters. They can use portfolio management tools to evaluate market information, to make allocation and trading decisions, to monitor ‘breaking’ news, and to integrate this information. Twitter is perhaps the para-journalist equivalent to how professional journalists and finance analysts rely on Bloomberg’s platform for real-time market and business information. Already, hedge funds like PhaseCapital are data-mining Twitter’s ‘tweets’ or messages for rumours, shifts in stock-market sentiment, and to analyse potential trading patterns (Pritchett and Palmer). The US-based Securities and Exchange Commission, and researchers like David Gelernter and Paul Tetlock, have also shown the benefits of applied data-mining for regulatory market supervision, in particular to uncover analysts who provide ‘whisper numbers’ to online message boards, and who have access to material, non-public information (Leinweber 60, 136, 144-145, 208, 219, 241-246). Hermida’s framework might be developed further for such regulatory supervision. Hermida’s awareness system may also benefit from the algorithms found in high-frequency trading (HFT) systems that Citadel Group, Goldman Sachs, Renaissance Technologies, and other quantitative financial institutions use. Rather than human traders, HFT uses co-located servers and complex algorithms, to make high-volume trades on stock-markets that take advantage of microsecond changes in prices (Duhigg). HFT capabilities are shrouded in secrecy, and became the focus of regulatory attention after several high-profile investigations of traders alleged to have stolen the software code (Bray and Bunge). One public example is Streambase (www.streambase.com), a ‘complex event processing’ (CEP) platform that can be used in HFT, and commercialised from the Project Aurora research collaboration between Brandeis University, Brown University, and Massachusetts Institute of Technology. CEP and HFT may be the ‘killer apps’ of Hermida’s awareness system. Alternatively, they may confirm Jaron Lanier’s worst fears: your data-stream and user-generated content can be harvested by others–for their gain, and your loss! Conclusion: Brian Eno and Redefining ‘Ambient Journalism’ On the basis of the above discussion, I suggest a modified definition of Hermida’s thesis: ‘Ambient journalism’ is an emerging analytical framework for journalists, informed by cognitive, cybernetic, and information systems research. It ‘sensitises’ the individual journalist, whether professional or ‘para-professional’, to observe and to evaluate their immediate context. In doing so, ‘ambient journalism’, like journalism generally, emphasises ‘novel’ information. It can also inform the design of real-time platforms for journalistic sources and news delivery. Individual ‘ambient journalists’ can learn much from the career of musician and producer Brian Eno. His personal definition of ‘ambient’ is “an atmosphere, or a surrounding influence: a tint,” that relies on the co-evolution of the musician, creative horizons, and studio technology as a tool, just as para-journalists use Twitter as a platform (Sheppard 278; Eno 293-297). Like para-journalists, Eno claims to be a “self-educated but largely untrained” musician and yet also a craft-based producer (McFadzean; Tamm 177; 44-50). Perhaps Eno would frame the distinction between para-journalist and professional journalist as “axis thinking” (Eno 298, 302) which is needlessly polarised due to different normative theories, stances, and practices. Furthermore, I would argue that Eno’s worldview was shaped by similar influences to Licklider and Engelbart, who appear to have informed Hermida’s assumptions. These influences include the mathematician and game theorist John von Neumann and biologist Richard Dawkins (Eno 162); musicians Eric Satie, John Cage and his book Silence (Eno 19-22, 162; Sheppard 22, 36, 378-379); and the field of self-organising systems, in particular cyberneticist Stafford Beer (Eno 245; Tamm 86; Sheppard 224). Eno summed up the central lesson of this theoretical corpus during his collaborations with New York’s ‘No Wave’ scene in 1978, of “people experimenting with their lives” (Eno 253; Reynolds 146-147; Sheppard 290-295). Importantly, he developed a personal view of normative theories through practice-based research, on a range of projects, and with different creative and collaborative teams. Rather than a technological solution, Eno settled on a way to encode his craft and skills into a quasi-experimental, transmittable method—an aim of practitioner development in professional journalism. Even if only a “founding myth,” the story of Eno’s 1975 street accident with a taxi, and how he conceived ‘ambient music’ during his hospital stay, illustrates how ambient journalists might perceive something new in specific circumstances (Tamm 131; Sheppard 186-188). More tellingly, this background informed his collaboration with the late painter Peter Schmidt, to co-create the Oblique Strategies deck of aphorisms: aleatory, oracular messages that appeared dependent on chance, luck, and randomness, but that in fact were based on Eno and Schmidt’s creative philosophy and work guidelines (Tamm 77-78; Sheppard 178-179; Reynolds 170). In short, Eno was engaging with the kind of reflective practices that underpin exemplary professional journalism. He was able to encode this craft and skills into a quasi-experimental method, rather than a technological solution. Journalists and practitioners who adopt Hermida’s framework could learn much from the published accounts of Eno’s practice-based research, in the context of creative projects and collaborative teams. In particular, these detail the contexts and choices of Eno’s early ambient music recordings (Sheppard 199-200); Eno’s duels with David Bowie during ‘Sense of Doubt’ for the Heroes album (Tamm 158; Sheppard 254-255); troubled collaborations with Talking Heads and David Byrne (Reynolds 165-170; Sheppard; 338-347, 353); a curatorial, mentor role on U2’s The Unforgettable Fire (Sheppard 368-369); the ‘grand, stadium scale’ experiments of U2’s 1991-93 ZooTV tour (Sheppard 404); the Zorn-like games of Bowie’s Outside album (Eno 382-389); and the ‘generative’ artwork 77 Million Paintings (Eno 330-332; Tamm 133-135; Sheppard 278-279; Eno 435). Eno is clearly a highly flexible maker and producer. Developing such flexibility would ensure ambient journalism remains open to novelty as an analytical framework that may enhance the practitioner development and work of professional journalists and para-journalists alike.Acknowledgments The author thanks editor Luke Jaaniste, Alfred Hermida, and the two blind peer reviewers for their constructive feedback and reflective insights. References Bray, Chad, and Jacob Bunge. “Ex-Goldman Programmer Indicted for Trade Secrets Theft.” The Wall Street Journal 12 Feb. 2010. 17 March 2010 ‹http://online.wsj.com/article/SB10001424052748703382904575059660427173510.html›. Burns, Alex. “Select Issues with New Media Theories of Citizen Journalism.” M/C Journal 11.1 (2008). 17 March 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/view/30›.———, and Barry Saunders. “Journalists as Investigators and ‘Quality Media’ Reputation.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 281-297. 17 March 2010 ‹http://eprints.vu.edu.au/15229/1/CPRF09BurnsSaunders.pdf›.———, and Ben Eltham. “Twitter Free Iran: An Evaluation of Twitter’s Role in Public Diplomacy and Information Operations in Iran’s 2009 Election Crisis.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 298-310. 17 March 2010 ‹http://eprints.vu.edu.au/15230/1/CPRF09BurnsEltham.pdf›. Christians, Clifford G., Theodore Glasser, Denis McQuail, Kaarle Nordenstreng, and Robert A. White. Normative Theories of the Media: Journalism in Democratic Societies. Champaign, IL: University of Illinois Press, 2009. Clifford, Stephanie, and Julie Creswell. “At Bloomberg, Modest Strategy to Rule the World.” The New York Times 14 Nov. 2009. 17 March 2010 ‹http://www.nytimes.com/2009/11/15/business/media/15bloom.html?ref=businessandpagewanted=all›.Cole, Peter, and Tony Harcup. Newspaper Journalism. Thousand Oaks, CA: Sage Publications, 2010. Duhigg, Charles. “Stock Traders Find Speed Pays, in Milliseconds.” The New York Times 23 July 2009. 17 March 2010 ‹http://www.nytimes.com/2009/07/24/business/24trading.html?_r=2andref=business›. Engelbart, Douglas. “Augmenting Human Intellect: A Conceptual Framework, 1962.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era. London: Phaidon Press, 2002. 60-67. Eno, Brian. A Year with Swollen Appendices. London: Faber and Faber, 1996. Garfinkel, Harold, and Anne Warfield Rawls. Toward a Sociological Theory of Information. Boulder, CO: Paradigm Publishers, 2008. Hadlow, George D., and Kim S. Haddow. Disaster Communications in a Changing Media World, Butterworth-Heinemann, Burlington MA, 2009. Hemmingway, Emma. Into the Newsroom: Exploring the Digital Production of Regional Television News. Milton Park: Routledge, 2008. Hermida, Alfred. “Twittering the News: The Emergence of Ambient Journalism.” Journalism Practice 4.3 (2010): 1-12. Hofstadter, Douglas. I Am a Strange Loop. New York: Perseus Books, 2007. Lanier, Jaron. You Are Not a Gadget: A Manifesto. London: Allen Lane, 2010. Leinweber, David. Nerds on Wall Street: Math, Machines and Wired Markets. Hoboken, NJ: John Wiley and Sons, 2009. Licklider, J.C.R. “Man-Machine Symbiosis, 1960.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era, London: Phaidon Press, 2002. 52-59. McFadzean, Elspeth. “What Can We Learn from Creative People? The Story of Brian Eno.” Management Decision 38.1 (2000): 51-56. Moeller, Susan. Compassion Fatigue: How the Media Sell Disease, Famine, War and Death. New York: Routledge, 1998. Morville, Peter. Ambient Findability. Sebastopol, CA: O’Reilly Press, 2005. ———. Search Patterns. Sebastopol, CA: O’Reilly Press, 2010.Pritchett, Eric, and Mark Palmer. ‘Following the Tweet Trail.’ CNBC 11 July 2009. 17 March 2010 ‹http://www.casttv.com/ext/ug0p08›. Reynolds, Simon. Rip It Up and Start Again: Postpunk 1978-1984. London: Penguin Books, 2006. Sennett, Richard. The Craftsman. London: Penguin Books, 2008. Sheppard, David. On Some Faraway Beach: The Life and Times of Brian Eno. London: Orion Books, 2008. Sunstein, Cass. On Rumours: How Falsehoods Spread, Why We Believe Them, What Can Be Done. New York: Farrar, Straus and Giroux, 2009. Tamm, Eric. Brian Eno: His Music and the Vertical Colour of Sound. New York: Da Capo Press, 1995. Thackara, John. In the Bubble: Designing in a Complex World. Boston, MA: The MIT Press, 1995. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Science of Mind. Boston, MA: Belknap Press, 2007.
APA, Harvard, Vancouver, ISO, and other styles
47

Green, Lelia. "Reviewing the Scourge of Self-Plagiarism." M/C Journal 8, no. 5 (October 1, 2005). http://dx.doi.org/10.5204/mcj.2426.

Full text
Abstract:
The task of the unpaid reviewer in academic publishing has always been a taxing one. Although the notion is one of blind peer review, the selection of reviewers is far from random. Journals try to balance a prospective reviewer’s expertise with their availability, and with their track record of returning a useful review on time. Ideally, the reviewer should have a specific (reasonably expert) knowledge of the paper’s topic, but should also retain enough in common with the interested, but jargon-averse, academic reader to empathise with non-specialist journal subscribers. Reviewers should be able to judge the quality of the argument, of the writing, and of the contribution of the article to the field. It’s a tough ask, and now there is a further layer of concern: will the reviewer – having satisfied all the foregoing – be able to spot ‘self-plagiarism’? Self-plagiarism is a relatively new evil – at least, few people in the author’s circle appear aware of it. Googling the term results in some 8,000 hits (whereas plagiarism scores 3,150,000). At first blush, the usual interpretation of plagiarism – the pinching of some one else’s intellectual property without acknowledgement – seems to rule out the possibility of self-plagiarism. Surely, if the ideas and words are your own, a little judicious re-purposing is all grist to the mill? Indeed, most of the anti-plagiarism sites, for example: What is Plagiarism? (Georgetown University), don’t include the term at all. Instead, the site offers examples of five types of plagiarism, most of them familiar to seasoned markers of student work, which are sufficiently rigorous to include “the ‘apt phrase’”, defined as the lifting of a part sentence. Their comment on the example they give for ‘apt phrase’ plagiarism involves four words in an original paragraph: “This passage is almost entirely original, but the phrase ‘dissolved into a conglomeration’ is taken directly from Arendt [the example used for illustration]. Even though this is a short phrase, it must be footnoted. Only phrases that have truly become part of general usage can be used without citation.” Georgetown University, then, sees plagiarism predominantly as a matter of correct attribution of authorship. Most journals have a requirement that no work offered to them for review should previously have been published, and that concurrent submissions to multiple journals are not permitted. The issue here, it seems, is that a journal’s reputation is built upon the originality and usefulness of its contents. Journal editors like to feel that they are ‘advancing the field’ with each edition and they are building a readership that can count upon learning something new (or, at least, provocative) for each hour invested in consuming their journal. Where papers have appeared in other forms (based, for example, on a presentation recorded in conference proceedings) this may be acceptable to the journal, provided it is acknowledged, and experienced editors will often check that papers developed from conference presentations have not previously been posted on the web. If two journals in ignorance each accept and publish the same paper at the same time then that reflects very poorly on the academic who failed to deal honestly with the editors. The issue here is one of resources – the printed page, in particular, is expensive – and of the reviewers’ time. Given the unpaid and voluntary labour of reviewers, and the amount of time and energy that goes into deciding which papers to accept or reject, journals think very poorly of someone who ‘withdraws’ a paper after acceptance on the grounds that s/he has got a better offer/earlier publication elsewhere. Most journals would not welcome future papers from that author. If self-plagiarism were a simple matter of passing off published paper A as published paper B (say, by changing the title and offering it elsewhere), then it would be seen to be deceitful and perpetrators would receive little respect from their peers. But these extreme cases are not (generally) the kind of self-plagiarism against which authors are warned. So what is the authorship problem widely referred to as ‘self-plagiarism’? The SPlaT website (SPlaT) is happy to explain: Self-plagiarism occurs when an author reuses portions of their previous writings in subsequent research papers. Occasionally, the derived paper is simply a re-titled and reformatted version of the original one, but more frequently it is assembled from bits and pieces of previous work. … It is our belief that self-plagiarism is detrimental to scientific progress and bad for our academic community. Flooding conferences and journals with near-identical papers makes searching for information relevant to a particular topic harder than it has to be. It also rewards those authors who are able to break down their results into overlapping least-publishable-units over those who publish each result only once. Finally, whenever a self-plagiarised paper is allowed to be published, another, more deserving paper, is not. Among the more chilling examples of self-plagiarism identified by the developers of SPlaT is “cryptomnesia (reusing one’s own previously published text while unaware of its existence)” (SPlaT). The avoidance of cryptomnesia is one reason why authors are encouraged to use the SPlaT tool. Academic and journal reviewers are also regarded as potential users, and the software is designed to work in three modes – ‘reviewer’s workbench’, ‘author’ and ‘web spider’. It is indeed a crypromnesiac’s concern that the ‘apt phrase’ that came so creatively to the author in an earlier paper might appear again, unwittingly, in the guise of an original composition. However, the injunction to use SPlaT as a ‘reviewer’s workbench’ (where “SPlaT compares a paper under review to a record of the author’s previously published articles extracted from their web site and online article repositories” [SPlaT]) begs the question as to how a review may remain blind – in the sense of not identifying the author of the work to be reviewed – if the ‘workbench’ and/or ‘web spider’ modes of SPlaT are pressed into service. Might it be the case, notwithstanding the foregoing, that the problem of self-plagiarism is as authentic as ‘social anxiety disorder’ (SAD), incidences of which multiplied dramatically once a drug, Paxil, had been shown effective in treating it? In a Washington Post article (Vedantam), the journalist-author comments: “according to a marketing newsletter, media accounts of social anxiety rose from just 50 stories in 1997 and 1998 to more than 1 billion references in 1999 alone” and goes on to say, “The education and advertising campaigns have raised concerns that pharmaceutical companies, traditionally in the business of finding new drugs for existing disorders, are increasingly in the business of seeking new disorders for existing drugs”. Prior to the publicity about SAD, Paxil was an anti-depressant with sales languishing way behind Prozac and Zoloft. The identification (and treatment) of social anxiety disorder did wonders for its marketing. Could it be that self-plagiarism has only come into existence as a major concern for academia now that there is a tool for its detection? Social anxiety disorder may be an authentic scourge – as may self-plagiarism – and the fact that it has been publicised in concert with its cure (or detection) does not mean that the remedy serves no useful purpose. On the contrary, once a population of professionals is attuned to a new way of viewing symptoms and practices then valuable advances may result. However, such advances are only possible when the community concerned has had a chance to consider the matter and discuss the ramifications. At the present, we run the risk of allowing the designers of anti-self-plagiarism software to be the judges and the jury of this new way to commit academic crime. One way to avoid charges of self-plagiarism is self-citation. Leaving aside crytomnesia, it is perfectly possible to cite the already-published reference when an author is aware of reusing a previously-published phrase or idea. Unfortunately, this remedy is also generally frowned upon in many academic circles. The practice undermines the principle of blind peer review – since the identity of the author soon becomes clear in such repeated instances – while readers may become irritated, suspecting that self-citation is a clumsy ruse to improve the citation index ratings of the originally-published article. The issue is of concern to more than journal editors: it also relates to text- and reference-book editors and publishers. One ‘for instance’ was discussed a year ago by the World Association of Medical Editors (WAME) who conducted a hypothetical on “self-plagiarism of textbook chapters” and threw the discussion open to the members’ list. The initial self-plagiarism case-study situation was complicated by the supposition that Author A (of Book A) had self-plagiarised a previously-published chapter which had been jointly authored by Author A and Author B (Book B). Notwithstanding this complication, the WAME Ethics Committee addressed themselves to four questions: Is [Does] reuse of a person’s writings in another textbook, but authored by the same person, meet the definition of plagiarism? If so, what degree of identical components needs to be present for this definition to be met? Is it appropriate for authors to write for different textbooks in the same field? If so, can they write on the same topic? If not, what are the potential infringements on the author’s rights to pursue their career/income? Should the editors of these textbooks agree to exclude authors that write for one another’s textbooks? Or is that unfair restraint of trade? For example, if all four textbooks were to agree to limit or completely avoid any overlap among authors, it could effectively deny entry of another textbook into that market. For book A, the author had a co-author. Since this shared work was used for book B, what is the author’s responsibility to the original co-author? (WAME) These are good questions and they are the kinds of questions we should be asking ourselves about self-plagiarism in our own ‘media and culture’ academic circles. In particular, in the case of textbooks, it is precisely because an author has a standing in the field, and has published on equivalent matters, that editors seek them out and ask them to contribute chapters. Whilst all reputable writers would expect to originate a new chapter according to the specific brief given, it is possible (some might even say likely) that there is an overlap in approach and phraseology. In the case of Books A and B, the overlap stretched the bounds of coincidence in that: “One table is essentially identical, although other tables in the two chapters are different. In addition, there are some passages that contain identical phrases. Most of these appear to have been reworded, but many identifiable words and phrases are identical between the two chapters. There are also areas where the text is completely different” (WAME). However, this hypothetical case is clearly not a situation where the same authorial product was disguised with a new title. Although the whole debate is worth reading, the general consensus of the Ethics Committee was along the lines of (specifically citing one response): I do not see a problem with the author reusing his own material to write a chapter in another textbook (readers of textbooks as opposed to research articles are not expecting originality). The problem is that he should have done this with the concurrence of the two editors and if he signed over his copyright the permission of publisher of textbook A. He should of course also have consulted with his co-author. I think the editors should inform the publishers and his employer of the facts and let them decide what course of action to take. (WAME) The references to re-using the material transparently, and the editors of the textbooks informing the author’s employer, are a constant refrain from a number of contributors to the discussion. Some WAME list discussants offer defences to the charge of self-plagiarism: “the main problem here is not whether the same, or very similar, information can or should be published in more than one place” commented Frank Davidoff, “that sort of thing is done all the time, and can serve important functions. After all, different people read different textbooks, and if it’s important for the information to get out there, why shouldn’t it be made as widely available as possible?” Andrew Herxheimer thought the readers’ perspective had not been given sufficient consideration: “If I were keenly interested in the contents of the chapter in textbook B, I might well wish to know how they had developed, and to look at earlier versions of the material, and to understand why the contents and emphases etc had changed in the way they had.” “The choice of an author for a review monograph or textbook chapter is based always on perusal of the existing reviews and chapters, hoping that the new publication can contain something just as good” argued Rick Nelson, going on to say, “that obligates the author to produce something as similar to his previous publication as possible, and yet different – an impossible task even if such writing were a priority endeavor, which it never is.” (WAME). Irving Hexham, of the Department of Religious Studies, University of Calgary, appears to have been substantially ahead of the game in discussing self-plagiarism in the 1990s. His consideration of the issue is generally more sympathetic than SPlaT’s, or WAME’s. For example, “Self-plagiarism must be distinguished from the recycling of one’s work that to a greater or lesser extent everyone does legitimately”, and: Academics are expected to republish revised versions of their Ph.D. thesis. They also often develop different aspects of an argument in several papers that require the repetition of certain key passages. This is not self-plagiarism if the complete work develops new insights. It is self-plagiarism if the argument, examples, evidence, and conclusion remain the same in two works that only differ in their appearance. (Hexham) It appears that Hexham and SPlaT have very different ideas of what constitutes self-plagiarism. Their different perspectives may be influenced by disciplinary perspectives and wider contexts – journal article or textbook chapter, a cannibalised conference paper or thesis – and by whether or not they have authored software to catch the offending behaviour. At least one Australian academic (not in M/C – Media and Culture) has been asked by their University to justify their publications against a charge of self-plagiarism, however, which is how the topic has become visible and why the need for debate has become urgent. Incidentally, the opening sentence of the opening paragraph to the Introduction of the paper on “Splat: A System for Self-Plagiarism Detection” is almost identical to the Abstract for a paper published two years later as “Self-Plagiarism in Computer Science”, viz: “We are all too aware of the ravages of scientific misconduct in the academic community. Students submit assignments inherited from the [sic] their friends who took the course the year before, on-line paper-mills allow students to browse for term papers on popular topics, and occasionally researchers are found out when falsifying data or publishing the work of others as their own.” (Collburg et al.) “We are all too aware of the ravages of misconduct in the academic community. Students submit assignments inherited from their friends, online papermills provide term papers on popular topics, and occasionally researchers are found falsifying data or publishing the work of others as their own.” (Collburg & Kubourov) Further, in these two papers there is a difference in authorship line-up, as with the WAME example… So what of the reviewers in all this? The Journal of Optical Networking, published by the Optical Society of America, comments that “self-plagiarism causes duplicate papers in the scientific literature, violates copyright agreements, and unduly burdens reviewers, editors, and the scientific publishing enterprise.” (JON). In an environment of blind peer review, where the reviewer does not know the author’s identity and is not in a position to check the body of their published work, the acid test becomes whether (in the reviewer’s opinion) the article advances the debate by offering something new. The submission should also repay the time and effort expended in reading and considering the contents. Other than that, issues of in/valid repurposing, repackaging, recycling and redeveloping arguments and findings require debate and determination at a discipline-wide level, rather than at the coalface of reviewers’ practice. References Collburg, Christian, and Stephen Kobourov. “Self-Plagiarism in Computer Science”, Communications of the ACM, 48.4 (April 2005): 88-94. Collburg, Christian, Stephen Kobourov, Joshua Louie, and Thomas Slattery. “SPlaT: A System for Self-Plagiarism Detection” IADIS International Conference WWW/INTERNET, Algarve, Portugal 5-8 November 2003. 09 Oct 2005 http://splat.cs.arizona.edu/icwi_plag.pdf>. Georgetown University. What Is Plagiarism?, Georgetown University Honor Council, Georgetown University, n.d. 9 Oct. 2005 http://www.georgetown.edu/honor/plagiarism.html>. Hexham, Irving. The Plague of Plagiarism, Department of Religious Studies, University of Calgary, 1999 published on University of Missouri Kansas City, Douglas E Cowan Website. 9 Oct. 2005 http://c.faculty.umkc.edu/cowande/plague.htm#self>. JON. “From the Board of Editors: On Plagiarism”, Journal of Optical Networking, Optical Society of America, 4.3 (2005): 142-3, 9 Oct. 2005 http://www.osa-jon.org/abstract.cfm?URI=JON-4-3-142>. Vedantam, Shankar. “Drug Ads Hyping Anxiety Make Some Uneasy”, Washington Post 16 July (2001): p. A01; also published in PR in the News, Council of Public Relations Firms, 9 Oct. 2005 http://www.prfirms.org/resources/news/drug071601.asp>. SPlaT. SPlaT Website, Computer Science Department, University of Arizona, March 2005. 9 Oct. 2005 http://splat.cs.arizona.edu/>. WAME. “Self-Plagiarism of Textbook Chapters”, World Association of Medical Editors, Ethics Committee and list discussants, October 2004. 9 Oct. 2005 http://www.wame.org/selfplag.htm>. Citation reference for this article MLA Style Green, Lelia. "Reviewing the Scourge of Self-Plagiarism." M/C Journal 8.5 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0510/07-green.php>. APA Style Green, L. (Oct. 2005) "Reviewing the Scourge of Self-Plagiarism," M/C Journal, 8(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0510/07-green.php>.
APA, Harvard, Vancouver, ISO, and other styles
48

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography