To see the other types of publications on this topic, follow the link: Divers Alert Network.

Journal articles on the topic 'Divers Alert Network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 41 journal articles for your research on the topic 'Divers Alert Network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wachholz, Chris. "Divers Alert Network (DAN)." Canadian Anaesthetists’ Society Journal 32, no. 1 (January 1985): 97. http://dx.doi.org/10.1007/bf03008548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jendle, Johan, and Peter Adolfsson. "Continuous Glucose Monitoring Diving and Diabetes: An Update of the Swedish Recommendations." Journal of Diabetes Science and Technology 14, no. 1 (February 2, 2019): 170–73. http://dx.doi.org/10.1177/1932296819826584.

Full text
Abstract:
Divers travel to different countries to explore various diving sites worldwide. In 2005, the Divers Alert Network (DAN) published their guidelines for recreational diving and diabetes mellitus. However, although years have passed, there is still no consensus in the form of international guidelines on diabetes and diving. Large differences are noted with regard to the regulations in different countries. Furthermore, the diabetes technology has evolved rapidly and is not reflected in current international guidelines. This is potentially both a medical and an insurance problem for a diver with diabetes. We present a short summary of the recently updated Swedish recommendations for recreational divers with type 1 diabetes mellitus, focusing on the use of continuous glucose monitoring and continuous subcutaneous insulin infusion during such circumstances.
APA, Harvard, Vancouver, ISO, and other styles
3

Robert, Jacalyn J. "Decompression Sickness in Women Recreational Scuba Divers." Women in Sport and Physical Activity Journal 8, no. 1 (April 1999): 47–54. http://dx.doi.org/10.1123/wspaj.8.1.47.

Full text
Abstract:
Recreational sport diving is becoming an increasingly popular sport for women. Women now comprise approximately 25% of the diving community according to Divers Alert Network statistics. In the diving literature it has been stated that women are at a greater risk for decompression sickness than men. Most of these statements were derived from high-altitude (hypobaric environment) studies rather than from a scuba diving (hyperbaric) environment. Data from the naval diving and salvage training center were analyzed, and it was found that women are not more susceptible to decompression sickness than men during dives between 4 and 10 atmospheres. More specific studies on sport diving should be completed on factors contributing to underwater decompression sickness in both men and women.
APA, Harvard, Vancouver, ISO, and other styles
4

Ranapurwala, Shabbar I., Kristen L. Kucera, and Petar J. Denoble. "The healthy diver: A cross-sectional survey to evaluate the health status of recreational scuba diver members of Divers Alert Network (DAN)." PLOS ONE 13, no. 3 (March 22, 2018): e0194380. http://dx.doi.org/10.1371/journal.pone.0194380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Taylor, Simone E., David McD Taylor, Daisy Pisasale, Kyle Booth, and John Lippmann. "Regular medication use by active scuba divers with a declared comorbid medical condition and victims of scuba and snorkelling-related fatalities." Diving and Hyperbaric Medicine Journal 51, no. 3 (September 30, 2021): 264–70. http://dx.doi.org/10.28920/dhm51.3.264-270.

Full text
Abstract:
Introduction: The aim of this study was to describe the nature of regular medications taken by active comorbid scuba divers (having a declared medical comorbidity) and scuba divers and snorkellers who died following a diving incident. Methods: We undertook a retrospective, observational study from July to October, 2020. Data on 268 active comorbid divers were obtained through a 2013 survey of Divers Alert Network Asia-Pacific members. Data on 126 deceased scuba divers and 175 deceased snorkellers were obtained predominantly from 2001–2013 reports to Australian State Coronial Services. Results: The active comorbid divers were significantly older, less likely to be male, and more likely to be taking one or more medications than the two deceased subject groups (P < 0.001). Cardiovascular, endocrine and psychotropic medications accounted for 53.4%, 9.9% and 6.4% of all medications taken, respectively. Almost one tenth of the deceased divers took at least one psychotropic medication, a proportion significantly greater than the other groups (P = 0.01). Conclusions: Medication use among active comorbid divers is common which likely reflects their declared medical condition. Nevertheless, they appear to be diving relatively safely, often with conditions once thought to be absolute contradictions to scuba diving. The deceased divers took significantly more psychotropic medications. It is possible that their underlying psychological/psychiatric conditions rendered them more at risk of a diving incident. Increased vigilance for psychological conditions may need to be considered during diving medical examinations.
APA, Harvard, Vancouver, ISO, and other styles
6

Pierleoni, Paola, Lorenzo Palma, Alberto Belli, Massimo Pieri, Lorenzo Maurizi, Marco Pellegrini, and Alessandro Marroni. "An EMD-Based Algorithm for Emboli Detection in Echo Doppler Audio Signals." Electronics 8, no. 8 (July 24, 2019): 824. http://dx.doi.org/10.3390/electronics8080824.

Full text
Abstract:
Divers’ health state after underwater activity can be assessed after the immersion using precordial echo Doppler examination. An audio analysis of the acquired signals is performed by specialist doctors to detect circulating gas bubbles in the vascular system and to evaluate the decompression sickness risk. Since on-site medical assistance cannot always be guaranteed, we propose a system for automatic emboli detection using a custom portable device connected to the echo Doppler instrument. The empirical mode decomposition method is used to develop a real-time algorithm able to automatically detect embolic events and, consequently, assess the decompression sickness risk according to the Spencer’s scale. The proposed algorithm has been tested according to an experimental protocol approved by the Divers Alert Network. It involved 30 volunteer divers and produced 37 echo Doppler files useful for the algorithm’s performances evaluation. The results obtained by the proposed emboli detection algorithm (83% sensitivity and 76% specificity) make the system particularly suitable for real-time evaluation of the decompression sickness risk level. Furthermore, the system could also be used in continuous monitoring of hospitalized patients with embolic risks such as post surgery ones.
APA, Harvard, Vancouver, ISO, and other styles
7

Kojima, Yasushi, Akiko Kojima, Yumi Niizeki, and Kazuyoshi Yagishita. "Recreational diving-related injury insurance claims among Divers Alert Network Japan members: Retrospective analysis of 321 cases from 2010 to 2014." Diving and Hyperbaric Medicine Journal 50, no. 2 (June 30, 2020): 92–97. http://dx.doi.org/10.28920/dhm50.2.92-97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scarff, Christopher W., John Lippmann, and Andrew W. Fock. "A review of diving practices and outcomes following the diagnosis of a persistent (patent) foramen ovale in compressed air divers with a documented episode of decompression sickness." Diving and Hyperbaric Medicine Journal 50, no. 4 (December 20, 2020): 363–69. http://dx.doi.org/10.28920/dhm50.4.363-369.

Full text
Abstract:
(Scarff CW, Lippmann J, Fock AW. A review of diving practices and outcomes following the diagnosis of a persistent (patent) foramen ovale in compressed air divers with a documented episode of decompression sickness. Diving and Hyperbaric Medicine. 2020 December 20;50(4):363–369. doi: 10.28920/dhm50.4.363-369. PMID: 33325017.) Introduction: The presence of a persistent (patent) foramen ovale (PFO) increases the risk of decompression sickness (DCS) whilst diving with pressurised air. After the diagnosis of a PFO, divers will be offered a number of options for risk mitigation. The aim of this study was to review the management choices and modifications to diving practices following PFO diagnosis in the era preceding the 2015 joint position statement (JPS) on PFO and diving. Methods: A retrospective study was conducted of divers sourced from both the Alfred Hospital, Melbourne and the Divers Alert Network Asia-Pacific during the period 2005–2015. Divers were contacted via a combination of phone, text, mail and email. Data collected included: diving habits (years, style and depths); DCS symptoms, signs and treatment; return to diving and modifications of dive practices; history of migraine and echocardiography (ECHO) pre- and post-intervention; ECHO technique(s) used, and success or failure of PFO closure (PFOC). Analyses were performed to compare the incidence of DCS pre- and post-PFO diagnosis. Results: Seventy-three divers were interviewed. Sixty-eight of these returned to diving following the diagnosis of PFO. Thirty-eight underwent PFOC and chose to adopt conservative diving practices (CDPs); 15 chose PFOC with no modification to practices; 15 adopted CDPs alone; and five have discontinued diving. The incidence of DCS decreased significantly following PFOC and/or adoption of conservative diving practices. Of interest, migraine with aura resolved in almost all those who underwent PFOC. Conclusions: Many divers had already adopted practices consistent with the 2015 JPS permitting the resumption of scuba diving with a lowering of the incidence of DCS to that of the general diving population. These results support the recommendations of the JPS.
APA, Harvard, Vancouver, ISO, and other styles
9

Dunford, Richard. "Diver's alert network." Annals of Emergency Medicine 14, no. 3 (March 1985): 278. http://dx.doi.org/10.1016/s0196-0644(85)80462-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ng, Desmond. "The social dynamics of diverse and closed networks." Human Systems Management 23, no. 2 (June 3, 2004): 111–22. http://dx.doi.org/10.3233/hsm-2004-23206.

Full text
Abstract:
Inherent to the dynamics of social networks is a paradoxical trade-off between closed networks that promote cooperation and efficiency and diverse networks that are flexible to new resources and ideas. Since actors cannot simultaneously maximize both facets of a network, this has created a sharp debate on the social capital performance of closed and diverse network relationships. Research on this social capital debate has often focused on these described network affects without explaining the origins and dynamics of network performance. This paper advances a cognitive diversity approach that is based upon the subjective and alert behaviors of Austrian entrepreneurs. These are key causal drivers to this paper's theoretical model of social dynamics and performance of closed and diverse networks. Such network behavior is subsequently modeled as a Complex Adaptive system. Using agent-based simulation, an agent-based model of entrepreneurship and social network dynamics is constructed to test the relationships described by the proposed theoretical model. The simulation results support the described hypothesized relationships. These findings also suggest the benefits of closed and diverse networks are logically distinct and, thus, should not be viewed as an either-or phenomenon. Agent-based simulation results show entrepreneurs can construct a balanced network of closed and diverse networks to optimize the benefits of both networks.
APA, Harvard, Vancouver, ISO, and other styles
11

Hussain, Zafar, Mobeen Munir, Muhammad Bilal, Alam Ameer, Shazia Rafique, and Shin Min Kang. "Computational Analysis of new Degree-based descriptors of oxide networks." Open Chemistry 17, no. 1 (March 29, 2019): 177–82. http://dx.doi.org/10.1515/chem-2019-0023.

Full text
Abstract:
AbstractOxide networks have diverse applications in the polymer and pharmaceutical industries. Polynomials and degree-based topological indices have tendencies to correlate properties of molecular graphs. In this article, we formulate the closed forms of Zagreb and forgotten polynomials and topological indices such as Hyper-Zagreb index, first and second multiple Zagreb indices, forgotten index, Albert index, Bell index, IRM(G) of oxide networks. We also compute the F-index of complement of oxide networks, F-coindex of G and F-coindex of complement of oxide networks. We put graphical analysis of each index with respect to the parameter involved in each case.
APA, Harvard, Vancouver, ISO, and other styles
12

Bhandari, Khadak Singh, and Gi Hwan Cho. "A Resource Oriented Route Selection Framework Using Contextual Information Based on Fuzzy Logic." Electronics 8, no. 9 (September 12, 2019): 1023. http://dx.doi.org/10.3390/electronics8091023.

Full text
Abstract:
Internet of Things (IoT) is expected to have a significant impact on city’s service provisioning and make a smart city more accessible and pragmatic since the deployment of heterogeneous smart devices in each infrastructure of cities is increasing. So far, the IPv6 routing protocol for low power and lossy networks (RPL) is considered to fit on IoT infrastructure for achieving the expected network requirements. While RPL meets the IoT network requirements quite well, there are some issues that need to be addressed, such as adaptability to network dynamics. This issue significantly limits the use of RPL in many smart city application scenarios, such as emergency alerts with high traffic flows. As part of a smart city vision, IoT applications are becoming more diverse, which requires context-awareness in routing protocols to support the behavior of the network. To address this issue, we design an objective function that performs the route selection based on fuzzy logic techniques while using contextual information from the application. For this, we present a new context-oriented objective function (COOF) that comprises both nodes as well as link metrics. Further, we suggest two new routing metrics, known as queue fluctuation index (QFI) and residual energy index (REI), which consider the status of queue utilization and remaining energy, respectively. The metrics used are designed to respond to the dynamic needs of the network. The proposed approach has been examined and evaluated in different scenarios when compared to other similar approach and default RPL objective functions. Simulation experiments are conducted in Cooja network simulator for Contiki OS. The evaluation results show that COOF can cope with network dynamics and IoT-based smart city application requirements.
APA, Harvard, Vancouver, ISO, and other styles
13

Seaman, Rob, Roy Williams, Matthew Graham, and Tara Murphy. "Using the VO to Study the Time Domain." Proceedings of the International Astronomical Union 7, S285 (September 2011): 221–26. http://dx.doi.org/10.1017/s1743921312000634.

Full text
Abstract:
AbstractJust as the astronomical “Time Domain” is a catch-phrase for a diverse group of different science objectives involving time-varying phenomena in all astrophysical régimes from the solar system to cosmological scales, so the “Virtual Observatory” is a complex set of community-wide activities from archives to astroinformatics. This workshop touched on some aspects of adapting and developing those semantic and network technologies in order to address transient and time-domain research challenges. It discussed the VOEvent format for representing alerts and reports on celestial transient events, the SkyAlert and ATELstream facilities for distributing these alerts, and the IVOA time-series protocol and time-series tools provided by the VAO. Those tools and infrastructure are available today to address the real-world needs of astronomers.
APA, Harvard, Vancouver, ISO, and other styles
14

Rajkumar, Rajasekaran. "Wireless Heartrate Monitoring Along Prioritized Alert Notification Using Mobile Techniques." International Journal of Applied Research on Public Health Management 4, no. 1 (January 2019): 35–46. http://dx.doi.org/10.4018/ijarphm.2019010103.

Full text
Abstract:
The increasing number of problems that need to be addressed in the hospital sector calls for innovation in this field. It brings us the need to find cost-effective and memory-efficient solutions to handle the vast data and sector it into essential information to operate on the patient. There used to be many systems to manage clinical records which are fixed at a place. It is quite complicated to get the information and make this data available at a patient's bedside. This leads to a considerable amount of wasted time in moving to those storage PCs and also the cost afforded is comparatively high. A computer system that controls and accomplishes all the data in the hospital database to provide effective healthcare is called hospital information system (HIS). The introduction of HIS made billing and inventor easier for the staff. This paper discusses diverse methods that improve the cost, demands of HIS, and provide techniques to function efficiently using wireless networks. Also, the paper gives a comparative study on different aspects such as cost, quality of service, transportation, and security. A new system is proposed by combining the wireless healthcare system along prioritized alert notification.
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Qiaozhi, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo. "#DontTweetThis: Scoring Private Information in Social Networks." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 72–92. http://dx.doi.org/10.2478/popets-2019-0059.

Full text
Abstract:
Abstract With the growing popularity of online social networks, a large amount of private or sensitive information has been posted online. In particular, studies show that users sometimes reveal too much information or unintentionally release regretful messages, especially when they are careless, emotional, or unaware of privacy risks. As such, there exist great needs to be able to identify potentially-sensitive online contents, so that users could be alerted with such findings. In this paper, we propose a context-aware, text-based quantitative model for private information assessment, namely PrivScore, which is expected to serve as the foundation of a privacy leakage alerting mechanism. We first solicit diverse opinions on the sensitiveness of private information from crowdsourcing workers, and examine the responses to discover a perceptual model behind the consensuses and disagreements. We then develop a computational scheme using deep neural networks to compute a context-free PrivScore (i.e., the “consensus” privacy score among average users). Finally, we integrate tweet histories, topic preferences and social contexts to generate a personalized context-aware PrivScore. This privacy scoring mechanism could be employed to identify potentially-private messages and alert users to think again before posting them to OSNs.
APA, Harvard, Vancouver, ISO, and other styles
16

A. Almusaylim, Zahrah, NZ Jhanjhi, and Abdulaziz Alhumam. "Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP." Sensors 20, no. 21 (October 22, 2020): 5997. http://dx.doi.org/10.3390/s20215997.

Full text
Abstract:
The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed in transmission during data packet routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. In this research, we propose a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. This mainly detects, mitigates, and isolates attacks in RPL networks. The detection is based on a comparison of the rank strategy. The mitigation uses threshold and attack status tables, and the isolation adds them to a blacklist table and alerts nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies, such as Standard RPL with Attacks, Sink-Based Intrusion Detection Systems (SBIDS), and RPL+Shield. The analysis results showed that the SRPL-RP achieved significant improvements with a Packet Delivery Ratio (PDR) of 98.48%, a control message value of 991 packets/s, and an average energy consumption of 1231.75 joules. SRPL-RP provided a better accuracy rate of 98.30% under the attacks.
APA, Harvard, Vancouver, ISO, and other styles
17

Papagiannopoulos, Nikolaos, Giuseppe D'Amico, Anna Gialitaki, Nicolae Ajtai, Lucas Alados-Arboledas, Aldo Amodeo, Vassilis Amiridis, et al. "An EARLINET early warning system for atmospheric aerosol aviation hazards." Atmospheric Chemistry and Physics 20, no. 18 (September 15, 2020): 10775–89. http://dx.doi.org/10.5194/acp-20-10775-2020.

Full text
Abstract:
Abstract. A stand-alone lidar-based method for detecting airborne hazards for aviation in near real time (NRT) is presented. A polarization lidar allows for the identification of irregular-shaped particles such as volcanic dust and desert dust. The Single Calculus Chain (SCC) of the European Aerosol Research Lidar Network (EARLINET) delivers high-resolution preprocessed data: the calibrated total attenuated backscatter and the calibrated volume linear depolarization ratio time series. From these calibrated lidar signals, the particle backscatter coefficient and the particle depolarization ratio can be derived in temporally high resolution and thus provide the basis of the NRT early warning system (EWS). In particular, an iterative method for the retrieval of the particle backscatter is implemented. This improved capability was designed as a pilot that will produce alerts for imminent threats for aviation. The method is applied to data during two diverse aerosol scenarios: first, a record breaking desert dust intrusion in March 2018 over Finokalia, Greece, and, second, an intrusion of volcanic particles originating from Mount Etna, Italy, in June 2019 over Antikythera, Greece. Additionally, a devoted observational period including several EARLINET lidar systems demonstrates the network's preparedness to offer insight into natural hazards that affect the aviation sector.
APA, Harvard, Vancouver, ISO, and other styles
18

Castillo, Tito, Rodrigo F. Herrera, Tania Guffante, Ángel Paredes, and Oscar Paredes. "The Interaction of Civil Engineering Students in Group Work through the Social Network Analysis." Sustainability 13, no. 17 (September 2, 2021): 9847. http://dx.doi.org/10.3390/su13179847.

Full text
Abstract:
A sustainable approach in the construction industry requires civil engineering professionals with technical and soft skills. Those skills complement each other and facilitate the professional to work effectively in multidisciplinary groups during the development of construction projects. Universities apply collaborative learning methods such as group work (GW) in the classroom to achieve these skills. There is disagreement on the best way to select the members of the GW to achieve their best performance, but it is clear that it should favor the interaction of diverse actors to promote the development of soft skills. A random or criteria-based selection could bring groups of people very close together, leading to the academic homogeneity of GW members and impairing performance and learning. Even the most alert instructors lack information about the closeness of their students, so they rely on their intuition without having tools that allow them to confirm their assumptions or relate them to GW performance. The objective of this paper was to discover the social structures within the classrooms and to identify the groups of people close by trust, knowledge, and informal conversation to relate them to their GW performance. For this purpose, a social network analysis (SNA) was applied to Civil Engineering degree students. In addition, a correlation analysis between SNA metrics and GW grades was performed. The results show that beyond the way in which members are selected, there is a social structure that affects such selection and GW performance. This study presents information that can be used for instructors for a better GW selection that propitiates the development of soft skills in Civil Engineering students.
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Xiao-Jing. "Neurophysiological and Computational Principles of Cortical Rhythms in Cognition." Physiological Reviews 90, no. 3 (July 2010): 1195–268. http://dx.doi.org/10.1152/physrev.00035.2008.

Full text
Abstract:
Synchronous rhythms represent a core mechanism for sculpting temporal coordination of neural activity in the brain-wide network. This review focuses on oscillations in the cerebral cortex that occur during cognition, in alert behaving conditions. Over the last two decades, experimental and modeling work has made great strides in elucidating the detailed cellular and circuit basis of these rhythms, particularly gamma and theta rhythms. The underlying physiological mechanisms are diverse (ranging from resonance and pacemaker properties of single cells to multiple scenarios for population synchronization and wave propagation), but also exhibit unifying principles. A major conceptual advance was the realization that synaptic inhibition plays a fundamental role in rhythmogenesis, either in an interneuronal network or in a reciprocal excitatory-inhibitory loop. Computational functions of synchronous oscillations in cognition are still a matter of debate among systems neuroscientists, in part because the notion of regular oscillation seems to contradict the common observation that spiking discharges of individual neurons in the cortex are highly stochastic and far from being clocklike. However, recent findings have led to a framework that goes beyond the conventional theory of coupled oscillators and reconciles the apparent dichotomy between irregular single neuron activity and field potential oscillations. From this perspective, a plethora of studies will be reviewed on the involvement of long-distance neuronal coherence in cognitive functions such as multisensory integration, working memory, and selective attention. Finally, implications of abnormal neural synchronization are discussed as they relate to mental disorders like schizophrenia and autism.
APA, Harvard, Vancouver, ISO, and other styles
20

Gurung, D. R., M. Shrestha, N. Shrestha, B. Debnath, G. Jishi, R. Bajracharya, H. K. Dhonju, and S. Pradhan. "Multi scale Disaster Risk Reduction Systems Space and Community based Experiences over HKH Region." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-8 (November 28, 2014): 1301–7. http://dx.doi.org/10.5194/isprsarchives-xl-8-1301-2014.

Full text
Abstract:
An increasing trend in the recurrence of natural disasters and associated impacts due to Floods, Glacier Lake out bursts, landslides and forest fire is reported over Hindu Kush Himalyan (HKH) region. Climate change and anthropogenic coupled factors are identified as primary factors for such increased vulnerability. The large degree of poverty, lack of infrastructure, poor accessibility and uncertainties involved in understanding high altitude land surface and climate dynamics poses serious challenges in reducing disaster vulnerability and mitigating disaster impacts. In this context effective development of Disaster Risk Reduction (DRR) protocols and mechanisms have been realized as an urgent need. The paper presents the adoption and experiences of multi scale DRR systems across different Himalayan member countries ranging from community based indigenous early warning to space based emergency response and decision support systems. <br><br> The Establishment of a Regional Flood Information System (HKH-HYCOS) over Ganges-Brahmaputra-Meghna (GBM) and Indus river basins promoted the timely exchange of flood data and information for the reduction of flood vulnerability within and among the participating countries. Satellite based forest fire alert systems evoked significant response among diverse stakeholders to optimize fire incidence and control. Satellite rainfall estimation products, satellite altimetry based flood early warning systems, flood inundation modelling and products, model derived hydrology flow products from different global data-sharing networks constitutes diverse information to support multi scale DRR systems. Community-based Flood Early Warning System (FEWS) enabled by wireless technology established over the Singara and Jiadhal rivers in Assam also stands as one of the promising examples of minimizing flood risk. Disaster database and information system and decision support tools in Nepal serves as potential tool to support diverse stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
21

Tang, Keison, Arjun Kumar, Muhammad Nadeem, and Issam Maaz. "CNN-Based Smart Sleep Posture Recognition System." IoT 2, no. 1 (February 24, 2021): 119–39. http://dx.doi.org/10.3390/iot2010007.

Full text
Abstract:
Sleep pattern and posture recognition have become of great interest for a diverse range of clinical applications. Autonomous and constant monitoring of sleep postures provides useful information for reducing the health risk. Prevailing systems are designed based on electrocardiograms, cameras, and pressure sensors, which are not only expensive but also intrusive in nature, and uncomfortable to use. We propose an unobtrusive and affordable smart system based on an electronic mat called Sleep Mat-e for monitoring the sleep activity and sleep posture of individuals living in residential care facilities. The system uses a pressure sensing mat constructed using piezo-resistive material to be placed on a mattress. The sensors detect the distribution of the body pressure on the mat during sleep and we use convolution neural network (CNN) to analyze collected data and recognize different sleeping postures. The system is capable of recognizing the four major postures—face-up, face-down, right lateral, and left lateral. A real-time feedback mechanism is also provided through an accompanying smartphone application for keeping a diary of the posture and send alert to the user in case there is a danger of falling from bed. It also produces synopses of postures and activities over a given duration of time. Finally, we conducted experiments to evaluate the accuracy of the prototype, and the proposed system achieved a classification accuracy of around 90%.
APA, Harvard, Vancouver, ISO, and other styles
22

Denning, Stephen. "Navigating the phase change to the creative economy." Strategy & Leadership 42, no. 2 (March 11, 2014): 3–11. http://dx.doi.org/10.1108/sl-01-2014-0001.

Full text
Abstract:
Purpose – This article argues that successful leadership needed for the Creative Economy requires different ways of managing, leading, following, thinking, speaking and acting in the workplace. Design/methodology/approach – The article outlines both the principles and implementation steps and conditions for success. Findings – Five principles are core to the new way of managing: 1. Organizational goal: a shift from an inward-looking goal maximizing shareholder returns to an outward-looking goal of delighting customers profitably. Innovation and transformation are now imperatives. 2. Organizational structure: a shift from managerial command and control to enabling collaboration among diverse self-organizing teams, networks and ecosystems. 3. Coordination of work: a shift from coordinating work by hierarchical bureaucracy with rules, roles, plans and reports to dynamic linking, with iterative approaches to development and direct customer feedback from, and interaction with, teams, networks and ecosystems. 4. Values: a shift from a single-minded preoccupation with profit and efficiency to an embrace of values that will grow the firm and the accompanying ecosystems. 5. Communications: a shift from top-down directives to multi-directional conversations across organizational boundaries about working together on common goals. Practical implications – Offers leaders a roadmap for managing during market phase changes, a complex transformation in human behavior produced by a new way to satisfy consumption needs. Originality/value – It alerts top management of the need both to recognize and anticipate many coming phase changes and explains how to revolutionize the process of managing the response to them in the creative economy.
APA, Harvard, Vancouver, ISO, and other styles
23

Rosario Michel, G., S. Muñoz Tapia, V. Guzmán Javier, and J. Crompvoets. "IDENTIFYING USERS’ REQUIREMENTS OF GEOGRAPHIC INFORMATION FOR DISASTER RISK MANAGEMENT IN THE DOMINICAN REPUBLIC." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences VI-3/W1-2020 (November 17, 2020): 99–106. http://dx.doi.org/10.5194/isprs-annals-vi-3-w1-2020-99-2020.

Full text
Abstract:
Abstract. In recent years, the growth of public available geographic information and location-based services has been enabling more stakeholders from diverse backgrounds to participate in generating and sharing a comprehensive view of the territory to reduce the impact of severe phenomena in the communities. With the prediction of more disastrous phenomena in the Caribbean region, understanding of what and how to be prepared beforehand to meet users’ needs from different sectors should facilitate to react quickly and take full advantage of geospatial technology and resources to support disaster managers and citizens. This paper is mainly focused on the identification of users’ requirements of geographic information and services for disaster risk management (DRM) in the Dominican Republic. The results are built upon an online survey targeted to expert and non-expert users that intervene in the National System of Prevention, Mitigation and Response (SN-PMR, in Spanish). Our findings revealed seven major users’ requirements for DRM: (1) policy for sharing geo-information; (2) implementing a disaster-oriented SDI; (3) technical standards for real-time data collection; (4) simplified procedures for gathering and accessing of metadata; (5) mobile applications (App) for data collection and alerts visualization; (6) more capacity building programs; and, (7) closer community participation using social networks. This knowledge will contribute to a superior level of readiness to prevent future disasters in Dominican Republic and to support potential studies/practices in the Caribbean region and other Small Island Developing States in the World, which share similar challenges in terms of natural hazards and development issues.
APA, Harvard, Vancouver, ISO, and other styles
24

Huang, Meixian, Amit Verma, Ke Zeng, Mi-Ae Lyu, Mitsutaka Nishimoto, Hongbing Ma, Zheng Yin, Swaminathan P. Iyer, and Simrit Parmar. "Novel CD4+CD8+ Umbilical Cord Blood Regulatory T Cells." Blood 134, Supplement_1 (November 13, 2019): 4446. http://dx.doi.org/10.1182/blood-2019-131948.

Full text
Abstract:
Background: Regulatory T cells (Treg), a well defined suppressor cell population with the phenotype of CD4+CD25+CD127- FoxP3+ are emerging as a promising adoptive therapy for a diverse subset of autoimmune diseases and inflammatory disorders. Specificlaly, cord blood (CB) Tregs have been shown to be superior to peripheral blood (PB) Tregs in their function and stability. Here, we define a novel subset of CB Tregs CD4+CD8+CD25+CD127- FoxP3+ that is not very well defined in the PB population and explore its' differentiation characteristics. Method: Tregs were isolated from CB or PB as described previously and cultured in the presence of CD3/28 beads and IL-2. On the day of harvest, cells were further sorted for CD8+ cell population and labelled as CD8+CD4+ (double positive CB Tregs: DP) and the leftover fraction as CD8-CD4+ (single positive CB Tregs: SP). Cells fractions were analyzed using flow cytometry and for cytokine assay, cells were activated (5 hours) with 1X Cell Stimulation Cocktail with Golgi inhibitors and stained for IFN-γ, IL-4, IL-17, IL-10 or TGFβ1 as per manufacturer's instructions. Additional cytokine assay was performed on the culture supernatants. DNA methylation assay was performed for the TSDR region as per manufacturer's instructions. Single cell RNAseq was performed at Albert Einstein Hospital and analyzed at Methodist Hospital. A threshold for original counts were applied to all four conditions, i.e. only transcripts with original counts>10 in all four. This step reduced the number of genes from 34626 to 16628; subsequently stringent cutoffs pairs showed two sets of genes- 1) Fold change>1.5, p-value<0.1, and 2) Fold change<2/3, p-value<0.1, this led to 73 rows, all with defined transcript names. Enrichment analysis using ConsensusPathDB for the above two gene sets were run to identify all pathways with at least one member-gene overlapping with either list, and the enrichment p-value for the pathway<0.1. Result: We cultured the Tregs isolated from CB or PB for 14 days and no evidence of a DP Tregs (0) was seen in PB as compared to a clearly defined DP Treg (8-26%) population in CB cultures. No differences were seen between the SP and DP CB Tregs in terms of the markers for mechanisms of suppression (FoxP3,Helios,CD39 ), homing (PSGL1, CLA, CD62L, CD49d), TGF-beta signaling (LAP, TGF-beta, GARP) and T cell signaling (LAG23, PD1, Icos, Tim3, CTLA-4, GITR). DP CBTregs consisted of a significantly higher expression of CCR4hiCXCR3hiCD95hipopulation. DP CB Tregs demonstrated a significantly higher IL-10 secretion compared to SP CB Tregs (Fig 1A) which correlated with the level of IL-10 secreted in the cell cuture supernatant (data not shown). While the degree of suppression of the proliferating conventional T cells was similar by the DP and SP CB Tregs (data not shown), a significantly higher demethylation of FoxP3 promoter and first intron region was observed in the DP vs SP CB Treg population (n=3) (Fig 1B). A total of 337 pathways were identified from Up-406 gene set, 80 of these pathways had enrichment p-value<0.05 and q-value<0.25 (Fig 1C). The Top 10 pathways enriched with members of Up-406 genes include (Fig 1D): TGF-β Receptor Signaling; Interleukin-10 signaling; Inflammatory bowel disease; IL12 signaling mediated by STAT4. A total of 158 pathways were identified from Down-314 gene set, 19 of these pathways had enrichment p-value<0.05 and q-value<0.25. The Top 10 pathways enriched with Down-314 genes included Immuno-regulatory interactions between a Lymphoid and a non-Lymphoid cell; ESC Pluripotency Pathways; Downstream signaling in naive CD8+ T cells; PDGF receptor signaling network; Nef Mediated CD8 Down-regulation (Fig E, F). Conclusion: We have identified a novel double positive CD4+CD8+ CB Treg population. Additional experiments for evaluating suppressor mechanism in addition to IL-10 secretion are ongoing. Figure 1 Disclosures Verma: Stelexis: Equity Ownership, Honoraria; Acceleron: Honoraria; Celgene: Honoraria; BMS: Research Funding; Janssen: Research Funding. Iyer:Genentech/Roche: Research Funding; Incyte: Research Funding; Seattle Genetics, Inc.: Research Funding; Novartis: Research Funding; Arog: Research Funding; Bristol-Myers Squibb: Research Funding. Parmar:Cellenkos Inc.: Equity Ownership, Membership on an entity's Board of Directors or advisory committees, Research Funding.
APA, Harvard, Vancouver, ISO, and other styles
25

Ozyiğit, Tamer, Cuneyt Yavuz, Salih Murat Egi, Massimo Pieri, Costantino Balestra, and Alessandro Marroni. "Clustering of recreational divers by their health conditions in a database of a citizen science project." Undersea and Hyperbaric Medicine, April 1, 2019, 171–83. http://dx.doi.org/10.22462/04.06.2019.10.

Full text
Abstract:
Divers Alert Network Europe has created a database with a large amount of dive-related data that has been collected since 1993 within the scope of the Diving Safety Laboratory citizen science project. The main objectives of this study are the grouping divers by their health information and revealing significant differences in diving parameters using data mining techniques. Due to the methodology of the project, data cleaning was performed before applying clustering methods in order to eliminate potential mistakes resulting from inaccuracies and missing information. Despite the fact that 63% of the data were lost during the cleaning phase, the remaining 1,169 “clean” diver data enabled meaningful clustering using the “two-step” method. Experienced male divers without any health problems are in Cluster 1. Male and female divers with health problems and high rates of cigarette smoking are in Cluster 2; healthy, overweight divers are in Cluster 3. There are significant differences in terms of dive parameters including pre- and post-dive conditions with respect to each group, such as: exercise level, alcohol consumption, thermal comfort, equipment malfunctions, and maximum depth. The study proves the usefulness of citizen science projects, while data collection methodologies can be improved to decrease potential mistakes resulting from inconsistencies, inaccuracies and missing information. It is hypothesized that if naturally occurring clusters of divers were identified it might be possible to identify risk factors arising from different clusters while merging the database with other dive accident databases in the future.
APA, Harvard, Vancouver, ISO, and other styles
26

Edmonds, Carl, John Lippmann, and Alfred Bove. "Immersion pulmonary edema: an analysis of 31 cases from Oceania." Undersea and Hyperbaric Medicine, October 1, 2019, 603–10. http://dx.doi.org/10.22462/10.12.2019.3.

Full text
Abstract:
Aim: To review incidents of immersion pulmonary edema (IPE) from Oceania, to determine the demographics, diving parameters, and comorbidities that may be related to this disorder. Method: Incidents of IPE, most of which were documented by Divers Alert Network Asia-Pacific (DAN AP) or reported in our medical literature, were analyzed. They included interviews with the survivors and a review of available medical records. Only incidents diagnosed as IPE by specialist diving physicians or pathologists with experience in the investigation of diving accidents were included. Results: Thirty-one IPE incidents in divers from Oceania were documented. There were two surface snorkelers, 22 scuba air divers and seven nitrox divers, which included three closed-circuit rebreathers (CCR). The mean (SD) age was 53 (12) years, 58% of victims were females, and the average dive profile was to a maximum depth of 19 msw for 25 minutes. Six victims (19%) had previous episodes of IPE. There were nine recorded fatalities in this cohort. Medical comorbidities were recorded in 68%, with 42% being cardiac. The latter included valvular disease in 29%, transient cardiomyopathies in 26% and dysrhythmias in 16%. Conclusion: IPE was more likely in middle-aged females, in experienced divers, and during ascent or after surfacing. Commonly reported associations such as exertion, stress, cold exposure, negative inspiratory pressure, hypertension, overhydration, tight wetsuit, aspiration and certain medications were identified. This series supports the hypothesis that the elderly IPE subjects are likely to have comorbidities and be susceptible to IPE recurrences and fatalities unless the contributing factors can be identified and addressed.
APA, Harvard, Vancouver, ISO, and other styles
27

Edmonds, Carl, John Lippmann, and Andrew Fock. "Immersion pulmonary edema: case reports from Oceania." Undersea and Hyperbaric Medicine, October 1, 2019, 581–601. http://dx.doi.org/10.22462/10.12.2019.2.

Full text
Abstract:
Introduction: We aimed to document identified cases of immersion pulmonary edema (IPE) in divers from Oceania (the Indo-Pacific region) from January 2002 to May 2018, inclusive. Method: Cases were identified using various sources, including searches of the Divers Alert Network Asia-Pacific (DAN AP) Fatality Database, published case reports, and interviews with survivors who had reported their incident to DAN AP. Where available, investigations, pathology and autopsy results were obtained. Only incidents diagnosed as IPE by diving physicians or pathologists with experience in the investigation of diving accidents were included. Individual case histories and outcomes, together with brief individual summaries of the associations and possible contributing factors were recorded. Results: Thirty-one IPE incidents in divers from Oceania were documented. There were two surface snorkelers, 22 scuba air divers and seven nitrox divers which included three closed-circuit rebreathers (CCR). The mean (SD) age was 53 (12) years, 58% of victims were females, and the average dive profile was to a maximum depth of 19 meters of seawater for 25 minutes. Six victims (19%) had previous episodes of IPE. There were nine recorded fatalities. Cardiac anomalies dominated the associated or possible contributing factors. These included valvular disease in 29%, transient cardiomyopathies in 26% and dysrhythmias in 16%. Conclusions: Previously reported associations of IPE such as exertion, stress, cold exposure, negative inspiratory pressure, hypertension, overhydration, ascent or surfacing, tight wetsuit, aspiration and certain medications were identified. Cardiac conditions were frequent and included chronic disorders (valvular pathology, coronary artery disease) and transient disorders (dysrhythmias, transient myocardial dysfunction, takotsubo or stress cardiomyopathy). It is likely that the chronic cardiac disorders may have contributed to the IPE, whereas the transient cases could be either sequelae, contributors or coincidental to the IPE.
APA, Harvard, Vancouver, ISO, and other styles
28

Aksoy, Sinan, Emilie Purvine, and Stephen Young. "Directional Laplacian Centrality for Cyber Situational Awareness." Digital Threats: Research and Practice, April 15, 2021. http://dx.doi.org/10.1145/3450286.

Full text
Abstract:
Cyber operations is drowning in diverse, high-volume, multi-source data. In order to get a full picture of current operations and identify malicious events and actors analysts must see through data generated by a mix of human activity and benign automated processes. Although many monitoring and alert systems exist, they typically use signature-based detection methods. We introduce a general method rooted in spectral graph theory to discover patterns and anomalies without a priori knowledge of signatures. We derive and propose a new graph-theoretic centrality measure based on the derivative of the graph Laplacian matrix in the direction of a vertex. While our proposed Directional Laplacian Centrality may be applied to any graph, we study its effectiveness in identifying important Internet Protocol addresses in network flow data. Using both real and synthetic network flow data, we conduct several experiments to test our measure's sensitivity to two types of injected attack profiles.
APA, Harvard, Vancouver, ISO, and other styles
29

Jones, Albert, Abhijit Deshmukh, Soundar Kumara, and Man-Sze Li. "Engineering Complex, Information-Based, Networked Industrial Systems: A Research Roadmap." Journal of Computing and Information Science in Engineering 8, no. 1 (February 28, 2008). http://dx.doi.org/10.1115/1.2844398.

Full text
Abstract:
The explosive pace of globalization and the rapid development of information and communications technologies continue to impact the evolution of industrial systems. They have become completely dependent on information—generating, exchanging, and processing far more electronic data than ever before. They have become geographically dispersed organizations that comprise numerous, tightly interconnected networks of diverse companies. As a result, current-day industrial systems exhibit highly nonlinear, chaotic, and unpredictable behaviors. How best to engineer these new systems is a question of both theoretical and practical importance. Albert Einstein believed that you cannot use old approaches to solve new, and fundamentally different, problems. (“We cannot solve problems by using the same kind of thinking we used when we created them.”) That old approach, Descartes’ reductionism, said that you could infer the behavior of the entire system by knowing only the behavior of its components. This view is not valid for these new systems, because their behavior emerges in complex ways from the interactions of those components. Therefore, in this paper, we argue that a different approach to engineering these new types of industrial systems is needed. We base that approach on our view that these systems are remarkably similar to living systems. In this paper, we describe the major characteristics of living systems, summarize their similarities with these new systems, and use these similarities as a basis for a new research agenda.
APA, Harvard, Vancouver, ISO, and other styles
30

Charre, Caroline, Christophe Ginevra, Marina Sabatier, Hadrien Regue, Grégory Destras, Solenne Brun, Gwendolyne Burfin, et al. "Evaluation of NGS-based approaches for SARS-CoV-2 whole genome characterisation." Virus Evolution 6, no. 2 (July 1, 2020). http://dx.doi.org/10.1093/ve/veaa075.

Full text
Abstract:
Abstract Since the beginning of the COVID-19 outbreak, SARS-CoV-2 whole-genome sequencing (WGS) has been performed at unprecedented rate worldwide with the use of very diverse Next-Generation Sequencing (NGS) methods. Herein, we compare the performance of four NGS-based approaches for SARS-CoV-2 WGS. Twenty-four clinical respiratory samples with a large scale of Ct values (from 10.7 to 33.9) were sequenced with four methods. Three used Illumina sequencing: an in-house metagenomic NGS (mNGS) protocol and two newly commercialised kits including a hybridisation capture method developed by Illumina (DNA Prep with Enrichment kit and Respiratory Virus Oligo Panel, RVOP), and an amplicon sequencing method developed by Paragon Genomics (CleanPlex SARS-CoV-2 kit). We also evaluated the widely used amplicon sequencing protocol developed by ARTIC Network and combined with Oxford Nanopore Technologies (ONT) sequencing. All four methods yielded near-complete genomes (&gt;99%) for high viral loads samples (n = 8), with mNGS and RVOP producing the most complete genomes. For mid viral loads (Ct 20–25), amplicon-based enrichment methods led to genome coverage &gt;99 per cent for all samples while 1/8 sample sequenced with RVOP and 2/8 samples sequenced with mNGS had a genome coverage below 99 per cent. For low viral loads (Ct ≥25), amplicon-based enrichment methods were the most sensitive techniques. All methods were highly concordant in terms of identity in complete consensus sequence. Just one mismatch in three samples was observed in CleanPlex vs the other methods, due to the dedicated bioinformatics pipeline setting a high threshold to call SNP compared to reference sequence. Importantly, all methods correctly identified a newly observed 34nt-deletion in ORF6 but required specific bioinformatic validation for RVOP. Finally, as a major warning for targeted techniques, a loss of coverage in any given region of the genome should alert to a potential rearrangement or a SNP in primer-annealing or probe-hybridizing regions and would require further validation using unbiased metagenomic sequencing.
APA, Harvard, Vancouver, ISO, and other styles
31

Goffey, Andrew. "Idiotypic Networks, Normative Networks." M/C Journal 6, no. 4 (August 1, 2003). http://dx.doi.org/10.5204/mcj.2235.

Full text
Abstract:
Health Health is a production, a process, and not a goal. It is a means and not an end state, required “to liberate life wherever it is imprisoned by and within man, by and within organisms and genera” (Deleuze). We live our health as a network, within networks, within social, technological, political and biological networks, but how does the network concept understand health? And how does the network concept implicate health within other networks, for better or for worse? Biopolitical Relations In its diverse forms, network thinking institutes a relational ontology, an ontology of connection and of connectedness. Whether the connections being explored are those governing the proverbial ‘six degrees of separation’, the small world in which “no-one is more than a few handshakes from anyone else”, the rhizomatic imperative that not only is everything connected but it must be, or even the ordinality of the mathematical regimen of belonging (Alain Badiou), one gains the impression that network thinking is the expression of a common world-view, a zeitgeist. Yet to think in this way is not only to lose sight of the important qualitative differences evident in the manifold conceptions of ‘network’ but is also to overlook differences in descent in the genealogy of knowledges and hence the differential inscription of those knowledges in power relations (another network…). The case of immunology is analysed here as one line of descent in network thinking, selected here for its susceptibility to exemplify a series of biopolitical implications which may not be so evident in other scientific fields. What follows is an attempt to address some of these implications for our understanding of the materiality of communications. Self - Nonself Since the groundbreaking work of Sir Frank MacFarlane Burnett in the 1940s and 1950s, immunology has become known as the ‘science of self-nonself discrimination’. In the first half of the twentieth century, as Pauline Mazumdar has argued, immunology was caught up in a classificatory problematic of the nature of species and specificity. In the latter half of the twentieth century, it might be argued, this concern becomes a more general one of the nature of biological identity and the mechanisms of organic integrity. Yet it is licit to see in these innocently scientific concerns the play of another set of interests, another set of issues or, to put it slightly differently, another problematic. We can see in the autonymic definition of immunology as the ‘science of self-nonself discrimination’ a biopolitical concern with the nature, maintenance and protection of populations: a delegation of the health of the body to a set of autonomous biological mechanisms, an interiorisation of a social and political problematic parallel to the interiorisation of the social repression of desire traced out by Gilles Deleuze and Felix Guattari in their Anti-Oedipus. There are a number of points which are relevant here. The intellectual roots of immunology are to be found in Darwinian theory. Socially, however, immunology develops out of a set of public health practices, a set of public health reforms. Immunology locates the mechanisms for maintaining the integrity of the organism ‘under the skin’ and in a sense shifts the focal point of the problem of health to the internal workings of the organism. In this way, it reconfigures the field of social action. The enormous success of vaccination programmes and a concentration on the ‘serologic’ of immunisation focalises immunological research on outer-directed reactions. We can find a trace of the social field to which immunology is related in the name of the discipline itself. The term ‘immunology’ derives from the Latin term ‘immunitas’ which signified an exemption from public duty. The mechanisms of the immune system are routinely figured as weapons in a war against the enemy (Paul Ehrlich: “magic bullets”). And war, as Agamben has argued, exemplifies a state of exception. Given the way in which immunology shifts health inside the body, its enemies become ‘any enemies whatever’, microphysical forces with no apparent connection to the socius. The ability to combat any enemy whatever offers decisive evidence of the miraculous abilities of the self, the sovereignty of its powers. The self which the immune system protects is imagined to be defined anterior to that system, on a genetic basis, independent of the rules governing interactions in the system itself. The ability of the immune system to respond to and destroy any enemy whatever and thus maintain the organism’s sovereign identity demonstrates its ‘intolerance for foreign matter’ (Macfarlane Burnet). The molecular terrain on which its combat is waged is only apparently divorced from the socius. Idiotypy Network theory offers an interesting response to this set of ideas. Niels Jerne developed idiotypic network theory as a way of overcoming some of the difficulties in the accepted version of how the immune system works. The immune system possesses the remarkable ability to distinguish between everything which is a friend of the organism and everything which is an enemy. The key question which this poses is this: how and on what basis does the immune system not react to self, why does it posses what Paul Ehrlich called ‘horror autotoxicus’? The standard wisdom is to maintain that those elements which can react to self are firstly only very small in number and, secondly, eliminated by a process of learning (‘clonal deletion’). Yet this view is wrong on both counts – there is a far higher concentration of ‘auto-antibodies’ in the individual organism than the standard theory suggests, and an organism which develops in the absence of contact with ‘antigens’ originating in the environment can nevertheless develop a perfectly functional immune system. Jerne’s theory develops as a piece of self-organisational wisdom. Everything in the immune system is connected. The activities of all the elements in the system are regulated by the activities of every other. One type of cell specifically recognises and thus is stimulated into action (i.e. the production of clones) by another. However, this reaction is dampened down by another recognition event: the proliferation of clones of the first type of cell is regulated by the response of a third (also a production), and so on. This cascading chain of stimulus-response events is called an idiotypic network, by Jerne, a recurrent set of ‘eigen-behaviours’, and it reverses the conventional wisdom about the way in which the immune system operates: the destructive response to the other is no longer an exception but a limiting case in the auto-consistent behaviour of a self-organising network. An immune reaction is not a characteristic of the miraculous power of the immune system but a consequence of the network’s loss of plasticity. Autopoiesis Francisco Varela and the so-called ‘Paris School’ have managed to draw out the radical consequences of this way of looking at organic processes. The first point they make is that idiotypic network theory substitutes an autonomous conception of immunity for the predominantly heteronomous view of immunity as a set of defensive mechanisms. A variant on the more general autopoietic postulate of the circular causality inhering in living systems, the eigen-behaviour used to characterise immune networks attempts to move our understanding of biological processes away from the biopolitical problematic of defence and security. As Varela and Anspach put it, “to say that immunity is fundamentally defence is as distorted as saying that the brain is fundamentally concerned with defence and avoidance. We certainly defend ourselves and avoid attack, but this is hardly what cognition is about, that is flexibility in living”. An idiotypic network is thus conceptualised as a radically autonomous system, which effectively knows no outside. The idea that the immune network has defence as its prime function is argued by Varela to result from the epistemically relative nature of the claims made by the biologist: it is a claim which makes sense from the specific point of view of the observer but does not – cannot – explain what the immune network is doing in its own terms. The place of the observer in biology is fundamentally contingent. The assertion of the contingent nature of the observation in biology is not, however, accompanied by an analysis of the immanent implication of these observations in the socius. As Maturana himself has noted, “the fact that science as a cognitive domain is constituted and validated in the operational coherences of the praxis of living of the standard observers as they operate in their experiential domains without reference to an independent reality does not make scientific statements subjective”. Certainly not, if these statements can be demonstrated to belong to a specific set of discursive ‘regularities’. The argument that the immune network does not have defence as its primary function of course raises the question of what the immune network is actually for. The research carried out by Varela and his associates suggests, and this is the second point, that the immune network is responsible for the assertion of organic identity. Far from being a secondary mechanism for the protection of a sovereign identity defined elsewhere and otherwise, the organisation of the immune network as a recurrent set of mutually reinforcing chemical interactions (in which defence is instead the result of an excessive perturbation of the system), suggests that the network has a primary role in defining identity. To put it another way, the immune network is a means of individuation. The field of theoretical immunology more generally has explored the logic of the network constitution of individuality. Experimental evidence suggests that vertebrate organisms replace up to 20% of the chemical components constituting the immune network daily, thus demonstrating a highly productive processual character, but how does this activity cohere into the development of a consistent set? Theoretical immunologists use some of the arguments of complexity theory to show that even the continuous random production of notional molecular compounds (which would correspond to the elements of the immune network – B-cells, T-cells and so on) can yield an organised consistent set. They argue that this set or network of interactions forms a ‘cognitive field’ which determines the sensitivity of the network to any one of its elements at any moment in time. The sensitivity of the network – equally its degree of connectedness – determines the likelihood that any element will be integrated or rejected. The less connected the network to any element, the more likely that element will be rejected. Interestingly, the shape of the cognitive field of the network – what it is sensitive to – varies over time, and the network is more flexible, or plastic, at earlier stage in its history than later. The crucial point, however, is that there are no necessarily enduring components to this network. A useful term to describe this is metastability: immune networks provide evidence for an ongoing process of individuation, itself a more or less chaotic process. Such a view is far from gaining univocal adherence in the immunological community and yet it certainly offers an interesting and inventive way of looking at the anomalies of currently available experimental evidence, not least the difficulties standard theory has of grasping auto-immune diseases. But does the network conception of immunity displace the biopolitical problematic ? As mentioned above, for Varela this view of the immune network as an autonomous, cognitive system offers a way out of the predominantly militaristic characterisation of the organism’s maintenance mechanisms, and thus permits the conceptualisation of what he calls ‘flexibility in living’. Yet, if the claim sketched out above concerning the link between immunology and biopolitics is correct, one is entitled to ask about the extent to which network thought as a way of grasping biological processes can really constitute a locus of resistance to contemporary biopolitical imperatives. Pacification To finish, it is worth noting firstly that with biopolitics, in the genealogy sketched out by Foucault, mutations in power are accompanied by a shift in its phenomenal manifestation: the noisy destructiveness of sovereignty, with its power over life and death, is replaced by the anonymity of the grey procedures of knowledge. Cognition could perhaps be another form of power. And power is for Foucault, of course, a network. Or, to take another view, contemporary power may be characterised by the state of the exception becoming the rule (Agamben): the exceptional response of the sovereign has spread across the whole social fabric or by the generalised diffusion of the death drive across the whole of the socius (Deleuze and Guattari). The diffuse cognitive qualities of the network conception of immunity might in this sense correspond to contemporary shifts in the nature of power and its exercise. As Francois Ewald has put it in his discussion of Foucault’s Discipline and Punish, “[n]ormative knowledge appeals to nothing exterior to that which it works on, that which it makes visible. What precisely is the norm? It is the measure which simultaneously individualises, makes ceaseless individualisation possible and creates comparability”. Works Cited Giorgio Agamben Homo Sacer (Stanford University Press, Stanford CA, 1998) Albert-Làszló Barabàsi Linked: The New Science of Networks (Perseus, Cambridge MA,2002) Gilles Deleuze and Felix Guattari Anti-Oedipus (Minnesota University Press, Minneapolis, 1983) François Ewald ‘A power without an exterior’ in T.J. Armstrong (ed.) Michel Foucault Philosopher (Harvester Wheatsheaf, Hemel Hempstead, 1992) Pauline Mazumdar Species and Specificity (Cambridge University Press, Cambridge, 1995) Francisco Varela and Mark Anspach ‘The Body Thinks: The Immune System in the Process of Somatic Individuation’ in Hans Ulrich Gumbrecht and K.Ludwig Pfeiffer (eds.) Materialities of Communication (Stanford University Press, Stanford CA,1994) Cary Wolfe ‘In Search of Post-Humanist Theory: The Second-Order Cybernetics of Maturana and Varela’ in Cultural Critique (Spring 1995) 30:36 <http://www.santafe.edu/projects/immunology/> Links http://www.santafe.edu/projects/immunology/%20 Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Goffey, Andrew. "Idiotypic Networks, Normative Networks" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/07-idiotypic.php>. APA Style Goffey, A. (2003, Aug 26). Idiotypic Networks, Normative Networks. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/07-idiotypic.php>
APA, Harvard, Vancouver, ISO, and other styles
32

Dwyer, Tim. "Transformations." M/C Journal 7, no. 2 (March 1, 2004). http://dx.doi.org/10.5204/mcj.2339.

Full text
Abstract:
The Australian Government has been actively evaluating how best to merge the functions of the Australian Communications Authority (ACA) and the Australian Broadcasting Authority (ABA) for around two years now. Broadly, the reason for this is an attempt to keep pace with the communications media transformations we reduce to the term “convergence.” Mounting pressure for restructuring is emerging as a site of turf contestation: the possibility of a regulatory “one-stop shop” for governments (and some industry players) is an end game of considerable force. But, from a public interest perspective, the case for a converged regulator needs to make sense to audiences using various media, as well as in terms of arguments about global, industrial, and technological change. This national debate about the institutional reshaping of media regulation is occurring within a wider global context of transformations in social, technological, and politico-economic frameworks of open capital and cultural markets, including the increasing prominence of international economic organisations, corporations, and Free Trade Agreements (FTAs). Although the recently concluded FTA with the US explicitly carves out a right for Australian Governments to make regulatory policy in relation to existing and new media, considerable uncertainty remains as to future regulatory arrangements. A key concern is how a right to intervene in cultural markets will be sustained in the face of cultural, politico-economic, and technological pressures that are reconfiguring creative industries on an international scale. While the right to intervene was retained for the audiovisual sector in the FTA, by contrast, it appears that comparable unilateral rights to intervene will not operate for telecommunications, e-commerce or intellectual property (DFAT). Blurring Boundaries A lack of certainty for audiences is a by-product of industry change, and further blurs regulatory boundaries: new digital media content and overlapping delivering technologies are already a reality for Australia’s media regulators. These hypothetical media usage scenarios indicate how confusion over the appropriate regulatory agency may arise: 1. playing electronic games that use racist language; 2. being subjected to deceptive or misleading pop-up advertising online 3. receiving messaged imagery on your mobile phone that offends, disturbs, or annoys; 4. watching a program like World Idol with SMS voting that subsequently raises charging or billing issues; or 5. watching a new “reality” TV program where products are being promoted with no explicit acknowledgement of the underlying commercial arrangements either during or at the end of the program. These are all instances where, theoretically, regulatory mechanisms are in place that allow individuals to complain and to seek some kind of redress as consumers and citizens. In the last scenario, in commercial television under the sector code, no clear-cut rules exist as to the precise form of the disclosure—as there is (from 2000) in commercial radio. It’s one of a number of issues the peak TV industry lobby Commercial TV Australia (CTVA) is considering in their review of the industry’s code of practice. CTVA have proposed an amendment to the code that will simply formalise the already existing practice . That is, commercial arrangements that assist in the making of a program should be acknowledged either during programs, or in their credits. In my view, this amendment doesn’t go far enough in post “cash for comment” mediascapes (Dwyer). Audiences have a right to expect that broadcasters, production companies and program celebrities are open and transparent with the Australian community about these kinds of arrangements. They need to be far more clearly signposted, and people better informed about their role. In the US, the “Commercial Alert” <http://www.commercialalert.org/> organisation has been lobbying the Federal Communications Commission and the Federal Trade Commission to achieve similar in-program “visual acknowledgements.” The ABA’s Commercial Radio Inquiry (“Cash-for-Comment”) found widespread systemic regulatory failure and introduced three new standards. On that basis, how could a “standstill” response by CTVA, constitute best practice for such a pervasive and influential medium as contemporary commercial television? The World Idol example may lead to confusion for some audiences, who are unsure whether the issues involved relate to broadcasting or telecommunications. In fact, it could be dealt with as a complaint to the Telecommunication Industry Ombudsman (TIO) under an ACA registered, but Australian Communications Industry Forum (ACIF) developed, code of practice. These kind of cross-platform issues may become more vexed in future years from an audience’s perspective, especially if reality formats using on-screen premium rate service numbers invite audiences to participate, by sending MMS (multimedia messaging services) images or short video grabs over wireless networks. The political and cultural implications of this kind of audience interaction, in terms of access, participation, and more generally the symbolic power of media, may perhaps even indicate a longer-term shift in relations with consumers and citizens. In the Internet example, the Australian Competition and Consumer Commission’s (ACCC) Internet advertising jurisdiction would apply—not the ABA’s “co-regulatory” Internet content regime as some may have thought. Although the ACCC deals with complaints relating to Internet advertising, there won’t be much traction for them in a more complex issue that also includes, say, racist or religious bigotry. The DVD example would probably fall between the remits of the Office of Film and Literature Classification’s (OFLC) new “convergent” Guidelines for the Classification of Film and Computer Games and race discrimination legislation administered by the Human Rights and Equal Opportunity Commission (HREOC). The OFLC’s National Classification Scheme is really geared to provide consumer advice on media products that contain sexual and violent imagery or coarse language, rather than issues of racist language. And it’s unlikely that a single person would have the locus standito even apply for a reclassification. It may fall within the jurisdiction of the HREOC depending on whether it was played in public or not. Even then it would probably be considered exempt on free speech grounds as an “artistic work.” Unsolicited, potentially illegal, content transmitted via mobile wireless devices, in particular 3G phones, provide another example of content that falls between the media regulation cracks. It illustrates a potential content policy “turf grab” too. Image-enabled mobile phones create a variety of novel issues for content producers, network operators, regulators, parents and viewers. There is no one government media authority or agency with a remit to deal with this issue. Although it has elements relating to the regulatory activities of the ACA, the ABA, the OFLC, the TIO, and TISSC, the combination of illegal or potentially prohibited content and its carriage over wireless networks positions it outside their current frameworks. The ACA may argue it should have responsibility for this kind of content since: it now enforces the recently enacted Commonwealth anti-Spam laws; has registered an industry code of practice for unsolicited content delivered over wireless networks; is seeking to include ‘adult’ content within premium rate service numbers, and, has been actively involved in consumer education for mobile telephony. It has also worked with TISSC and the ABA in relation to telephone sex information services over voice networks. On the other hand, the ABA would probably argue that it has the relevant expertise for regulating wirelessly transmitted image-content, arising from its experience of Internet and free and subscription TV industries, under co-regulatory codes of practice. The OFLC can also stake its claim for policy and compliance expertise, since the recently implemented Guidelines for Classification of Film and Computer Games were specifically developed to address issues of industry convergence. These Guidelines now underpin the regulation of content across the film, TV, video, subscription TV, computer games and Internet sectors. Reshaping Institutions Debates around the “merged regulator” concept have occurred on and off for at least a decade, with vested interests in agencies and the executive jockeying to stake claims over new turf. On several occasions the debate has been given renewed impetus in the context of ruling conservative parties’ mooted changes to the ownership and control regime. It’s tended to highlight demarcations of remit, informed as they are by historical and legal developments, and the gradual accretion of regulatory cultures. Now the key pressure points for regulatory change include the mere existence of already converged single regulatory structures in those countries with whom we tend to triangulate our policy comparisons—the US, the UK and Canada—increasingly in a context of debates concerning international trade agreements; and, overlaying this, new media formats and devices are complicating existing institutional arrangements and legal frameworks. The Department of Communications, Information Technology & the Arts’s (DCITA) review brief was initially framed as “options for reform in spectrum management,” but was then widened to include “new institutional arrangements” for a converged regulator, to deal with visual content in the latest generation of mobile telephony, and other image-enabled wireless devices (DCITA). No other regulatory agencies appear, at this point, to be actively on the Government’s radar screen (although they previously have been). Were the review to look more inclusively, the ACCC, the OFLC and the specialist telecommunications bodies, the TIO and the TISSC may also be drawn in. Current regulatory arrangements see the ACA delegate responsibility for broadcasting services bands of the radio frequency spectrum to the ABA. In fact, spectrum management is the turf least contested by the regulatory players themselves, although the “convergent regulator” issue provokes considerable angst among powerful incumbent media players. The consensus that exists at a regulatory level can be linked to the scientific convention that holds the radio frequency spectrum is a continuum of electromagnetic bands. In this view, it becomes artificial to sever broadcasting, as “broadcasting services bands” from the other remaining highly diverse communications uses, as occurred from 1992 when the Broadcasting Services Act was introduced. The prospect of new forms of spectrum charging is highly alarming for commercial broadcasters. In a joint submission to the DCITA review, the peak TV and radio industry lobby groups have indicated they will fight tooth and nail to resist new regulatory arrangements that would see a move away from the existing licence fee arrangements. These are paid as a sliding scale percentage of gross earnings that, it has been argued by Julian Thomas and Marion McCutcheon, “do not reflect the amount of spectrum used by a broadcaster, do not reflect the opportunity cost of using the spectrum, and do not provide an incentive for broadcasters to pursue more efficient ways of delivering their services” (6). An economic rationalist logic underpins pressure to modify the spectrum management (and charging) regime, and undoubtedly contributes to the commercial broadcasting industry’s general paranoia about reform. Total revenues collected by the ABA and the ACA between 1997 and 2002 were, respectively, $1423 million and $3644.7 million. Of these sums, using auction mechanisms, the ABA collected $391 million, while the ACA collected some $3 billion. The sale of spectrum that will be returned to the Commonwealth by television broadcasters when analog spectrum is eventually switched off, around the end of the decade, is a salivating prospect for Treasury officials. The large sums that have been successfully raised by the ACA boosts their position in planning discussions for the convergent media regulatory agency. The way in which media outlets and regulators respond to publics is an enduring question for a democratic polity, irrespective of how the product itself has been mediated and accessed. Media regulation and civic responsibility, including frameworks for negotiating consumer and citizen rights, are fundamental democratic rights (Keane; Tambini). The ABA’s Commercial Radio Inquiry (‘cash for comment’) has also reminded us that regulatory frameworks are important at the level of corporate conduct, as well as how they negotiate relations with specific media audiences (Johnson; Turner; Gordon-Smith). Building publicly meaningful regulatory frameworks will be demanding: relationships with audiences are often complex as people are constructed as both consumers and citizens, through marketised media regulation, institutions and more recently, through hybridising program formats (Murdock and Golding; Lumby and Probyn). In TV, we’ve seen the growth of infotainment formats blending entertainment and informational aspects of media consumption. At a deeper level, changes in the regulatory landscape are symptomatic of broader tectonic shifts in the discourses of governance in advanced information economies from the late 1980s onwards, where deregulatory agendas created an increasing reliance on free market, business-oriented solutions to regulation. “Co-regulation” and “self-regulation’ became the preferred mechanisms to more direct state control. Yet, curiously contradicting these market transformations, we continue to witness recurring instances of direct intervention on the basis of censorship rationales (Dwyer and Stockbridge). That digital media content is “converging” between different technologies and modes of delivery is the norm in “new media” regulatory rhetoric. Others critique “visions of techno-glory,” arguing instead for a view that sees fundamental continuities in media technologies (Winston). But the socio-cultural impacts of new media developments surround us: the introduction of multichannel digital and interactive TV (in free-to-air and subscription variants); broadband access in the office and home; wirelessly delivered content and mobility, and, as Jock Given notes, around the corner, there’s the possibility of “an Amazon.Com of movies-on-demand, with the local video and DVD store replaced by online access to a distant server” (90). Taking a longer view of media history, these changes can be seen to be embedded in the global (and local) “innovation frontier” of converging digital media content industries and its transforming modes of delivery and access technologies (QUT/CIRAC/Cutler & Co). The activities of regulatory agencies will continue to be a source of policy rivalry and turf contestation until such time as a convergent regulator is established to the satisfaction of key players. However, there are risks that the benefits of institutional reshaping will not be readily available for either audiences or industry. In the past, the idea that media power and responsibility ought to coexist has been recognised in both the regulation of the media by the state, and the field of communications media analysis (Curran and Seaton; Couldry). But for now, as media industries transform, whatever the eventual institutional configuration, the evolution of media power in neo-liberal market mediascapes will challenge the ongoing capacity for interventions by national governments and their agencies. Works Cited Australian Broadcasting Authority. Commercial Radio Inquiry: Final Report of the Australian Broadcasting Authority. Sydney: ABA, 2000. Australian Communications Information Forum. Industry Code: Short Message Service (SMS) Issues. Dec. 2002. 8 Mar. 2004 <http://www.acif.org.au/__data/page/3235/C580_Dec_2002_ACA.pdf >. Commercial Television Australia. Draft Commercial Television Industry Code of Practice. Aug. 2003. 8 Mar. 2004 <http://www.ctva.com.au/control.cfm?page=codereview&pageID=171&menucat=1.2.110.171&Level=3>. Couldry, Nick. The Place of Media Power: Pilgrims and Witnesses of the Media Age. London: Routledge, 2000. Curran, James, and Jean Seaton. Power without Responsibility: The Press, Broadcasting and New Media in Britain. 6th ed. London: Routledge, 2003. Dept. of Communication, Information Technology and the Arts. Options for Structural Reform in Spectrum Management. Canberra: DCITA, Aug. 2002. ---. Proposal for New Institutional Arrangements for the ACA and the ABA. Aug. 2003. 8 Mar. 2004 <http://www.dcita.gov.au/Article/0,,0_1-2_1-4_116552,00.php>. Dept. of Foreign Affairs and Trade. Australia-United States Free Trade Agreement. Feb. 2004. 8 Mar. 2004 <http://www.dfat.gov.au/trade/negotiations/us_fta/outcomes/11_audio_visual.php>. Dwyer, Tim. Submission to Commercial Television Australia’s Review of the Commercial Television Industry’s Code of Practice. Sept. 2003. Dwyer, Tim, and Sally Stockbridge. “Putting Violence to Work in New Media Policies: Trends in Australian Internet, Computer Game and Video Regulation.” New Media and Society 1.2 (1999): 227-49. Given, Jock. America’s Pie: Trade and Culture After 9/11. Sydney: U of NSW P, 2003. Gordon-Smith, Michael. “Media Ethics After Cash-for-Comment.” The Media and Communications in Australia. Ed. Stuart Cunningham and Graeme Turner. Sydney: Allen and Unwin, 2002. Johnson, Rob. Cash-for-Comment: The Seduction of Journo Culture. Sydney: Pluto, 2000. Keane, John. The Media and Democracy. Cambridge: Polity, 1991. Lumby, Cathy, and Elspeth Probyn, eds. Remote Control: New Media, New Ethics. Melbourne: Cambridge UP, 2003. Murdock, Graham, and Peter Golding. “Information Poverty and Political Inequality: Citizenship in the Age of Privatized Communications.” Journal of Communication 39.3 (1991): 180-95. QUT, CIRAC, and Cutler & Co. Research and Innovation Systems in the Production of Digital Content and Applications: Report for the National Office for the Information Economy. Canberra: Commonwealth of Australia, Sept. 2003. Tambini, Damian. Universal Access: A Realistic View. IPPR/Citizens Online Research Publication 1. London: IPPR, 2000. Thomas, Julian and Marion McCutcheon. “Is Broadcasting Special? Charging for Spectrum.” Conference paper. ABA conference, Canberra. May 2003. Turner, Graeme. “Talkback, Advertising and Journalism: A cautionary tale of self-regulated radio”. International Journal of Cultural Studies 3.2 (2000): 247-255. ---. “Reshaping Australian Institutions: Popular Culture, the Market and the Public Sphere.” Culture in Australia: Policies, Publics and Programs. Ed. Tony Bennett and David Carter. Melbourne: Cambridge UP, 2001. Winston, Brian. Media, Technology and Society: A History from the Telegraph to the Internet. London: Routledge, 1998. Web Links http://www.aba.gov.au http://www.aca.gov.au http://www.accc.gov.au http://www.acif.org.au http://www.adma.com.au http://www.ctva.com.au http://www.crtc.gc.ca http://www.dcita.com.au http://www.dfat.gov.au http://www.fcc.gov http://www.ippr.org.uk http://www.ofcom.org.uk http://www.oflc.gov.au Links http://www.commercialalert.org/ Citation reference for this article MLA Style Dwyer, Tim. "Transformations" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/06-transformations.php>. APA Style Dwyer, T. (2004, Mar17). Transformations. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/06-transformations.php>
APA, Harvard, Vancouver, ISO, and other styles
33

Ryan, Robin, and Uncle Ossie Cruse. "Welcome to the Peoples of the Mountains and the Sea: Evaluating an Inaugural Indigenous Cultural Festival." M/C Journal 22, no. 3 (June 19, 2019). http://dx.doi.org/10.5204/mcj.1535.

Full text
Abstract:
IntroductionFestivals, according to Chris Gibson and John Connell, are like “glue”, temporarily sticking together various stakeholders, economic transactions, and networks (9). Australia’s First Nations peoples see festivals as an opportunity to display cultural vitality (Henry 586), and to challenge a history which has rendered them absent (587). The 2017 Australia Council for the Arts Showcasing Creativity report indicates that performing arts by First Nations peoples are under-represented in Australia’s mainstream venues and festivals (1). Large Aboriginal cultural festivals have long thrived in Australia’s northern half, but have been under-developed in the south. Each regional happening develops a cultural landscape connected to a long and intimate relationship with the natural environment.The Far South East coast and mountainous hinterland of New South Wales is rich in pristine landscapes that ground the Yuin and Monaro Nations to Country as the Monaroo Bobberrer Gadu (Peoples of the Mountains and the Sea). This article highlights cross-sector interaction between Koori and mainstream organisations in producing the Giiyong (Guy-Yoong/Welcoming) Festival. This, the first large festival to be held within the Yuin Nation, took place on Aboriginal-owned land at Jigamy, via Eden, on 22 September 2018. Emerging regional artists joined national headline acts, most notably No Fixed Address (one of the earliest Aboriginal bands to break into the Australian mainstream music industry), and hip-hop artist Baker Boy (Danzal Baker, Young Australian of the Year 2019). The festival followed five years of sustained community preparation by South East Arts in association with Grow the Music, Twofold Aboriginal Corporation, the Eden Local Aboriginal Land Council, and its Elders. We offer dual understandings of the Giiyong Festival: the viewpoints of a male Yuin Elder wedded to an Australian woman of European descent. We acknowledge, and rely upon, key information, statistics, and photographs provided by the staff of South East Arts including Andrew Gray (General Manager), Jasmin Williams (Aboriginal Creative and Cultural Engagement Officer and Giiyong Festival Project Manager), and Kate Howarth (Screen Industry Development Officer). We are also grateful to Wiradjuri woman Alison Simpson (Program Manager at Twofold Aboriginal Corporation) for valuable feedback. As community leaders from First Nations and non-First Nations backgrounds, Simpson and Williams complement each other’s talents for empowering Indigenous communities. They plan a 2020 follow-up event on the basis of the huge success of the 2018 festival.The case study is informed by our personal involvement with community. Since the general population barely comprehends the number and diversity of Australia’s Indigenous ‘nations’, the burgeoning Indigenous festival movement encourages First Nations and non-First Nations peoples alike to openly and confidently refer to the places they live in according to Indigenous names, practices, histories, and knowledge. Consequently, in the mental image of a map of the island-continent, the straight lines and names of state borders fade as the colours of the Indigenous ‘Countries’ (represented by David Horton’s wall map of 1996) come to the foreground. We reason that, in terms of ‘regionality,’ the festival’s expressions of “the agency of country” (Slater 141) differ vastly from the centre-periphery structure and logic of the Australian colony. There is no fixed centre to the mutual exchange of knowledge, culture, and experience in Aboriginal Australia. The broader implication of this article is that Indigenous cultural festivals allow First Nations peoples cultures—in moments of time—to assume precedence, that is to ‘stitch’ back together the notion of a continent made up of hundreds of countries, as against the exploitative structure of ‘hub and region’ colonial Australia.Festival Concepts and ContextsHoward Becker observed that cultural production results from an interplay between the person of the artist and a multitude of support personnel whose work is not frequently studied: “It is through this network of cooperation that the art work we eventually see or hear comes to be and continues to be” (1). In assisting arts and culture throughout the Bega Valley, Eurobodalla, and Snowy Monaro, South East Arts delivers positive achievements in the Aboriginal arts and cultural sector. Their outcomes are significant in the light of the dispossession, segregation, and discrimination experienced by Aboriginal Australians. Michael Young, assisted by Indigenous authors Ellen Mundy and Debbie Mundy, recorded how Delegate Reserve residents relocating to the coast were faced with having their lives controlled by a Wallaga Lake Reserve manager or with life on the fringes of the towns in shacks (2–3). But as discovered in the records, “their retention of traditional beliefs, values and customs, reveal that the accommodation they were forced to make with the Europeans did not mean they had surrendered. The proof of this is the persistence of their belief in the value of their culture” (3–4). The goal of the Twofold Aboriginal Corporation is to create an inclusive place where Aboriginal people of the Twofold Bay Region can be proud of their heritage, connect with the local economy, and create a real future for their children. When Simpson told Williams of the Twofold Aboriginal Corporation’s and Eden Local Aboriginal Land Council’s dream of housing a large cultural festival at Jigamy, Williams rigorously consulted local Indigenous organisations to build a shared sense of community ownership of the event. She promoted the festival as “a rare opportunity in our region to learn about Aboriginal culture and have access to a huge program of Aboriginal musicians, dancers, visual artists, authors, academics, storytellers, cooks, poets, creative producers, and films” (McKnight).‘Uncle Ossie’ Cruse of Eden envisaged that the welcoming event would enliven the longstanding caring and sharing ethos of the Yuin-Monaro people. Uncle Ossie was instrumental in establishing Jigamy’s majestic Monaroo Bobberrer Gudu Keeping Place with the Eden Local Aboriginal Land Council in 1994. Built brick by brick by Indigenous workers, it is a centre for the teaching and celebration of Aboriginal culture, and for the preservation of artefacts. It represents the local community's determination to find their own solutions for “bridging the gap” by creating education and employment opportunities. The centre is also the gateway to the Bundian Way, the first Aboriginal pathway to be listed on the NSW State Heritage Register. Festival Lead-Up EventsEden’s Indigenous students learn a revived South Coast language at Primary and Secondary School. In 2015, Uncle Ossie vitally informed their input into The Black Ducks, a hip-hop song filmed in Eden by Desert Pea Media. A notable event boosting Koori musical socialisation was a Giiyong Grow the Music spectacle performed at Jigamy on 28 October 2017. Grow the Music—co-founded by Lizzy Rutten and Emily White—specialises in mentoring Indigenous artists in remote areas using digital recording equipment. Eden Marine High School students co-directed the film Scars as part of a programme of events with South East Arts and the Giiyong Festival 2018. The Eden Place Project and Campbell Page also create links between in- and out-of-school activities. Eden’s Indigenous students thus perform confidently at NAIDOC Week celebrations and at various festivals. Preparation and PersonnelAn early decision was made to allow free entry to the Giiyong Festival in order to attract a maximum number of Indigenous families. The prospect necessitated in-kind support from Twofold Aboriginal Corporation staff. They galvanised over 100 volunteers to enhance the unique features of Jigamy, while Uncle Ossie slashed fields of bushes to prepare copious parking space. The festival site was spatially focused around two large stages dedicated to the memory of two strong supporters of cultural creativity: Aunty Doris Kirby, and Aunty Liddy Stewart (Image 1). Image 1: Uncle Ossie Cruse Welcomes Festival-Goers to Country on the Aunty Liddy Stewart Stage. Image Credit: David Rogers for South East Arts, Reproduction Courtesy of South East Arts.Cultural festivals are peaceful weapons in a continuing ontological political contest (Slater 144). In a panel discussion, Uncle Ossie explained and defended the Makarrata: the call for a First Nations Voice to be enshrined in the Constitution.Williams also contracted artists with a view to capturing the past and present achievements of Aboriginal music. Apart from her brilliant centrepiece acts No Fixed Address and Baker Boy, she attracted Pitjantjatjara singer Frank Yamma (Image 2), Yorta Yorta singer/songwriter Benny Walker, the Central Desert Docker River Band, and Jessie Lloyd’s nostalgic Mission Songs Project. These stellar acts were joined by Wallaga Lake performers Robbie Bundle, Warren Foster, and Alison Walker as well as Nathan Lygon (Eden), Chelsy Atkins (Pambula), Gabadoo (Bermagui), and Drifting Doolgahls (Nowra). Stage presentations were technologically transformed by the live broadcast of acts on large screens surrounding the platforms. Image 2: Singer-Songwriter Frank Yamma Performs at Giiyong Festival 2018. Image Credit: David Rogers for South East Arts, Reproduction Courtesy of South East Arts.Giiyong Music and Dance Music and dance form the staple components of Indigenous festivals: a reflection on the cultural strength of ancient ceremony. Hundreds of Yuin-Monaro people once attended great corroborees on Mumbulla Mountain (Horton 1235), and oral history recorded by Janet Mathews evidences ceremonies at Fishy Flats, Eden, in the 1850s. Today’s highly regarded community musicians and dancers perform the social arrangements of direct communication, sometimes including their children on stage as apprentices. But artists are still negotiating the power structures through which they experience belonging and detachment in the representation of their musical identity.Youth gain positive identities from participating alongside national headline acts—a form of learning that propels talented individuals into performing careers. The One Mob Dreaming Choir of Koori students from three local schools were a popular feature (Image 3), as were Eden Marine student soloists Nikai Stewart, and Nikea Brooks. Grow the Music in particular has enabled these youngsters to exhibit the roots of their culture in a deep and touching way that contributes to their life-long learning and development. Image 3: The One Mob Dreaming Choir, Directed by Corinne Gibbons (L) and Chelsy Atkins (R). Image Credit: David Rogers for South East Arts, Reproduction Courtesy of South East Arts. Brydie-Leigh Bartleet describes how discourses of pride emerge when Indigenous Australian youth participate in hip-hop. At the Giiyong Festival the relationship between musical expression, cultural representation, and political positioning shone through the songs of Baker Boy and Gabadoo (Image 4). Channelling emotions into song, they led young audiences to engage with contemporary themes of Indigeneity. The drones launched above the carpark established a numerical figure close on 6,000 attendees, a third of whom were Indigenous. Extra teenagers arrived in time for Baker Boy’s evening performance (Williams), revealing the typical youthful audience composition associated with the hip-hop craze (Image 5).Image 4: Bermagui Resident Gabadoo Performs Hip-Hop at the Giiyong Festival. Image Credit: David Rogers for South East Arts, Reproduced Courtesy South East Arts.Image 5: A Youthful Audience Enjoys Baker Boy’s Giiyong Festival Performance. Image Credit: David Rogers for South East Arts, Reproduced Courtesy South East Arts.Wallaga Lake’s traditional Gulaga Dancers were joined by Bermagui’s Gadhu Dancers, Eden’s Duurunu Miru Dancers, and Narooma’s Djaadjawan Dancers. Sharon Mason founded Djaadjawan Dancers in 2015. Their cultural practice connects to the environment and Mingagia (Mother Earth). At their festival tent, dancers explained how they gather natural resources from Walbanja Country to hand-make traditional dance outfits, accessories, and craft. They collect nuts, seeds, and bark from the bush, body paint from ancient ochre pits, shells from beaches, and bird feathers from fresh roadkill. Duurunu Miru dancer/didjeriduist Nathan Lygon elaborates on the functions of the Far South East Coast dance performance tradition:Dance provides us with a platform, an opportunity to share our stories, our culture, and our way of being. It demonstrates a beautiful positivity—a feeling of connection, celebration, and inclusion. The community needs it. And our young people need a ‘space’ in which they can grow into the knowledge and practices of their culture. The festival also helped the wider community to learn more about these dimensions. (n.p.)While music and dance were at the heart of the festival, other traditional skills were included, for example the exhibitions mounted inside the Keeping Place featured a large number of visual artists. Traditional bush cooking took place near Lake Pambula, and yarn-ups, poetry, and readings were featured throughout the day. Cultural demonstrations in the Bunaan Ring (the Yuin name for a corroboree circle) included ‘Gum Leaf Playing.’ Robin Ryan explained how the Yuin’s use of cultural elements to entertain settlers (Cameron 79) led to the formation of the Wallaga Lake Gum Leaf Band. As the local custodian of this unique musical practice, Uncle Ossie performed items and conducted a workshop for numerous adults and children. Festival Feedback and Future PlanningThe Giiyong Festival gained huge Indigenous cultural capital. Feedback gleaned from artists, sponsors, supporters, volunteers, and audiences reflected on how—from the moment the day began—the spirit of so many performers and consumers gathered in one place took over. The festival’s success depended on its reception, for as Myers suggests: “It is the audience who create the response to performance and if the right chemistry is achieved the performers react and excel in their presentation” (59). The Bega District News, of 24 September 2018, described the “incredibly beautiful event” (n.p.), while Simpson enthused to the authors:I believe that the amount of people who came through the gates to attend the Giiyong Festival was a testament to the wider need and want for Aboriginal culture. Having almost double the population of Eden attend also highlights that this event was long overdue. (n.p.)Williams reported that the whole festival was “a giant exercise in the breaking down of walls. Some signed contracts for the first time, and all met their contracts professionally. National artists Baker Boy and No Fixed Address now keep in touch with us regularly” (Williams). Williams also expressed her delight that local artists are performing further afield this year, and that an awareness, recognition, and economic impact has been created for Jigamy, the Giiyong Festival, and Eden respectively:We believe that not only celebrating, but elevating these artists and Aboriginal culture, is one of the most important things South East Arts can do for the overall arts sector in the region. This work benefits artists, the economy and cultural tourism of the region. Most importantly it feeds our collective spirit, educates us, and creates a much richer place to live. (Giiyong Festival Report 1)Howarth received 150 responses to her post-event survey. All respondents felt welcome, included, and willing to attend another festival. One commented, “not even one piece of rubbish on the ground.” Vanessa Milton, ABC Open Producer for South East NSW, wrote: “Down to the tiniest detail it was so obvious that you understood the community, the audience, the performers and how to bring everyone together. What a coup to pull off this event, and what a gift to our region” (Giiyong Festival Report 4).The total running cost for the event was $257,533, including $209,606 in government grants from local, state, and federal agencies. Major donor Create NSW Regional Partnerships funded over $100,000, and State Aboriginal Affairs gave $6,000. Key corporate sponsors included Bendigo Bank, Snowy Hydro and Waterway Constructions, Local Land Services Bega, and the Eden Fisherman’s Club. Funding covered artists’ fees, staging, the hiring of toilets, and multiple generators, including delivery costs. South East Arts were satisfied with the funding amount: each time a new donation arrived they were able to invite more performers (Giiyong Festival Report 2; Gray; Williams). South East Arts now need to prove they have the leadership capacity, financial self-sufficiency, and material resources to produce another festival. They are planning 2020 will be similar to 2018, provided Twofold Aboriginal Corporation can provide extra support. Since South East Arts exists to service a wider area of NSW, they envisage that by 2024, they would hand over the festival to Twofold Aboriginal Corporation (Gray; Williams). Forthcoming festivals will not rotate around other venues because the Giiyong concept was developed Indigenously at Jigamy, and “Jigamy has the vibe” (Williams). Uncle Ossie insists that the Yuin-Monaro feel comfortable being connected to Country that once had a traditional campsite on the east side. Evaluation and ConclusionAlthough ostensibly intended for entertainment, large Aboriginal festivals significantly benefit the educational, political, and socio-economic landscape of contemporary Indigenous life. The cultural outpourings and dissemination of knowledges at the 2018 Giiyong Festival testified to the resilience of the Yuin-Monaro people. In contributing to the processes of Reconciliation and Recognition, the event privileged the performing arts as a peaceful—yet powerful truth-telling means—for dealing with the state. Performers representing the cultures of far-flung ancestral lands contributed to the reimagining of a First Nations people’s map representing hundreds of 'Countries.’It would be beneficial for the Far South East region to perpetuate the Giiyong Festival. It energised all those involved. But it took years of preparation and a vast network of cooperating people to create the feeling which made the 2018 festival unique. Uncle Ossie now sees aspects of the old sharing culture of his people springing back to life to mould the quality of life for families. Furthermore, the popular arts cultures are enhancing the quality of life for Eden youth. As the cross-sector efforts of stakeholders and volunteers so amply proved, a family-friendly, drug and alcohol-free event of the magnitude of the Giiyong Festival injects new growth into an Aboriginal arts industry designed for the future creative landscape of the whole South East region. AcknowledgementsMany thanks to Andrew Gray and Jasmin Williams for supplying a copy of the 2018 Giiyong Festival Report. We appreciated prompt responses to queries from Jasmin Williams, and from our editor Rachel Franks. We are humbly indebted to our two reviewers for their expert direction.ReferencesAustralian Government. Showcasing Creativity: Programming and Presenting First Nations Performing Arts. Australia Council for the Arts Report, 8 Mar. 2017. 20 May 2019 <https://tnn.org.au/2017/03/showcasing-creativity-programming-and-presenting-first-nations-performing-arts-australia-council/>.Bartleet, Brydie-Leigh. “‘Pride in Self, Pride in Community, Pride in Culture’: The Role of Stylin’ Up in Fostering Indigenous Community and Identity.” The Festivalization of Culture. Eds. Andy Bennett, Jodie Taylor, and Ian Woodward. New York: Routledge, 2014.Becker, Howard S. Art Worlds. 25th anniversary edition. Berkeley: U of California P, 2008.Brown, Bill. “The Monaroo Bubberer [Bobberer] Gudu Keeping Place: A Symbol of Aboriginal Self-determination.” ABC South East NSW, 9 Jul. 2015. 20 May 2019 <http://www.abc.net.au/local/photos/2015/07/09/4270480.htm>.Cameron, Stuart. "An Investigation of the History of the Aborigines of the Far South Coast of NSW in the 19th Century." PhD Thesis. Canberra: Australian National U, 1987. Desert Pea Media. The Black Ducks “People of the Mountains and the Sea.” <https://www.youtube.com/watch?v=8fbJNHAdbkg>.“Festival Fanfare.” Eden Magnet 28 June 2018. 1 Mar. 2019 <edenmagnet.com.au>.Gibson, Chris, and John Connell. Music Festivals and Regional Development in Australia. Aldershot: Ashgate, 2012.Gray, Andrew. Personal Communication, 28 Mar. 2019.Henry, Rosita. “Festivals.” The Oxford Companion to Aboriginal Art and Culture. Eds. Syvia Kleinert and Margot Neale. South Melbourne: Oxford UP, 586–87.Horton, David R. “Yuin.” Encyclopaedia of Aboriginal Australia. Ed. David R. Horton. Canberra: Aboriginal Studies Press, 1994.———. Aboriginal Australia Wall Map Compiled by David Horton. Aboriginal Studies Press, 1996.Lygon, Nathan. Personal Communication, 20 May 2019.Mathews, Janet. Albert Thomas Mentions the Leaf Bands That Used to Play in the Old Days. Cassette recorded at Wreck Bay, NSW on 9 July 1964 for the Australian Institute of Aboriginal and Torres Strait Islanders (AIATSIS). LAA1013. McKnight, Albert. “Giiyong Festival the First of Its Kind in Yuin Nation.” Bega District News 17 Sep. 2018. 1 Mar. 2019 <https://www.begadistrictnews.com.au/story/5649214/giiyong-festival-the-first-of-its-kind-in-yuin-nation/?cs=7523#slide=2>. ———. “Giiyong Festival Celebrates Diverse, Enduring Cultures.” Bega District News 24 Sep. 2018. 1 Mar. 2019 <https://www.begadistrictnews.com.au/story/5662590/giiyong-festival-celebrates-diverse-enduring-cultures-photos-videos/>.Myers, Doug. “The Fifth Festival of Pacific Arts.” Australian Aboriginal Studies 1 (1989): 59–62.Simpson, Alison. Personal Communication, 9 Apr. 2019.Slater, Lisa. “Sovereign Bodies: Australian Indigenous Cultural Festivals and Flourishing Lifeworlds.” The Festivalization of Culture. Eds. Andy Bennett, Jodie Taylor, and Ian Woodward. London: Ashgate, 2014. 131–46.South East Arts. "Giiyong Festival Report." Bega: South East Arts, 2018.———. Giiyong Grow the Music. Poster for Event Produced on Saturday, 28 Oct. 2017. Bega: South East Arts, 2017.Williams, Jasmin. Personal Communication, 28 Mar. 2019.Young, Michael, with Ellen, and Debbie Mundy. The Aboriginal People of the Monaro: A Documentary History. Sydney: NSW National Parks and Wildlife Service, 2000.
APA, Harvard, Vancouver, ISO, and other styles
34

Felton, Emma. "Brisbane: Urban Construction, Suburban Dreaming." M/C Journal 14, no. 4 (August 22, 2011). http://dx.doi.org/10.5204/mcj.376.

Full text
Abstract:
When historian Graeme Davison famously declared that “Australia was born urban and quickly grew suburban” (98), he was clearly referring to Melbourne or Sydney, but certainly not Brisbane. Although the Brisbane of 2011 might resemble a contemporary, thriving metropolis, its genealogy is not an urban one. For most of its history, as Gillian Whitlock has noted, Brisbane was “a place where urban industrial society is kept at bay” (80). What distinguishes Brisbane from Australia’s larger southern capital cities is its rapid morphology into a city from a provincial, suburban, town. Indeed it is Brisbane’s distinctive regionalism, with its sub-tropical climate, offering a steamy, fecund backdrop to narratives of the city that has produced a plethora of writing in literary accounts of the city, from author David Malouf through to contemporary writers such as Andrew McGahan, John Birmingham, Venero Armanno, Susan Johnson, and Nick Earls. Brisbane’s lack of urban tradition makes its transformation unique among Australian cities. Its rapid population growth and urban development have changed the way that many people now live in the city. Unlike the larger cities of Sydney or Melbourne, whose inner cities were established on the Victorian model of terrace-row housing on small lots, Brisbane’s early planners eschewed this approach. So, one of the features that gives the city its distinction is the languorous suburban quality of its inner-city areas, where many house blocks are the size of the suburban quarter-acre block, all within coo-ee of the city centre. Other allotments are medium to small in size, and, until recently, housed single dwellings of varying sizes and grandeur. Add to this a sub-tropical climate in which ‘green and growth’ is abundant and the pretty but flimsy timber vernacular housing, and it’s easy to imagine that you might be many kilometres from a major metropolitan centre as you walk around Brisbane’s inner city areas. It is partly this feature that prompted demographer Bernard Salt to declare Brisbane “Australia’s most suburban city” (Salt 5). Prior to urban renewal in the early 1990s, Brisbane was a low-density town with very few apartment blocks; most people lived in standalone houses.From the inception of the first Urban Renewal program in 1992, a joint initiative of the Federal government’s Building Better Cities Program and managed by the Brisbane City Council (BCC), Brisbane’s urban development has undergone significant change. In particular, the city’s Central Business District (CBD) and inner city have experienced intense development and densification with a sharp rise in medium- to high-density apartment dwellings to accommodate the city’s swelling population. Population growth has added to the demand for increased density, and from the period 1995–2006 Brisbane was Australia’s fastest growing city (ABS).Today, parts of Brisbane’s inner city resembles the density of the larger cities of Melbourne and Sydney. Apartment blocks have mushroomed along the riverfront and throughout inner and middle ring suburbs. Brisbane’s population has enthusiastically embraced apartment living, with “empty nesters” leaving their suburban family homes for the city, and apartments have become the affordable option for renters and first home purchasers. A significant increase in urban amenities such as large-scale parklands and river side boardwalks, and a growth in service industries such as cafes, restaurants and bars—a feature of cities the world over—have contributed to the appeal of the city and the changing way that people live in Brisbane.Urbanism demands specific techniques of living—life is different in medium- to high-density dwellings, in populous places, where people live in close proximity to one another. In many ways it’s the antithesis to suburban life, a way of living that, as Davison notes, was established around an ethos of privacy, health, and seclusion and is exemplified in the gated communities seen in the suburbs today. The suburbs are characterised by generosity of space and land, and developed as a refuge and escape from the city, a legacy of the nineteenth-century industrial city’s connection with overcrowding, disease, and disorder. Suburban living flourished in Australia from the eighteenth century and Davison notes how, when Governor Phillip drew up the first town plan for Sydney in 1789, it embodied the aspirations of “decency, good order, health and domestic privacy,” which lie at the heart of suburban ideals (100).The health and moral impetus underpinning the establishment of suburban life—that is, to remove people from overcrowding and the unhygienic conditions of slums—for Davison meant that the suburban ethos was based on a “logic of avoidance” (110). Attempting to banish anything deemed dangerous and offensive, the suburbs were seen to offer a more natural, orderly, and healthy environment. A virtuous and happy life required plenty of room—thus, a garden and the expectation of privacy was paramount.The suburbs as a site of lived experience and cultural meaning is significant for understanding the shift from suburban living to the adoption of medium- to high-density inner-city living in Brisbane. I suggest that the ways in which this shift is captured discursively, particularly in promotional material, are indicative of the suburbs' stronghold on the collective imagination. Reinforcing this perception of Brisbane as a suburban city is a history of literary narratives that have cast Brisbane in ways that set it apart from other Australian cities, and that are to do with its non-urban characteristics. Imaginative and symbolic discourses of place have real and material consequences (Lefebvre), as advertisers are only too well aware. Discursively, city life has been imagined oppositionally from life in the suburbs: the two sites embody different cultural meanings and values. In Australia, the suburbs are frequently a site of derision and satire, characterized as bastions of conformity and materialism (Horne), offering little of value in contrast to the city’s many enchantments and diverse pleasures. In the well-established tradition of satire, “suburban bashing is replete in literature, film and popular culture” (Felton et al xx). From Barry Humphries’s characterisation of Dame Edna Everage, housewife superstar, who first appeared in the 1960s, to the recent television comedy series Kath and Kim, suburbia and its inhabitants are represented as dull-witted, obsessed with trivia, and unworldly. This article does not intend to rehearse the tradition of suburban lampooning; rather, it seeks to illustrate how ideas about suburban living are hard held and how the suburban ethos maintains its grip, particularly in relation to notions of privacy and peace, despite the celebratory discourse around the emerging forms of urbanism in Brisbane.As Brisbane morphed rapidly from a provincial, suburban town to a metropolis throughout the 1990s and early 2000s, a set of metropolitan discourses developed in the local media that presented new ways of inhabiting and imagining the city and offered new affiliations and identifications with the city. In establishing Brisbane’s distinction as a city, marketing material relied heavily on the opposition between the city and the suburbs, implying that urban vitality and diversity rules triumphant over the suburbs’ apparent dullness and homogeneity. In a billboard advertisement for apartments in the urban renewal area of Newstead (2004), images of architectural renderings of the apartments were anchored by the words—“Urban living NOT suburban”—leaving little room for doubt. It is not the design qualities of the apartments or the building itself being promoted here, but a way of life that alludes to utopian ideas of urban life, of enchantment with the city, and implies, with the heavy emphasis of “NOT suburban,” the inferiority of suburban living.The cultural commodification of the late twentieth- and twenty-first-century city has been well documented (Evans; Dear; Zukin; Harvey) and its symbolic value as a commodity is expressed in marketing literature via familiar metropolitan tropes that are frequently amorphous and international. The malleability of such images makes them easily transportable and transposable, and they provided a useful stockpile for promoting a city such as Brisbane that lacked its own urban resources with which to construct a new identity. In the early days of urban renewal, the iconic images and references to powerhouse cities such as New York, London, and even Venice were heavily relied upon. In the latter example, an advertisement promoting Brisbane appeared in the Sydney Morning Herald colour magazine (May 2005). This advertisement represented Brisbane as an antipodean Venice, showing a large reach of the Brisbane river replete with gondolas flanked by the city’s only nineteenth-century riverside building, the Custom’s House. The allusion to traditional European culture is a departure from the usual tropes of “fun and sun” associated with promotions of Queensland, including Brisbane, while the new approach to promoting Brisbane is cognizant of the value of culture in the symbolic and economic hierarchy of the contemporary city. Perhaps equally, the advertisement could be read as ironic, a postmodern self-parodying statement about the city in general. In a nod to the centrality of the spectacle, the advertisement might be a salute to idea of the city as theme park, a pleasure playground and a collective fantasy of escape. Nonetheless, either interpretation presents Brisbane as somewhere else.In other promotional literature for apartment dwellings, suburban living maintains its imaginative grip, evident in a brochure advertising Petrie Point apartments in Brisbane’s urban renewal area of inner-city New Farm (2000). In the brochure, the promise of peace and calm—ideals that have their basis in suburban living—are imposed and promoted as a feature of inner-city living. Paradoxically, while suggesting that a wholesale evacuation and rejection of suburban life is occurring presumably because it is dull, the brochure simultaneously upholds the values of suburbia:Discerning baby boomers and generation X’ers who prefer lounging over latte rather than mowing the quarter acre block, are abandoning suburban living in droves. Instead, hankering after a more cosmopolitan lifestyle without the mind numbing drive to work, they are retreating to the residential mecca, the inner city, for chic shops and a lively dining, arts and theatre culture. (my italics)In the above extract, the rhetoric used to promote and uphold the virtues of a cosmopolitan inner-city life is sabotaged by a language that in many respects capitulates to the ideals of suburban living, and evokes the health and retreat ethos of suburbia. “Lounging” over lattes and “retreating to a residential mecca”[i] allude to precisely the type of suburban living the brochure purports to eschew. Privacy, relaxation, and health is a discourse and, more importantly, a way of living that is in many ways anathema to life in the city. It is a dream-wish that those features most valued about suburban life, can and should somehow be transplanted to the city. In its promotion of urban amenity, the brochure draws upon a somewhat bourgeois collection of cultural amenities and activities such as a (presumably traditional) arts and theatre culture, “lively dining,” and “chic” shops. The appeal to “discerning baby boomers and generation X’ers” has more than a whiff of status and class, an appeal that disavows the contemporary city’s attention to diversity and inclusivity, and frequently the source of promotion of many international cities. In contrast to the suburban sub-text of exclusivity and seclusion in the Petrie Point Apartment’s brochure, is a promotion of Sydney’s inner-city Newtown as a tourist site and spectacle, which makes an appeal to suburban antipathy clear from the outset. The brochure, distributed by NSW Tourism (2000) displays a strong emphasis on Newtown’s cultural and ethnic diversity, and the various forms of cultural consumption on offer. The inner-city suburb’s appeal is based on its re-framing as a site of tourist consumption of diversity and difference in which diversity is central to its performance as a tourist site. It relies on the distinction between “ordinary” suburbs and “cosmopolitan” places:Some cities are cursed with suburbs, but Sydney’s blessed with Newtown — a cosmopolitan neighbourhood of more than 600 stores, 70 restaurants, 42 cafes, theatres, pubs, and entertainment venues, all trading in two streets whose origins lie in the nineteenth century … Newtown is the Catwalk for those with more style than money … a parade where Yves St Laurent meets Saint Vincent de Paul, where Milano meets post-punk bohemia, where Max Mara meets Doc Marten, a stage where a petticoat is more likely to be your grandma’s than a Colette Dinnigan designer original (From Sydney Marketing brochure)Its opening oppositional gambit—“some cities are cursed with suburbs”—conveniently elides the fact that like all Australian cities, Sydney is largely suburban and many of Sydney’s suburbs are more ethnically diverse than its inner-city areas. Cabramatta, Fairfield, and most other suburbs have characteristically high numbers of ethnic groups such as Vietnamese, Korean, Lebanese, and so forth. Recent events, however, have helped to reframe these places as problem areas, rather than epicentres of diversity.The mingling of social groups invites the tourist-flâneur to a performance of difference, “a parade where Yves St Laurent meets Saint Vincent de Paul (my italics), where Milano meets post-punk bohemia,” and where “the upwardly mobile and down at heel” appear in what is presented as something of a theatrical extravaganza. Newtown is a product, its diversity a commodity. Consumed visually and corporeally via its divergent sights, sounds, smells and tastes (the brochure goes on to state that 70 restaurants offer cuisine from all over the globe), Newtown is a “successful neighbourhood experiment in the new globalism.” The area’s social inequities—which are implicit in the text, referred to as the “down at heel”—are vanquished and celebrated, incorporated into the rhetoric of difference.Brisbane’s lack of urban tradition and culture, as well as its lack of diversity in comparison to Sydney, reveals itself in the first brochure while the Newtown brochure appeals to the idea of a consumer-based cosmopolitanism. As a sociological concept, cosmopolitanism refers to a set of "subjective attitudes, outlooks and practices" broadly characterized as “disposition of openness towards others, people, things and experiences whose origin is non local” (Skrbis and Woodward 1). Clearly cosmopolitan attitudes do not have to be geographically located, but frequently the city is promoted as the site of these values, with the suburbs, apparently, forever looking inward.In the realm of marketing, appeals to the imagination are ubiquitous, but discursive practices can become embedded in everyday life. Despite the growth of urbanism, the increasing take up of metropolitan life and the enduring disdain among some for the suburbs, the hard-held suburban values of peace and privacy have pragmatic implications for the ways in which those values are embedded in people’s expectations of life in the inner city.The exponential growth in apartment living in Brisbane offers different ways of living to the suburban house. For a sub-tropical city where "life on the verandah" is a significant feature of the Queenslander house with its front and exterior verandahs, in the suburbs, a reasonable degree of privacy is assured. Much of Brisbane’s vernacular and contemporary housing is sensitive to this indoor-outdoor style of living, a distinct feature and appeal of everyday life in many suburbs. When "life on the verandah" is adapted to inner-city apartment buildings, expectations that indoor-outdoor living can be maintained in the same way can be problematic. In the inner city, life on the verandah may challenge expectations about privacy, noise and visual elements. While the Brisbane City Plan 2000 attempts to deal with privacy issues by mandating privacy screenings on verandahs, and the side screening of windows to prevent overlooking neighbours, there is ample evidence that attitudinal change is difficult. The exchange of a suburban lifestyle for an urban one, with the exposure to urbanity’s complexity, potential chaos and noise, can be confronting. In the Urban Renewal area and entertainment precinct of Fortitude Valley, during the late 1990s, several newly arrived residents mounted a vigorous campaign to the Brisbane City Council (BCC) and State government to have noise levels reduced from local nightclubs and bars. Fortitude Valley—the Valley, as it is known locally—had long been Brisbane’s main area for nightclubs, bars and brothels. A small precinct bounded by two major one-way roads, it was the locus of the infamous ABC 4 Corners “Moonlight State” report, which exposed the lines of corruption between politicians, police, and the judiciary of the former Bjelke-Petersen government (1974–1987) and who met in the Valley’s bars and brothels. The Valley was notorious for Brisbanites as the only place in a provincial, suburban town that resembled the seedy side of life associated with big cities. The BCC’s Urban Renewal Task Force and associated developers initially had a tough task convincing people that the area had been transformed. But as more amenity was established, and old buildings were converted to warehouse-style living in the pattern of gentrification the world over, people started moving in to the area from the suburbs and interstate (Felton). One of the resident campaigners against noise had purchased an apartment in the Sun Building, a former newspaper house and in which one of the apartment walls directly abutted the adjoining and popular nightclub, The Press Club. The Valley’s location as a music venue was supported by the BCC, who initially responded to residents’ noise complaints with its “loud and proud” campaign (Valley Metro). The focus of the campaign was to alert people moving into the newly converted apartments in the Valley to the existing use of the neighbourhood by musicians and music clubs. In another iteration of this campaign, the BCC worked with owners of music venues to ensure the area remains a viable music precinct while implementing restrictions on noise levels. Residents who objected to nightclub noise clearly failed to consider the impact of moving into an area that was already well known, even a decade ago, as the city’s premier precinct for music and entertainment venues. Since that time, the Valley has become Australia’s only regulated and promoted music precinct.The shift from suburban to urban living requires people to live in very different ways. Thrust into close proximity with strangers amongst a diverse population, residents can be confronted with a myriad of sensory inputs—to a cacophony of noise, sights, smells (Allon and Anderson). Expectations of order, retreat, and privacy inevitably come into conflict with urbanism’s inherent messiness. The contested nature of urban space is expressed in neighbour disputes, complaints about noise and visual amenity, and sometimes in eruptions of street violence. There is no shortage of examples in the Brisbane’s Urban Renewal areas such as Fortitude Valley, where acts of homophobia, racism, and other less destructive conflicts continue to be a frequent occurrence. While the refashioned discursive Brisbane is re-presented as cool, cultured, and creative, the tensions of urbanism and tests to civility remain in a process of constant negotiation. This is the way the city’s past disrupts and resists its cool new surface.[i] The use of the word mecca in the brochure occurred prior to 11 September 2001.ReferencesAllon, Fiona, and Kay Anderson. "Sentient Sydney." In Passionate City: An International Symposium. Melbourne: RMIT, School of Media Communication, 2004. 89–97.Australian Bureau of Statistics (ABS). Regional Population Growth, Australia, 1996-2006.Birmingham, John. "The Lost City of Vegas: David Malouf’s Old Brisbane." Hot Iron Corrugated Sky. Ed. R. Sheahan-Bright and S. Glover. St Lucia: U of Queensland P, 2002. xx–xx.Davison, Graeme. "The Past and Future of the Australian Suburb." Suburban Dreaming: An Interdisciplinary Approach to Australian Cities. Ed. L. Johnson. Geelong: Deakin University Press, 1994. xx–xx.Dear, Michael. The Postmodern Urban Condition. Oxford: Blackwell, 2000.Evans, Graeme. “Hard-Branding the Cultural City—From Prado to Prada.” International Journal of Urban and Regional Research 27.2 (2003): 417–40.Evans, Raymond, and Carole Ferrier, eds. Radical Brisbane. Melbourne: The Vulgar Press, 2004.Felton, Emma, Christy Collis, and Phil Graham. “Making Connections: Creative Industries Networks in Outer Urban Locations.” Australian Geographer 14.1 (Mar. 2010): 57–70.Felton, Emma. Emerging Urbanism: A Social and Cultural Study of Urban Change in Brisbane. PhD thesis. Brisbane: Griffith University, 2007.Glover, Stuart, and Stuart Cunningham. "The New Brisbane." Artlink 23.2 (2003): 16–23. Harvey, David. The Condition of Postmodernity: An Enquiry into the Origins of Cultural Change. Cambridge, MA: Blackwell, 1990. Horne, Donald. The Lucky Country: Australia in the Sixties. Ringwood: Penguin, 1964.Lefebvre, Henri. The Production of Space. Oxford: Basil Blackwell, 1991.Malouf, David. Johnno. St Lucia: University of Queensland Press, 1975. ---. 12 Edmondstone Street. London: Penguin, 1986.NSW Tourism. Sydney City 2000. Sydney, 2000.Salt, Bernard. Cinderella City: A Vision of Brisbane’s Rise to Prominence. Sydney: Austcorp, 2005.Skrbis, Zlatko, and Ian Woodward. “The Ambivalence of Ordinary Cosmopolitanism: Investigating the Limits of Cosmopolitanism Openness.” Sociological Review (2007): 1-14.Valley Metro. 1 May 2011 < http://www.valleymetro.com.au/the_valley.aspx >.Whitlock, Gillian. “Queensland: The State of the Art on the 'Last Frontier.’" Westerly 29.2 (1984): 85–90.Zukin, Sharon. The Culture of Cities. Cambridge, MA: Basil Blackwell, 1995.
APA, Harvard, Vancouver, ISO, and other styles
35

Piatti-Farnell, Lorna, and Erin Mercer. "Gothic: New Directions in Media and Popular Culture." M/C Journal 17, no. 4 (August 20, 2014). http://dx.doi.org/10.5204/mcj.880.

Full text
Abstract:
In a field of study as well-established as the Gothic, it is surprising how much contention there is over precisely what that term refers to. Is Gothic a genre, for example, or a mode? Should it be only applicable to literary and film texts that deal with tropes of haunting and trauma set in a gloomy atmosphere, or might it meaningfully be applied to other cultural forms of production, such as music or animation? Can television shows aimed at children be considered Gothic? What about food? When is something “Gothic” and when is it “horror”? Is there even a difference? The Gothic as a phenomenon is commonly identified as beginning with Horace Walpole’s novel The Castle of Otranto (1764), which was followed by Clara Reeve’s The Old English Baron (1778), the romances of Ann Radcliffe and Matthew Lewis’ The Monk (1796). Nineteenth-century Gothic literature was characterised by “penny dreadfuls” and novels such as Mary Shelley’s Frankenstein (1818) and Bram Stoker’s Dracula (1897). Frequently dismissed as sensational and escapist, the Gothic has experienced a critical revival in recent decades, beginning with the feminist revisionism of the 1970s by critics such as Ellen Moers, Sandra M. Gilbert and Susan Gubar. With the appearance of studies such as David Punter’s The Literature of Terror (1980), Gothic literature became a reputable field of scholarly research, with critics identifying suburban Gothic, imperial Gothic, postcolonial Gothic and numerous national Gothics, including Irish Gothic and the Gothic of the American South. Furthermore, as this special edition on Gothic shows, the Gothic is by no means limited to literature, with film, television, animation and music all partaking of the Gothic inflection. Indeed, it would be unwise to negate the ways in which the Gothic has developed to find fertile ground beyond the bounds of literature. In our media-centred twenty-first century, the Gothic has colonised different forms of expression, where the impact left by literary works, that were historically the centre of the Gothic itself, is all but a legacy. Film, in particular, has a close connection to the Gothic, where the works of, for instance, Tim Burton, have shown the representative potential of the Gothic mode; the visual medium of film, of course, has a certain experiential immediacy that marries successfully with the dark aesthetics of the Gothic, and its connections to representing cultural anxieties and desires (Botting). The analysis of Gothic cinema, in its various and extremely international incarnations, has now established itself as a distinct area of academic research, where prominent Gothic scholars such as Ken Gelder—with the recent publication of his New Vampire Cinema (2012)—continue to lead the way to advance Gothic scholarship outside of the traditional bounds of the literary.As far as cinema is concerned, one cannot negate the interconnections, both aesthetic and conceptual, between traditional Gothic representation and horror. Jerrold Hogle has clearly identified the mutation and transformation of the Gothic from a narrative solely based on “terror”, to one that incorporates elements of “horror” (Hogle 3). While the separation between the two has a long-standing history—and there is no denying that both the aesthetics and the politics of horror and the Gothic can be fundamentally different—one has to be attuned to the fact that, in our contemporary moment, the two often tend to merge and intersect, often forming hybrid visions of the Gothic, with cinematic examples such as Guillermo Del Toro’s Pan’s Labyrinth (2006) playing testament to this. Indeed, the newly formed representations of “Gothic Horror” and “Gothic Terror” alerts us to the mutable and malleable nature of the Gothic itself, an adaptable mode that is always contextually based. Film is not, however, the only non-literary medium that has incorporated elements of the Gothic over the years. Other visual representations of the Gothic abound in the worlds of television, animation, comics and graphic novels. One must only think here of the multiple examples of recent television series that have found fruitful connections with both the psychologically haunting aspects of Gothic terror, and the gory and grisly visual evocations of Gothic horror: the list is long and diverse, and includes Dexter (2006-2013), Hannibal (2013-), and Penny Dreadful (2014-), to mention but a few. The animation front —in its multiple in carnations —has similarly been entangled with Gothic tropes and concerns, a valid interconnection that is visible both in cinematic and television examples, from The Corpse Bride (2005) to Coraline (2009) and Frankenweeinie (2012). Comics and graphics also have a long-standing tradition of exploiting the dark aesthetics of the Gothic mode, and its sensationalist connections to horror; the instances from this list pervade the contemporary media scope, and feature the inclusion of Gothicised ambiences and characters in both singular graphic novels and continuous comics —such as the famous Arkham Asylum (1989) in the ever-popular Batman franchise. The inclusion of these multi-media examples here is only representative, and it is an almost prosaic accent in a list of Gothicised media that extends to great bounds, and also includes the worlds of games and music. The scholarship, for its part, has not failed to pick up on the transformations and metamorphoses that the Gothic mode has undergone in recent years. The place of both Gothic horror and Gothic terror in a multi-media context has been critically evaluated in detail, and continues to attract academic attention, as the development of the multi-genre and multi-medium journey of the Gothic unfolds. Indeed, this emphasis is now so widespread that a certain canonicity has developed for the study of the Gothic in media such as television, extending the reach of Gothic Studies into the wider popular culture scope. Critical texts that have recently focused on identifying the Gothic in media beyond not only literature, but also film, include Helen Wheatley’s Gothic Television (2007), John C. Tibbetts’ The Gothic Imagination: Conversation of Fantasy, Horror, and Science Fiction in the Media (2011), and Julia Round’s Gothic in Comics and Graphic Novels (2014). Critics often suggest that the Gothic returns at moments of particular cultural crisis, and if this is true, it seems as if we are in such a moment ourselves. Popular television shows such as True Blood and The Walking Dead, books such as the Twilight series, and the death-obsessed musical stylings of Lana Del Ray all point to the pertinence of the Gothic in contemporary culture, as does the amount of submissions received for this edition of M/C Journal, which explore a wide range of Gothic texts. Timothy Jones’ featured essay “The Black Mass as Play: Dennis Wheatley’s The Devil Rides Out” suggests that although scholarly approaches to the Gothic tend to adopt the methodologies used to approach literary texts and applied them to Gothic texts, yielding readings that are more-or-less congruous with readings of other sorts of literature, the Gothic can be considered as something that tells us about more than simply ourselves and the world we live in. For Jones, the fact that the Gothic is a production of popular culture as much as “highbrow” literature suggests there is something else happening with the way popular Gothic texts function. What if, Jones asks, the popular Gothic were not a type of work, but a kind of play? Jones uses this approach to suggest that texts such as Wheatley’s The Devil Rides Out might direct readers not primarily towards the real, but away from it, at least for a time. Wheatley’s novel is explored by Jones as a venue for readerly play, apart from the more substantial and “serious” concerns that occupy most literary criticism. Samantha Jane Lindop’s essay foregrounds the debt David Lynch’s film Mulholland Drive owes to J. Sheridan le Fanu’s Carmilla (1872) thus adding to studies of the film that have noted Lynch’s intertextual references to classic cinema such as Billy Wilder’s Sunset Boulevard (1950), Alfred Hitchcock’s Vertigo (1958) and Ingmar Bergman’s Persona (1966). Lindop explores not just the striking similarity between Carmilla and Mulholland Drive in terms of character and plot, but also the way that each text is profoundly concerned with the uncanny. Lorna Piatti-Farnell’s contribution, “What’s Hidden in Gravity Falls: Strange Creatures and the Gothic Intertext” is similarly interested in the intertextuality of the Gothic mode, noting that since its inception this has taken many and varied incarnations, from simple references and allusions to more complicated uses of style and plot organisation. Piatti-Farnell suggests it is unwise to reduce the Gothic text to a simple master narrative, but that within its re-elaborations and re-interpretations, interconnections do appear, forming “the Gothic intertext”. While the Gothic has traditionally found fertile ground in works of literature, other contemporary media, such as animation, have offered the Gothic an opportunity for growth and adaptation. Alex Hirsch’s Gravity Falls is explored by Piatti-Farnell as a visual text providing an example of intersecting monstrous creatures and interconnected narrative structures that reveal the presence of a dense and intertextual Gothic network. Those interlacings are connected to the wider cultural framework and occupy an important part in unravelling the insidious aspects of human nature, from the difficulties of finding “oneself” to the loneliness of the everyday. Issues relating to identity also feature in Patrick Usmar’s “Born To Die: Lana Del Rey, Beauty Queen or Gothic Princess?”, which further highlights the presence of the Gothic in a wide range of contemporary media forms. Usmar explores the music videos of Del Rey, which he describes as Pop Gothic, and that advance themes of consumer culture, gender identity, sexuality and the male gaze. Jen Craig’s “The Agitated Shell: Thinspiration and the Gothic Experience of Eating Disorders” similarly focuses on contemporary media and gender identity, problematising these issues by exploring the highly charged topic of “thinspiration” web sites. Hannah Irwin’s contribution also focuses on female experience. “Not of this earth: Jack the Ripper and the development of Gothic Whitechapel” focuses on the murder of five women who were the victims of an assailant commonly referred to by the epithet “Jack the Ripper”. Irwin discusses how Whitechapel developed as a Gothic location through the body of literature devoted to the Whitechapel murders of 1888, known as “Ripperature”. The subject of the Gothic space is also taken up by Donna Brien’s “Forging Continuing Bonds from the Dead to the Living: Gothic Commemorative Practices along Australia’s Leichhardt Highway.” This essay explores the memorials along Leichhardt’s highway as Gothic practice, in order to illuminate some of the uncanny paradoxes around public memorials, as well as the loaded emotional terrain such commemorative practices may inhabit. Furthering our understanding of the Australian Gothic is Patrick West’s contribution “Towards a Politics & Art of the Land: Gothic Cinema of the Australian New Wave and its Reception by American Film Critics.” West argues that many films of the Australian New Wave of the 1970s and 1980s can be defined as Gothic and that international reviews of such films tended to overlook the importance of the Australian landscape, which functions less as a backdrop and more as a participating element, even a character, in the drama, saturating the mise-en-scène. Bruno Starrs’ “Writing My Indigenous Vampires: Aboriginal Gothic or Aboriginal Fantastic” is dedicated to illuminating a new genre of creative writing: that of the “Aboriginal Fantastic”. Starrs’ novel That Blackfella Bloodsucka Dance! is part of this emerging genre of writing that is worthy of further academic interrogation. Similarly concerned with the supernatural, Erin Mercer’s contribution “‘A Deluge of Shrieking Unreason’: Supernaturalism and Settlement in New Zealand Gothic Fiction” explores the absence of ghosts and vampires in contemporary Gothic produced in New Zealand, arguing that this is largely a result of a colonial Gothic tradition utilising Maori ghosts that complicates the processes through which contemporary writers might build on that tradition. Although there is no reason why the Gothic must include supernatural elements, it is an enduring feature that is taken up by Jessica Balanzategui in “‘You Have a Secret that You Don’t Want To Tell Me’: The Child as Trauma in Spanish and American Horror Film.” This essay explores the uncanny child character and how such children act as an embodiment of trauma. Sarah Baker’s “The Walking Dead and Gothic Excess: The Decaying Social Structures of Contagion” focuses on the figure of the zombie as it appears in the television show The Walking Dead, which Baker argues is a way of exploring themes of decay, particularly of family and society. The essays contained in this special Gothic edition of M/C Journal highlight the continuing importance of the Gothic mode in contemporary culture and how that mode is constantly evolving into new forms and manifestations. The multi-faceted nature of the Gothic in our contemporary popular culture moment is accurately signalled by the various media on which the essays focus, from television to literature, animation, music, and film. The place occupied by the Gothic beyond representational forms, and into the realms of cultural practice, is also signalled, an important shift within the bounds of Gothic Studies which is bound to initiate fascinating debates. The transformations of the Gothic in media and culture are, therefore, also surveyed, so to continue the ongoing critical conversation on not only the place of the Gothic in contemporary narratives, but also its duplicitous, malleable, and often slippery nature. It is our hope that the essays here stimulate further discussion about the Gothic and we will hope, and look forward, to hearing from you. References Botting, Fred. Gothic: The New Critical Idiom. 2nd edition. Abingdon, UK: Routledge, 2014. Hogle, Jerrold. “Introduction: The Gothic in Western Culture”. The Cambridge Companion of Gothic Fiction, ed. Jerrold Hogle. Cambridge: Cambridge University Press, 2002. 1-20.
APA, Harvard, Vancouver, ISO, and other styles
36

Rizzo, Sergio. "Adaptation and the Art of Survival." M/C Journal 10, no. 2 (May 1, 2007). http://dx.doi.org/10.5204/mcj.2623.

Full text
Abstract:
To use the overworked metaphor of the movie reviewers, Adaptation (2002)—directed by Spike Jonze and written by Charlie Kaufman—is that rare Hollywood flower, a “literary” film that succeeds both with the critics and at the box office. But Kaufman’s literary colleagues, his fellow screenwriters whose opinions are rarely noticed by movie reviewers or the public, express their support in more interesting terms. Robert McKee, the real-life screenwriter and teacher played by Brian Cox in the movie, writes about Kaufman as one of the few to “step out of screenwriting anonymity to gain national recognition as an artist—without becoming a director” (131). And the screenwriter Stephen Schiff (Lolita [Adrian Lyne, 1997], The Deep End of the Ocean [Ulu Grosbard, 1999]) embraces the film as a manifesto, claiming that Kaufman’s work offers “redemption” to him and his fellow screenwriters who are “struggling to adapt to the world’s dismissive view of adaptation.” The comments by Kaufman’s colleagues suggest that new respect for the work of adaptation, and the role of the screenwriter go hand in hand. The director—whom auteur theory, the New Wave, and film schools helped to establish as the primary creative agent behind a film—has long overshadowed the screenwriter, but Kaufman’s acclaim as a screenwriter reflects a new sensibility. This was illustrated by the controversy among Academy Award voters in 2002. They found that year’s nominees, including Adaptation, unsettled the Academy’s traditional distinction between “original screenplay” and “adapted screenplay”, debating whether a nominee for best original screenplay, such as My Big Fat Greek Wedding (Joel Zwik, 2002), was more like an adaptation, while Adaptation, a nominee for best adapted screenplay, was more like an original screenplay. The Academy’s confusion on this score is not without precedents; nonetheless, as Rick Lyman of The New York Times reports, it led some to wonder, “in an age of narrative deconstruction and ‘reality television’,” whether the distinction between original and adaptation was still valid. If, as the famed critic Alexandre Astruc claimed, the director should be seen as someone who uses the camera as a pen to “write” the movie, then the screenwriter, in Ben Stoltzfus’s words, is increasingly seen as someone who uses the pen to “shoot” the movie. While this appreciation of the screenwriter as an “adaptor” who directs the movie opens new possibilities within Hollywood filmmaking, it also occurs in a Hollywood where TV shows, video games, and rides at Disneyland are adapted to film as readily as literary works once were. Granted, some stand to gain, but who or what is lost in this new hyper-adaptive environment? While there is much to be said for Kaufman’s movie, I suggest its optimistic account of adaptation—both as an existential principle and cinematic practice—is one-sided. Part of the dramatic impact of the movie’s one word title is the way it shoves the act of adaptation out from the wings and places it front and center in the filmmaking process. An amusing depiction of the screenwriter’s marginalisation occurs at the movie’s beginning, immediately following Charlie’s (Nicholas Cage) opening monologue delivered against a black screen. It is presented as a flashback to the making of Being John Malkovich (Spike Jonze, 1999), the movie for which Kaufman wrote his first screenplay, making him “a name” in Hollywood. Although scripted, the scene is shot with a hand-held video camera and looks as though it is occurring in real time. The central character is John Malkovich in costume as a woman who shouts orders at everyone on the set—deftly illustrating how the star’s power in the new Hollywood enables him or her to become “the director” of the movie. His directions are then followed by ones from the first assistant director and the cinematographer. Meanwhile, Charlie stands silently and awkwardly off to the side, until he is chased away by the first assistant director—not even the director or the cinematographer—who tells him, “You. You’re in the eyeline. Can you please get off the stage?” (Kaufman and Kaufman, 3). There are other references that make the movie’s one-word title evocative. It forces one to think about the biological and literary senses of the word—evolution as a narrative process and narrative as an evolutionary process—lifting the word’s more colloquial meaning of “getting along” to the level of an existential principle. Or, as Laroche (Chris Cooper) explains to Orlean (Meryl Streep), “Adaptation’s a profound process. It means you figure out how to thrive in the world” (Kaufman and Kaufman, 35). But Laroche’s definition of adaptation, which the movie endorses and dramatises, is only half the story. In fact evolutionary science shows that nature’s “losers” vastly outnumber nature’s “winners.” As Peter Bowler expresses it in his historical account of the theory of natural selection, “Evolution becomes a process of trial and error based on massive wastage and the death of vast numbers of unfit creatures”(6). Turning the “profound process” of adaptation into a story about the tiny fraction who “figure out how to thrive in the world” has been done before. It manifested itself in Herbert Spencer’s late-nineteenth-century philosophical “adaptation” of Charles Darwin’s work on natural selection, coining the phrase, “survival of the fittest.” Both the scientist Darwin and the philosopher Spencer, as Bowler points out, would have been horrified at how their work was used to justify the rapacious capitalism and harsh social policies of American industry (301). Nonetheless, although by now largely discredited in the academy, the ideology of social Darwinism persists within the broader culture in various watered-down or subterranean forms. Perhaps in the movie’s violent climax when Laroche is killed by an alligator—a creature that represents one of the more impressive examples of adaptation in the natural world—Kaufman is suggesting the darker side to the story of natural selection in which adaptation is not only a story about the mutable and agile orchid that “figure[s] out how to thrive in the world.” There are no guarantees for the tiny fraction of species that do survive, whether they are as perfectly adapted to their environment as orchids and alligators or, for that matter, individuals like Laroche with his uncanny ability to adapt to whatever life throws at him. But after the movie’s violent eruption, which does away not only with Laroche but also Donald (Nicholas Cage) and in effect Orlean, Charlie emerges as the sole survivor, reassuring the viewer that the story of adaptation is about nature’s winners. The darker side to the story of natural selection is subsumed within the movie’s layers of meta-commentary, which make the violence at the movie’s end an ironic device within Charlie’s personal and artistic evolution—a way for him to maintain a critical distance on the Hollywood conventions he has resisted while simultaneously incorporating them into his art. A cinematically effective montage dramatically represents the process of evolution. However, as with the movie’s one-sided account of adaptation, as a story about those who “figure out how to thrive in the world,” this depiction of evolution is framed, both figuratively and literally, by Charlie’s personal growth—as though the logical and inevitable endpoint of the evolutionary process is the human individual. The montage is instigated by Charlie’s questions to himself, “Why am I here? How did I get here?” and concludes with a close-up on the bawling face of a newborn baby, whom the viewer assumes is Charlie (Kaufman and Kaufman, 3). This assumption is reinforced by the next scene, which begins with a close-up on the face of the adult Charlie who is sweating profusely as he struggles to survive a business luncheon with the attractive studio executive Valerie (Tilda Swinton). Although Orlean’s novel doesn’t provide a feminist reading of Darwin, she does alert her readers to the fact that he was a Victorian man and, as such, his science might reflect the prejudices of his day. In discussing Darwin’s particular fondness for his “‘beloved Orchids’” (47), she recounts his experiments to determine how they release their pollen: “He experimented by poking them with needles, camel-hair brushes, bristles, pencils, and his fingers. He discovered that parts were so sensitive that they released pollen upon the slightest touch, but that ‘moderate degrees of violence’ on the less sensitive parts had no effect ….” (48). In contrast to this humorous view of Darwin as the historically situated man of science, the movie depicts Darwin (Bob Yerkes) as the stereotypical Man of Science. Kaufman does incorporate some of Orlean’s discussion of Darwin’s study of orchids, but the portion he uses advances the screenplay’s sexualisation/romanticisation of Orlean’s relationship with Laroche. At an orchid show, Laroche lectures to Orlean about Darwin’s theory that a particular orchid, Angraecum sesquipedale, is pollinated by a moth with a twelve-inch proboscis. When Orlean takes exception to Laroche for telling her that proboscis means “nose,” he chides her, “Hey, let’s not get off the subject. This isn’t a pissing contest” (23). After this scene bristling with phallic imagery—and with his female pupil sufficiently chastised—Laroche proceeds to wax poetic about pollination as a “little dance” (24) between flower and insect. “[The] only barometer you have is your heart …” (24) he tells Orlean, who is clearly impressed by the depth of his soliloquy. On the literary and social level, a one-sided reading of adaptation as a positive process may be more justified, although here too one may question what the movie slights or ignores. What about the human ability to adapt to murderous and dehumanising social systems: slavery, fascism, colonialism, and so on? Or, more immediately, even if one acknowledges the writer’s “maturity,” as T.S. Eliot famously phrased it, in “stealing” from his or her source, what about the element of compromise implicit in the concept of adaptation? Several critics question whether the film’s ending, despite the movie’s self-referential ironies, ultimately reinforces the Hollywood formulas it sets out to critique. But only Stuart Klawans of The Nation connects it to the movie’s optimistic, one-sided view of adaptation. “Still,” he concludes, “I’m disappointed by that crashing final act. I wonder about the environmental pressure that must bear down on today’s filmmakers as they struggle to adapt, even when they’re as prodigious as Charlie Kaufman.” Oddly, for a self-reflexive movie about the creative process, it has little to say about the “environmental pressure” of the studio system and its toll on the artist. There are incisive character sketches of studio types, such as the attractive and painfully earnest executive, Valerie, who hires Charlie to write the screenplay for Orlean’s book, or Charlie’s sophomoric agent, Marty (Ron Livingston), who daydreams about anal sex with the women in his office while talking to his client. And, of course, a central plot line of the movie is the competition, at least as one of them sees it, between Charlie and his twin brother Donald. Charlie, the self-conscious Hollywood screenwriter who is stymied by his success and notions of artistic integrity, suffers defeat after humiliating defeat as Donald, the screenwriting neophyte who will stoop to any cliché or cheap device to advance his screenplay, receives a six-figure contract for his first effort: a formulaic and absurd serial-killer movie, The Three, that their mother admires as a cross between Psycho (Alfred Hitchcock, 1960) and Silence of the Lambs (Jonathan Demme, 1991). Because of the emotional arc of the brothers’ personal relationship, however, any qualms about Donald selling out look churlish at best. When Donald excitedly tells his brother about his good fortune, Charlie responds approvingly, rather than with one of the snide putdowns the viewer has grown to expect from him, signaling not only Charlie’s acceptance of his brother but the new awareness that will enable him to overcome his writer’s block. While there is a good deal of satire directed at the filmmaking process—as distinct from the studio system—it is ultimately a cherishing sort of satire. It certainly doesn’t reach the level of indictment found in Robert Altman’s The Player (1992) or Joel and Ethan Cohen’s Barton Fink (1991) for example. But the movie most frequently compared to Adaptation is Frederico Fellini’s masterpiece of auteurist self-reflexivity, 8 ½ (1963). This is high praise indeed, although the enthusiastic endorsements of some film critics do not stop there. Writing for the Observer, Philip French cites such New Wave movies as Jean-Luc Godard’s Le Mepris (1963), Francois Truffaut’s La Nuit Americaine (1973), and Alain Robbe-Grillet’s Trans-Europ-Express (1966). However, in passing, he qualifies the comparison by pointing out that, unlike the French auteurs, “Kaufman and Jonze are concerned with turning someone else’s idea into a piece of commercial cinema.” Some would argue the filmmakers’ ability to playfully adapt Orlean’s artistry to the commercial environment of Hollywood is what saves Adaptation’s meta-commentary from the didactic and elitist seriousness of many of its literary and cinematic precursors (Miller). This is a valid preference, but it slights the “environmental pressure” of the new studio system and how it sets the terms for success and failure. While Fellini and the New Wave auteurs were not entirely free of commercial cinema, they could claim an opposition to it that Kaufman, even if he wanted to, cannot. Film scholar Timothy Corrigan argues that the convergence of the new media, in particular television and film, radically alters the meaning and function of “independent” cinema: a more flexible and varied distribution network has responded to contemporary audiences, who now have the need and the power to pick and choose among the glut of images in contemporary television and film culture. Within this climate and under these conditions, the different, the more peculiar, the controversial enter the marketplace not as an opposition but as a revision and invasion of an audience market defined as too large and diverse by the dominant blockbusters. (25-6) Corrigan’s argument explains the qualitative differences between the sense of adaptation employed by the older auteurs and the new sense of adaptation required by contemporary auteurs fully incorporated within the new studio system and its new distribution technologies. Not everyone is disturbed by this state of affairs. A. O. Scott, writing for the New York Times, notes a similar “two-tier system” in Hollywood—with studios producing lavish “critic- and audience-proof franchise pictures” on the one hand and “art” or “independent” movies on the other—which strikes him as “a pretty good arrangement.” Based on what Adaptation does and does not say about the studio system, one imagines that Kaufman would, ultimately, concur. In contrast, however, a comment by Michel Gondry, the director Kaufman worked with on Human Nature (2001), gives a better indication of the costs incurred by adapting to the current system when he expresses his frustration with the delayed release of the picture by New Line Cinema: ‘First they were, like, “O.K. if Rush Hour 2 [Brett Ratner, 2001] does good business, then we’re in a good position,”’ Mr. Gondry said. ‘You fight to do something original and then you depend on Rush Hour 2 for the success of your movie? It’s like you are the last little thing on the bottom of the scale and you’re looking up watching the planets colliding. It’s been so frustrating.’ (Rochlin) No doubt, when Fellini and Godard thought about doing “something original” they also had considerable obstacles to face. But at least the success of 8 ½ or Le Mepris wasn’t dependent upon the success of films like Rush Hour 2. Given this sort of environmental pressure, as Klawans and Corrigan remind us, we need to keep in mind what might be lost as the present system’s winners adapt to what is generally understood as “a pretty good arrangement.” Another indication of the environmental pressure on artists in Hollywood’s present arrangement comes from Adaptation’s own story of adaptation—not the one told by Kaufman or his movie, but the one found in Susan Orlean’s account of how she and her novel were “adapted” by the filmmakers. Although Orlean is an enthusiastic supporter of the movie, when she first read the screenplay, she thought, “the whole thing ‘seemed completely nuts’” and wondered whether she wanted “that much visibility” (Boxer). She decided to give her consent on the condition they not use her name. This solution, however, wouldn’t work because she didn’t want her book “in a movie with someone else’s name on it” (Boxer). Forced to choose between an uncomfortable visibility and the loss of authorship, she chose the former. Of course, her predicament is not Kaufman’s fault; nonetheless, it is important to stress that the process of adaptation did not enforce a similar “choice” upon him. Her situation, like that of Gondry, indicates that successful adaptation to any system is a story of losing as well as winning. References Astruc, Alexandre. “The Birth of a New Avant-Garde: Le Camera-Stylo.” Film and Literature: An Introduction and Reader. Ed. Timothy Corrigan. Saddle River, NJ: Prentice Hall, 1999, 158-62. Bowler, Peter J. Evolution: The History of an Idea. 3rd ed. Berkeley, CA: U of California P, 2003. Boxer, Sarah. “New Yorker Writer Turns Gun-Toting Floozy? That’s Showbiz.” The New York Times 9 Dec. 2002, sec. E. Corrigan, Timothy. A Cinema without Walls. New Brunswick, NJ: Rutgers UP, 1991. Eliot, T.S. “Philip Massinger.” The Sacred Wood: Essays on Poetry and Criticism. 1922. http://www.bartleby.com/> French, Philip. “The Towering Twins.” The Observer 2 Mar. 2003. Guardian Unlimited. 12 Feb. 2007. http://film.guardian.co.uk/News_Story/Critic_Review>. Kaufman, Charlie and Donald Kaufman. Adaptation: The Shooting Script. New York: Newmarket Press, 2002. Klawans, Stuart. “Adeptations.” The Nation 23 Dec. 2002. 12 Febr. 2007. http://www.thenation.com/doc/20021223/klawans>. Lyman, Rick. “A Jumble of Categories for Screenwriter Awards.” The New York Times 21 Feb. 2003. McKee, Robert. “Critical Commentary.” Adaptation: The Shooting Script. New York: Newmarket Press, 2002. 131-5. Miller, Laura. “This Is the Way We Live Now.” The New York Times Magazine 17 Nov. 2002. Orlean, Susan. The Orchid Thief. New York: Ballantine Books, 1998. Rochlin, Margy. “From an Untamed Mind Springs an Ape Man.” The New York Times 7 Apr. 2002. Schiff, Stephen. “All Right, You Try: Adaptation Isn’t Easy.” The New York Times 1 Dec. 2002. Scott, A. O. “As Requested My Thoughts on the Oscars.” The New York Times 9 Feb. 2003. Stoltzfus, Ben. “Shooting with the Pen.” Writing in a Film Age. Ed. Keith Cohen. Niwot, CO: UP of Colorado, 1991. 246-63. Citation reference for this article MLA Style Rizzo, Sergio. "Adaptation and the Art of Survival." M/C Journal 10.2 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0705/02-rizzo.php>. APA Style Rizzo, S. (May 2007) "Adaptation and the Art of Survival," M/C Journal, 10(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0705/02-rizzo.php>.
APA, Harvard, Vancouver, ISO, and other styles
37

Ibrahim, Yasmin. "Commodifying Terrorism." M/C Journal 10, no. 3 (June 1, 2007). http://dx.doi.org/10.5204/mcj.2665.

Full text
Abstract:
Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circumscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circumscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. Citation reference for this article MLA Style Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>.
APA, Harvard, Vancouver, ISO, and other styles
38

Ruggill, Judd, and Ken McAllister. "The Wicked Problem of Collaboration." M/C Journal 9, no. 2 (May 1, 2006). http://dx.doi.org/10.5204/mcj.2606.

Full text
Abstract:
In “Dilemmas in a General Theory of Planning,” urban planners Horst Rittel and Melvin Webber outline what they term “wicked problems.” According to Rittel and Webber, wicked problems are unavoidably “ill-defined,” that is, unlike “problems in the natural sciences, which are definable and separable and may have solutions that are findable…[wicked problems] are never solved. At best they are only re-solved—over and over again” (160). Rittel and Webber were thinking specifically of the challenges involved in making decisions within immensely complex social circumstances—building highways through cities and designing low income housing projects, for example—but public policy-making and urban design are not the only fields rife with wicked problems. Indeed, the nub of Rittel and Webber’s articulation of wicked problems concerns a phenomenon common to many disciplines: interdisciplinary collaboration. As anyone who has collaborated with people outside her area of expertise will acknowledge, interdisciplinary collaboration itself is among the wickedest problems of all. By way of introduction, we direct the Learning Games Initiative (LGI), a transdisciplinary, inter-institutional research group that studies, teaches with, and builds computer games. In the seven years since LGI was inaugurated, we have undertaken many productive and well-received collaborations, including: 1) leading workshops at national and international conferences; 2) presenting numerous academic talks; 3) editing academic journals; 4) writing books, book chapters, journal articles, and other scholarly materials; 5) exhibiting creative and archival work in museums, galleries, and libraries; and 6) building one of the largest academic research archives of computer games, systems, paraphernalia, and print-, video-, and audio-scholarship in the world. We thus have a fair bit of experience with the wicked problem of collaboration. The purpose of this article is to share some of that experience with readers and to describe candidly some of the challenges we have faced—and sometimes overcome—working collaboratively across disciplinary, institutional, and even international boundaries. Collaborative Circle? Michael Farrell, whose illuminating analysis of “collaborative circles” has lent much to scholars’ understandings of group dynamics within creative contexts, succinctly describes how many such groups form: “A collaborative circle is a set of peers in the same discipline who, through open exchange of support, ideas, and criticism develop into an interdependent group with a common vision that guides their creative work” (266). Farrell’s model, while applicable to several of the smaller projects LGI has nurtured over the years, does not capture the idiosyncratic organizational method that has evolved more broadly within our collective. Rather, LGI has always tended to function according to a model more akin to that found in used car dealerships, one where “no reasonable offer will be refused.” LGI is open to anyone willing to think hard and get their hands dirty, which of course has molded the organization and its projects in remarkable ways. Unlike Farrell’s collaborative circles, for example, LGI’s collaborative model actually decentralizes the group’s study and production of culture. Any member from anywhere—not just “peers in the same discipline”—can initiate or join a project provided she or he is willing to trade in the coin of the realm: sweat equity. Much like the programmers of the open source software movement, LGI’s members work only on what excites them, and with other similarly motivated people. The “buy-in,” simply, is interest and a readiness to assume some level of responsibility for the successes and failures of a given project. In addition to decentralizing the group, LGI’s collaborative model has emerged such that it naturally encourages diversity, swelling our ranks with all kinds of interesting folks, from fine artists to clergy members to librarians. In large part this is because our members view “peers” in the most expansive way possible; sure, optical scientists can help us understand how virtual cameras simulate the real properties of lenses and research linguists can help us design more effective language-in-context tools for our games. However, in an organization that always tries to understand the layers of meaning-making that constitute computer games, such technical expertise is only one stratum. For a game about the cultural politics of ancient Greece that LGI has been working on for the past year, our members invited a musical instrument maker, a potter, and a school teacher to join the development team. These new additions—all experts and peers as far as LGI is concerned—were not merely consultants but became part of the development team, often working in areas of the project completely outside their own specialties. While some outsiders have criticized this project—currently known as “Aristotle’s Assassins”—for being too slow in development, the learning taking place as it moves forward is thrilling to those on the inside, where everyone is learning from everyone else. One common consequence of this dynamic is, as Farrell points out, that the work of the individual members is transformed: “Those who are merely good at their discipline become masters, and, working together, very ordinary people make extraordinary advances in their field” (2). Additionally, the diversity that gives LGI its true interdisciplinarity also makes for praxical as well as innovative projects. The varying social and intellectual concerns of the LGI’s membership means that every collaboration is also an exploration of ethics, responsibility, epistemology, and ideology. This is part of what makes LGI so special: there are multiple levels of learning that underpin every project every day. In LGI we are fond of saying that games teach multiple things in multiple ways. So too, in fact, does collaborating on one of LGI’s projects because members are constantly forced to reevaluate their ways of seeing in order to work with one another. This has been particularly rewarding in our international projects, such as our recently initiated project investigating the relationships among the mass media, new media, and cultural resource management practices. This project, which is building collaborative relationships among a team of archaeologists, game designers, media historians, folklorists, and grave repatriation experts from Cambodia, the Philippines, Australia, and the U.S., is flourishing, not because its members are of the same discipline nor because they share the same ideology. Rather, the team is maturing as a collaborative and productive entity because the focus of its work raises an extraordinary number of questions that have yet to be addressed by national and international researchers. In LGI, much of the sweat equity we contribute involves trying to answer questions like these in ways that are meaningful for our international research teams. In our experience, it is in the process of investigating such questions that effective collaborative relationships are cemented and within which investigators end up learning about more than just the subject matter at hand. They also learn about the micro-cultures, histories, and economies that provide the usually invisible rhetorical infrastructures that ground the subject matter and to which each team member is differently attuned. It is precisely because of this sometimes slow, sometimes tense learning/teaching dynamic—a dynamic too often invoked in both academic and industry settings to discourage collaboration—that François Chesnais calls attention to the fact that collaborative projects frequently yield more benefits than the sum of their parts suggests possible. This fact, says Chesnais, should lead institutions to value collaborative projects more highly as “resource-creating, value-creating and surplus-creating potentialities” (22). Such work is always risky, of course, and Jitendra Mohan, a scholar specializing in cross-cultural collaborations within the field of psychology, writes that international collaboration “raises methodological problems in terms of the selection of culturally-coloured items and their historical as well as semantic meaning…” (314). Mohan means this as a warning and it is heeded as such by LGI members; at the same time, however, it is precisely the identification and sorting out of such methodological problems that seems to excite our best collaborations and most innovative work. Given such promise, it is easy to see why LGI is quite happy to adopt the used car dealer’s slogan “no reasonable offer refused.” In fact, in LGI we see our open-door policy for projects as mirroring our primary object of study: games. This is another factor that we believe contributes to the success of our members’ collaborations. Commercial computer game development is a notoriously interdisciplinary and collaborative endeavor. By collaborating in a fashion similar to professional game developers, LGI members are constantly fashioning more complex understandings of the kinds of production practices and social interactions involved in game development; these practices and interactions are crucial to game studies precisely because they shape what games consist of, how they mean, and the ways in which they are consumed. For this reason, we think it foolish to refuse any reasonable offer to help us explore and understand these meaning-making processes. Wicked Problem Backlash Among the striking points that Rittel and Webber make about wicked problems is that solutions to them are usually created with great care and planning, and yet inevitably suffer severe criticism (at least) or utter annihilation (at worst). Far from being indicative of a bad solution, this backlash against a wicked problem’s solution is an integral element of what we call the “wicked problem dialectic.” The backlash against attempts to establish and nurture transdisciplinary collaboration is easy to document at multiple levels. For example, although our used car dealership model has created a rich research environment, it has also made the quotidian work of doing projects difficult. For one thing, organizing something as simple as a project meeting can take Herculean efforts. The wage earners are on a different schedule than the academics, who are on a different schedule from the artists, who are on a different schedule from the librarians. Getting everyone together in the same room at the same time (even virtually) is like herding cats. As co-directors of LGI, we have done our best to provide the membership with both synchronous and asynchronous resources to facilitate communication (e.g., conference-call enabled phones, online forums, chat clients, file-sharing software, and so on), but nothing beats face-to-face meetings, especially when projects grow complex or deadlines impend mercilessly. Nonetheless, our members routinely fight the meeting scheduling battle, despite the various communication options we have made available through our group’s website and in our physical offices. Most recently we have found that an organizational wiki makes the process of collecting and sharing notes, drawings, videos, segments of code, and drafts of writing decidedly easier than it had been, especially when the projects involve people who do not live a short distance (or a cheap phone call) away from each other. Similarly, not every member has the same amount of time to devote to LGI and its projects despite their considerable and demonstrated interest in them. Some folks are simply busier than others, and cannot contribute to projects as much as they might like. This can be a real problem when a project requires a particular skill set, and the owner of those skills is busy doing other things like working at a paying job or spending time with family. LGI’s projects are always done in addition to members’ regular workload, and it is understandable when that workload has to take precedence. Like regular exercise and eating right, the organization’s projects are the first things to go when life’s demands intrude. Different projects handle this challenge in a variety of ways, but the solutions always tend to reflect the general structure of the project itself. In projects that follow what Andrea Lunsford and Lisa Ede refer to as “hierarchical collaborations”—projects that are clearly structured, goal-oriented, and define clear roles for its participants—milestones and deadlines are set at the beginning of the project and are often tied to professional rewards that stand-in for a paycheck: recommendation letters, all-expenses-paid conference trips, guest speaking invitations, and so forth (133). Less organized projects—what Lunsford and Ede call “dialogic collaborations”—deal with time scheduling challenges differently. Inherently, dialogic collaborations such as these tend to be less hampered by time because they are loosely structured, accept and often encourage members to shift roles, and often value the process of working toward the project’s goals as highly as actually attaining them (134). The most common adaptive strategy used in these cases is simply for the most experienced members of the team to keep the project in motion. As long as something is happening, dialogic collaborations can be kept fruitful for a very long time, even when collaborators are only able to contribute once or twice a month. In our experience, as long as each project’s collaborators understand its operative expectations—which can, by the way, be a combination of hierarchical and dialogical modes—their work proceeds smoothly. Finally, there is the matter of expenses. As an institutionally unaffiliated collective, the LGI has no established revenue stream, which means project funding is either grant-based or comes out of the membership’s pockets. As anyone who has ever applied for a grant knows, it is one thing to write a grant, and another thing entirely to get it. Things are especially tough when grant monies are scarce, as they have been (at least on this side of the pond) since the U.S. economy started its downward spiral several years ago. Tapping the membership’s pockets is not really a viable funding option either. Even modest projects can be expensive, and most folks do not have a lot of spare cash to throw around. What this means, ultimately, is that even though our group’s members have carte blanche to do as they will, they must do so in a resource-starved environment. While it is sometimes disappointing that we are not able to fund certain projects despite their artistic and scholarly merit, LGI members learned long ago that such hardships rarely foreclose all opportunities. As Anne O’Meara and Nancy MacKenzie pointed out several years ago, many “seemingly extraneous features” of collaborative projects—not only financial limitations, but also such innocuous phenomena as where collaborators meet, the dance of their work and play patterns, their conflicting responsibilities, geographic separations, and the ways they talk to each other—emerge as influential factors in all collaborations (210). Thus, we understand in LGI that while our intermittent funding has influenced the dimension and direction of our group, it has also led to some outcomes that in hindsight we are glad we were led to. For example, while LGI originally began studying games in order to discover where production-side innovations might be possible, a series of funding shortfalls and serendipitous academic conversations led us to favor scholarly writing, which has now taken precedence over other kinds of projects. At the most practical level, this works out well because writing costs nothing but time, plus there is a rather desperate shortage of good game scholarship. Moreover, we have discovered that as LGI members have refined their scholarship and begun turning out books, chapters, and articles on a consistent basis, both they and the organization accrue publicity and credibility. Add to this the fact that for many of the group’s academics, traditional print-based work is more valued in the tenure and promotion economy than is, say, an educational game, an online teachers’ resource, or a workshop for a local parent-teacher association, and you have a pretty clear research path blazed by what Kathleen Clark and Rhunette Diggs have called “dialectical collaboration,” that is, collaboration marked by “struggle and opposition, where tension can be creative, productive, clarifying, as well as difficult” (10). Conclusion In sketching out our experience directing a highly collaborative digital media research collective, we hope we have given readers a sense of why collaboration is almost always a “wicked problem.” Collaborators negotiate different schedules, work demands, and ways of seeing, as well as resource pinches that hinder the process by which innovative digital media collaborations come to fruition. And yet, it is precisely because collaboration can be so wicked that it is so valuable. In constantly requiring collaborators to assess and reassess their rationales, artistic visions, and project objectives, collaboration makes for reflexive, complex, and innovative projects, which (at least to us) are the most satisfying and useful of all. References Chesnais, François. “Technological Agreements, Networks and Selected Issues in Economic Theory.” In Technological Collaboration: The Dynamics of Cooperation in Industrial Innovation. Rod Coombs, Albert Richards, Vivien Walsh, and Pier Paolo Saviotti, eds. Northampton, MA: Edward Elgar, 1996. 18-33. Clark, Kathleen D., and Rhunette C. Diggs. “Connected or Separated?: Toward a Dialectical View of Interethnic Relationships.” In Building Diverse Communities: Applications of Communication Research. McDonald, Trevy A., Mark P. Orbe, and Trevellya Ford-Ahmed, eds. Cresskill, NJ: Hampton Press, 2002. 3-25. Farrell, Michael P. Collaborative Circles: Friendship Dynamics & Creative Work. Chicago: U of Chicago P, 2001. Lunsford, Andrea, and Lisa Ede. Singular Texts/Plural Authors: Perspectives on Collaborative Writing. Carbondale: Southern Illinois UP, 1990. Mohan, Jitendra. “Cross-Cultural Experience of Collaboration in Personality Research.” Personality across Cultures: Recent Developments and Debates. Jitendra Mohan, ed. Oxford: Oxford UP, 2000. 313-335. O’Meara, Anne, and Nancy R. MacKenzie. “Reflections on Scholarly Collaboration.” In Common Ground: Feminist Collaboration in the Academy. Elizabeth G. Peck and JoAnna Stephens Mink, eds. Albany: State U of New York P, 1998. 209-26. Rittel, Horst W. J., and Melvin M. Weber. “Dilemmas in a General Theory of Planning.” Policy Sciences 4 (1973): 155-69. Citation reference for this article MLA Style Ruggill, Judd, and Ken McAllister. "The Wicked Problem of Collaboration." M/C Journal 9.2 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0605/07-ruggillmcallister.php>. APA Style Ruggill, J., and K. McAllister. (May 2006) "The Wicked Problem of Collaboration," M/C Journal, 9(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0605/07-ruggillmcallister.php>.
APA, Harvard, Vancouver, ISO, and other styles
39

Horrigan, Matthew. "A Flattering Robopocalypse." M/C Journal 23, no. 6 (November 28, 2020). http://dx.doi.org/10.5204/mcj.2726.

Full text
Abstract:
RACHAEL. It seems you feel our work is not a benefit to the public.DECKARD. Replicants are like any other machine. They're either a benefit or a hazard. If they're a benefit it's not my problem.RACHAEL. May I ask you a personal question?DECKARD. Yes.RACHAEL. Have you every retired a human by mistake? (Scott 17:30) CAPTCHAs (henceforth "captchas") are commonplace on today's Internet. Their purpose seems clear: block malicious software, allow human users to pass. But as much as they exclude spambots, captchas often exclude humans with visual and other disabilities (Dzieza; W3C Working Group). Worse yet, more and more advanced captcha-breaking technology has resulted in more and more challenging captchas, raising the barrier between online services and those who would access them. In the words of inclusive design advocate Robin Christopherson, "CAPTCHAs are evil". In this essay I describe how the captcha industry implements a posthuman process that speculative fiction has gestured toward but not grasped. The hostile posthumanity of captcha is not just a technical problem, nor just a problem of usability or access. Rather, captchas convey a design philosophy that asks humans to prove themselves by performing well at disembodied games. This philosophy has its roots in the Turing Test itself, whose terms guide speculation away from the real problems that today's authentication systems present. Drawing the concept of "procedurality" from game studies, I argue that, despite a design goal of separating machines and humans to the benefit of the latter, captchas actually and ironically produce an arms race in which humans have a systematic and increasing disadvantage. This arms race results from the Turing Test's equivocation between human and machine bodies, an assumption whose influence I identify in popular film, science fiction literature, and captcha design discourse. The Captcha Industry and Its Side-Effects Exclusion is an essential function of every cybersecurity system. From denial-of-service attacks to data theft, toxic automated entities constantly seek admission to services they would damage. To remain functional and accessible, Websites need security systems to keep out "abusive agents" (Shet). In cybersecurity, the term "user authentication" refers to the process of distinguishing between abusive agents and welcome users (Jeng et al.). Of the many available authentication techniques, CAPTCHA, "Completely Automated Public Turing test[s] to tell Computers and Humans Apart" (Von Ahn et al. 1465), is one of the most iconic. Although some captchas display a simple checkbox beside a disclaimer to the effect that "I am not a robot" (Shet), these frequently give way to more difficult alternatives: perception tests (fig. 1). Test captchas may show sequences of distorted letters, which a user is supposed to recognise and then type in (Godfrey). Others effectively digitize a game of "I Spy": an image appears, with an instruction to select the parts of it that show a specific type of object (Zhu et al.). A newer type of captcha involves icons rotated upside-down or sideways, the task being to right them (Gossweiler et al.). These latter developments show the influence of gamification (Kani and Nishigaki; Kumar et al.), the design trend where game-like elements figure in serious tasks. Fig. 1: A series of captchas followed by multifactor authentication as a "quick security check" during the author's suspicious attempt to access LinkedIn over a Virtual Private Network Gamified captchas, in using tests of ability to tell humans from computers, invite three problems, of which only the first has received focussed critical attention. I discuss each briefly below, and at greater length in subsequent sections. First, as many commentators have pointed out (W3C Working Group), captchas can accidentally categorise real humans as nonhumans—a technical problem that becomes more likely as captcha-breaking technologies improve (e.g. Tam et al.; Brown et al.). Indeed, the design and breaking of captchas has become an almost self-sustaining subfield in computer science, as researchers review extant captchas, publish methods for breaking them, and publish further captcha designs (e.g. Weng et al.). Such research fuels an industry of captcha-solving services (fig. 2), of which some use automated techniques, and some are "human-powered", employing groups of humans to complete large numbers of captchas, thus clearing the way for automated incursions (Motoyama et al. 2). Captchas now face the quixotic task of using ability tests to distinguish legitimate users from abusers with similar abilities. Fig. 2: Captcha production and captcha breaking: a feedback loop Second, gamified captchas import the feelings of games. When they defeat a real human, the human seems not to have encountered the failure state of an automated procedure, but rather to have lost, or given up on, a game. The same frame of "gameful"-ness (McGonigal, under "Happiness Hacking") or "gameful work" (under "The Rise of the Happiness Engineers"), supposed to flatter users with a feeling of reward or satisfaction when they complete a challenge, has a different effect in the event of defeat. Gamefulness shifts the fault from procedure to human, suggesting, for the latter, the shameful status of loser. Third, like games, gamified captchas promote a particular strain of logic. Just as other forms of media can be powerful venues for purveying stereotypes, so are gamified captchas, in this case conveying the notion that ability is a legitimate means, not only of apportioning privilege, but of humanising and dehumanising. Humanity thus appears as a status earned, and disability appears not as a stigma, nor an occurrence, but an essence. The latter two problems emerge because the captcha reveals, propagates and naturalises an ideology through mechanised procedures. Below I invoke the concept of "procedural rhetoric" to critique the disembodied notion of humanity that underlies both the original Turing Test and the "Completely Automated Public Turing test." Both tests, I argue, ultimately play to the disadvantage of their human participants. Rhetorical Games, Procedural Rhetoric When videogame studies emerged as an academic field in the early 2000s, once of its first tasks was to legitimise games relative to other types of artefact, especially literary texts (Eskelinen; Aarseth). Scholars sought a framework for discussing how video games, like other more venerable media, can express ideas (Weise). Janet Murray and Ian Bogost looked to the notion of procedure, devising the concepts of "procedurality" (Bogost 3), "procedural authorship" (Murray 171), and "procedural rhetoric" (Bogost 1). From a proceduralist perspective, a videogame is both an object and a medium for inscribing processes. Those processes have two basic types: procedures the game's developers have authored, which script the behaviour of the game as a computer program; and procedures human players respond with, the "operational logic" of gameplay (Bogost 13). Procedurality's two types of procedure, the computerised and the human, have a kind of call-and-response relationship, where the behaviour of the machine calls upon players to respond with their own behaviour patterns. Games thus train their players. Through the training that is play, players acquire habits they bring to other contexts, giving videogames the power not only to express ideas but "disrupt and change fundamental attitudes and beliefs about the world, leading to potentially significant long-term social change" (Bogost ix). That social change can be positive (McGonigal), or it can involve "dark patterns", cases where game procedures provoke and exploit harmful behaviours (Zagal et al.). For example, embedded in many game paradigms is the procedural rhetoric of "toxic meritocracy" (Paul 66), where players earn rewards, status and personal improvement by overcoming challenges, and, especially, excelling where others fail. While meritocracy may seem logical within a strictly competitive arena, its effect in a broader cultural context is to legitimise privileges as the spoils of victory, and maltreatment as the just result of defeat. As game design has influenced other fields, so too has procedurality's applicability expanded. Gamification, "the use of game design elements in non-game contexts" (Deterding et al. 9), is a popular trend in which designers seek to imbue diverse tasks with some of the enjoyment of playing a game (10). Gamification discourse has drawn heavily upon Mihaly Csikszentmihalyi's "positive psychology" (Seligman and Csikszentmihalyi), and especially the speculative psychology of flow (Csikszentmihalyi 51), which promise enormously broad benefits for individuals acting in the "flow state" that challenging play supposedly promotes (75). Gamification has become a celebrated cause, advocated by a group of scholars and designers Sebastian Deterding calls the "Californian league of gamification evangelists" (120), before becoming an object of critical scrutiny (Fuchs et al.). Where gamification goes, it brings its dark patterns with it. In gamified user authentication (Kroeze and Olivier), and particularly gamified captcha, there occurs an intersection of deceptively difficult games, real-world stakes, and users whose differences go often ignored. The Disembodied Arms Race In captcha design research, the concept of disability occurs under the broader umbrella of usability. Usability studies emphasise the fact that some technology pieces are easier to access than others (Yan and El Ahmad). Disability studies, in contrast, emphasises the fact that different users have different capacities to overcome access barriers. Ability is contextual, an intersection of usability and disability, use case and user (Reynolds 443). When used as an index of humanness, ability yields illusive results. In Posthuman Knowledge, Rosi Braidotti begins her conceptual enquiry into the posthuman condition with a contemplation of captcha, asking what it means to tick that checkbox claiming that "I am not a robot" (8), and noting the baffling multiplicity of possible answers. From a practical angle, Junya Kani and Masakatsu Nishigaki write candidly about the problem of distinguishing robot from human: "no matter how advanced malicious automated programs are, a CAPTCHA that will not pass automated programs is required. Hence, we have to find another human cognitive processing capability to tackle this challenge" (40). Kani and Nishigaki try out various human cognitive processing capabilities for the task. Narrative comprehension and humour become candidates: might a captcha ascribe humanity based on human users' ability to determine the correct order of scenes in a film (43)? What about panels in a cartoon (40)? As they seek to assess the soft skills of machines, Kani and Nishigaki set up a drama similar to that of Philip K. Dick's Do Androids Dream of Electric Sheep. Do Androids Dream of Electric Sheep, and its film adaptation, Blade Runner (Scott), describe a spacefaring society populated by both humans and androids. Androids have lesser legal privileges than humans, and in particular face execution—euphemistically called "retirement"—for trespassing on planet Earth (Dick 60). Blade Runner gave these androids their more famous name: "replicant". Replicants mostly resemble humans in thought and action, but are reputed to lack the capacity for empathy, so human police, seeking a cognitive processing capability unique to humans, test for empathy to test for humanness (30). But as with captchas, Blade Runner's testing procedure depends upon an automated device whose effectiveness is not certain, prompting the haunting question: "have you ever retired a human by mistake?" (Scott 17:50). Blade Runner's empathy test is part of a long philosophical discourse about the distinction between human and machine (e.g. Putnam; Searle). At the heart of the debate lies Alan Turing's "Turing Test", which a machine hypothetically passes when it can pass itself off as a human conversationalist in an exchange of written text. Turing's motivation for coming up with the test goes: there may be no absolute way of defining what makes a human mind, so the best we can do is assess a computer's ability to imitate one (Turing 433). The aporia, however—how can we determine what makes a human mind?—is the result of an unfair question. Turing's test, dealing only with information expressed in strings of text, purposely disembodies both humans and machines. The Blade Runner universe similarly evens the playing field: replicants look, feel and act like humans to such an extent that distinguishing between the two becomes, again, the subject of a cognition test. The Turing Test, obsessed with information processing and steeped in mind-body dualism, assesses humanness using criteria that automated users can master relatively easily. In contrast, in everyday life, I use a suite of much more intuitive sensory tests to distinguish between my housemate and my laptop. My intuitions capture what the Turing Test masks: a human is a fleshy entity, possessed of the numerous trappings and capacities of a human body. The result of the automated Turing Test's focus on cognition is an arms race that places human users at an increasing disadvantage. Loss, in such a race, manifests not only as exclusion by and from computer services, but as a redefinition of proper usership, the proper behaviour of the authentic, human, user. Thus the Turing Test implicitly provides for a scenario where a machine becomes able to super-imitate humanness: to be perceived as human more often than a real human would be. In such an outcome, it would be the human conversationalist who would begin to fail the Turing test; to fail to pass themself off according to new criteria for authenticity. This scenario is possible because, through procedural rhetoric, machines shift human perspectives: about what is and is not responsible behaviour; about what humans should and should not feel when confronted with a challenge; about who does and does not deserve access; and, fundamentally, about what does and does not signify authentic usership. In captcha, as in Blade Runner, it is ultimately a machine that adjudicates between human and machine cognition. As users we rely upon this machine to serve our interests, rather than pursue some emergent automated interest, some by-product of the feedback loop that results from the ideologies of human researchers both producing and being produced by mechanised procedures. In the case of captcha, that faith is misplaced. The Feeling of Robopocalypse A rich repertory of fiction has speculated upon what novelist Daniel Wilson calls the "Robopocalypse", the scenario where machines overthrow humankind. Most versions of the story play out as a slave-owner's nightmare, featuring formerly servile entities (which happen to be machines) violently revolting and destroying the civilisation of their masters. Blade Runner's rogue replicants, for example, are effectively fugitive slaves (Dihal 196). Popular narratives of robopocalypse, despite showing their antagonists as lethal robots, are fundamentally human stories with robots playing some of the parts. In contrast, the exclusion a captcha presents when it defeats a human is not metaphorical or emancipatory. There, in that moment, is a mechanised entity defeating a human. The defeat takes place within an authoritative frame that hides its aggression. For a human user, to be defeated by a captcha is to fail to meet an apparently common standard, within the framework of a common procedure. This is a robopocalypse of baffling systems rather than anthropomorphic soldiers. Likewise, non-human software clients pose threats that humanoid replicants do not. In particular, software clients replicate much faster than physical bodies. The sheer sudden scale of a denial-of-service attack makes Philip K. Dick's vision of android resistance seem quaint. The task of excluding unauthorised software, unlike the impulse to exclude replicants, is more a practical necessity than an exercise in colonialism. Nevertheless, dystopia finds its way into the captcha process through the peril inherent in the test, whenever humans are told apart from authentic users. This is the encroachment of the hostile posthuman, naturalised by us before it denaturalises us. The hostile posthuman sometimes manifests as a drone strike, Terminator-esque (Cameron), a dehumanised decision to kill (Asaro). But it is also a process of gradual exclusion, detectable from moment to moment as a feeling of disdain or impatience for the irresponsibility, incompetence, or simply unusualness of a human who struggles to keep afloat of a rising standard. "We are in this together", Braidotti writes, "between the algorithmic devil and the acidified deep blue sea" (9). But we are also in this separately, divided along lines of ability. Captcha's danger, as a broken procedure, hides in plain sight, because it lashes out at some only while continuing to flatter others with a game that they can still win. Conclusion Online security systems may always have to define some users as legitimate and others as illegitimate. Is there a future where they do so on the basis of behaviour rather than identity or essence? Might some future system accord each user, human or machine, the same authentic status, and provide all with an initial benefit of the doubt? In the short term, such a system would seem grossly impractical. The type of user that most needs to be excluded is the disembodied type, the type that can generate orders of magnitude more demands than a human, that can proliferate suddenly and in immense number because it does not lag behind the slow processes of human bodies. This type of user exists in software alone. Rich in irony, then, is the captcha paradigm which depends on the disabilities of the threats it confronts. We dread malicious software not for its disabilities—which are momentary and all too human—but its abilities. Attenuating the threat presented by those abilities requires inverting a habit that meritocracy trains and overtrains: specifically, we have here a case where the plight of the human user calls for negative action toward ability rather than disability. References Aarseth, Espen. "Computer Game Studies, Year One." Game Studies 1.1 (2001): 1–15. Asaro, Peter. "On Banning Autonomous Weapon Systems: Human Rights, Automation, and the Dehumanization of Lethal Decision-Making." International Review of the Red Cross 94.886 (2012): 687–709. Blade Runner. Dir. Ridley Scott. Warner Bros, 1982. Bogost, Ian. Persuasive Games: The Expressive Power of Videogames. Cambridge, MA: MIT Press, 2007. Braidotti, Rosi. Posthuman Knowledge. Cambridge: Polity Press, 2019. Brown, Samuel S., et al. "I Am 'Totally' Human: Bypassing the Recaptcha." 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), 2017. Christopherson, Robin. "AI Is Making CAPTCHA Increasingly Cruel for Disabled Users." AbilityNet 2019. 17 Sep. 2020 <https://abilitynet.org.uk/news-blogs/ai-making-captcha-increasingly-cruel-disabled-users>. Csikszentmihalyi, Mihaly. Flow: The Psychology of Optimal Experience. Harper & Row: New York, 1990. Deterding, Sebastian. "Eudaimonic Design, Or: Six Invitations to Rethink Gamification." Rethinking Gamification. Eds. Mathias Fuchs et al. Lüneburg: Meson Press, 2014. Deterding, Sebastian, et al. "From Game Design Elements to Gamefulness: Defining Gamification." Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments. ACM, 2011. Dick, Philip K. Do Androids Dream of Electric Sheep. 1968. New York: Del Rey, 1996. Dihal, Kanta. "Artificial Intelligence, Slavery, and Revolt." AI Narratives: A History of Imaginative Thinking about Intelligent Machines. Eds. Stephen Cave, Kanta Dihal, and Sarah Dillon. 2020. 189–212. Dzieza, Josh. "Why Captchas Have Gotten So Difficult." The Verge 2019. 17 Sep. 2020 <https://www.theverge.com/2019/2/1/18205610/google-captcha-ai-robot-human-difficult-artificial-intelligence>. Eskelinen, Markku. "Towards Computer Game Studies." Digital Creativity 12.3 (2001): 175–83. Fuchs, Mathias, et al., eds. Rethinking Gamification. Lüneburg: Meson Press, 2014. Godfrey, Philip Brighten. "Text-Based CAPTCHA Algorithms." First Workshop on Human Interactive Proofs, 15 Dec. 2001. 14 Nov. 2020 <http://www.aladdin.cs.cmu.edu/hips/events/abs/godfreyb_abstract.pdf>. Gossweiler, Rich, et al. "What's Up CAPTCHA? A CAPTCHA Based on Image Orientation." Proceedings of the 18th International Conference on World Wide Web. WWW, 2009. Jeng, Albert B., et al. "A Study of CAPTCHA and Its Application to User Authentication." International Conference on Computational Collective Intelligence. Springer, 2010. Kani, Junya, and Masakatsu Nishigaki. "Gamified Captcha." International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 2013. Kroeze, Christien, and Martin S. Olivier. "Gamifying Authentication." 2012 Information Security for South Africa. IEEE, 2012. Kumar, S. Ashok, et al. "Gamification of Internet Security by Next Generation Captchas." 2017 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2017. McGonigal, Jane. Reality Is Broken: Why Games Make Us Better and How They Can Change the World. Penguin, 2011. Motoyama, Marti, et al. "Re: Captchas – Understanding CAPTCHA-Solving Services in an Economic Context." USENIX Security Symposium. 2010. Murray, Janet. Hamlet on the Holodeck: The Future of Narrative in Cyberspace. New York: The Free Press, 1997. Paul, Christopher A. The Toxic Meritocracy of Video Games: Why Gaming Culture Is the Worst. University of Minnesota Press, 2018. Putnam, Hilary. "Robots: Machines or Artificially Created Life?" The Journal of Philosophy 61.21 (1964): 668–91. Reynolds, Joel Michael. "The Meaning of Ability and Disability." The Journal of Speculative Philosophy 33.3 (2019): 434–47. Searle, John. "Minds, Brains, and Programs." Behavioral and Brain Sciences 3.3 (1980): 417–24. Seligman, Martin, and Mihaly Csikszentmihalyi. "Positive Psychology: An Introduction." Flow and the Foundations of Positive Psychology. 2000. Springer, 2014. 279–98. Shet, Vinay. "Are You a Robot? Introducing No Captcha Recaptcha." Google Security Blog 3 (2014): 12. Tam, Jennifer, et al. "Breaking Audio Captchas." Advances in Neural Information Processing Systems. 2009. Proceedings of the 21st International Conference on Neural Information Processing Systems 1625–1632. ACM, 2008. The Terminator. Dir. James Cameron. Orion, 1984. Turing, Alan. "Computing Machinery and Intelligence." Mind 59.236 (1950). Von Ahn, Luis, et al. "Recaptcha: Human-Based Character Recognition via Web Security Measures." Science 321.5895 (2008): 1465–68. W3C Working Group. "Inaccessibility of CAPTCHA: Alternatives to Visual Turing Tests on the Web." W3C 2019. 17 Sep. 2020 <https://www.w3.org/TR/turingtest/>. Weise, Matthew. "How Videogames Express Ideas." DiGRA Conference. 2003. Weng, Haiqin, et al. "Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services." Big Data Mining and Analytics 2.2 (2019): 118–44. Wilson, Daniel H. Robopocalypse. New York: Doubleday, 2011. Yan, Jeff, and Ahmad Salah El Ahmad. "Usability of Captchas or Usability Issues in CAPTCHA Design." Proceedings of the 4th Symposium on Usable Privacy and Security. 2008. Zagal, José P., Staffan Björk, and Chris Lewis. "Dark Patterns in the Design of Games." 8th International Conference on the Foundations of Digital Games. 2013. 25 Aug. 2020 <http://soda.swedish-ict.se/5552/1/DarkPatterns.1.1.6_cameraready.pdf>. Zhu, Bin B., et al. "Attacks and Design of Image Recognition Captchas." Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010.
APA, Harvard, Vancouver, ISO, and other styles
40

Brien, Donna Lee. "From Waste to Superbrand: The Uneasy Relationship between Vegemite and Its Origins." M/C Journal 13, no. 4 (August 18, 2010). http://dx.doi.org/10.5204/mcj.245.

Full text
Abstract:
This article investigates the possibilities for understanding waste as a resource, with a particular focus on understanding food waste as a food resource. It considers the popular yeast spread Vegemite within this frame. The spread’s origins in waste product, and how it has achieved and sustained its status as a popular symbol of Australia despite half a century of Australian gastro-multiculturalism and a marked public resistance to other recycling and reuse of food products, have not yet been a focus of study. The process of producing Vegemite from waste would seem to align with contemporary moves towards recycling food waste, and ensuring environmental sustainability and food security, yet even during times of austerity and environmental concern this has not provided the company with a viable marketing strategy. Instead, advertising copywriting and a recurrent cycle of product memorialisation have created a superbrand through focusing on Vegemite’s nutrient and nostalgic value.John Scanlan notes that producing waste is a core feature of modern life, and what we dispose of as surplus to our requirements—whether this comprises material objects or more abstract products such as knowledge—reveals much about our society. In observing this, Scanlan asks us to consider the quite radical idea that waste is central to everything of significance to us: the “possibility that the surprising core of all we value results from (and creates even more) garbage (both the material and the metaphorical)” (9). Others have noted the ambivalent relationship we have with the waste we produce. C. T. Anderson notes that we are both creator and agent of its disposal. It is our ambivalence towards waste, coupled with its ubiquity, that allows waste materials to be described so variously: negatively as garbage, trash and rubbish, or more positively as by-products, leftovers, offcuts, trimmings, and recycled.This ambivalence is also crucial to understanding the affectionate relationship the Australian public have with Vegemite, a relationship that appears to exist in spite of the product’s unpalatable origins in waste. A study of Vegemite reveals that consumers can be comfortable with waste, even to the point of eating recycled waste, as long as that fact remains hidden and unmentioned. In Vegemite’s case not only has the product’s connection to waste been rendered invisible, it has been largely kept out of sight despite considerable media and other attention focusing on the product. Recycling Food Waste into Food ProductRecent work such as Elizabeth Royte’s Garbage Land and Tristram Stuart’s Waste make waste uncomfortably visible, outlining how much waste, and food waste in particular, the Western world generates and how profligately this is disposed of. Their aim is clear: a call to less extravagant and more sustainable practices. The relatively recent interest in reducing our food waste has, of course, introduced more complexity into a simple linear movement from the creation of a food product, to its acquisition or purchase, and then to its consumption and/or its disposal. Moreover, the recycling, reuse and repurposing of what has previously been discarded as waste is reconfiguring the whole idea of what waste is, as well as what value it has. The initiatives that seem to offer the most promise are those that reconfigure the way waste is understood. However, it is not only the process of transforming waste from an abject nuisance into a valued product that is central here. It is also necessary to reconfigure people’s acculturated perceptions of, and reactions to waste. Food waste is generated during all stages of the food cycle: while the raw materials are being grown; while these are being processed; when the resulting food products are being sold; when they are prepared in the home or other kitchen; and when they are only partly consumed. Until recently, the food industry in the West almost universally produced large volumes of solid and liquid waste that not only posed problems of disposal and pollution for the companies involved, but also represented a reckless squandering of total food resources in terms of both nutrient content and valuable biomass for society at large. While this is currently changing, albeit slowly, the by-products of food processing were, and often are, dumped (Stuart). In best-case scenarios, various gardening, farming and industrial processes gather household and commercial food waste for use as animal feed or as components in fertilisers (Delgado et al; Wang et al). This might, on the surface, appear a responsible application of waste, yet the reality is that such food waste often includes perfectly good fruit and vegetables that are not quite the required size, shape or colour, meat trimmings and products (such as offal) that are completely edible but extraneous to processing need, and other high grade product that does not meet certain specifications—such as the mountains of bread crusts sandwich producers discard (Hickman), or food that is still edible but past its ‘sell by date.’ In the last few years, however, mounting public awareness over the issues of world hunger, resource conservation, and the environmental and economic costs associated with food waste has accelerated efforts to make sustainable use of available food supplies and to more efficiently recycle, recover and utilise such needlessly wasted food product. This has fed into and led to multiple new policies, instances of research into, and resultant methods for waste handling and treatment (Laufenberg et al). Most straightforwardly, this involves the use or sale of offcuts, trimmings and unwanted ingredients that are “often of prime quality and are only rejected from the production line as a result of standardisation requirements or retailer specification” from one process for use in another, in such processed foods as soups, baby food or fast food products (Henningsson et al. 505). At a higher level, such recycling seeks to reclaim any reusable substances of significant food value from what could otherwise be thought of as a non-usable waste product. Enacting this is largely dependent on two elements: an available technology and being able to obtain a price or other value for the resultant product that makes the process worthwhile for the recycler to engage in it (Laufenberg et al). An example of the latter is the use of dehydrated restaurant food waste as a feedstuff for finishing pigs, a reuse process with added value for all involved as this process produces both a nutritious food substance as well as a viable way of disposing of restaurant waste (Myer et al). In Japan, laws regarding food waste recycling, which are separate from those governing other organic waste, are ensuring that at least some of food waste is being converted into animal feed, especially for the pigs who are destined for human tables (Stuart). Other recycling/reuse is more complex and involves more lateral thinking, with the by-products from some food processing able to be utilised, for instance, in the production of dyes, toiletries and cosmetics (Henningsson et al), although many argue for the privileging of food production in the recycling of foodstuffs.Brewing is one such process that has been in the reuse spotlight recently as large companies seek to minimise their waste product so as to be able to market their processes as sustainable. In 2009, for example, the giant Foster’s Group (with over 150 brands of beer, wine, spirits and ciders) proudly claimed that it recycled or reused some 91.23% of 171,000 tonnes of operational waste, with only 8.77% of this going to landfill (Foster’s Group). The treatment and recycling of the massive amounts of water used for brewing, rinsing and cooling purposes (Braeken et al.; Fillaudeaua et al.) is of significant interest, and is leading to research into areas as diverse as the development microbial fuel cells—where added bacteria consume the water-soluble brewing wastes, thereby cleaning the water as well as releasing chemical energy that is then converted into electricity (Lagan)—to using nutrient-rich wastewater as the carbon source for creating bioplastics (Yu et al.).In order for the waste-recycling-reuse loop to be closed in the best way for securing food supplies, any new product salvaged and created from food waste has to be both usable, and used, as food (Stuart)—and preferably as a food source for people to consume. There is, however, considerable consumer resistance to such reuse. Resistance to reusing recycled water in Australia has been documented by the CSIRO, which identified negative consumer perception as one of the two primary impediments to water reuse, the other being the fundamental economics of the process (MacDonald & Dyack). This consumer aversion operates even in times of severe water shortages, and despite proof of the cleanliness and safety of the resulting treated water. There was higher consumer acceptance levels for using stormwater rather than recycled water, despite the treated stormwater being shown to have higher concentrations of contaminants (MacDonald & Dyack). This reveals the extent of public resistance to the potential consumption of recycled waste product when it is labelled as such, even when this consumption appears to benefit that public. Vegemite: From Waste Product to Australian IconIn this context, the savoury yeast spread Vegemite provides an example of how food processing waste can be repurposed into a new food product that can gain a high level of consumer acceptability. It has been able to retain this status despite half a century of Australian gastronomic multiculturalism and the wide embrace of a much broader range of foodstuffs. Indeed, Vegemite is so ubiquitous in Australian foodways that it is recognised as an international superbrand, a standing it has been able to maintain despite most consumers from outside Australasia finding it unpalatable (Rozin & Siegal). However, Vegemite’s long product history is one in which its origin as recycled waste has been omitted, or at the very least, consistently marginalised.Vegemite’s history as a consumer product is narrated in a number of accounts, including one on the Kraft website, where the apocryphal and actual blend. What all these narratives agree on is that in the early 1920s Fred Walker—of Fred Walker and Company, Melbourne, canners of meat for export and Australian manufacturers of Bonox branded beef stock beverage—asked his company chemist to emulate Marmite yeast extract (Farrer). The imitation product was based, as was Marmite, on the residue from spent brewer’s yeast. This waste was initially sourced from Melbourne-based Carlton & United Breweries, and flavoured with vegetables, spices and salt (Creswell & Trenoweth). Today, the yeast left after Foster Group’s Australian commercial beer making processes is collected, put through a sieve to remove hop resins, washed to remove any bitterness, then mixed with warm water. The yeast dies from the lack of nutrients in this environment, and enzymes then break down the yeast proteins with the effect that vitamins and minerals are released into the resulting solution. Using centrifugal force, the yeast cell walls are removed, leaving behind a nutrient-rich brown liquid, which is then concentrated into a dark, thick paste using a vacuum process. This is seasoned with significant amounts of salt—although less today than before—and flavoured with vegetable extracts (Richardson).Given its popularity—Vegemite was found in 2009 to be the third most popular brand in Australia (Brand Asset Consulting)—it is unsurprising to find that the product has a significant history as an object of study in popular culture (Fiske et al; White), as a marker of national identity (Ivory; Renne; Rozin & Siegal; Richardson; Harper & White) and as an iconic Australian food, brand and product (Cozzolino; Luck; Khamis; Symons). Jars, packaging and product advertising are collected by Australian institutions such as Sydney’s Powerhouse Museum and the National Museum of Australia in Canberra, and are regularly included in permanent and travelling exhibitions profiling Australian brands and investigating how a sense of national identity is expressed through identification with these brands. All of this significant study largely focuses on how, when and by whom the product has been taken up, and how it has been consumed, rather than its links to waste, and what this circumstance could add to current thinking about recycling of food waste into other food products.It is worth noting that Vegemite was not an initial success in the Australian marketplace, but this does not seem due to an adverse public perception to waste. Indeed, when it was first produced it was in imitation of an already popular product well-known to be made from brewery by-products, hence this origin was not an issue. It was also introduced during a time when consumer relationships to waste were quite unlike today, and thrifty re-use of was a common feature of household behaviour. Despite a national competition mounted to name the product (Richardson), Marmite continued to attract more purchasers after Vegemite’s launch in 1923, so much so that in 1928, in an attempt to differentiate itself from Marmite, Vegemite was renamed “Parwill—the all Australian product” (punning on the idea that “Ma-might” but “Pa-will”) (White 16). When this campaign was unsuccessful, the original, consumer-suggested name was reinstated, but sales still lagged behind its UK-owned prototype. It was only after remaining in production for more than a decade, and after two successful marketing campaigns in the second half of the 1930s that the Vegemite brand gained some market traction. The first of these was in 1935 and 1936, when a free jar of Vegemite was offered with every sale of an item from the relatively extensive Kraft-Walker product list (after Walker’s company merged with Kraft) (White). The second was an attention-grabbing contest held in 1937, which invited consumers to compose Vegemite-inspired limericks. However, it was not the nature of the product itself or even the task set by the competition which captured mass attention, but the prize of a desirable, exotic and valuable imported Pontiac car (Richardson 61; Superbrands).Since that time, multinational media company, J Walter Thompson (now rebranded as JWT) has continued to manage Vegemite’s marketing. JWT’s marketing has never looked to Vegemite’s status as a thrifty recycler of waste as a viable marketing strategy, even in periods of austerity (such as the Depression years and the Second World War) or in more recent times of environmental concern. Instead, advertising copywriting and a recurrent cycle of cultural/media memorialisation have created a superbrand by focusing on two factors: its nutrient value and, as the brand became more established, its status as national icon. Throughout the regular noting and celebration of anniversaries of its initial invention and launch, with various commemorative events and products marking each of these product ‘birthdays,’ Vegemite’s status as recycled waste product has never been more than mentioned. Even when its 60th anniversary was marked in 1983 with the laying of a permanent plaque in Kerferd Road, South Melbourne, opposite Walker’s original factory, there was only the most passing reference to how, and from what, the product manufactured at the site was made. This remained the case when the site itself was prioritised for heritage listing almost twenty years later in 2001 (City of Port Phillip).Shying away from the reality of this successful example of recycling food waste into food was still the case in 1990, when Kraft Foods held a nationwide public campaign to recover past styles of Vegemite containers and packaging, and then donated their collection to Powerhouse Museum. The Powerhouse then held an exhibition of the receptacles and the historical promotional material in 1991, tracing the development of the product’s presentation (Powerhouse Museum), an occasion that dovetailed with other nostalgic commemorative activities around the product’s 70th birthday. Although the production process was noted in the exhibition, it is noteworthy that the possibilities for recycling a number of the styles of jars, as either containers with reusable lids or as drinking glasses, were given considerably more notice than the product’s origins as a recycled product. By this time, it seems, Vegemite had become so incorporated into Australian popular memory as a product in its own right, and with such a rich nostalgic history, that its origins were no longer of any significant interest or relevance.This disregard continued in the commemorative volume, The Vegemite Cookbook. With some ninety recipes and recipe ideas, the collection contains an almost unimaginably wide range of ways to use Vegemite as an ingredient. There are recipes on how to make the definitive Vegemite toast soldiers and Vegemite crumpets, as well as adaptations of foreign cuisines including pastas and risottos, stroganoffs, tacos, chilli con carne, frijole dip, marinated beef “souvlaki style,” “Indian-style” chicken wings, curries, Asian stir-fries, Indonesian gado-gado and a number of Chinese inspired dishes. Although the cookbook includes a timeline of product history illustrated with images from the major advertising campaigns that runs across 30 pages of the book, this timeline history emphasises the technological achievement of Vegemite’s creation, as opposed to the matter from which it orginated: “In a Spartan room in Albert Park Melbourne, 20 year-old food technologist Cyril P. Callister employed by Fred Walker, conducted initial experiments with yeast. His workplace was neither kitchen nor laboratory. … It was not long before this rather ordinary room yielded an extra-ordinary substance” (2). The Big Vegemite Party Book, described on its cover as “a great book for the Vegemite fan … with lots of old advertisements from magazines and newspapers,” is even more openly nostalgic, but similarly includes very little regarding Vegemite’s obviously potentially unpalatable genesis in waste.Such commemorations have continued into the new century, each one becoming more self-referential and more obviously a marketing strategy. In 2003, Vegemite celebrated its 80th birthday with the launch of the “Spread the Smile” campaign, seeking to record the childhood reminisces of adults who loved Vegemite. After this, the commemorative anniversaries broke free from even the date of its original invention and launch, and began to celebrate other major dates in the product’s life. In this way, Kraft made major news headlines when it announced that it was trying to locate the children who featured in the 1954 “Happy little Vegemites” campaign as part of the company’s celebrations of the 50th anniversary of the television advertisement. In October 2006, these once child actors joined a number of past and current Kraft employees to celebrate the supposed production of the one-billionth jar of Vegemite (Rood, "Vegemite Spreads" & "Vegemite Toasts") but, once again, little about the actual production process was discussed. In 2007, the then iconic marching band image was resituated into a contemporary setting—presumably to mobilise both the original messages (nutritious wholesomeness in an Australian domestic context) as well as its heritage appeal. Despite the real interest at this time in recycling and waste reduction, the silence over Vegemite’s status as recycled, repurposed food waste product continued.Concluding Remarks: Towards Considering Waste as a ResourceIn most parts of the Western world, including Australia, food waste is formally (in policy) and informally (by consumers) classified, disposed of, or otherwise treated alongside garden waste and other organic materials. Disposal by individuals, industry or local governments includes a range of options, from dumping to composting or breaking down in anaerobic digestion systems into materials for fertiliser, with food waste given no special status or priority. Despite current concerns regarding the security of food supplies in the West and decades of recognising that there are sections of all societies where people do not have enough to eat, it seems that recycling food waste into food that people can consume remains one of the last and least palatable solutions to these problems. This brief study of Vegemite has attempted to show how, despite the growing interest in recycling and sustainability, the focus in both the marketing of, and public interest in, this iconic and popular product appears to remain rooted in Vegemite’s nutrient and nostalgic value and its status as a brand, and firmly away from any suggestion of innovative and prudent reuse of waste product. That this is so for an already popular product suggests that any initiatives that wish to move in this direction must first reconfigure not only the way waste itself is seen—as a valuable product to be used, rather than as a troublesome nuisance to be disposed of—but also our own understandings of, and reactions to, waste itself.Acknowledgements Many thanks to the reviewers for their perceptive, useful, and generous comments on this article. All errors are, of course, my own. The research for this work was carried out with funding from the Faculty of Arts, Business, Informatics and Education, CQUniversity, Australia.ReferencesAnderson, C. T. “Sacred Waste: Ecology, Spirit, and the American Garbage Poem.” Interdisciplinary Studies in Literature and Environment 17 (2010): 35-60.Blake, J. The Vegemite Cookbook: Delicious Recipe Ideas. Melbourne: Ark Publishing, 1992.Braeken, L., B. Van der Bruggen and C. Vandecasteele. “Regeneration of Brewery Waste Water Using Nanofiltration.” Water Research 38.13 (July 2004): 3075-82.City of Port Phillip. “Heritage Recognition Strategy”. Community and Services Development Committee Agenda, 20 Aug. 2001.Cozzolino, M. Symbols of Australia. Ringwood: Penguin, 1980.Creswell, T., and S. Trenoweth. “Cyril Callister: The Happiest Little Vegemite”. 1001 Australians You Should Know. North Melbourne: Pluto Press, 2006. 353-4.Delgado, C. L., M. Rosegrant, H. Steinfled, S. Ehui, and C. Courbois. Livestock to 2020: The Next Food Revolution. Food, Agriculture, and the Environment Discussion Paper, 28. Washington, D. C.: International Food Policy Research Institute, 2009.Farrer, K. T. H. “Callister, Cyril Percy (1893-1949)”. Australian Dictionary of Biography 7. Melbourne: Melbourne University Press, 1979. 527-8.Fillaudeaua, L., P. Blanpain-Avetb and G. Daufinc. “Water, Wastewater and Waste Management in Brewing Industries”. Journal of Cleaner Production 14.5 (2006): 463-71.Fiske, J., B. Hodge and G. Turner. Myths of Oz: Reading Australian Popular Culture. Sydney: Allen & Unwin, 1987.Foster’s Group Limited. Transforming Fosters: Sustainability Report 2009.16 June 2010 ‹http://fosters.ice4.interactiveinvestor.com.au/Fosters0902/2009SustainabilityReport/EN/body.aspx?z=1&p=-1&v=2&uid›.George Patterson Young and Rubicam (GPYR). Brand Asset Valuator, 2009. 6 Aug. 2010 ‹http://www.brandassetconsulting.com/›.Harper, M., and R. White. Symbols of Australia. UNSW, Sydney: UNSW Press, 2010.Henningsson, S., K. Hyde, A. Smith, and M. Campbell. “The Value of Resource Efficiency in the Food Industry: A Waste Minimisation Project in East Anglia, UK”. Journal of Cleaner Production 12.5 (June 2004): 505-12.Hickman, M. “Exposed: The Big Waste Scandal”. The Independent, 9 July 2009. 18 June 2010 ‹http://www.independent.co.uk/life-style/food-and-drink/features/exposed-the-big-waste-scandal-1737712.html›.Ivory, K. “Australia’s Vegemite”. Hemispheres (Jan. 1998): 83-5.Khamis, S. “Buy Australiana: Diggers, Drovers and Vegemite”. Write/Up. Eds. E. Hartrick, R. Hogg and S. Supski. St Lucia: API Network and UQP, 2004. 121-30.Lagan, B. “Australia Finds a New Power Source—Beer”. The Times 5 May 2007. 18 June 2010 ‹http://www.timesonline.co.uk/tol/news/science/article1749835.ece›.Laufenberg, G., B. Kunz and M. Nystroem. “Transformation of Vegetable Waste into Value Added Products: (A) The Upgrading Concept; (B) Practical Implementations [review paper].” Bioresource Technology 87 (2003): 167-98.Luck, P. Australian Icons: Things That Make Us What We Are. Melbourne: William Heinemann Australia, 1992.MacDonald, D. H., and B. Dyack. Exploring the Institutional Impediments to Conservation and Water Reuse—National Issues: Report for the Australian Water Conservation and Reuse Research Program. March. CSIRO Land and Water, 2004.Myer, R. O., J. H. Brendemuhl, and D. D. Johnson. “Evaluation of Dehydrated Restaurant Food Waste Products as Feedstuffs for Finishing Pigs”. Journal of Animal Science 77.3 (1999): 685-92.Pittaway, M. The Big Vegemite Party Book. Melbourne: Hill of Content, 1992. Powerhouse Museum. Collection & Research. 16 June 2010.Renne, E. P. “All Right, Vegemite!: The Everyday Constitution of an Australian National Identity”. Visual Anthropology 6.2 (1993): 139-55.Richardson, K. “Vegemite, Soldiers, and Rosy Cheeks”. Gastronomica 3.4 (Fall 2003): 60-2.Rood, D. “Vegemite Spreads the News of a Happy Little Milestone”. Sydney Morning Herald 6 Oct. 2008. 16 March 2010 ‹http://www.smh.com.au/news/national/vegemite-spreads-the-news-of-a-happy-little-milestone/2008/10/05/1223145175371.html›.———. “Vegemite Toasts a Billion Jars”. The Age 6 Oct. 2008. 16 March 2010 ‹http://www.theage.com.au/national/vegemite-toasts-a-billion-jars-20081005-4uc1.html›.Royte, E. Garbage Land: On the Secret Trail of Trash. New York: Back Bay Books, 2006.Rozin, P., and M. Siegal “Vegemite as a Marker of National Identity”. Gastronomica 3.4 (Fall 2003): 63-7.Scanlan, J. On Garbage. London: Reaktion Books, 2005.Stuart, T. Waste: Uncovering the Global Food Scandal. New York: W. W. Norton & Company, 2009.Superbrands. Superbrands: An Insight into Many of Australia’s Most Trusted Brands. Vol IV. Ingleside, NSW: Superbrands, 2004.Symons, M. One Continuous Picnic: A History of Eating in Australia. Ringwood: Penguin Books, 1982.Wang, J., O. Stabnikova, V. Ivanov, S. T. Tay, and J. Tay. “Intensive Aerobic Bioconversion of Sewage Sludge and Food Waste into Fertiliser”. Waste Management & Research 21 (2003): 405-15.White, R. S. “Popular Culture as the Everyday: A Brief Cultural History of Vegemite”. Australian Popular Culture. Ed. I. Craven. Cambridge UP, 1994. 15-21.Yu, P. H., H. Chua, A. L. Huang, W. Lo, and G. Q. Chen. “Conversion of Food Industrial Wastes into Bioplastics”. Applied Biochemistry and Biotechnology 70-72.1 (March 1998): 603-14.
APA, Harvard, Vancouver, ISO, and other styles
41

Matthews, Nicole, Sherman Young, David Parker, and Jemina Napier. "Looking across the Hearing Line?: Exploring Young Deaf People’s Use of Web 2.0." M/C Journal 13, no. 3 (June 30, 2010). http://dx.doi.org/10.5204/mcj.266.

Full text
Abstract:
IntroductionNew digital technologies hold promise for equalising access to information and communication for the Deaf community. SMS technology, for example, has helped to equalise deaf peoples’ access to information and made it easier to communicate with both deaf and hearing people (Tane Akamatsu et al.; Power and Power; Power, Power, and Horstmanshof; Valentine and Skelton, "Changing", "Umbilical"; Harper). A wealth of anecdotal evidence and some recent academic work suggests that new media technology is also reshaping deaf peoples’ sense of local and global community (Breivik "Deaf"; Breivik, Deaf; Brueggeman). One focus of research on new media technologies has been on technologies used for point to point communication, including communication (and interpretation) via video (Tane Akamatsu et al.; Power and Power; Power, Power, and Horstmanshof). Another has been the use of multimedia technologies in formal educational setting for pedagogical purposes, particularly English language literacy (e.g. Marshall Gentry et al.; Tane Akamatsu et al.; Vogel et al.). An emphasis on the role of multimedia in deaf education is understandable, considering the on-going highly politicised contest over whether to educate young deaf people in a bilingual environment using a signed language (Swanwick & Gregory). However, the increasing significance of social and participatory media in the leisure time of Westerners suggests that such uses of Web 2.0 are also worth exploring. There have begun to be some academic accounts of the enthusiastic adoption of vlogging by sign language users (e.g. Leigh; Cavander and Ladner) and this paper seeks to add to this important work. Web 2.0 has been defined by its ability to, in Denise Woods’ word, “harness collective intelligence” (19.2) by providing opportunities for users to make, adapt, “mash up” and share text, photos and video. As well as its well-documented participatory possibilities (Bruns), its re-emphasis on visual (as opposed to textual) communication is of particular interest for Deaf communities. It has been suggested that deaf people are a ‘visual variety of the human race’ (Bahan), and the visually rich presents new opportunities for visually rich forms of communication, most importantly via signed languages. The central importance of signed languages for Deaf identity suggests that the visual aspects of interactive multimedia might offer possibilities of maintenance, enhancement and shifts in those identities (Hyde, Power and Lloyd). At the same time, the visual aspects of the Web 2.0 are often audio-visual, such that the increasingly rich resources of the net offer potential barriers as well as routes to inclusion and community (see Woods; Ellis; Cavander and Ladner). In particular, lack of captioning or use of Auslan in video resources emerges as a key limit to the accessibility of the visual Web to deaf users (Cahill and Hollier). In this paper we ask to what extent contemporary digital media might create moments of permeability in what Krentz has called “the hearing line, that invisible boundary separating deaf and hearing people”( 2)”. To provide tentative answers to these questions, this paper will explore the use of participatory digital media by a group of young Deaf people taking part in a small-scale digital moviemaking project in Sydney in 2009. The ProjectAs a starting point, the interdisciplinary research team conducted a video-making course for young deaf sign language users within the Department of Media, Music and Cultural Studies at Macquarie University. The research team was comprised of one deaf and four hearing researchers, with expertise in media and cultural studies, information technology, sign language linguistics/ deaf studies, and signed language interpreting. The course was advertised through the newsletter of partner organization the NSW Deaf Society, via a Sydney bilingual deaf school and through the dense electronic networks of Australian deaf people. The course attracted fourteen participants from NSW, Western Australia and Queensland ranging in age from 10 to 18. Twelve of the participants were male, and two female. While there was no aspiration to gather a representative group of young people, it is worth noting there was some diversity within the group: for example, one participant was a wheelchair user while another had in recent years moved to Sydney from Africa and had learned Auslan relatively recently. Students were taught a variety of storytelling techniques and video-making skills, and set loose in groups to devise, shoot and edit a number of short films. The results were shared amongst the class, posted on a private YouTube channel and made into a DVD which was distributed to participants.The classes were largely taught in Auslan by a deaf teacher, although two sessions were taught by (non-deaf) members of Macquarie faculty, including an AFI award winning director. Those sessions were interpreted into Auslan by a sign language interpreter. Participants were then allowed free creative time to shoot video in locations of their choice on campus, or to edit their footage in the computer lab. Formal teaching sessions lasted half of each day – in the afternoons, participants were free to use the facilities or participate in a range of structured activities. Participants were also interviewed in groups, and individually, and their participation in the project was observed by researchers. Our research interest was in what deaf young people would choose to do with Web 2.0 technologies, and most particularly the visually rich elements of participatory and social media, in a relatively unstructured environment. Importantly, our focus was not on evaluating the effectiveness of multimedia for teaching deaf young people, or the level of literacy deployed by deaf young people in using the applications. Rather we were interested to discover the kinds of stories participants chose to tell, the ways they used Web 2.0 applications and the modalities of communication they chose to use. Given that Auslan was the language of instruction of the course, would participants draw on the tradition of deaf jokes and storytelling and narrate stories to camera in Auslan? Would they use the format of the “mash-up”, drawing on found footage or photographs? Would they make more filmic movies using Auslan dialogue? How would they use captions and text in their movies: as subtitles for Auslan dialogue? As an alternative to signing? Or not at all? Our observations from the project point to the great significance of the visual dimensions of Web 2.0 for the deaf young people who participated in the project. Initially, this was evident in the kind of movies students chose to make. Only one group – three young people in their late teens which included both of the young women in the class - chose to make a dialogue heavy movie, a spoof of Charlie’s Angels, entitled Deaf Angels. This movie included long scenes of the Angels using Auslan to chat together, receiving instruction from “Charlie” in sign language via videophone and recruiting “extras”, again using Auslan, to sign a petition for Auslan to be made an official Australian language. In follow up interviews, one of the students involved in making this film commented “my clip is about making a political statement, while the other [students in the class] made theirs just for fun”. The next group of (three) films, all with the involvement of the youngest class member, included signed storytelling of a sort readily recognisable from signed videos on-line: direct address to camera, with the teller narrating but also taking on the roles of characters and presenting their dialogue directly via the sign language convention of “role shift” - also referred to as constructed action and constructed dialogue (Metzger). One of these movies was an interesting hybrid. The first half of the four minute film had two young actors staging a hold-up at a vending machine, with a subsequent chase and fight scene. Like most of the films made by participants in the class, it included only one line of signed dialogue, with the rest of the narrative told visually through action. However, at the end of the action sequence, with the victim safely dead, the narrative was then retold by one of the performers within a signed story, using conventions typically observed in signed storytelling - such as role shift, characterisation and spatial mapping (Mather & Winston; Rayman; Wilson).The remaining films similarly drew on action and horror genres with copious use of chase and fight scenes and melodramatic and sometimes quite beautiful climactic death tableaux. The movies included a story about revenging the death of a brother; a story about escaping from jail; a short story about a hippo eating a vet; a similar short comprised of stills showing a sequence of executions in the computer lab; and a ghost story. Notably, most of these movies contained very little dialogue – with only one or two lines of signed dialogue in each four to five minute video (with the exception of the gun handshape used in context to represent the object liberally throughout most films). The kinds of movies made by this limited group of people on this one occasion are suggestive. While participants drew on a number of genres and communication strategies in their film making, the researchers were surprised at how few of the movies drew on traditions of signed storytelling or jokes– particularly since the course was targeted at deaf sign language users and promoted as presented in Auslan. Consequently, our group of students were largely drawn from the small number of deaf schools in which Auslan is the main language of instruction – an exceptional circumstance in an Australian setting in which most deaf young people attend mainstream schools (Byrnes et al.; Power and Hyde). Looking across the Hearing LineWe can make sense of the creative choices made by the participants in the course in a number of ways. Although methods of captioning were briefly introduced during the course, iMovie (the package which participants were using) has limited captioning functionality. Indeed, one student, who was involved in making the only clip to include captioning which contextualised the narrative, commented in follow-up interviews that he would have liked more information about captioning. It’s also possible that the compressed nature of the course prevented participants from undertaking the time-consuming task of scripting and entering captions. As well as being the most fun approach to the projects, the use of visual story telling was probably the easiest. This was perhaps exacerbated by the lack of emphasis on scriptwriting (outside of structural elements and broad narrative sweeps) in the course. Greater emphasis on that aspect of film-making would have given participants a stronger foundational literacy for caption-based projectsDespite these qualifications, both the movies made by students and our observations suggest the significance of a shared visual culture in the use of the Web by these particular young people. During an afternoon when many of the students were away swimming, one student stayed in the lab to use the computers. Rather than working on a video project, he spent time trawling through YouTube for clips purporting to show ghost sightings and other paranormal phenomena. He drew these clips to the attention of one of the research team who was present in the lab, prompting a discussion about the believability of the ghosts and supernatural apparitions in the clips. While some of the clips included (uncaptioned) off-screen dialogue and commentary, this didn’t seem to be a barrier to this student’s enjoyment. Like many other sub-genres of YouTube clips – pranks, pratfalls, cute or alarmingly dangerous incidents involving children and animals – these supernatural videos as a genre rely very little on commentary or dialogue for their meaning – just as with the action films that other students drew on so heavily in their movie making. In an E-Tech paper entitled "The Cute Cat Theory of Digital Activism", Ethan Zuckerman suggests that “web 1.0 was invented to allow physicists to share research papers and web 2.0 was created to allow people to share pictures of cute cats”. This comment points out both the Web 2.0’s vast repository of entertaining material in the ‘funny video’genre which is visually based, dialogue free, entertaining material accessible to a wide range of people, including deaf sign language users. In the realm of leisure, at least, the visually rich resources of Web 2.0’s ubiquitous images and video materials may be creating a shared culture in which the line between hearing and deaf people’s entertainment activities is less clear than it may have been in the past. The ironic tone of Zuckerman’s observation, however, alerts us to the limits of a reliance on language-free materials as a route to accessibility. The kinds of videos that the participants in the course chose to make speaks to the limitations as well as resources offered by the visual Web. There is still a limited range of captioned material on You Tube. In interviews, both young people and their teachers emphasised the central importance of access to captioned video on-line, with the young people we interviewed strongly favouring captioned video over the inclusion on-screen of simultaneous signed interpretations of text. One participant who was a regular user of a range of on-line social networking commented that if she really liked the look of a particular movie which was uncaptioned, she would sometimes contact its maker and ask them to add captions to it. Interestingly, two student participants emphasised in interviews that signed video should also include captions so hearing people could have access to signed narratives. These students seemed to be drawing on ideas about “reverse discrimination”, but their concern reflected the approach of many of the student movies - using shared visual conventions that made their movies available to the widest possible audience. All the students were anxious that hearing people could understand their work, perhaps a consequence of the course’s location in the University as an overwhelmingly hearing environment. In this emphasis on captioning rather than sign as a route to making media accessible, we may be seeing a consequence of the emphasis Krentz describes as ubiquitous in deaf education “the desire to make the differences between deaf and hearing people recede” (16). Krentz suggests that his concept of the ‘hearing line’ “must be perpetually retested and re-examined. It reveals complex and shifting relationships between physical difference, cultural fabrication and identity” (7). The students’ movies and attitudes emphasised the reality of that complexity. Our research project explored how some young Deaf people attempted to create stories capable of crossing categories of deafness and ‘hearing-ness’… unstable (like other identity categories) while others constructed narratives that affirmed Deaf Culture or drew on the Deaf storytelling traditions. This is of particular interest in the Web 2.0 environment, given that its technologies are often lauded as having the politics of participation. The example of the Deaf Community asks reasonable questions about the validity of those claims, and it’s hard to escape the conclusion that there is still less than appropriate access and that some users are more equal than others.How do young people handle the continuing lack of material available to the on the Web? The answer repeatedly offered by our young male interviewees was ‘I can’t be bothered’. As distinct from “I can’t understand” or “I won’t go there” this answer, represented a disengagement from demands to identify your literacy levels, reveal your preferred means of communication; to rehearse arguments about questions of access or expose attempts to struggle to make sense of texts that fail to employ readily accessible means of communicating. Neither an admission of failure or a demand for change, CAN’T-BE-BOTHERED in this context offers a cool way out of an accessibility impasse. This easily-dismissed comment in interviews was confirmed in a whole-group discussions, when students came to a consensus that if when searching for video resources on the Net they found video that included neither signing nor captions, they would move on to find other more accessible resources. Even here, though, the ground continues to shift. YouTube recently announced that it was making its auto-captioning feature open to everybody - a machine generated system that whilst not perfect does attempt to make all YouTube videos accessible to deaf people. (Bertolucci).The importance of captioning of non-signed video is thrown into further significance by our observation from the course of the use of YouTube as a search engine by the participants. Many of the students when asked to research information on the Web bypassed text-based search engines and used the more visual results presented on YouTube directly. In research on deaf adolescents’ search strategies on the Internet, Smith points to the promise of graphical interfaces for deaf young people as a strategy for overcoming the English literacy difficulties experienced by many deaf young people (527). In the years since Smith’s research was undertaken, the graphical and audiovisual resources available on the Web have exploded and users are increasingly turning to these resources in their searches, providing new possibilities for Deaf users (see for instance Schonfeld; Fajardo et al.). Preliminary ConclusionsA number of recent writers have pointed out the ways that the internet has made everyday communication with government services, businesses, workmates and friends immeasurably easier for deaf people (Power, Power and Horstmanshof; Keating and Mirus; Valentine and Skelton, "Changing", "Umbilical"). The ready availability of information in a textual and graphical form on the Web, and ready access to direct contact with others on the move via SMS, has worked against what has been described as deaf peoples’ “information deprivation”, while everyday tasks – booking tickets, for example – are no longer a struggle to communicate face-to-face with hearing people (Valentine and Skelton, "Changing"; Bakken 169-70).The impacts of new technologies should not be seen in simple terms, however. Valentine and Skelton summarise: “the Internet is not producing either just positive or just negative outcomes for D/deaf people but rather is generating a complex set of paradoxical effects for different users” (Valentine and Skelton, "Umbilical" 12). They note, for example, that the ability, via text-based on-line social media to interact with other people on-line regardless of geographic location, hearing status or facility with sign language has been highly valued by some of their deaf respondents. They comment, however, that the fact that many deaf people, using the Internet, can “pass” minimises the need for hearing people in a phonocentric society to be aware of the diversity of ways communication can take place. They note, for example, that “few mainstream Websites demonstrate awareness of D/deaf peoples’ information and communication needs/preferences (eg. by incorporating sign language video clips)” ("Changing" 11). As such, many deaf people have an enhanced ability to interact with a range of others, but in a mode favoured by the dominant culture, a culture which is thus unchallenged by exposure to alternative strategies of communication. Our research, preliminary as it is, suggests a somewhat different take on these complex questions. The visually driven, image-rich approach taken to movie making, Web-searching and information sharing by our participants suggests the emergence of a certain kind of on-line culture which seems likely to be shared by deaf and hearing young people. However where Valentine and Skelton suggest deaf people, in order to participate on-line, are obliged to do so, on the terms of the hearing majority, the increasingly visual nature of Web 2.0 suggests that the terrain may be shifting – even if there is still some way to go.AcknowledgementsWe would like to thank Natalie Kull and Meg Stewart for their research assistance on this project, and participants in the course and members of the project’s steering group for their generosity with their time and ideas.ReferencesBahan, B. "Upon the Formation of a Visual Variety of the Human Race. In H-Dirksen L. Baumann (ed.), Open Your Eyes: Deaf Studies Talking. London: University of Minnesota Press, 2007.Bakken, F. “SMS Use among Deaf Teens and Young Adults in Norway.” In R. Harper, L. Palen, and A. Taylor (eds.), The Inside Text: Social, Cultural and Design Perspectives on SMS. Netherlands: Springe, 2005. 161-74. Berners-Lee, Tim. Weaving the Web. London: Orion Business, 1999.Bertolucci, Jeff. “YouTube Offers Auto-Captioning to All Users.” PC World 5 Mar. 2010. 5 Mar. 2010 < http://www.macworld.com/article/146879/2010/03/YouTube_captions.html >.Breivik, Jan Kare. Deaf Identities in the Making: Local Lives, Transnational Connections. Washington, D.C.: Gallaudet University Press, 2005.———. “Deaf Identities: Visible Culture, Hidden Dilemmas and Scattered Belonging.” In H.G. Sicakkan and Y.G. Lithman (eds.), What Happens When a Society Is Diverse: Exploring Multidimensional Identities. Lewiston, New York: Edwin Mellen Press, 2006. 75-104.Brueggemann, B.J. (ed.). Literacy and Deaf People’s Cultural and Contextual Perspectives. Washington, DC: Gaudellet University Press, 2004. Bruns, Axel. Blogs, Wikipedia, Second Life and Beyond: From Production to Produsage. New York: Peter Lang, 2008.Byrnes, Linda, Jeff Sigafoos, Field Rickards, and P. Margaret Brown. “Inclusion of Students Who Are Deaf or Hard of Hearing in Government Schools in New South Wales, Australia: Development and Implementation of a Policy.” Journal of Deaf Studies and Deaf Education 7.3 (2002): 244-257.Cahill, Martin, and Scott Hollier. Social Media Accessibility Review 1.0. Media Access Australia, 2009. Cavender, Anna, and Richard Ladner. “Hearing Impairments.” In S. Harper and Y. Yesilada (eds.), Web Accessibility. London: Springer, 2008.Ellis, Katie. “A Purposeful Rebuilding: YouTube, Representation, Accessibility and the Socio-Political Space of Disability." Telecommunications Journal of Australia 60.2 (2010): 1.1-21.12.Fajardo, Inmaculada, Elena Parra, and Jose J. Canas. “Do Sign Language Videos Improve Web Navigation for Deaf Signer Users?” Journal of Deaf Studies and Deaf Education 15.3 (2009): 242-262.Harper, Phil. “Networking the Deaf Nation.” Australian Journal of Communication 30.3 (2003): 153-166.Hyde, M., D. Power, and K. Lloyd. "W(h)ither the Deaf Community? Comments on Trevor Johnston’s Population, Genetics and the Future of Australian Sign Language." Sign Language Studies 6.2 (2006): 190-201. Keating, Elizabeth, and Gene Mirus. “American Sign Language in Virtual Space: Interactions between Deaf Users of Computer-Mediated Video.” Language in Society 32.5 (Nov. 2003): 693-714.Krentz, Christopher. Writing Deafness: The Hearing Line in Nineteenth-Century Literature. Chapel Hill, NC: University of North Carolina Press, 2007.Leigh, Irene. A Lens on Deaf Identities. Oxford: Oxford UP. 2009.Marshall Gentry, M., K.M. Chinn, and R.D. Moulton. “Effectiveness of Multimedia Reading Materials When Used with Children Who Are Deaf.” American Annals of the Deaf 5 (2004): 394-403.Mather, S., and E. Winston. "Spatial Mapping and Involvement in ASL Storytelling." In C. Lucas (ed.), Pinky Extension and Eye Gaze: Language Use in Deaf Communities. Washington, DC: Gallaudet University Press, 1998. 170-82.Metzger, M. "Constructed Action and Constructed Dialogue in American Sign Language." In C. Lucas (ed.), Sociolinguistics in Deaf Communities. Washington, DC: Gallaudet University Press, 1995. 255-71.Power, Des, and G. Leigh. "Principles and Practices of Literacy Development for Deaf Learners: A Historical Overview." Journal of Deaf Studies and Deaf Education 5.1 (2000): 3-8.Power, Des, and Merv Hyde. “The Characteristics and Extent of Participation of Deaf and Hard-of-Hearing Students in Regular Classes in Australian Schools.” Journal of Deaf Studies and Deaf Education 7.4 (2002): 302-311.Power, M., and D. Power “Everyone Here Speaks TXT: Deaf People Using SMS in Australia and the Rest of the World.” Journal of Deaf Studies and Deaf Education 9.3 (2004). Power, M., D. Power, and L. Horstmanshof. “Deaf People Communicating via SMS, TTY, Relay Service, Fax, and Computers in Australia.” Journal of Deaf Studies and Deaf Education 12.1 (2007): 80-92. Rayman, J. "Storytelling in the Visual Mode: A Comparison of ASL and English." In E. Wilson (ed.), Storytelling & Conversation: Discourse in Deaf Communities. Washington, DC: Gallaudet University Press, 2002. 59-82.Schonfeld, Eric. "ComScore: YouTube Now 25 Percent of All Google Searches." Tech Crunch 18 Dec. 2008. 14 May 2009 < http://www.techcrunch.com/2008/12/18/comscore-YouTube-now-25-percent-of-all-google-searches/?rss >.Smith, Chad. “Where Is It? How Deaf Adolescents Complete Fact-Based Internet Search Tasks." American Annals of the Deaf 151.5 (2005-6).Swanwick, R., and S. Gregory (eds.). Sign Bilingual Education: Policy and Practice. Coleford: Douglas McLean Publishing, 2007.Tane Akamatsu, C., C. Mayer, and C. Farrelly. “An Investigation of Two-Way Text Messaging Use with Deaf Students at the Secondary Level.” Journal of Deaf Studies and Deaf Education 11.1 (2006): 120-131.Valentine, Gill, and Tracy Skelton. “Changing Spaces: The Role of the Internet in Shaping Deaf Geographies.” Social and Cultural Geography 9.5 (2008): 469-85.———. “‘An Umbilical Cord to the World’: The Role of the Internet in D/deaf People’s Information and Communication Practices." Information, Communication and Society 12.1 (2009): 44-65.Vogel, Jennifer, Clint Bowers, Cricket Meehan, Raegan Hoeft, and Kristy Bradley. “Virtual Reality for Life Skills Education: Program Evaluation.” Deafness and Education International 61 (2004): 39-47.Wilson, J. "The Tobacco Story: Narrative Structure in an ASL Story." In C. Lucas (ed.), Multicultural Aspects of Sociolinguistics in Deaf Communities. Washington, DC: Gallaudet University Press, 1996. 152-80.Winston (ed.). Storytelling and Conversation: Discourse in Deaf Communities. Washington, D.C: Gallaudet University Press. 59-82.Woods, Denise. “Communicating in Virtual Worlds through an Accessible Web 2.0 Solution." Telecommunications Journal of Australia 60.2 (2010): 19.1-19.16YouTube Most Viewed. Online video. YouTube 2009. 23 May 2009 < http://www.YouTube.com/browse?s=mp&t=a >.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography