To see the other types of publications on this topic, follow the link: E-voting technologies.

Journal articles on the topic 'E-voting technologies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 39 journal articles for your research on the topic 'E-voting technologies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Raichel, Madona, and Anitha Sandeep. "e-Voting System: Technologies and Implementations." International Journal of Computer Applications 117, no. 24 (May 20, 2015): 4–7. http://dx.doi.org/10.5120/20700-3348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hsu, Jeffrey, Qiyang Chen, and Gary Bronson. "Evaluating the Usability of E-Voting Technologies." International Journal of Information Systems and Social Change 6, no. 2 (April 2015): 16–33. http://dx.doi.org/10.4018/ijissc.2015040102.

Full text
Abstract:
Voting has been an accepted means for electing candidates, receiving public approval for referendums and budgets, and for many other tasks where the will of the people, whether a broad population or a select group, can be recorded and measured in a tangible way. Because of advances in technology, together with problems inherent in manual forms of voting, the concepts and issues relating to electronic voting (e-voting) and various other technology-based forms, are been proposed, discussed, and examined. The goal of all such systems is the casting and recording of the votes from eligible voters as they intended to be cast, with adequate security. This security requires that there be no identifiable connection between the voter and the vote that is cast, while providing an audit trail that can be used to validate that every vote was counted and tallied, as cast. The focus of this paper is to examine electronic voting technologies from the perspective of usability in controlled environments. Current research has shown that such systems form the majority of the nascent e-voting technologies, primarily because they have come closest to solving the usability and security issues inherent in technology–based voting systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Pardue, Harold, Jeffrey P. Landry, and Alec Yasinsac. "E-Voting Risk Assessment." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 19–35. http://dx.doi.org/10.4018/jisp.2011070102.

Full text
Abstract:
Approximately 25% (according to http://verifiedvoting.com/) of voting jurisdictions use direct recording electronic systems to record votes. Accurate tabulation of voter intent is critical to safeguard this fundamental act of democracy: voting. Electronic voting systems are known to be vulnerable to attack. Assessing risk to these systems requires a systematic treatment and cataloging of threats, vulnerabilities, technologies, controls, and operational environments. This paper presents a threat tree for direct recording electronic (DRE) voting systems. The threat tree is organized as a hierarchy of threat actions, the goal of which is to exploit a system vulnerability in the context of specific technologies, controls, and operational environment. As an abstraction, the threat tree allows the analyst to reason comparatively about threats. A panel of elections officials, security experts, academics, election law attorneys, representatives from governmental agencies, voting equipment vendors, and voting equipment testing labs vetted the DRE threat tree. The authors submit that the DRE threat tree supports both individual and group risk assessment processes and techniques.
APA, Harvard, Vancouver, ISO, and other styles
4

Alvarez, R. Michael, Ines Levin, Julia Pomares, and Marcelo Leiras. "Voting Made Safe and Easy: The Impact of e-voting on Citizen Perceptions." Political Science Research and Methods 1, no. 1 (June 2013): 117–37. http://dx.doi.org/10.1017/psrm.2013.2.

Full text
Abstract:
Voting technologies frame the voting experience. Different ways of presenting information to voters, registering voter choices and counting ballots may change the voting experience and cause individuals to re-evaluate the legitimacy of the electoral process. Yet few field experiments have evaluated how voting technologies affect the voting experience. This article uses unique data from a recent e-voting field experiment in Salta, Argentina to study these questions. It employs propensity-score matching methods to measure the causal effect of replacing traditional voting technology with e-voting on the voting experience. The study's main finding is that while e-voters perceive the new technology as easier to use and more likely to register votes as intended—and support replacing traditional voting technologies with e-voting—the new technologies also raise some concerns about ballot secrecy.
APA, Harvard, Vancouver, ISO, and other styles
5

Lahane, Anita A., Junaid Patel, Talif Pathan, and Prathmesh Potdar. "Blockchain technology based e-voting system." ITM Web of Conferences 32 (2020): 03001. http://dx.doi.org/10.1051/itmconf/20203203001.

Full text
Abstract:
Election could be a important event during a trendy democracy however massive sections of society round the world don’t trust their election system that is major concern for the democracy. Even the world’s largest democracies like Republic of India, us, and Japan still suffer from a blemished legal system. Vote rigging, hacking of the EVM (Electronic vote machine), election manipulation, and booth capturing square measure the key problems within the current electoral system. during this system, we tend to square measure work the problems|the problems within the election vote systems and attempting to propose the E-voting model which might resolve these issues. The system can highlight a number of the popular blockchain frameworks that provide blockchain as a service and associated electronic E-voting system that is predicated on blockchain that addresses all limitations severally, it additionally preserve participant’s obscurity whereas still being hospitable public examination. Building Associate in Nursing electronic electoral system that satisfies the legal necessities of legislators has been a challenge for an extended time. Distributed ledger technologies is Associate in Nursing exciting technological advancement within the info technology world. Blockchain technologies supply Associate in Nursing infinite vary of applications cashing in on sharing economies. Blockchain could be a unquiet technology of current era and guarantees to enhance the resilience of e-voting systems. this technique presents a shot to leverage edges of blockchain like cryptological foundations and transparency to attain an efficient theme for e-voting. The projected theme conforms to the elemental necessities for e-voting schemes and achieves end-to-end verifiability. The system presents in-depth analysis of the theme that with success demonstrates its effectiveness to attain Associate in Nursing end-to-end verifiable e-voting theme.
APA, Harvard, Vancouver, ISO, and other styles
6

Avgerou, Chrisanthi, Silvia Masiero, and Angeliki Poulymenakou. "Trusting e-voting amid experiences of electoral malpractice: The case of Indian elections." Journal of Information Technology 34, no. 3 (February 1, 2019): 263–89. http://dx.doi.org/10.1177/0268396218816199.

Full text
Abstract:
This article constructs explanatory theory on trust in e-voting, a term that refers to the use of stand-alone IT artefacts in voting stations. We study e-voting as a techno-organisational arrangement embedded in the process of elections and the broader socio-economic context of a country. Following a critical realist approach, we apply retroduction and retrodiction principles to build theory by complementing existing studies of e-voting with insights from an in-depth case study of elections in India. First, we seek evidence of trust in e-voting in the responses of the public to the announcement of election results. Then we derive the following four mechanisms of trust creation or loss: the association of e-voting with the production of positive democratic effects; the making of e-voting part of the mission and identity of electoral authorities; the cultivation of a positive public attitude to IT with policies for IT-driven socio-economic development; and, in countries with turbulent political cultures, a clear distinction between the experience of voting as orderly and experiences of malpractice in other election tasks. We suggest that these mechanisms explain the different experience with e-voting of different countries. Attention to them helps in assessing the potential of electoral technologies in countries that are currently adopting them, especially fragile democracies embarking upon e-voting.
APA, Harvard, Vancouver, ISO, and other styles
7

Musiał-Karg, Magdalena, and Izabela Kapsa. "Polish Mass Media Coverage and Public Opinion on E-democracy." Medijske studije 12, no. 23 (July 23, 2021): 2–18. http://dx.doi.org/10.20901/ms.12.23.1.

Full text
Abstract:
The rapid development of new technologies and their impressive communication capacity has fundamentally changed modern democracy by providing easy and universal access to information, as well as increasing participation and accessibility of political involvement tools. One of the electoral participation tools is e-voting which has been used in only a few countries. The main aim of the paper is to explore whether and how e-voting has been presented in Polish mass media (1), as well as to investigate people’s opinions about e-voting against certain political factors (2). The research is based on a media content analysis (quantitative and qualitative), data collected via the Content Analysis System for Television (CAST) and a quantitative analysis of data from a survey conducted by the authors (2018, sample: 1717 Poles). The results of the analyses show that the debate on the implementation of e-voting is rather poor, but the support for e-voting among Poles remains considerable. The public media rhetoric is interlinked with attitudes towards political parties. To some extent, determinants are reflected in the public opinion on the implementation of e-voting since Poles declare both their support for the introduction of e-voting and willingness to vote online.
APA, Harvard, Vancouver, ISO, and other styles
8

Rane, Lokesh. "Secure Digital E-Voting System using Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 10, 2021): 164–67. http://dx.doi.org/10.22214/ijraset.2021.36283.

Full text
Abstract:
Technology has great positive impacts on numerous aspects of our social life. Designing a globally connected architecture enables simple access to a range of resources and services. Furthermore, technology rather just like the internet has been a fertile ground for innovation and creativity. The blockchain technology is presented as a game-changer for several existing and emerging technologies. With its immutability property and decentralized architecture, it's taking center stage in many services as an equalization factor to the current parity between consumers and big corporations/governments. one among the fields during which blockchain application is used is E-voting. The target of such a scheme would be to produce a decentralized architecture to run and support a voting scheme that's open, fair, and independently verifiable. this might propose a possible new e-voting protocol that utilizes the blockchain as a transparent box. The protocol helps to attain fundamental e-voting properties additionally as offer a degree of decentralization.
APA, Harvard, Vancouver, ISO, and other styles
9

MUSIAŁ-KARG, Magdalena. "Internetowe głosowanie w E-stonii na przykładzie wyborów w latach 2005–2009." Przegląd Politologiczny, no. 3 (November 2, 2018): 99–118. http://dx.doi.org/10.14746/pp.2011.16.3.6.

Full text
Abstract:
An increasingly popular tendency can be observed in numerous states in Europe and globally, where modern forms of casting votes are implemented, including, first and foremost, electronic voting via the Internet or mobile telephones. In the opinion of ICT (Information and Communication Technologies) advocates modern civilization is facing an era of electronic democracy, which constitutes this new form of exercising power, based on information and communication tools. Estonia is a European leader in applying electronic voting for election procedures. The paper presents an analysis of Estonia’s experience in the field of e-voting in the elections of 2005–2009.
APA, Harvard, Vancouver, ISO, and other styles
10

MUSIAŁ -KARG, Magdalena MUSIAŁ KARG. "Głosowanie elektroniczne – nowe wyzwanie dla demokracji?" Przegląd Politologiczny, no. 4 (November 2, 2018): 123–34. http://dx.doi.org/10.14746/pp.2010.15.4.10.

Full text
Abstract:
The notion of democracy poses a significant challenge and problem in modern considerations on history, philosophy and politics. At present, in the face of the so-called information revolution, democracy has undoubtedly undergone profound and easily visible transformations. It can be said that the application of IT to exercise democratic power has brought about a revolution that will span a period of many years, given the different potential differing states have to spread the new technologies. The development of information and communications technology (ICT) has introduced new notions related to democracy, such as teledemocracy, technopolitics or electronic democracy (e-democracy). The subject of this paper, electronic voting (e-voting) is among the highly significant instruments of e-democracy. Electronic voting is the fulfillment of the principle of national sovereignty as it can be applied in the procedures of both indirect (e-elections) and direct (e-referendum) democracy.
APA, Harvard, Vancouver, ISO, and other styles
11

Kishor Chaudhari, Umang, A. Vijaya Kumar, and G. Venkata Sai. "Enhanced Security using Secure Multiparty Computation to E-voting application in cloud." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 803. http://dx.doi.org/10.14419/ijet.v7i2.7.10983.

Full text
Abstract:
Secure outsourcing of computation on sensitive data is an important topic that has received a lot of attention recently. E-Voting system is interested in method collaboration system to ameliorate the quality of System. Cloud computing is integrating in communication and information technologies in the E-Voting. In fact, the paradigm is to provide the computational resources or result at the end of the services. Further it needs to reveal the voting information result but if faces several challenges in the security it must be overcome without reveal any sensitive data to unauthorized parties. To accomplish this objective, we proposed secure multiparty computation techniques (SMC). The main aim of our work is to use the suitable model for parties to together compute their function based on their inputs without revealing their private inputs. The idea behind is the several collaborate system use to their shared objectives without allow any gathering to information and private information.
APA, Harvard, Vancouver, ISO, and other styles
12

Choi, Sang Ok, and Byung Cho Kim. "Voter Intention to Use E-Voting Technologies: Security, Technology Acceptance, Election Type, and Political Ideology." Journal of Information Technology & Politics 9, no. 4 (October 2012): 433–52. http://dx.doi.org/10.1080/19331681.2012.710042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kassen, Maxat. "Politicization of e-voting rejection: reflections from Kazakhstan." Transforming Government: People, Process and Policy 14, no. 2 (May 4, 2020): 305–30. http://dx.doi.org/10.1108/tg-11-2019-0106.

Full text
Abstract:
Purpose Despite certain political, organizational, technological and socioeconomic benefits that e-voting brings, governments around the world are beginning one by one to denounce its further use in the electoral process. In this regard, the paper aims to analyze reasons that led to the discontinuation of e-voting, resorting to the case of Kazakhstan, a transitional post-soviet country, which actively used the technology in 2004-2011, as a poster child of the global trend, elaborating on key political, socioeconomic, organizational and technological risks that could be associated with the possible return of this innovation in future elections. Design/methodology/approach The research is based on the combination of context and policy analysis, as well as focus groups studies and semi-structured interviews. The context analysis was aimed to understand various political and socioeconomic benefits in adopting e-voting in Kazakhstan. The policy analysis was useful in identifying implementation strategies of the government in promoting e-voting. The focus groups were helpful in understanding the perspectives of various audiences on e-voting. The semi-structured interviews were carried among independent developers in regard to the potential software products that could be used to propose new solutions in the area, including by experimenting with various blockchain platforms. Findings Analyzing the lessons from Kazakhstan, one can conclude that e-voting was introduced and used for several years by authorities in this country for certain economic and organizational benefits, but later they had to reject it and return to traditional paper ballot due to lack of confidence from the non-governmental sector in the capacity of public sector to ensure the integrity of e-voting procedures. As a result, building trust and applying innovative approaches should be a priority for policymakers in the area, if they wish to return to this technology, especially in adopting new presumably more reliable solutions based on blockchain technologies. Research limitations/implications The primary data that was collected by the author from field studies were indexed, refined and presented in a special matrix in a separate section, which were interpreted in the discussion session. These data could be used by other scholars for further interpretation and analysis in their own studies, setting new research agendas and testing hypotheses. This is a single case study research, which is focused on the analysis of reasons that led to the denunciation of e-voting in Kazakhstan, which results could be extrapolated mostly to similar transitional post-totalitarian settings. Practical implications The study can be used to inform ways of how to improve the current e-voting platforms, especially in ensuring better security and transparency of the systems, which could be useful for developers who work on blockchain-driven solutions. Social implications The results of the case study research and expert opinions expressed by various software developers in the e-government areas, which were presented in the paper, could be used by both an academic community and practitioners in understanding better a wide range of political, organizational, economic, social and technological drivers, risks and new opportunities in promoting e-voting technology as a trust generating social phenomenon. Originality/value The paper proposes the first case study of reasons that led to the discontinuation of e-voting in the context of such a typical transitional, post-totalitarian and post-soviet society as Kazakhstan, providing new insights into a wide range of political, regulatory, socioeconomic, organizational and technological aspects of related policy decision-making and implementation strategies adopted by public institutions in this country.
APA, Harvard, Vancouver, ISO, and other styles
14

Rodrigues Filho, Jose. "E-Voting and the Creation of Trust for the Socially Marginalized Citizens in Brazil." JeDEM - eJournal of eDemocracy and Open Government 2, no. 2 (September 21, 2010): 184–93. http://dx.doi.org/10.29379/jedem.v2i2.26.

Full text
Abstract:
Abstract: Information and Communication Technologies (ICTs) have been implemented in a quite intensive way in both developed and developing countries. In the discourse of the New Public Management (NPM), the principal role of ICT is to improve the delivery of public services to citizens and the distrust of public administration. In responding to distrust and the challenges facing the simplistic technological determinism discourse of ICTs in general and ICT for development in particular, building on areas of trust associated with economic development seems to have been emphasized. On the other hand, despite the influence of institutions in the design and use of ICTs as a compelling enabler of change mentioned in the theory of social shaping and the ideas of citizens’ orientation, where technological artifacts are social constructions, it seems to be evident that these institutions can reinforce the same technological determinism and trust. In this paper an attempt is made to show that the use of a technology like e-voting in Brazil has not contributed to improve political participation and the delivery of public services, despite the attempt to promote and create trust in e-voting. With a more critical view of trust, an attempt is made to show how institutions and technology are enmeshed in a structure of vested interests in the public sector in such a way that a fabricated trust is created smoothly.
APA, Harvard, Vancouver, ISO, and other styles
15

Levitskiy, V. M., and N. Yu Rohotska. "CLIENT-SERVER WEB-ORIENTED SYSTEM WITH ELEMENTS OF ANALYSIS FOR ORGANIZATION OF THE ELECTION PROCESS WITHIN THE WORK OF ASSETS STUDENT." Scientific Notes of Junior Academy of Sciences of Ukraine, no. 1(17) (2020): 51–59. http://dx.doi.org/10.51707/2618-0529-2020-17-06.

Full text
Abstract:
With the rapid development of Internet technology, the involvement of computers in almost every aspect of human life, and the increasing use of opportunities to spend their time freely and profitably, society is increasingly moving to address important issues through modern gadgets with Internet access. The government also introduces various forms of e‑activity in its practice, such as: e‑democracy, e‑government, raising public awareness of current policy issues, programs, legislative innovations, creating opportunities for advising citizens and their participation in decision-making via the Internet, is actively involved in the issue of electronic elections. The state has chosen a course for e‑democracy, it becomes a direct tool for democratization and development of society in the information direction, so it is very important to create appropriate conditions for the will of citizens. One of the ways to implement e‑democracy is “electronic voting”, which can be described as the fixation of the will of voters using electronic technology, which includes both the voting process itself and the process of automatic vote counting using electronic devices and special software. any person at a convenient time can make their own will with the help of electronic voting and modern gadgets. The article considers the development of an electronic voting system which is implemented using a client-server web-oriented system with elements of analysis. Web-system is a distributed information system with a unified data access interface based on the use of a number of open standards. The possibilities, ways and advantages of using electronic voting during the election of the heads of student self-government are analyzed, the basic principles on which the electronic electoral system should be built are described. Electronic voting is defined as a procedure for the expression of will using electronic means and as an automated process of counting votes. A program for holding elections of student self-government chairmen based on a multi-layered client-server architecture and with elements of web-application has been created. The stage of developing the architecture of the software system is very important, given that this stage determines the principles of the system, user interfaces, all components of the system and the relationships between them. During the development of this system, the main emphasis was placed on building the architecture of the application and the example of the client part, which demonstrates its capabilities, user-friendly interface and high speed. The use of selected technologies allowed to perform the task in full and create a basis for convenient expansion of functionality
APA, Harvard, Vancouver, ISO, and other styles
16

Rosacker, Kirsten M., and Robert E. Rosacker. "Voting is a right: a decade of societal, technological and experiential progress towards the goal of remote-access voting." Transforming Government: People, Process and Policy 14, no. 5 (June 29, 2020): 701–12. http://dx.doi.org/10.1108/tg-03-2020-0053.

Full text
Abstract:
Purpose This study aims to revisit and extends the work of Rosacker and Rosacker (2012) that called for increased interdisciplinary efforts to address and solve the critical issues (critical success factors) facing technologically-enabled remote-access voting platforms. It builds upon the background platform presented there, which included an historical timeline of information and communication technologies and an e-voting literature review, and extends that work by providing a state-of-the-art update and review of the rapidly changing voter environment from societal, technological and experiential studies over the past decade. Specific focus is directed at technology-enabled, remote-access voting, while also considering the important role technological advances can play in improving voter registration/confirmation procedures. Design/methodology/approach First, a brief review of significant societal and technological changes, including the rapid evolution of the internet of things, is undertaken to frame the discussion. Second, a sample of several technology-enabled, remote-access voting experiments are reviewed and critiqued. Third, currently available technical solutions targeting technology-enabled voter registration and vote casting are offered as the next step in the process that will ultimately lead to remote-access voting becoming widely deployed across smart devices. Finally, some contemporaneous conclusions are tendered. Findings Society and technology-enabled devices have each witnessed myriad changes and advancements in the second decade of the 21st century. These have led to numerous remote-access voting experiments across the globe that have overwhelmingly proven the concept of technology-enabled, remote-access voting to be viable while also identifying/reasserting issues (critical success factors) that continue to restrain its full implementation. Importantly, none of the problems identified is fatal to the concept. Originality/value This study considers the issue of technologically-enabled, remote-access voting focussing on the impacts associated with the portfolio of recent societal and technological advancements including the many vexing concerns and issues presented by the coronavirus pandemic. Social distancing is limiting access to the traditional methods of in-person voting for both election officials and voters bringing into question the November 2020 US national election. Calls for expanded mail voting options and the requisite federal funding required to support these efforts are increasing, widespread and broadly persuasive. Wholly missing in this debate is an exhaustive consideration and discussion of technologically enhanced, remote-access voting systems and their role in filling the void.
APA, Harvard, Vancouver, ISO, and other styles
17

Mudda, Mallikarjun, and Shruti Bhargava Choubey. "Application of System Engineering in Election Voting System." International Journal of Engineering & Technology 7, no. 2.16 (April 12, 2018): 102. http://dx.doi.org/10.14419/ijet.v7i2.16.11503.

Full text
Abstract:
Election System is one of the indicators of the democratic country when this country is giving equal rights to the eligible citizens to choose their leaders or to give their candidatures, to participate in the country development by criticizing the government on how thing are being done and how they want to be done (i.e. means listen the views of the citizens). An E-voting system is one of the system engineering where different technologies are applied to analyze, design and implement a dynamic system which is satisfying the user needs. In this work we are discussing on the futures of Election Management System (EMS) by mentioning some of the problems and coming up with the solutions. The system is having the strong securities in the way that the hackers cannot be able to enter our system to make any change during the registration of the voters and candidates as well as in the election period till the end of election (i.e. tabulation, store votes, and display the final election results). We are developing, designing and implementing Electronic Voting Machine composed by Hardware, Software and Network.
APA, Harvard, Vancouver, ISO, and other styles
18

WITCZAK-ROSZKOWSKA, Danuta. "The virtual dimension of socio-economic relations in european countries." Scientific Papers of Silesian University of Technology. Organization and Management Series 2020, no. 146 (2020): 509–22. http://dx.doi.org/10.29119/1641-3466.2020.146.36.

Full text
Abstract:
Purpose: The purpose of the article is to assess the level of use of information technologies by households in selected European countries and the resulting transformations in socio-economic relations. Design/methodology/approach: The article uses one of the taxonomic methods – the Hellwig’s development pattern method. 20 diagnostic features were adopted to develop Hellwig’s synthetic measure. They reflect the access and use of the Internet by households in five areas: networking and formal activities in the fields of e-government, e-banking, e-education, e-health; carrying out political and civic activities online (consulting, voting, expressing opinions); making informal contacts and participating in social networks (e.g. Facebook, Twitter, etc.); e-commerce; using instant messaging and e-mail. Findings: In the light of the characteristics adopted for the survey, the highest level of use of information technology by households is characteristic of Iceland, Norway, Denmark, Sweden, the Netherlands, Great Britain and Finland. The countries with the lowest rates are Romania and Bulgaria. Research limitations/implications: The studies presented may contribute to further in-depth analyses of the links between the use of information technologies in individual countries and their level of economic development in the long term. Originality/value: The results are addressed to public authorities in 30 European countries. On their basis, leaders in the use of information technologies by households in various areas of economic and social life were identified. The distance between the other countries was also diagnosed. The results of the research can guide public authorities in developing strategies for the development and dissemination of information technologies in their countries.
APA, Harvard, Vancouver, ISO, and other styles
19

Alvarez, R. Michael, Gabriel Katz, and Julia Pomares. "The Impact of New Technologies on Voter Confidence in Latin America: Evidence from E-Voting Experiments in Argentina and Colombia." Journal of Information Technology & Politics 8, no. 2 (April 2011): 199–217. http://dx.doi.org/10.1080/19331681.2011.559739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ostrovsky, Oleg A. "THE VALUE OF DIGITAL EVIDENCE IN CRIMINAL INVESTIGATIONS." RUDN Journal of Law 23, no. 1 (December 15, 2019): 123–40. http://dx.doi.org/10.22363/2313-2337-2019-23-1-123-140.

Full text
Abstract:
Modern information systems, such as e-learning, e-voting, e-health, etc., are often used inappropriately for irregular data changes (data falsification). These facts force to review security measures and find a way to improve them. Proof of computer crime is accompanied by very complex processes that are based on the collection of digital evidence, forensic analysis and investigation. Forensic analysis of database systems is a very specific and complex task and therefore is the main source of inspiration for research. This article presents the fact that classical methods of collecting digital evidence are not suitable and effective. To improve efficiency, a combination of well-known, world-independent database technologies and their application in the field of forensic science are proposed. It also offers new directions for research in this area.
APA, Harvard, Vancouver, ISO, and other styles
21

Dedeic, Predrag. "Corporate governance and information society." Corporate Ownership and Control 7, no. 2 (2009): 202–7. http://dx.doi.org/10.22495/cocv7i2c1p3.

Full text
Abstract:
Information and communication technologies are an important cohesive factor in developing global economy and binding up capital markets. Corporate governance has its place in the process of creation of new capital flows. Financial instrument markets are connected in their existence with relevant information and their dissemination, so that information technologies contribute to the efficiency of their organization and functioning. By its nature, technological changes, which influence the market, encourage the change of structure and processes which make the system of corporate governance. Application of new technologies helps easier problem solution regarding numerous corporate governance issues such as: rational apathy of shareholders, principal-agent problem, transparency, information transfer, etc. The application of technology within a public company should help in distribution of corporate power and contribute to balance of numerous divergent interests within a company, which is very important in terms of achieving primary goal – providing long-term well-being of the shareholders and the public company. On the external plan, application of technology can contribute to better quality of relations among the participants on the capital market. New technologies should help public companies to be successful in a long run by providing more efficient functioning of corporate governance by encouraging shareholders to effectively use their rights. Inability, disinterestedness and inertia of the shareholders will open doors to activities which direct company resources towards satisfying other interests (e.g. management interests) but not interests of the shareholders. Application of information technology can contribute significantly to more effective protection of both basic rights of the shareholders and higher level of more complex managerial enterprises (effective shareholders assembly, material distribution, accepting agenda, discussing and exercising voting power of all shareholders, particularly important for cross-border shareholders, voting in absence etc. The Internet and other technologies provide opportunity for everyday interactive communication between the public company and the shareholders. Interactive communication through on-line forums on the Internet provides instantaneous access of great number of shareholders and an opportunity to find answers on questions they are concerned with in a more effective way. The use of new technologies can reduce these costs of communication in a great deal, for it is possible to send piles of documents important for assembly sessions and decision making to an endless number of e-mail addresses (financial reports, auditor’s report, supervisory board report, board of directors report regarding business operations of the company, as well as reports on corporate governance).
APA, Harvard, Vancouver, ISO, and other styles
22

Abdennadher, Sonia, and Walid Cheffi. "The effectiveness of e-corporate governance: an exploratory study of internet voting at shareholders’ annual meetings in France." Corporate Governance: The International Journal of Business in Society 20, no. 4 (May 1, 2020): 673–702. http://dx.doi.org/10.1108/cg-04-2019-0116.

Full text
Abstract:
Purpose E-corporate governance or the use of technologies and information systems (ISs) in corporate governance, is still a subject that is too seldom addressed in business research. This paper is at the intersection between two fields of research (corporate governance and the management of ISs), which are interdependent in ways that are still unexplored. The paper analyzes the implications of internet voting (IV) at shareholders’ annual meetings (SAM) for the corporate governance of listed companies in France, in particular for the relationship between executives and shareholders. Most of the studies that have dealt with IV at SAM have focused on techno-legal issues and were often conducted by business law researchers. The purpose of this paper is to investigate the implications of the new voting system through the prism of corporate governance. Design/methodology/approach The authors proceeded by triangulation of methods. This qualitative study is based on observations, interviews and documentary analysis. It assessed the IV implications for both the issuing companies and the shareholders. Findings The new voting system brings undeniable competitive advantage to the issuing company and facilitates shareholders’ activism, yet it has serious risks both for the corporations and for certain categories of the shareholder. Interestingly, the authors propose an original and field-grounded typology that distinguishes the risks and benefits associated with IV in relation to executives’ attitudes. Social implications The paper shows that the resolving of identified deficiencies with IV development could contribute to the alignment of companies’ interests with those of shareholders. Moreover, the study calls for policymakers to appoint an official body to regulate the practical implementation of the new system and to prevent its dissemination being held hostage to the executives’ willingness. Originality/value An original aspect of this research lies in the effective operationalization of the constructs of corporate governance effectiveness with a view to examining corporate governance as a set of technologically mediated practices. Moreover, this study emphasizes the key role of the construct of “executives’ willingness” in facilitating/impeding IV diffusion. This underlies their attempts to reverse the corporate governance relationship.
APA, Harvard, Vancouver, ISO, and other styles
23

Yusuf, Muhammad, Mochammad Kautsar Sophan, Arif Muntasa, Nurwahyu Alamsyah, Haythem Nakkas, and Putri Pradnyawidya Sari. "E-government learning media through augmented reality technology." Bulletin of Social Informatics Theory and Application 4, no. 1 (April 23, 2020): 12–20. http://dx.doi.org/10.31763/businta.v4i1.258.

Full text
Abstract:
Augmented reality (AR) is one of the newest learning technologies besides Artificial Intelligent, Virtual Reality, Virtual World, Alternates Reality Games, and Wearable Computing. E-Government is becoming an evolving academic field and transforming to be E-Governance, E-Participation, E-Service, E-Democracy, E-Voting issues. Therefore, some universities have E-Government course in their curriculum. AR can be one of the learning media to learn and teach E-Government effectively and interestingly. This research aims and contributes to develop a novel model of E-Government learning media using AR. Furthermore, this work has three novelties as follows:First, a method to develop e-Government learning media using AR. Second, a novel model of e-government learning media based on augmented reality technology. Third, the material courses are command centre and public service mall materials based in Surabaya, Indonesia. The new model of learning media using AR consists of main components, i.e., user, devices, AR, and course materials. Additionally, this novel model has some sub-components, such as AR object, marker, text, image, audio, video, and 3D animation. The proposed model has some practical and theoretical implications. For the theoretical implication , it adds a model of learning media for e-government course and extends the body of knowledge for e-government and augmented reality fields. For practice, e-Government courses can uilize the augmented reality application.
APA, Harvard, Vancouver, ISO, and other styles
24

Treiblmaier, Horst, Abderahman Rejeb, and Andreas Strebinger. "Blockchain as a Driver for Smart City Development: Application Fields and a Comprehensive Research Agenda." Smart Cities 3, no. 3 (August 7, 2020): 853–72. http://dx.doi.org/10.3390/smartcities3030044.

Full text
Abstract:
The term “Smart City” denotes a comprehensive concept to alleviate pending problems of modern urban areas which have developed into an important work field for practitioners and scholars alike. However, the question remains as to how cities can become “smart”. The application of information technology is generally considered a key driver in the “smartization” of cities. Detailed frameworks and procedures are therefore needed to guide, operationalize, and measure the implementation process as well as the impact of the respective technologies. In this paper, we discuss blockchain technology, a novel driver of technological transformation that comprises a multitude of underlying technologies and protocols, and its potential impact on smart cities. We specifically address the question of how blockchain technology may benefit the development of urban areas. Based on a comprehensive literature review, we present a framework and research propositions. We identify nine application fields of blockchain technology in the smartization of cities: (1) healthcare, (2) logistics and supply chains, (3) mobility, (4) energy, (5) administration and services, (6) e-voting, (7) factory, (8) home and (9) education. We discuss current developments in these fields, illustrate how they are affected by blockchain technology and derive propositions to guide future research endeavors.
APA, Harvard, Vancouver, ISO, and other styles
25

Tunyova, Nina. "Integration of Mobile Voting Services into Mining Engineers Training for Mineral and Resource Sector." E3S Web of Conferences 105 (2019): 04041. http://dx.doi.org/10.1051/e3sconf/201910504041.

Full text
Abstract:
Currently, sustainable development is associated with the intellectualization of the mineral resource complex, with careful use of natural resources, with a decrease in the anthropogenic load on the environment. This makes new demands on the training of mining engineers related to the digitization of the mineral and resource sector. Being one of the leading coal mining regions in the world, Kuzbass (Russia) demands from its regional higher educational institutions to follow new educational standards, making ICT, web-sources and e-learning the significant and inherent part of educational process. This paper reveals the author’s experience of integration the mobile voting service (Socrative) into teaching mining engineering students. We conducted the experiment to test this service among mining engineering students. Our methods included interviewing, testing, observations. The received data proved that this mobile service could improve educational process in various ways. The value of mining engineers, provided for new knowledge, is increasing in the process of innovative development of the mineral and resource sector, in which traditional resource-intensive technologies give way to lean production.
APA, Harvard, Vancouver, ISO, and other styles
26

Ivanova, K. "Electronic legislative initiative as a Tool to improve Citizens’ Public activity in Cyberspace: Common issues in the BriCs Countries, europe and the russian Federation." BRICS Law Journal 6, no. 1 (February 17, 2019): 102–26. http://dx.doi.org/10.21684/2412-2343-2019-6-1-102-126.

Full text
Abstract:
Around the world, parliaments, governments, civil society organizations and even individual parliamentarians are taking measures to make the legislative process more participatory. A key instrument of such measures is e-democracy. In the 1980s, a number of pilot projects on electronic voting and online discussions were introduced. However, only since 2000, with the active development of the Internet, has considerable interest in utilizing electronic initiatives to advance democracy emerge. Today, researchers warn that despite all the talk about “e-democracy,” the circle of actual decision makers is likely to remain as small as it has been heretofore. In this article, the author analyzes the pros and cons of electronic initiatives in the BRICS countries, Europe and the Russian Federation, and provides practical information for improvement. The author suggests that the next step needed to improve civil activity in filing legislative initiatives is the application of a regular mechanism to establish the possibility of organizing the process of civil legislative initiative nomination and the collection of signatures in electronic form, in particular via the Internet, with the possible use of crowd sourcing technologies.
APA, Harvard, Vancouver, ISO, and other styles
27

Ermolaeva, Polina, Yulia Ermolaeva, and Olga Basheva. "Digital Environmental Activism as the New Form of Environmental Participation." Sotsiologicheskoe Obozrenie / Russian Sociological Review 19, no. 3 (2020): 376–408. http://dx.doi.org/10.17323/1728-192x-2020-3-376-408.

Full text
Abstract:
The article provides a comprehensive study and systematization of the main approaches and theories to the study of digital environmental activism based on a related-literature analysis. The authors came to the conclusion that, in the conceptualization of a digital environmental activism, researchers place emphasis either on the features of the digital technologies that drive such activity, or on the basis of the environmental mobilization itself. In this work, combining both approaches with digital environmental activism, the authors understand the voluntary collective activity around common environmental interests and values that are implemented publicly and voluntarily through the use of new informational and communication technologies. The article discusses the main features of digital environmental activism, which include, on the one hand, the enhancement of environmental knowledge, and the change in the paradigm of interaction between actors in which they become not only consumers of information, but also its active producers. On the other hand, digital practices contribute to the alienation of users from the real protest movement by limiting them to virtual means of interaction; additionally, this form of participation is not accessible to all citizens, thereby generating new forms of digital inequality and social distances. The authors examined various types of digital participation which include clicktivism, meta-voting, self-affirmation, e-finance, political consumer protection, digital petitions, botivism, data activity, and hacktivism. The authors critically assess both established and new theoretical approaches to the study of digital eco-activism such as Castells’ theory of network society, deliberative democracy, “citizen science”, socio-psychological theories to explain environmental behavior, and Digital Environmental Humanities. The author’s vision of possible options for data synthesis in the study of environmental online activism for the Russian scientific context is proposed.
APA, Harvard, Vancouver, ISO, and other styles
28

Altman, Micah, and Kenneth Rogerson. "Open Research Questions on Information and Technology in Global and Domestic Politics—Beyond “E-”." PS: Political Science & Politics 41, no. 04 (October 2008): 835–37. http://dx.doi.org/10.1017/s1049096508081109.

Full text
Abstract:
Accelerating technological change is one of the defining characteristics of this era. And the intersection of information, technology, and politics is a constantly changing arena. Technological change can provide the subject for political debate, such as in the controversy over electronic voting (see Tokaji 2005); affect the means by which politics is conducted, such as in the use of information technologies to provide government services and collect regulatory feedback (see Fountain 2001; West 2005; and Mayer-Schonberger and Lazer 2007); or challenge our understanding of political theories and concepts, such as the meaning of privacy and of the public sphere (see Etzioni 2000 and Sunstein 2007 on the meaning of privacy and the compartmentalization of “public” speech, Bimber 2003 on the effect of information technologies on democracy, and Benkler 2006 on the reinterpretation of the public sphere). Each of these perspectives is visible locally, regionally, nationally, and globally.
APA, Harvard, Vancouver, ISO, and other styles
29

Saleem, Farrukh, Zahid Ullah, Bahjat Fakieh, and Faris Kateb. "Intelligent Decision Support System for Predicting Student’s E-Learning Performance Using Ensemble Machine Learning." Mathematics 9, no. 17 (August 27, 2021): 2078. http://dx.doi.org/10.3390/math9172078.

Full text
Abstract:
Electronic learning management systems provide live environments for students and faculty members to connect with their institutional online portals and perform educational activities virtually. Although modern technologies proactively support these online sessions, students’ active participation remains a challenge that has been discussed in previous research. Additionally, one concern for both parents and teachers is how to accurately measure student performance using different attributes collected during online sessions. Therefore, the research idea undertaken in this study is to understand and predict the performance of the students based on features extracted from electronic learning management systems. The dataset chosen in this study belongs to one of the learning management systems providing a number of features predicting student’s performance. The integrated machine learning model proposed in this research can be useful to make proactive and intelligent decisions according to student performance evaluated through the electronic system’s data. The proposed model consists of five traditional machine learning algorithms, which are further enhanced by applying four ensemble techniques: bagging, boosting, stacking, and voting. The overall F1 scores of the single models are as follows: DT (0.675), RF (0.777), GBT (0.714), NB (0.654), and KNN (0.664). The model performance has shown remarkable improvement using ensemble approaches. The stacking model by combining all five classifiers has outperformed and recorded the highest F1 score (0.8195) among other ensemble methods. The integration of the ML models has improved the prediction ratio and performed better than all other ensemble approaches. The proposed model can be useful for predicting student performance and helping educators to make informed decisions by proactively notifying the students.
APA, Harvard, Vancouver, ISO, and other styles
30

"Secured Aadhar Based E-Voting Application using RSA." International Journal of Innovative Technology and Exploring Engineering 8, no. 12 (October 10, 2019): 2909–13. http://dx.doi.org/10.35940/ijitee.k1765.1081219.

Full text
Abstract:
The invasion of wireless, mobile phones and various internet technologies has resulted in the new implementation, making the e-voting method very quiet and effective. The E-voting ensures the option of a suitable, simple and secure manner of incarceration and the complete number of votes in an election. This study work offers the e-voting requirements and necessities using a platform based on Android or the internet. E-voting implies voting through electronic devices or websites in the election. An e-voting application is developed using the android or web platform. This request enables the user cast the ballot without going to the polling booth. To prevent fraud respondents using the scheme, the application utilizes adequate authentication steps. Once the polling process is completed in the electronic device, the outcomes can be obtained in a fraction of seconds instantly. All voting counts of applicants are encrypted using RSA and stored in the database to prevent third-party attack and disclosure of outcomes. Upon completion of the meeting, the admin can decrypt the count of votes and publish the outcome and finish the voting process.
APA, Harvard, Vancouver, ISO, and other styles
31

Maletić, Marija, Dušan Barać, Vuk Rakočević, Tamara Naumović, and Artur Bjelica. "Scaffolding e-voting in developing countries." Management:Journal of Sustainable Business and Management Solutions in Emerging Economies, March 19, 2019. http://dx.doi.org/10.7595/management.fon.2019.0006.

Full text
Abstract:
Research question: This paper discusses e-voting as an integral part of e-government in developing countries. E-voting enables automation of casting and counting votes. Motivation: The main goal was to investigate the readiness of both the public sector and citizens for switching from common “paper” voting method to electronic system-based voting. In order to improve democracy and trust in the election process (IDEA, 2011), the e-voting system should be reliable, accurate and secure (Mauw, Verschuren, & de Vink, 2007). The example that should be followed is the Estonian e-voting system (Drechsler, 2004). Idea: We proposed a comprehensive e-voting model that includes five components: e-voting services, IT infrastructure, participants’ registration, components integration and a system for counting and reporting. Security is the most important issue that should be overcome by using the cryptographic protocols. Reliability and availability of the e-voting system should not be neglected, and it should be able to save all verified casted votes. Data: In order to examine the readiness and awareness of e-voting potentials in a developing country, we conducted a survey that included 152 persons from three different groups: individuals, legal entities and e-government employees. Tools: In order to establish relationships among opinions of the three groups of respondents to the survey that was conducted, a comparative analysis was performed. For this purpose the questions were divided into four categories. Findings: As it was expected, the study results have showed that survey participants find security, lack of qualified staff and mistrust of the older generations towards new technologies as the crucial issues in developing and implementing the e-voting model. Based on the responses the cost reduction, ease of use and efficiency improvement are recognized as categories that could be realized by implementation of the e-voting system. Contribution: The results show the respondents’ opinion regarding the e-voting system introduction as a legitimate voting tool. It can reduce abuse, voting costs and manual errors.
APA, Harvard, Vancouver, ISO, and other styles
32

"Cloud Database Security in E-Voting System using Blockchain Technology." International Journal of Recent Technology and Engineering 8, no. 5 (January 30, 2020): 1361–70. http://dx.doi.org/10.35940/ijrte.e6292.018520.

Full text
Abstract:
In today’s era, the cloud database security is one of the main concerns for any of the real time data accessing web/mobile applications. The cloud database protection involves accessibility and vulnerability of data, data protection, storage space, integrity and confidentiality on sensitive data. Building an electronic voting system that tries to completely fulfill the needs of the people has always been a challenge to achieve. The existing E-Voting System (E-VS) is not that much compatible with that of the current trends and does not assure to provide more security A lot of distributed ledger technologies which has been an exciting approach during existing election voting process. If we take a look on the ways of implying E-VS in a distribute ledger then Blockchain would be the right choice. As we all know that nowadays, Blockchain is one of the emerging technologies in the field of Information Technology. It normally stores information in batches called blocks which are linked together in a chronological way or method to form chain of blocks using cryptography techniques. During online voting process, many fraudulent activities happens which corrupt the entire election process. One of the major problems faced are fake voting which is obviously done by unauthorized people, inconvenient to reach to the respective places, average security level which may lead to the chances of an electoral fraud or any other malpractices.. Our proposed E-Voting System is mainly to protect the cloud database for real time data and to reduce the time consumption in voting and vote counting processes. Instead of standing in the queue for casting the vote, people can cast their votes from anywhere they want through online. The E-VS gives complete privacy and security for the online voting and makes it an ease for every individual to access it and cast their votes from anywhere possible with full pronounced security. In our proposed E-VS, Blockchain security concept called Consensus algorithm is implemented which makes it impossible for any unwanted activities to occur during election process. The E-VS system also achieves a higher level of security. Hence, the proposed system achieves data integrity, data confidentiality, eliminates storage overhead, and reduces time consumption for overall electronic voting system.
APA, Harvard, Vancouver, ISO, and other styles
33

Azizah, Anik Hanifatul. "ANALISIS FAKTOR KEPERCAYAAN TERHADAP TEKNOLOGI PADA KEINGINAN MASYARAKAT DALAM MENGADOPSI E-VOTING." Jurnal Ilmiah Teknologi Infomasi Terapan 4, no. 2 (April 30, 2018). http://dx.doi.org/10.33197/jitter.vol4.iss2.2018.156.

Full text
Abstract:
[Id]Berkembangnya penggunaan mesin e-voting dan meningkatnya penerapan pemilu dalam jaringan (daring) mengindikasikan bahwa masyarakat percaya akan performansi teknologi informasi dalam meningkatkan proses pemilu. Kesuksesan implementasi teknologi informasi mutlak dibutuhkan, Sebagai dukungan kesuksesan tersebut diperlukan analisis yang mendalam. Sebelum mengimplementasikan teknologi e-voting, pemerintah perlu mengetahui tingkat kesediaan (willingness) masyarakat untuk menggunakan teknologi baru. Tingkatan tertentu bahwa ekspektasi seseorang dapat terpenuhi dengan baik adalah definisi dari kepercayaan (trust). Kepercayaan masyarakat teridentifikasi sebagai faktor utama untuk mempengaruhi niat/ kemauan masyarakat menggunakan sebuah teknologi. Penelitian ini menganalisis pengaruh dari faktor kepercayaan terhadap niat untuk menggunakan e-voting. Penelitian ini mengusulkan sebuah model yang menggambarkan niat masyarakat untuk menggunakan e-voting (Intention to use) dengan mengidentifikasi kepercayaan masyarakat terhadap teknologi (trust of technology). Trust dibagi menjadi beberapa faktor yang lebih spesifik. Kuisioner kertas disebarkan kepada 370 masyarakat negara Indonesia dan 346 di antaranya valid. Kuisioner disebarkan secara langsung oleh surveyor kepada masyarakat yang telah memiliki hak pilih dan disebar secara merata kepada golongan umur yang bervariasi, serta tingkat Pendidikan maupun profesi yang beragam. Hasil penelitian menunjukkan bahwa semakin tinggi Trust of Technology (TOT) dapat meningkatkan niat masyarakat untuk menggunakan e-voting (Intention to Use E-voting - ITU). Ditemukan juga beberapa faktor dapat mempengaruhi pengaruh positif terhadap kepercayaan masyarakat terhadap teknologi. Hasil dari penelitian ini menunjukkan bahwa pemerintah diharapkan untuk memperhatikan fakto-faktor yang mempengaruhi kepercayaan masyarakat yang berujung niat dan kemauan masyarakat untuk menggunakan e-voting sebelum menerapkan e-voting tersebut.Kata Kunci: Kepercayaan, Keinginan, Keamanan, Validitas, Pemilu.[En]Increasing adoption of the electronic voting machine and rising pilot testing of internet voting suggests people believe that ICT can improve the electoral process. Since every new technology adoption needs to achieve successful implementation, deeper analysis on several sides was needed to support it. Before implementing a particular e-voting technology, the government needs to know the level of citizen willingness to adopt those new technologies. The expectancy that promise of an individual or group can be relied upon is defined as trust. The citizen trust can be identified by certain factors that lead to intention to use actual system. This study analyzes the impact of trustworthiness on citizen intention to use e-voting system in a developing country. The research proposes a model of e-voting adoption intention by investigating citizen trustworthiness from trust of technology (TOT). The trust was expanded to more specific unique factors. Offline questionnaires were spreaded to 370 respondents and 346 of them were valid. Questionnaires were distributed directly by surveyors to people who have the right to vote and distributed equally for a wide range of ages, as well as varying levels of education and professions. The results indicate that higher TOT increase citizen intention to use e-voting, and also several key determinants have positive influence on the citizen trust. This result suggested that government should first comply with several factors in citizen trustworthiness before conducting an e-voting system.
APA, Harvard, Vancouver, ISO, and other styles
34

Imperial, Miranda. "The Democracy to Come? An Enquiry Into the Vision of Blockchain-Powered E-Voting Start-Ups." Frontiers in Blockchain 4 (April 9, 2021). http://dx.doi.org/10.3389/fbloc.2021.587148.

Full text
Abstract:
This research sets out to analyze the message promoted by start-up enterprises that apply blockchain technologies for the purpose of e-voting [blockchain-powered e-voting (BPE)], and their perceived effects of this technological solution on democratic outcomes. Employing Norman Fairclough’s critical discourse analysis (CDA), I examined the written output of seven BPE start-ups (Agora, DemocracyEarth, Follow My Vote, Polys, Voatz, Votem, and VoteWatcher), as displayed in their websites. The close attention of CDA to power relations brought out relevant topics of discussion for analysis. Notably, these included: voting as an expression of democracy; technological determinism; individual versus communitarian understandings of democracy; the prominence of neoliberalism and the economic sphere; and technological literacy. Findings from the literature suggest that the assumptions of BPE start-ups about a blockchain-powered democracy diverge from widely accepted understandings of democracy. BPE start-ups envision a democracy determined by positions and institutions of power, by the technologically able, and by economic interests. This research argues that this conception of democracy disempowers voters from any form of decision-making regarding how democracy is run beyond their expression in the form of a vote decided by these established powers. The widespread addresses to existing elites to enable BPE, as well as what is left unsaid about community, collective rights and the not so technologically literate population, imply that BPE developers display concern for one particular expression among the many diverse and heterogeneous understandings of democracy, while disregarding outstanding privacy, security and accountability concerns associated to implementations of the technology for BPE. This work is a contribution to much needed research on technology and democracy’s deepening intersections, at a time of rapid technological innovation and turbulent democratic scepticism.
APA, Harvard, Vancouver, ISO, and other styles
35

Maletić, Marija, Dušan Barać, Tamara Naumović, Zorica Bogdanović, and Božidar Radenković. "Blending Crowdvoting in Modern e-Learning Environments." International Review of Research in Open and Distributed Learning 20, no. 2 (April 30, 2019). http://dx.doi.org/10.19173/irrodl.v20i2.3795.

Full text
Abstract:
Given that the most students spend considerable time on social networks, many educational institutions use this habit as a basis for educational purposes. Increasing students’ active participation in learning activities is one of the main goals of education. The purpose of this research was to investigate to what extent crowdvoting techniques can increase students’ participation and interest in the e-learning process. Additionally, we set out to explore social networks as a medium for crowdvoting, contests, and collaboration among students. The research participants included 131 students in the information technologies area of the Faculty of Organizational Sciences, University of Belgrade who participated in contest related to their 3D modeling projects. Voting was performed via Facebook. The students voted for particular projects primarily based on the quality of the project itself. Additionally, the competition was an incentive for students to prove themselves to colleagues, but also to provide an opportunity for teamwork, additional engagement, and acquisition of new skills and knowledge. The research results indicate a generally positive attitude among students towards the competition and rewards.
APA, Harvard, Vancouver, ISO, and other styles
36

Edmundson, Anna. "Curating in the Postdigital Age." M/C Journal 18, no. 4 (August 10, 2015). http://dx.doi.org/10.5204/mcj.1016.

Full text
Abstract:
It seems nowadays that any aspect of collecting and displaying tangible or intangible material culture is labeled as curating: shopkeepers curate their wares; DJs curate their musical selections; magazine editors curate media stories; and hipsters curate their coffee tables. Given the increasing ubiquity and complexity of 21st-century notions of curatorship, the current issue of MC Journal, ‘curate’, provides an excellent opportunity to consider some of the changes that have occurred in professional practice since the emergence of the ‘digital turn’. There is no doubt that the internet and interactive media have transformed the way we live our daily lives—and for many cultural commentators it only makes sense that they should also transform our cultural experiences. In this paper, I want to examine the issue of curatorial practice in the postdigital age, looking some of the ways that curating has changed over the last twenty years—and some of the ways it has not. The term postdigital comes from the work of Ross Parry, and is used to references the ‘tipping point’ where the use of digital technologies became normative practice in museums (24). Overall, I contend that although new technologies have substantially facilitated the way that curators do their jobs, core business and values have not changed as the result of the digital turn. While, major paradigm shifts have occurred in the field of professional curatorship over the last twenty years, these shifts have been issue-driven rather than a result of new technologies. Everyone’s a Curator In a 2009 article in the New York Times, journalist Alex Williams commented on the growing trend in American consumer culture of labeling oneself a curator. “The word ‘curate’,’’ he observed, “has become a fashionable code word among the aesthetically minded, who seem to paste it onto any activity that involves culling and selecting” (1). Williams dated the origins of the popular adoption of the term ‘curating’ to a decade earlier; noting the strong association between the uptake and the rise of the internet (2). This association is not surprising. The development of increasingly interactive software such as Web 2.0 has led to a rapid rise in new technologies aimed at connecting people and information in ways that were previously unimaginable. In particular the internet has become a space in which people can collect, store and most importantly share vast quantities of information. This information is often about objects. According to sociologist Jyri Engeström, the most successful social network sites on the internet (such as Pinterest, Flickr, Houzz etc), use discrete objects, rather than educational content or interpersonal relationships, as the basis for social interaction. So objects become the node for inter-personal communication. In these and other sites, internet users can find, collate and display multiple images of objects on the same page, which can in turn be connected at the press of a button to other related sources of information in the form of text, commentary or more images. These sites are often seen as the opportunity to virtually curate mini-exhibitions, as well as to create mood boards or sites of virtual consumption. The idea of curating as selective aesthetic editing is also popular in online markets places such as Etsy where numerous sellers offer ‘curated’ selections from home wares, to prints, to (my personal favorite) a curated selection of cat toys. In all of these exercises there is an emphasis on the idea of connoisseurship. As part of his article on the new breed of ‘curators’, for example, Alex Williams interviewed Tom Kalendrain, the Fashion Director of a leading American department store, which had engaged in a collaboration with Scott Schuman of the fashion blog, the Sartorialist. According to Kalendrain the store had asked Schuman to ‘curate’ a collection of clothes for them to sell. He justified calling Schuman a curator by explaining: “It was precisely his eye that made the store want to work with him; it was about the right shade of blue, about the cut, about the width of a lapel” (cited in Williams 2). The interview reveals much about current popular notions of what it means to be a curator. The central emphasis of Kalendrain’s distinction was on connoisseurship: exerting a privileged authoritative voice based on intimate knowledge of the subject matter and the ability to discern the very best examples from a plethora of choices. Ironically, in terms of contemporary museum practice, this is a model of curating that museums have consciously been trying to move away from for at least the last three decades. We are now witnessing an interesting disconnect in which the extra-museum community (represented in particular by a postdigital generation of cultural bloggers, commentators and entrepreneurs) are re-vivifying an archaic model of curating, based on object-centric connoisseurship, just at the point where professional curators had thought they had successfully moved on. From Being about Something to Being for Somebody The rejection of the object-expert model of curating has been so persuasive that it has transformed the way museums conduct core business across all sectors of the institution. Over the last thirty to forty years museums have witnessed a major pedagogical shift in how curators approach their work and how museums conceptualise their core values. These paradigmatic and pedagogical shifts were best characterised by the museologist Stephen Weil in his seminal article “From being about something to being for somebody.” Weil, writing in the late 1990s, noted that museums had turned away from traditional models in which individual curators (by way of scholarship and connoisseurship) dictated how the rest of the world (the audience) apprehended and understood significant objects of art, science and history—towards an audience centered approach where curators worked collaboratively with a variety of interested communities to create a pluralist forum for social change. In museum parlance these changes are referred to under the general rubric of the ‘new museology’: a paradigm shift, which had its origins in the 1970s; its gestation in the 1980s; and began to substantially manifest by the 1990s. Although no longer ‘new’, these shifts continue to influence museum practices in the 2000s. In her article, “Curatorship as Social Practice’” museologist Christina Kreps outlined some of the developments over recent decades that have challenged the object-centric model. According to Kreps, the ‘new museology’ was a paradigm shift that emerged from a widespread dissatisfaction with conventional interpretations of the museum and its functions and sought to re-orient itself away from strongly method and technique driven object-focused approaches. “The ‘new museum’ was to be people-centered, action-oriented, and devoted to social change and development” (315). An integral contributor to the developing new museology was the subjection of the western museum in the 1980s and ‘90s to representational critique from academics and activists. Such a critique entailed, in the words of Sharon Macdonald, questioning and drawing attention to “how meanings come to be inscribed and by whom, and how some come to be regarded as ‘right’ or taken as given” (3). Macdonald notes that postcolonial and feminist academics were especially engaged in this critique and the growing “identity politics” of the era. A growing engagement with the concept that museological /curatorial work is what Kreps (2003b) calls a ‘social process’, a recognition that; “people’s relationships to objects are primarily social and cultural ones” (154). This shift has particularly impacted on the practice of museum curatorship. By way of illustration we can compare two scholarly definitions of what constitutes a curator; one written in 1984 and one from 2001. The Manual of Curatorship, written in 1994 by Gary Edson and David Dean define a curator as: “a staff member or consultant who is as specialist in a particular field on study and who provides information, does research and oversees the maintenance, use, and enhancement of collections” (290). Cash Cash writing in 2001 defines curatorship instead as “a social practice predicated on the principle of a fixed relation between material objects and the human environment” (140). The shift has been towards increased self-reflexivity and a focus on greater plurality–acknowledging the needs of their diverse audiences and community stakeholders. As part of this internal reflection the role of curator has shifted from sole authority to cultural mediator—from connoisseur to community facilitator as a conduit for greater community-based conversation and audience engagement resulting in new interpretations of what museums are, and what their purpose is. This shift—away from objects and towards audiences—has been so great that it has led some scholars to question the need for museums to have standing collections at all. Do Museums Need Objects? In his provocatively titled work Do Museums Still Need Objects? Historian Steven Conn observes that many contemporary museums are turning away from the authority of the object and towards mass entertainment (1). Conn notes that there has been an increasing retreat from object-based research in the fields of art; science and ethnography; that less object-based research seems to be occurring in museums and fewer objects are being put on display (2). The success of science centers with no standing collections, the reduction in the number of objects put on display in modern museums (23); the increasing phalanx of ‘starchitect’ designed museums where the building is more important than the objects in it (11), and the increase of virtual museums and collections online, all seems to indicate that conventional museum objects have had their day (1-2). Or have they? At the same time that all of the above is occurring, ongoing research suggests that in the digital age, more than ever, people are seeking the authenticity of the real. For example, a 2008 survey of 5,000 visitors to living history sites in the USA, found that those surveyed expressed a strong desire to commune with historically authentic objects: respondents felt that their lives had become so crazy, so complicated, so unreal that they were seeking something real and authentic in their lives by visiting these museums. (Wilkening and Donnis 1) A subsequent research survey aimed specifically at young audiences (in their early twenties) reported that: seeing stuff online only made them want to see the real objects in person even more, [and that] they felt that museums were inherently authentic, largely because they have authentic objects that are unique and wonderful. (Wilkening 2) Adding to the question ‘do museums need objects?’, Rainey Tisdale argues that in the current digital age we need real museum objects more than ever. “Many museum professionals,” she reports “have come to believe that the increase in digital versions of objects actually enhances the value of in-person encounters with tangible, real things” (20). Museums still need objects. Indeed, in any kind of corporate planning, one of the first thing business managers look for in a company is what is unique about it. What can it provide that the competition can’t? Despite the popularity of all sorts of info-tainments, the one thing that museums have (and other institutions don’t) is significant collections. Collections are a museum’s niche resource – in business speak they are the asset that gives them the advantage over their competitors. Despite the increasing importance of technology in delivering information, including collections online, there is still overwhelming evidence to suggest that we should not be too quick to dismiss the traditional preserve of museums – the numinous object. And in fact, this is precisely the final argument that Steven Conn reaches in his above-mentioned publication. Curating in the Postdigital Age While it is reassuring (but not particularly surprising) that generations Y and Z can still differentiate between virtual and real objects, this doesn’t mean that museum curators can bury their heads in the collection room hoping that the digital age will simply go away. The reality is that while digitally savvy audiences continue to feel the need to see and commune with authentic materially-present objects, the ways in which they access information about these objects (prior to, during, and after a museum visit) has changed substantially due to technological advances. In turn, the ways in which curators research and present these objects – and stories about them – has also changed. So what are some of the changes that have occurred in museum operations and visitor behavior due to technological advances over the last twenty years? The most obvious technological advances over the last twenty years have actually been in data management. Since the 1990s a number of specialist data management systems have been developed for use in the museum sector. In theory at least, a curator can now access the entire collections of an institution without leaving their desk. Moreover, the same database that tells the curator how many objects the institution holds from the Torres Strait Islands, can also tell her what they look like (through high quality images); which objects were exhibited in past exhibitions; what their prior labels were; what in-house research has been conducted on them; what the conservation requirements are; where they are stored; and who to contact for copyright clearance for display—to name just a few functions. In addition a curator can get on the internet to search the online collection databases from other museums to find what objects they have from the Torres Strait Islands. Thus, while our curator is at this point conducting the same type of exhibition research that she would have done twenty years ago, the ease in which she can access information is substantially greater. The major difference of course is that today, rather than in the past, the curator would be collaborating with members of the original source community to undertake this project. Despite the rise of the internet, this type of liaison still usually occurs face to face. The development of accessible digital databases through the Internet and capacity to download images and information at a rapid rate has also changed the way non-museum staff can access collections. Audiences can now visit museum websites through which they can easily access information about current and past exhibitions, public programs, and online collections. In many cases visitors can also contribute to general discussion forums and collections provenance data through various means such as ‘tagging’; commenting on blogs; message boards; and virtual ‘talk back’ walls. Again, however, this represents a change in how visitors access museums but not a fundamental shift in what they can access. In the past, museum visitors were still encouraged to access and comment upon the collections; it’s just that doing so took a lot more time and effort. The rise of interactivity and the internet—in particular through Web 2.0—has led many commentators to call for a radical change in the ways museums operate. Museum analyst Lynda Kelly (2009) has commented on the issue that: the demands of the ‘information age’ have raised new questions for museums. It has been argued that museums need to move from being suppliers of information to providing usable knowledge and tools for visitors to explore their own ideas and reach their own conclusions because of increasing access to technologies, such as the internet. Gordon Freedman for example argues that internet technologies such as computers, the World Wide Web, mobile phones and email “… have put the power of communication, information gathering, and analysis in the hands of the individuals of the world” (299). Freedman argued that museums need to “evolve into a new kind of beast” (300) in order to keep up with the changes opening up to the possibility of audiences becoming mediators of information and knowledge. Although we often hear about the possibilities of new technologies in opening up the possibilities of multiple authors for exhibitions, I have yet to hear of an example of this successfully taking place. This doesn’t mean, however, that it will never happen. At present most museums seem to be merely dipping their toes in the waters. A recent example from the Art Gallery of South Australia illustrates this point. In 2013, the Gallery mounted an exhibition that was, in theory at least, curated by the public. Labeled as “the ultimate people’s choice exhibition” the project was hosted in conjunction with ABC Radio Adelaide. The public was encouraged to go online to the gallery website and select from a range of artworks in different categories by voting for their favorites. The ‘winning’ works were to form the basis of the exhibition. While the media spin on the exhibition gave the illusion of a mass curated show, in reality very little actual control was given over to the audience-curators. The public was presented a range of artworks, which had already been pre-selected from the standing collections; the themes for the exhibition had also already been determined as they informed the 120 artworks that were offered up for voting. Thus, in the end the pre-selection of objects and themes, as well as the timing and execution of the exhibition remained entirely in the hand of the professional curators. Another recent innovation did not attempt to harness public authorship, but rather enhanced individual visitor connections to museum collections by harnessing new GPS technologies. The Streetmuseum was a free app program created by the Museum of London to bring geotagged historical street views to hand held or portable mobile devices. The program allowed user to undertake a self-guided tour of London. After programing in their route, users could then point their device at various significant sites along the way. Looking through their viewfinder they would see a 3D historic photograph overlayed on the live site – allowing user not only to see what the area looked like in the past but also to capture an image of the overlay. While many of the available tagging apps simply allow for the opportunity of adding more white noise, allowing viewers to add commentary, pics, links to a particular geo tagged site but with no particular focus, the Streetmuseum had a well-defined purpose to encourage their audience to get out and explore London; to share their archival photograph collection with a broader audience; and to teach people more about London’s unique history. A Second Golden Age? A few years ago the Steven Conn suggested that museums are experiencing an international ‘golden age’ with more museums being built and visited and talked about than ever before (1). In the United States, where Conn is based, there are more than 17,500 accredited museums, and more than two million people visit some sort of museum per day, averaging around 865 million museum visits per year (2). However, at the same time that museums are proliferating, the traditional areas of academic research and theory that feed into museums such as history, cultural studies, anthropology and art history are experiencing a period of intense self reflexivity. Conn writes: At the turn of the twenty-first century, more people are going to more museums than at any time in the past, and simultaneously more scholars, critics, and others are writing and talking about museums. The two phenomena are most certainly related but it does not seem to be a happy relationship. Even as museums enjoy more and more success…many who write about them express varying degrees of foreboding. (1) There is no doubt that the internet and increasingly interactive media has transformed the way we live our daily lives—it only makes sense that it should also transform our cultural experiences. At the same time Museums need to learn to ride the wave without getting dumped into it. The best new media acts as a bridge—connecting people to places and ideas—allowing them to learn more about museum objects and historical spaces, value-adding to museum visits rather than replacing them altogether. As museologust Elaine Gurian, has recently concluded, the core business of museums seems unchanged thus far by the adoption of internet based technology: “the museum field generally, its curators, and those academic departments focused on training curators remain at the core philosophically unchanged despite their new websites and shiny new technological reference centres” (97). Virtual life has not replaced real life and online collections and exhibitions have not replaced real life visitations. Visitors want access to credible information about museum objects and museum exhibitions, they are not looking for Wiki-Museums. Or if they are are, they are looking to the Internet community to provide that service rather than the employees of state and federally funded museums. Both provide legitimate services, but they don’t necessarily need to provide the same service. In the same vein, extra-museum ‘curating’ of object and ideas through social media sites such as Pinterest, Flikr, Instagram and Tumblr provide a valuable source of inspiration and a highly enjoyable form of virtual consumption. But the popular uptake of the term ‘curating’ remains as easily separable from professional practice as the prior uptake of the terms ‘doctor’ and ‘architect’. An individual who doctors an image, or is the architect of their destiny, is still not going to operate on a patient nor construct a building. While major ontological shifts have occurred within museum curatorship over the last thirty years, these changes have resulted from wider social shifts, not directly from technology. This is not to say that technology will not change the museum’s ‘way of being’ in my professional lifetime—it’s just to say it hasn’t happened yet. References Cash Cash, Phillip. “Medicine Bundles: An Indigenous Approach.” Ed. T. Bray. The Future of the Past: Archaeologists, Native Americans and Repatriation. New York and London: Garland Publishing (2001): 139-145. Conn, Steven. Do Museums Still Need Objects? Philadelphia: University of Pennsylvania Press, 2011. Edson, Gary, and David Dean. The Handbook for Museums. New York and London: Routledge, 1994. Engeström, Jyri. “Why Some Social Network Services Work and Others Don’t — Or: The Case for Object-Centered Sociality.” Zengestrom Apr. 2005. 17 June 2015 ‹http://www.zengestrom.com/blog/2005/04/why-some-social-network-services-work-and-others-dont-or-the-case-for-object-centered-sociality.html›. Freedman, Gordon. “The Changing Nature of Museums”. Curator 43.4 (2000): 295-306. Gurian, Elaine Heumann. “Curator: From Soloist to Impresario.” Eds. Fiona Cameron and Lynda Kelly. Hot Topics, Public Culture, Museums. Newcastle: Cambridge Scholars Publishing, 2010. 95-111. Kelly, Lynda. “Museum Authority.” Blog 12 Nov. 2009. 25 June 2015 ‹http://australianmuseum.net.au/blogpost/museullaneous/museum-authority›. Kreps, Christina. “Curatorship as Social Practice.” Curator: The Museum Journal 46.3 (2003): 311-323. ———, Christina. Liberating Culture: Cross-Cultural Perspectives on Museums, Curation, and Heritage Preservation. London and New York: Routledge, 2003. Macdonald, Sharon. “Expanding Museum Studies: An Introduction.” Ed. Sharon MacDonald. A Companion to Museum Studies. Oxford: Blackwell Publishing, 2011. Parry, Ross. “The End of the Beginning: Normativity in the Postdigital Museum.” Museum Worlds: Advances in Research 1 (2013): 24-39. Tisdale, Rainey. “Do History Museums Still Need Objects?” History News (2011): 19-24. 18 June 2015 ‹http://aaslhcommunity.org/historynews/files/2011/08/RaineySmr11Links.pdf›. Suchy, Serene. Leading with Passion: Change Management in the Twenty-First Century Museum. Lanham: AltaMira Press, 2004. Weil, Stephen E. “From Being about Something to Being for Somebody: The Ongoing Transformation of the American Museum.” Daedalus, Journal of the American Academy of Arts and Sciences 128.3 (1999): 229–258. Wilkening, Susie. “Community Engagement and Objects—Mutually Exclusive?” Museum Audience Insight 27 July 2009. 14 June 2015 ‹http://reachadvisors.typepad.com/museum_audience_insight/2009/07/community-engagement-and-objects-mutually-exclusive.html›. ———, and Erica Donnis. “Authenticity? It Means Everything.” History News (2008) 63:4. Williams, Alex. “On the Tip of Creative Tongues.” New York Times 4 Oct. 2009. 4 June 2015 ‹http://www.nytimes.com/2009/10/04/fashion/04curate.html›.
APA, Harvard, Vancouver, ISO, and other styles
37

Dwyer, Tim. "Transformations." M/C Journal 7, no. 2 (March 1, 2004). http://dx.doi.org/10.5204/mcj.2339.

Full text
Abstract:
The Australian Government has been actively evaluating how best to merge the functions of the Australian Communications Authority (ACA) and the Australian Broadcasting Authority (ABA) for around two years now. Broadly, the reason for this is an attempt to keep pace with the communications media transformations we reduce to the term “convergence.” Mounting pressure for restructuring is emerging as a site of turf contestation: the possibility of a regulatory “one-stop shop” for governments (and some industry players) is an end game of considerable force. But, from a public interest perspective, the case for a converged regulator needs to make sense to audiences using various media, as well as in terms of arguments about global, industrial, and technological change. This national debate about the institutional reshaping of media regulation is occurring within a wider global context of transformations in social, technological, and politico-economic frameworks of open capital and cultural markets, including the increasing prominence of international economic organisations, corporations, and Free Trade Agreements (FTAs). Although the recently concluded FTA with the US explicitly carves out a right for Australian Governments to make regulatory policy in relation to existing and new media, considerable uncertainty remains as to future regulatory arrangements. A key concern is how a right to intervene in cultural markets will be sustained in the face of cultural, politico-economic, and technological pressures that are reconfiguring creative industries on an international scale. While the right to intervene was retained for the audiovisual sector in the FTA, by contrast, it appears that comparable unilateral rights to intervene will not operate for telecommunications, e-commerce or intellectual property (DFAT). Blurring Boundaries A lack of certainty for audiences is a by-product of industry change, and further blurs regulatory boundaries: new digital media content and overlapping delivering technologies are already a reality for Australia’s media regulators. These hypothetical media usage scenarios indicate how confusion over the appropriate regulatory agency may arise: 1. playing electronic games that use racist language; 2. being subjected to deceptive or misleading pop-up advertising online 3. receiving messaged imagery on your mobile phone that offends, disturbs, or annoys; 4. watching a program like World Idol with SMS voting that subsequently raises charging or billing issues; or 5. watching a new “reality” TV program where products are being promoted with no explicit acknowledgement of the underlying commercial arrangements either during or at the end of the program. These are all instances where, theoretically, regulatory mechanisms are in place that allow individuals to complain and to seek some kind of redress as consumers and citizens. In the last scenario, in commercial television under the sector code, no clear-cut rules exist as to the precise form of the disclosure—as there is (from 2000) in commercial radio. It’s one of a number of issues the peak TV industry lobby Commercial TV Australia (CTVA) is considering in their review of the industry’s code of practice. CTVA have proposed an amendment to the code that will simply formalise the already existing practice . That is, commercial arrangements that assist in the making of a program should be acknowledged either during programs, or in their credits. In my view, this amendment doesn’t go far enough in post “cash for comment” mediascapes (Dwyer). Audiences have a right to expect that broadcasters, production companies and program celebrities are open and transparent with the Australian community about these kinds of arrangements. They need to be far more clearly signposted, and people better informed about their role. In the US, the “Commercial Alert” <http://www.commercialalert.org/> organisation has been lobbying the Federal Communications Commission and the Federal Trade Commission to achieve similar in-program “visual acknowledgements.” The ABA’s Commercial Radio Inquiry (“Cash-for-Comment”) found widespread systemic regulatory failure and introduced three new standards. On that basis, how could a “standstill” response by CTVA, constitute best practice for such a pervasive and influential medium as contemporary commercial television? The World Idol example may lead to confusion for some audiences, who are unsure whether the issues involved relate to broadcasting or telecommunications. In fact, it could be dealt with as a complaint to the Telecommunication Industry Ombudsman (TIO) under an ACA registered, but Australian Communications Industry Forum (ACIF) developed, code of practice. These kind of cross-platform issues may become more vexed in future years from an audience’s perspective, especially if reality formats using on-screen premium rate service numbers invite audiences to participate, by sending MMS (multimedia messaging services) images or short video grabs over wireless networks. The political and cultural implications of this kind of audience interaction, in terms of access, participation, and more generally the symbolic power of media, may perhaps even indicate a longer-term shift in relations with consumers and citizens. In the Internet example, the Australian Competition and Consumer Commission’s (ACCC) Internet advertising jurisdiction would apply—not the ABA’s “co-regulatory” Internet content regime as some may have thought. Although the ACCC deals with complaints relating to Internet advertising, there won’t be much traction for them in a more complex issue that also includes, say, racist or religious bigotry. The DVD example would probably fall between the remits of the Office of Film and Literature Classification’s (OFLC) new “convergent” Guidelines for the Classification of Film and Computer Games and race discrimination legislation administered by the Human Rights and Equal Opportunity Commission (HREOC). The OFLC’s National Classification Scheme is really geared to provide consumer advice on media products that contain sexual and violent imagery or coarse language, rather than issues of racist language. And it’s unlikely that a single person would have the locus standito even apply for a reclassification. It may fall within the jurisdiction of the HREOC depending on whether it was played in public or not. Even then it would probably be considered exempt on free speech grounds as an “artistic work.” Unsolicited, potentially illegal, content transmitted via mobile wireless devices, in particular 3G phones, provide another example of content that falls between the media regulation cracks. It illustrates a potential content policy “turf grab” too. Image-enabled mobile phones create a variety of novel issues for content producers, network operators, regulators, parents and viewers. There is no one government media authority or agency with a remit to deal with this issue. Although it has elements relating to the regulatory activities of the ACA, the ABA, the OFLC, the TIO, and TISSC, the combination of illegal or potentially prohibited content and its carriage over wireless networks positions it outside their current frameworks. The ACA may argue it should have responsibility for this kind of content since: it now enforces the recently enacted Commonwealth anti-Spam laws; has registered an industry code of practice for unsolicited content delivered over wireless networks; is seeking to include ‘adult’ content within premium rate service numbers, and, has been actively involved in consumer education for mobile telephony. It has also worked with TISSC and the ABA in relation to telephone sex information services over voice networks. On the other hand, the ABA would probably argue that it has the relevant expertise for regulating wirelessly transmitted image-content, arising from its experience of Internet and free and subscription TV industries, under co-regulatory codes of practice. The OFLC can also stake its claim for policy and compliance expertise, since the recently implemented Guidelines for Classification of Film and Computer Games were specifically developed to address issues of industry convergence. These Guidelines now underpin the regulation of content across the film, TV, video, subscription TV, computer games and Internet sectors. Reshaping Institutions Debates around the “merged regulator” concept have occurred on and off for at least a decade, with vested interests in agencies and the executive jockeying to stake claims over new turf. On several occasions the debate has been given renewed impetus in the context of ruling conservative parties’ mooted changes to the ownership and control regime. It’s tended to highlight demarcations of remit, informed as they are by historical and legal developments, and the gradual accretion of regulatory cultures. Now the key pressure points for regulatory change include the mere existence of already converged single regulatory structures in those countries with whom we tend to triangulate our policy comparisons—the US, the UK and Canada—increasingly in a context of debates concerning international trade agreements; and, overlaying this, new media formats and devices are complicating existing institutional arrangements and legal frameworks. The Department of Communications, Information Technology & the Arts’s (DCITA) review brief was initially framed as “options for reform in spectrum management,” but was then widened to include “new institutional arrangements” for a converged regulator, to deal with visual content in the latest generation of mobile telephony, and other image-enabled wireless devices (DCITA). No other regulatory agencies appear, at this point, to be actively on the Government’s radar screen (although they previously have been). Were the review to look more inclusively, the ACCC, the OFLC and the specialist telecommunications bodies, the TIO and the TISSC may also be drawn in. Current regulatory arrangements see the ACA delegate responsibility for broadcasting services bands of the radio frequency spectrum to the ABA. In fact, spectrum management is the turf least contested by the regulatory players themselves, although the “convergent regulator” issue provokes considerable angst among powerful incumbent media players. The consensus that exists at a regulatory level can be linked to the scientific convention that holds the radio frequency spectrum is a continuum of electromagnetic bands. In this view, it becomes artificial to sever broadcasting, as “broadcasting services bands” from the other remaining highly diverse communications uses, as occurred from 1992 when the Broadcasting Services Act was introduced. The prospect of new forms of spectrum charging is highly alarming for commercial broadcasters. In a joint submission to the DCITA review, the peak TV and radio industry lobby groups have indicated they will fight tooth and nail to resist new regulatory arrangements that would see a move away from the existing licence fee arrangements. These are paid as a sliding scale percentage of gross earnings that, it has been argued by Julian Thomas and Marion McCutcheon, “do not reflect the amount of spectrum used by a broadcaster, do not reflect the opportunity cost of using the spectrum, and do not provide an incentive for broadcasters to pursue more efficient ways of delivering their services” (6). An economic rationalist logic underpins pressure to modify the spectrum management (and charging) regime, and undoubtedly contributes to the commercial broadcasting industry’s general paranoia about reform. Total revenues collected by the ABA and the ACA between 1997 and 2002 were, respectively, $1423 million and $3644.7 million. Of these sums, using auction mechanisms, the ABA collected $391 million, while the ACA collected some $3 billion. The sale of spectrum that will be returned to the Commonwealth by television broadcasters when analog spectrum is eventually switched off, around the end of the decade, is a salivating prospect for Treasury officials. The large sums that have been successfully raised by the ACA boosts their position in planning discussions for the convergent media regulatory agency. The way in which media outlets and regulators respond to publics is an enduring question for a democratic polity, irrespective of how the product itself has been mediated and accessed. Media regulation and civic responsibility, including frameworks for negotiating consumer and citizen rights, are fundamental democratic rights (Keane; Tambini). The ABA’s Commercial Radio Inquiry (‘cash for comment’) has also reminded us that regulatory frameworks are important at the level of corporate conduct, as well as how they negotiate relations with specific media audiences (Johnson; Turner; Gordon-Smith). Building publicly meaningful regulatory frameworks will be demanding: relationships with audiences are often complex as people are constructed as both consumers and citizens, through marketised media regulation, institutions and more recently, through hybridising program formats (Murdock and Golding; Lumby and Probyn). In TV, we’ve seen the growth of infotainment formats blending entertainment and informational aspects of media consumption. At a deeper level, changes in the regulatory landscape are symptomatic of broader tectonic shifts in the discourses of governance in advanced information economies from the late 1980s onwards, where deregulatory agendas created an increasing reliance on free market, business-oriented solutions to regulation. “Co-regulation” and “self-regulation’ became the preferred mechanisms to more direct state control. Yet, curiously contradicting these market transformations, we continue to witness recurring instances of direct intervention on the basis of censorship rationales (Dwyer and Stockbridge). That digital media content is “converging” between different technologies and modes of delivery is the norm in “new media” regulatory rhetoric. Others critique “visions of techno-glory,” arguing instead for a view that sees fundamental continuities in media technologies (Winston). But the socio-cultural impacts of new media developments surround us: the introduction of multichannel digital and interactive TV (in free-to-air and subscription variants); broadband access in the office and home; wirelessly delivered content and mobility, and, as Jock Given notes, around the corner, there’s the possibility of “an Amazon.Com of movies-on-demand, with the local video and DVD store replaced by online access to a distant server” (90). Taking a longer view of media history, these changes can be seen to be embedded in the global (and local) “innovation frontier” of converging digital media content industries and its transforming modes of delivery and access technologies (QUT/CIRAC/Cutler & Co). The activities of regulatory agencies will continue to be a source of policy rivalry and turf contestation until such time as a convergent regulator is established to the satisfaction of key players. However, there are risks that the benefits of institutional reshaping will not be readily available for either audiences or industry. In the past, the idea that media power and responsibility ought to coexist has been recognised in both the regulation of the media by the state, and the field of communications media analysis (Curran and Seaton; Couldry). But for now, as media industries transform, whatever the eventual institutional configuration, the evolution of media power in neo-liberal market mediascapes will challenge the ongoing capacity for interventions by national governments and their agencies. Works Cited Australian Broadcasting Authority. Commercial Radio Inquiry: Final Report of the Australian Broadcasting Authority. Sydney: ABA, 2000. Australian Communications Information Forum. Industry Code: Short Message Service (SMS) Issues. Dec. 2002. 8 Mar. 2004 <http://www.acif.org.au/__data/page/3235/C580_Dec_2002_ACA.pdf >. Commercial Television Australia. Draft Commercial Television Industry Code of Practice. Aug. 2003. 8 Mar. 2004 <http://www.ctva.com.au/control.cfm?page=codereview&pageID=171&menucat=1.2.110.171&Level=3>. Couldry, Nick. The Place of Media Power: Pilgrims and Witnesses of the Media Age. London: Routledge, 2000. Curran, James, and Jean Seaton. Power without Responsibility: The Press, Broadcasting and New Media in Britain. 6th ed. London: Routledge, 2003. Dept. of Communication, Information Technology and the Arts. Options for Structural Reform in Spectrum Management. Canberra: DCITA, Aug. 2002. ---. Proposal for New Institutional Arrangements for the ACA and the ABA. Aug. 2003. 8 Mar. 2004 <http://www.dcita.gov.au/Article/0,,0_1-2_1-4_116552,00.php>. Dept. of Foreign Affairs and Trade. Australia-United States Free Trade Agreement. Feb. 2004. 8 Mar. 2004 <http://www.dfat.gov.au/trade/negotiations/us_fta/outcomes/11_audio_visual.php>. Dwyer, Tim. Submission to Commercial Television Australia’s Review of the Commercial Television Industry’s Code of Practice. Sept. 2003. Dwyer, Tim, and Sally Stockbridge. “Putting Violence to Work in New Media Policies: Trends in Australian Internet, Computer Game and Video Regulation.” New Media and Society 1.2 (1999): 227-49. Given, Jock. America’s Pie: Trade and Culture After 9/11. Sydney: U of NSW P, 2003. Gordon-Smith, Michael. “Media Ethics After Cash-for-Comment.” The Media and Communications in Australia. Ed. Stuart Cunningham and Graeme Turner. Sydney: Allen and Unwin, 2002. Johnson, Rob. Cash-for-Comment: The Seduction of Journo Culture. Sydney: Pluto, 2000. Keane, John. The Media and Democracy. Cambridge: Polity, 1991. Lumby, Cathy, and Elspeth Probyn, eds. Remote Control: New Media, New Ethics. Melbourne: Cambridge UP, 2003. Murdock, Graham, and Peter Golding. “Information Poverty and Political Inequality: Citizenship in the Age of Privatized Communications.” Journal of Communication 39.3 (1991): 180-95. QUT, CIRAC, and Cutler & Co. Research and Innovation Systems in the Production of Digital Content and Applications: Report for the National Office for the Information Economy. Canberra: Commonwealth of Australia, Sept. 2003. Tambini, Damian. Universal Access: A Realistic View. IPPR/Citizens Online Research Publication 1. London: IPPR, 2000. Thomas, Julian and Marion McCutcheon. “Is Broadcasting Special? Charging for Spectrum.” Conference paper. ABA conference, Canberra. May 2003. Turner, Graeme. “Talkback, Advertising and Journalism: A cautionary tale of self-regulated radio”. International Journal of Cultural Studies 3.2 (2000): 247-255. ---. “Reshaping Australian Institutions: Popular Culture, the Market and the Public Sphere.” Culture in Australia: Policies, Publics and Programs. Ed. Tony Bennett and David Carter. Melbourne: Cambridge UP, 2001. Winston, Brian. Media, Technology and Society: A History from the Telegraph to the Internet. London: Routledge, 1998. Web Links http://www.aba.gov.au http://www.aca.gov.au http://www.accc.gov.au http://www.acif.org.au http://www.adma.com.au http://www.ctva.com.au http://www.crtc.gc.ca http://www.dcita.com.au http://www.dfat.gov.au http://www.fcc.gov http://www.ippr.org.uk http://www.ofcom.org.uk http://www.oflc.gov.au Links http://www.commercialalert.org/ Citation reference for this article MLA Style Dwyer, Tim. "Transformations" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/06-transformations.php>. APA Style Dwyer, T. (2004, Mar17). Transformations. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/06-transformations.php>
APA, Harvard, Vancouver, ISO, and other styles
38

Goggin, Gerard. "‘mobile text’." M/C Journal 7, no. 1 (January 1, 2004). http://dx.doi.org/10.5204/mcj.2312.

Full text
Abstract:
Mobile In many countries, more people have mobile phones than they do fixed-line phones. Mobile phones are one of the fastest growing technologies ever, outstripping even the internet in many respects. With the advent and widespread deployment of digital systems, mobile phones were used by an estimated 1, 158, 254, 300 people worldwide in 2002 (up from approximately 91 million in 1995), 51. 4% of total telephone subscribers (ITU). One of the reasons for this is mobility itself: the ability for people to talk on the phone wherever they are. The communicative possibilities opened up by mobile phones have produced new uses and new discourses (see Katz and Aakhus; Brown, Green, and Harper; and Plant). Contemporary soundscapes now feature not only voice calls in previously quiet public spaces such as buses or restaurants but also the aural irruptions of customised polyphonic ringtones identifying whose phone is ringing by the tune downloaded. The mobile phone plays an important role in contemporary visual and material culture as fashion item and status symbol. Most tragically one might point to the tableau of people in the twin towers of the World Trade Centre, or aboard a plane about to crash, calling their loved ones to say good-bye (Galvin). By contrast, one can look on at the bathos of Australian cricketer Shane Warne’s predilection for pressing his mobile phone into service to arrange wanted and unwanted assignations while on tour. In this article, I wish to consider another important and so far also under-theorised aspect of mobile phones: text. Of contemporary textual and semiotic systems, mobile text is only a recent addition. Yet it is already produces millions of inscriptions each day, and promises to be of far-reaching significance. Txt Txt msg ws an acidnt. no 1 expcted it. Whn the 1st txt msg ws sent, in 1993 by Nokia eng stdnt Riku Pihkonen, the telcom cpnies thought it ws nt important. SMS – Short Message Service – ws nt considrd a majr pt of GSM. Like mny teks, the *pwr* of txt — indeed, the *pwr* of the fon — wz discvrd by users. In the case of txt mssng, the usrs were the yng or poor in the W and E. (Agar 105) As Jon Agar suggests in Constant Touch, textual communication through mobile phone was an after-thought. Mobile phones use radio waves, operating on a cellular system. The first such mobile service went live in Chicago in December 1978, in Sweden in 1981, in January 1985 in the United Kingdom (Agar), and in the mid-1980s in Australia. Mobile cellular systems allowed efficient sharing of scarce spectrum, improvements in handsets and quality, drawing on advances in science and engineering. In the first instance, technology designers, manufacturers, and mobile phone companies had been preoccupied with transferring telephone capabilities and culture to the mobile phone platform. With the growth in data communications from the 1960s onwards, consideration had been given to data capabilities of mobile phone. One difficulty, however, had been the poor quality and slow transfer rates of data communications over mobile networks, especially with first-generation analogue and early second-generation digital mobile phones. As the internet was widely and wildly adopted in the early to mid-1990s, mobile phone proponents looked at mimicking internet and online data services possibilities on their hand-held devices. What could work on a computer screen, it was thought, could be reinvented in miniature for the mobile phone — and hence much money was invested into the wireless access protocol (or WAP), which spectacularly flopped. The future of mobiles as a material support for text culture was not to lie, at first at least, in aping the world-wide web for the phone. It came from an unexpected direction: cheap, simple letters, spelling out short messages with strange new ellipses. SMS was built into the European Global System for Mobile (GSM) standard as an insignificant, additional capability. A number of telecommunications manufacturers thought so little of the SMS as not to not design or even offer the equipment needed (the servers, for instance) for the distribution of the messages. The character sets were limited, the keyboards small, the typeface displays rudimentary, and there was no acknowledgement that messages were actually received by the recipient. Yet SMS was cheap, and it offered one-to-one, or one-to-many, text communications that could be read at leisure, or more often, immediately. SMS was avidly taken up by young people, forming a new culture of media use. Sending a text message offered a relatively cheap and affordable alternative to the still expensive timed calls of voice mobile. In its early beginnings, mobile text can be seen as a subcultural activity. The text culture featured compressed, cryptic messages, with users devising their own abbreviations and grammar. One of the reasons young people took to texting was a tactic of consolidating and shaping their own shared culture, in distinction from the general culture dominated by their parents and other adults. Mobile texting become involved in a wider reworking of youth culture, involving other new media forms and technologies, and cultural developments (Butcher and Thomas). Another subculture that also was in the vanguard of SMS was the Deaf ‘community’. Though the Alexander Graham Bell, celebrated as the inventor of the telephone, very much had his hearing-impaired wife in mind in devising a new form of communication, Deaf people have been systematically left off the telecommunications network since this time. Deaf people pioneered an earlier form of text communications based on the Baudot standard, used for telex communications. Known as teletypewriter (TTY), or telecommunications device for the Deaf (TDD) in the US, this technology allowed Deaf people to communicate with each other by connecting such devices to the phone network. The addition of a relay service (established in Australia in the mid-1990s after much government resistance) allows Deaf people to communicate with hearing people without TTYs (Goggin & Newell). Connecting TTYs to mobile phones have been a vexed issue, however, because the digital phone network in Australia does not allow compatibility. For this reason, and because of other features, Deaf people have become avid users of SMS (Harper). An especially favoured device in Europe has been the Nokia Communicator, with its hinged keyboard. The move from a ‘restricted’, ‘subcultural’ economy to a ‘general’ economy sees mobile texting become incorporated in the semiotic texture and prosaic practices of everyday life. Many users were already familiar with the new conventions already developed around electronic mail, with shorter, crisper messages sent and received — more conversation-like than other correspondence. Unlike phone calls, email is asynchronous. The sender can respond immediately, and the reply will be received with seconds. However, they can also choose to reply at their leisure. Similarly, for the adept user, SMS offers considerable advantages over voice communications, because it makes textual production mobile. Writing and reading can take place wherever a mobile phone can be turned on: in the street, on the train, in the club, in the lecture theatre, in bed. The body writes differently too. Writing with a pen takes a finger and thumb. Typing on a keyboard requires between two and ten fingers. The mobile phone uses the ‘fifth finger’ — the thumb. Always too early, and too late, to speculate on contemporary culture (Morris), it is worth analyzing the textuality of mobile text. Theorists of media, especially television, have insisted on understanding the specific textual modes of different cultural forms. We are familiar with this imperative, and other methods of making visible and decentring structures of text, and the institutions which animate and frame them (whether author or producer; reader or audience; the cultural expectations encoded in genre; the inscriptions in technology). In formal terms, mobile text can be described as involving elision, great compression, and open-endedness. Its channels of communication physically constrain the composition of a very long single text message. Imagine sending James Joyce’s Finnegan’s Wake in one text message. How long would it take to key in this exemplar of the disintegration of the cultural form of the novel? How long would it take to read? How would one navigate the text? Imagine sending the Courier-Mail or Financial Review newspaper over a series of text messages? The concept of the ‘news’, with all its cultural baggage, is being reconfigured by mobile text — more along the lines of the older technology of the telegraph, perhaps: a few words suffices to signify what is important. Mobile textuality, then, involves a radical fragmentation and unpredictable seriality of text lexia (Barthes). Sometimes a mobile text looks singular: saying ‘yes’ or ‘no’, or sending your name and ID number to obtain your high school or university results. Yet, like a telephone conversation, or any text perhaps, its structure is always predicated upon, and haunted by, the other. Its imagined reader always has a mobile phone too, little time, no fixed address (except that hailed by the network’s radio transmitter), and a finger poised to respond. Mobile text has structure and channels. Yet, like all text, our reading and writing of it reworks those fixities and makes destabilizes our ‘clear’ communication. After all, mobile textuality has a set of new pre-conditions and fragilities. It introduces new sorts of ‘noise’ to signal problems to annoy those theorists cleaving to the Shannon and Weaver linear model of communication; signals often drop out; there is a network confirmation (and message displayed) that text messages have been sent, but no system guarantee that they have been received. Our friend or service provider might text us back, but how do we know that they got our text message? Commodity We are familiar now with the pleasures of mobile text, the smile of alerting a friend to our arrival, celebrating good news, jilting a lover, making a threat, firing a worker, flirting and picking-up. Text culture has a new vector of mobility, invented by its users, but now coveted and commodified by businesses who did not see it coming in the first place. Nimble in its keystrokes, rich in expressivity and cultural invention, but relatively rudimentary in its technical characteristics, mobile text culture has finally registered in the boardrooms of communications companies. Not only is SMS the preferred medium of mobile phone users to keep in touch with each other, SMS has insinuated itself into previously separate communication industries arenas. In 2002-2003 SMS became firmly established in television broadcasting. Finally, interactive television had arrived after many years of prototyping and being heralded. The keenly awaited back-channel for television arrives courtesy not of cable or satellite television, nor an extra fixed-phone line. It’s the mobile phone, stupid! Big Brother was not only a watershed in reality television, but also in convergent media. Less obvious perhaps than supplementary viewing, or biographies, or chat on Big Brother websites around the world was the use of SMS for voting. SMS is now routinely used by mainstream television channels for viewer feedback, contest entry, and program information. As well as its widespread deployment in broadcasting, mobile text culture has been the language of prosaic, everyday transactions. Slipping into a café at Bronte Beach in Sydney, why not pay your parking meter via SMS? You’ll even receive a warning when your time is up. The mobile is becoming the ‘electronic purse’, with SMS providing its syntax and sentences. The belated ingenuity of those fascinated by the economics of mobile text has also coincided with a technological reworking of its possibilities, with new implications for its semiotic possibilities. Multimedia messaging (MMS) has now been deployed, on capable digital phones (an instance of what has been called 2.5 generation [G] digital phones) and third-generation networks. MMS allows images, video, and audio to be communicated. At one level, this sort of capability can be user-generated, as in the popularity of mobiles that take pictures and send these to other users. Television broadcasters are also interested in the capability to send video clips of favourite programs to viewers. Not content with the revenues raised from millions of standard-priced SMS, and now MMS transactions, commercial participants along the value chain are keenly awaiting the deployment of what is called ‘premium rate’ SMS and MMS services. These services will involve the delivery of desirable content via SMS and MMS, and be priced at a premium. Products and services are likely to include: one-to-one textchat; subscription services (content delivered on handset); multi-party text chat (such as chat rooms); adult entertainment services; multi-part messages (such as text communications plus downloads); download of video or ringtones. In August 2003, one text-chat service charged $4.40 for a pair of SMS. Pwr At the end of 2003, we have scarcely registered the textual practices and systems in mobile text, a culture that sprang up in the interstices of telecommunications. It may be urgent that we do think about the stakes here, as SMS is being extended and commodified. There are obvious and serious policy issues in premium rate SMS and MMS services, and questions concerning the political economy in which these are embedded. Yet there are cultural questions too, with intricate ramifications. How do we understand the effects of mobile textuality, rewriting the telephone book for this new cultural form (Ronell). What are the new genres emerging? And what are the implications for cultural practice and policy? Does it matter, for instance, that new MMS and 3rd generation mobile platforms are not being designed or offered with any-to-any capabilities in mind: allowing any user to upload and send multimedia communications to other any. True, as the example of SMS shows, the inventiveness of users is difficult to foresee and predict, and so new forms of mobile text may have all sorts of relationships with content and communication. However, there are worrying signs of these developing mobile circuits being programmed for narrow channels of retail purchase of cultural products rather than open-source, open-architecture, publicly usable nodes of connection. Works Cited Agar, Jon. Constant Touch: A Global History of the Mobile Phone. Cambridge: Icon, 2003. Barthes, Roland. S/Z. Trans. Richard Miller. New York: Hill & Wang, 1974. Brown, Barry, Green, Nicola, and Harper, Richard, eds. Wireless World: Social, Cultural, and Interactional Aspects of the Mobile Age. London: Springer Verlag, 2001. Butcher, Melissa, and Thomas, Mandy, eds. Ingenious: Emerging youth cultures in urban Australia. Melbourne: Pluto, 2003. Galvin, Michael. ‘September 11 and the Logistics of Communication.’ Continuum: Journal of Media and Cultural Studies 17.3 (2003): 303-13. Goggin, Gerard, and Newell, Christopher. Digital Disability: The Social Construction of Digital in New Media. Lanham, MA: Rowman & Littlefield, 2003. Harper, Phil. ‘Networking the Deaf Nation.’ Australian Journal of Communication 30. 3 (2003), in press. International Telecommunications Union (ITU). ‘Mobile Cellular, subscribers per 100 people.’ World Telecommunication Indicators <http://www.itu.int/ITU-D/ict/statistics/> accessed 13 October 2003. Katz, James E., and Aakhus, Mark, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. Cambridge: Cambridge U P, 2002. Morris, Meaghan. Too Soon, Too Late: History in Popular Culture. Bloomington and Indianapolis: U of Indiana P, 1998. Plant, Sadie. On the Mobile: The Effects of Mobile Telephones on Social and Individual Life. < http://www.motorola.com/mot/documents/0,1028,296,00.pdf> accessed 5 October 2003. Ronell, Avital. The Telephone Book: Technology—schizophrenia—electric speech. Lincoln: U of Nebraska P, 1989. Citation reference for this article MLA Style Goggin, Gerard. "‘mobile text’" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0401/03-goggin.php>. APA Style Goggin, G. (2004, Jan 12). ‘mobile text’. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0401/03-goggin.php>
APA, Harvard, Vancouver, ISO, and other styles
39

Lee, Ashlin. "In the Shadow of Platforms." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2750.

Full text
Abstract:
Introduction This article explores the changing relational quality of “the shadow of hierarchy”, in the context of the merging of platforms with infrastructure as the source of the shadow of hierarchy. In governance and regulatory studies, the shadow of hierarchy (or variations thereof), describes the space of influence that hierarchal organisations and infrastructures have (Héritier and Lehmkuhl; Lance et al.). A shift in who/what casts the shadow of hierarchy will necessarily result in changes to the attendant relational values, logics, and (techno)socialities that constitute the shadow, and a new arrangement of shadow that presents new challenges and opportunities. This article reflects on relevant literature to consider two different ways the shadow of hierarchy has qualitatively changed as platforms, rather than infrastructures, come to cast the shadow of hierarchy – an increase in scalability; and new socio-technical arrangements of (non)participation – and the opportunities and challenges therein. The article concludes that more concerted efforts are needed to design the shadow, given a seemingly directionless desire to enact data-driven solutions. The Shadow of Hierarchy, Infrastructures, and Platforms The shadow of hierarchy refers to how institutional, infrastructural, and organisational hierarchies create a relational zone of influence over a particular space. This commonly refers to executive decisions and legislation created by nation states, which are cast over private and non-governmental actors (Héritier and Lehmkuhl, 2). Lance et al. (252–53) argue that the shadow of hierarchy is a productive and desirable thing. Exploring the shadow of hierarchy in the context of how geospatial data agencies govern their data, Lance et al. find that the shadow of hierarchy enables the networked governance approaches that agencies adopt. This is because operating in the shadow of institutions provides authority, confers bureaucratic legitimacy and top-down power, and offers financial support. The darkness of the shadow is thus less a moral or ethicopolitical statement (such as that suggested by Fisher and Bolter, who use the idea of darkness to unpack the morality of tourism involving death and human suffering), and instead a relationality; an expression of differing values, logics, and (techno)socialities internal and external to those infrastructures and institutions that cast it (Gehl and McKelvey). The shadow of hierarchy might therefore be thought of as a field of relational influences and power that a social body casts over society, by virtue of a privileged position vis-a-vis society. It modulates society’s “light”; the resources (Bourdieu) and power relationships (Foucault) that run through social life, as parsed through a certain institutional and infrastructural worldview (the thing that blocks the light to create the shadow). In this way the shadow of hierarchy is not a field of absolute blackness that obscures, but instead a gradient of light and dark that creates certain effects. The shadow of hierarchy is now, however, also being cast by decentralised, privately held, and non-hierarchal platforms that are replacing or merging with public infrastructure, creating new social effects. Platforms are digital, socio-technical systems that create relationships between different entities. They are most commonly built around a relatively fixed core function (such as a social media service like Facebook), that then interacts with a peripheral set of complementors (advertising companies and app developers in the case of social media; Baldwin and Woodard), to create new relationships, forms of value, and other interactions (van Dijck, The Culture of Connectivity). In creating these relationships, platforms become inherently political (Gillespie), shaping relationships and content on the platform (Suzor) and in embodied life (Ajunwa; Eubanks). While platforms are often associated with optional consumer platforms (such as streaming services like Spotify), they have increasingly come to occupy the place of public infrastructure, and act as a powerful enabler to different socio-technical, economic, and political relationships (van Dijck, Governing Digital Societies). For instance, Plantin et al. argue that platforms have merged with infrastructures, and that once publicly held and funded institutions and essential services now share many characteristics with for-profit, privately held platforms. For example, Australia has had a long history of outsourcing employment services (Webster and Harding), and nearly privatised its entire visa processing data infrastructure (Jenkins). Platforms therefore have a greater role in casting the shadow of hierarchy than before. In doing so, they cast a shadow that is qualitatively different, modulated through a different set of relational values and (techno)socialities. Scalability A key difference and selling point of platforms is their scalability; since they can rapidly and easily up- and down-scale their functionalities in a way that traditional infrastructure cannot (Plantin et al.). The ability to respond “on-demand” to infrastructural requirements has made platforms the go-to service delivery option in the neo-liberalised public infrastructure environment (van Dijck, Governing Digital Societies). For instance, services providers like Amazon Web Services or Microsoft Azure provide on demand computing capacity for many nations’ most valuable services, including their intelligence and security capabilities (Amoore, Cloud Ethics; Konkel). The value of such platforms to government lies in the reduced cost and risk that comes with using rented capabilities, and the enhanced flexibility to increase or decrease their usage as required, without any of the economic sunk costs attached to owning the infrastructure. Scalability is, however, not just about on-demand technical capability, but about how platforms can change the scale of socio-technical relationships and services that are mediated through the platform. This changes the relational quality of the shadow of hierarchy, as activities and services occurring within the shadow are now connected into a larger and rapidly modulating scale. Scalability allows the shadow of hierarchy to extend from those in proximity to institutions to the broader population in general. For example, individual citizens can more easily “reach up” into governmental services and agencies as a part of completing their everyday business through platform such as MyGov in Australia (Services Australia). Using a smartphone application, citizens are afforded a more personalised and adaptive experience of the welfare state, as engaging with welfare services is no-longer tied to specific “brick-and-mortar” locations, but constantly available through a smartphone app and web portal. Multiple government services including healthcare and taxation are also connected to this platform, allowing users to reach across multiple government service domains to complete their personal business, seeking information and services that would have once required separate communications with different branches of government. The individual’s capacities to engage with the state have therefore upscaled with this change in the shadow, retaining a productivity and capacity enhancing quality that is reminiscent of older infrastructures and institutions, as the individual and their lived context is brought closer to the institutions themselves. Scale, however, comes with complications. The fundamental driver for scalability and its adaptive qualities is datafication. This means individuals and organisations are inflecting their operational and relational logics with the logic of datafication: a need to capture all data, at all times (van Dijck, Datafication; Fourcade and Healy). Platforms, especially privately held platforms, benefit significantly from this, as they rely on data to drive and refine their algorithmic tools, and ultimately create actionable intelligence that benefits their operations. Thus, scalability allows platforms to better “reach down” into individual lives and different social domains to fuel their operations. For example, as public transport services become increasingly datafied into mobility-as-a-service (MAAS) systems, ride sharing and on-demand transportation platforms like Uber and Lyft become incorporated into the public transport ecosystem (Lyons et al.). These platforms capture geospatial, behavioural, and reputational data from users and drivers during their interactions with the platform (Rosenblat and Stark; Attoh et al.). This generates additional value, and profits, for the platform itself with limited value returned to the user or the broader public it supports, outside of the transport service. It also places the platform in a position to gain wider access to the population and their data, by virtue of operating as a part of a public service. In this way the shadow of hierarchy may exacerbate inequity. The (dis)benefits of the shadow of hierarchy become unevenly spread amongst actors within its field, a function of an increased scalability that connects individuals into much broader assemblages of datafication. For Eubank, this can entrench existing economic and social inequalities by forcing those in need to engage with digitally mediated welfare systems that rely on distant and opaque computational judgements. Local services are subject to increased digital surveillance, a removal of agency from frontline advocates, and algorithmic judgement at scale. More fortunate citizens are also still at risk, with Nardi and Ekbia arguing that many digitally scaled relationships are examples of “heteromation”, whereby platforms convince actors in the platform to labour for free, such as through providing ratings which establish a platform’s reputational economy. Such labour fuels the operation of the platform through exploiting users, who become both a product/resource (as a source of data for third party advertisers) and a performer of unrewarded digital labour, such as through providing user reviews that help guide a platform’s algorithm(s). Both these examples represent a particularly disconcerting outcome for the shadow of hierarchy, which has its roots in public sector institutions who operate for a common good through shared and publicly held infrastructure. In shifting towards platforms, especially privately held platforms, value is transmitted to private corporations and not the public or the commons, as was the case with traditional infrastructure. The public also comes to own the risks attached to platforms if they become tied to public services, placing a further burden on the public if the platform fails, while reaping none of the profit and value generated through datafication. This is a poor bargain at best. (Non)Participation Scalability forms the basis for a further predicament: a changing socio-technical dynamic of (non)participation between individuals and services. According to Star (118), infrastructures are defined through their relationships to a given context. These relationships, which often exist as boundary objects between different communities, are “loosely structured in common use, and become tightly bound in particular locations” (Star, 118). While platforms are certainly boundary objects and relationally defined, the affordances of cloud computing have enabled a decoupling from physical location, and the operation of platforms across time and space through distributed digital nodes (smartphones, computers, and other localised hardware) and powerful algorithms that sort and process requests for service. This does not mean location is not important for the cloud (see Amoore, Cloud Geographies), but platforms are less likely to have a physically co-located presence in the same way traditional infrastructures had. Without the same institutional and infrastructural footprint, the modality for participating in and with the shadow of hierarchy that platforms cast becomes qualitatively different and predicated on digital intermediaries. Replacing a physical and human footprint with algorithmically supported and decentralised computing power allows scalability and some efficiency improvements, but it also removes taken-for-granted touchpoints for contestation and recourse. For example, ride-sharing platform Uber operates globally, and has expressed interest in operating in complement to (and perhaps in competition with) public transport services in some cities (Hall et al.; Conger). Given that Uber would come to operate as a part of the shadow of hierarchy that transport authorities cast over said cities, it would not be unreasonable to expect Uber to be subject to comparable advocacy, adjudication, transparency, and complaint-handling requirements. Unfortunately, it is unclear if this would be the case, with examples suggesting that Uber would use the scalability of its platform to avoid these mechanisms. This is revealed by ongoing legal action launched by concerned Uber drivers in the United Kingdom, who have sought access to the profiling data that Uber uses to manage and monitor its drivers (Sawers). The challenge has relied on transnational law (the European Union’s General Data Protection Regulation), with UK-based drivers lodging claims in Amsterdam to initiate the challenge. Such costly and complex actions are beyond the means of many, but demonstrate how reasonable participation in socio-technical and governance relationships (like contestations) might become limited, depending on how the shadow of hierarchy changes with the incorporation of platforms. Even if legal challenges for transparency are successful, they may not produce meaningful change. For instance, O’Neil links algorithmic bias to mathematical shortcomings in the variables used to measure the world; in the creation of irritational feedback loops based on incorrect data; and in the use of unsound data analysis techniques. These three factors contribute to inequitable digital metrics like predictive policing algorithms that disproportionately target racial minorities. Large amounts of selective data on minorities create myopic algorithms that direct police to target minorities, creating more selective data that reinforces the spurious model. These biases, however, are persistently inaccessible, and even when visible are often unintelligible to experts (Ananny and Crawford). The visibility of the technical “installed base” that support institutions and public services is therefore not a panacea, especially when the installed base (un)intentionally obfuscates participation in meaningful engagement like complaints handling. A negative outcome is, however, also not an inevitable thing. It is entirely possible to design platforms to allow individual users to scale up and have opportunities for enhanced participation. For instance, eGovernance and mobile governance literature have explored how citizens engage with state services at scale (Thomas and Streib; Foth et al.), and the open government movement has demonstrated the effectiveness of open data in understanding government operations (Barns; Janssen et al.), although these both have their challenges (Chadwick; Dawes). It is not a fantasy to imagine alternative configurations of the shadow of hierarchy that allow more participatory relationships. Open data could facilitate the governance of platforms at scale (Box et al.), where users are enfranchised into a platform by some form of membership right and given access to financial and governance records, in the same way that corporate shareholders are enfranchised, facilitated by the same app that provides a service. This could also be extended to decision making through voting and polling functions. Such a governance form would require radically different legal, business, and institutional structures to create and enforce this arrangement. Delacoix and Lawrence, for instance, suggest that data trusts, where a trustee is assigned legal and fiduciary responsibility to achieve maximum benefit for a specific group’s data, can be used to negotiate legal and governance relationships that meaningfully benefit the users of the trust. Trustees can be instructed to only share data to services whose algorithms are regularly audited for bias and provide datasets that are accurate representations of their users, for instance, avoiding erroneous proxies that disrupt algorithmic models. While these developments are in their infancy, it is not unreasonable to reflect on such endeavours now, as the technologies to achieve these are already in use. Conclusions There is a persistent myth that data will yield better, faster, more complete results in whatever field it is applied (Lee and Cook; Fourcade and Healy; Mayer-Schönberger and Cukier; Kitchin). This myth has led to data-driven assemblages, including artificial intelligence, platforms, surveillance, and other data-technologies, being deployed throughout social life. The public sector is no exception to this, but the deployment of any technological solution within the traditional institutions of the shadow of hierarchy is fraught with challenges, and often results in failure or unintended consequences (Henman). The complexity of these systems combined with time, budgetary, and political pressures can create a contested environment. It is this environment that moulds societies' light and resources to cast the shadow of hierarchy. Relationality within a shadow of hierarchy that reflects the complicated and competing interests of platforms is likely to present a range of unintended social consequences that are inherently emergent because they are entering into a complex system – society – that is extremely hard to model. The relational qualities of the shadow of hierarchy are therefore now more multidimensional and emergent, and experiences relating to socio-technical features like scale, and as a follow-on (non)participation, are evidence of this. Yet by being emergent, they are also directionless, a product of complex systems rather than designed and strategic intent. This is not an inherently bad thing, but given the potential for data-system and platforms to have negative or unintended consequences, it is worth considering whether remaining directionless is the best outcome. There are many examples of data-driven systems in healthcare (Obermeyer et al.), welfare (Eubanks; Henman and Marston), and economics (MacKenzie), having unintended and negative social consequences. Appropriately guiding the design and deployment of theses system also represents a growing body of knowledge and practical endeavour (Jirotka et al.; Stilgoe et al.). Armed with the knowledge of these social implications, constructing an appropriate social architecture (Box and Lemon; Box et al.) around the platforms and data systems that form the shadow of hierarchy should be encouraged. This social architecture should account for the affordances and emergent potentials of a complex social, institutional, economic, political, and technical environment, and should assist in guiding the shadow of hierarchy away from egregious challenges and towards meaningful opportunities. To be directionless is an opportunity to take a new direction. The intersection of platforms with public institutions and infrastructures has moulded society’s light into an evolving and emergent shadow of hierarchy over many domains. With the scale of the shadow changing, and shaping participation, who benefits and who loses out in the shadow of hierarchy is also changing. Equipped with insights into this change, we should not hesitate to shape this change, creating or preserving relationalities that offer the best outcomes. Defining, understanding, and practically implementing what the “best” outcome(s) are would be a valuable next step in this endeavour, and should prompt considerable discussion. If we wish the shadow of hierarchy to continue to be productive, then finding a social architecture to shape the emergence and directionlessness of socio-technical systems like platforms is an important step in the continued evolution of the shadow of hierarchy. References Ajunwa, Ifeoma. “Age Discrimination by Platforms.” Berkeley J. Emp. & Lab. L. 40 (2019): 1-30. Amoore, Louise. Cloud Ethics: Algorithms and the Attributes of Ourselves and Others. Durham: Duke University Press, 2020. ———. “Cloud Geographies: Computing, Data, Sovereignty.” Progress in Human Geography 42.1 (2018): 4-24. Ananny, Mike, and Kate Crawford. “Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability.” New Media & Society 20.3 (2018): 973–89. Attoh, Kafui, et al. “‘We’re Building Their Data’: Labor, Alienation, and Idiocy in the Smart City.” Environment and Planning D: Society and Space 37.6 (2019): 1007-24. Baldwin, Carliss Y., and C. Jason Woodard. “The Architecture of Platforms: A Unified View.” Platforms, Markets and Innovation. Ed. Annabelle Gawer. Cheltenham: Edward Elgar, 2009. 19–44. Barns, Sarah. “Mine Your Data: Open Data, Digital Strategies and Entrepreneurial Governance by Code.” Urban Geography 37.4 (2016): 554–71. Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Cambridge, MA: Harvard University Press, 1984. Box, Paul, et al. Data Platforms for Smart Cities – A Landscape Scan and Recommendations for Smart City Practice. Canberra: CSIRO, 2020. Box, Paul, and David Lemon. The Role of Social Architecture in Information Infrastructure: A Report for the National Environmental Information Infrastructure (NEII). Canberra: CSIRO, 2015. Chadwick, Andrew. “Explaining the Failure of an Online Citizen Engagement Initiative: The Role of Internal Institutional Variables.” Journal of Information Technology & Politics 8.1 (2011): 21–40. Conger, Kate. “Uber Wants to Sell You Train Tickets. And Be Your Bus Service, Too.” The New York Times, 7 Aug. 2019. 19 Jan. 2021. <https://www.nytimes.com/2019/08/07/technology/uber-train-bus-public-transit.html>. Dawes, Sharon S. “The Evolution and Continuing Challenges of E‐Governance.” Public Administration Review 68 (2008): 86–102. Delacroix, Sylvie, and Neil D. Lawrence. “Bottom-Up Data Trusts: Disturbing the ‘One Size Fits All’ Approach to Data Governance.” International Data Privacy Law 9.4 (2019): 236-252. Eubanks, Virginia. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. New York: St. Martin’s Press, 2018. Fisher, Joshua A., and Jay David Bolter. “Ethical Considerations for AR Experiences at Dark Tourism Sites”. IEEE Explore 29 April. 2019. 13 Apr. 2021 <https://ieeexplore.ieee.org/document/8699186>. Foth, Marcus, et al. From Social Butterfly to Engaged Citizen: Urban Informatics, Social Media, Ubiquitous Computing, and Mobile Technology to Support Citizen Engagement. Cambridge MA: MIT Press, 2011. Fourcade, Marion, and Kieran Healy. “Seeing like a Market.” Socio-Economic Review, 15.1 (2017): 9–29. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219–35. Gillespie, Tarleton. “The Politics of ‘Platforms.’” New Media & Society 12.3 (2010): 347–64. Hall, Jonathan D., et al. “Is Uber a Substitute or Complement for Public Transit?” Journal of Urban Economics 108 (2018): 36–50. Henman, Paul. “Improving Public Services Using Artificial Intelligence: Possibilities, Pitfalls, Governance.” Asia Pacific Journal of Public Administration 42.4 (2020): 209–21. Henman, Paul, and Greg Marston. “The Social Division of Welfare Surveillance.” Journal of Social Policy 37.2 (2008): 187–205. Héritier, Adrienne, and Dirk Lehmkuhl. “Introduction: The Shadow of Hierarchy and New Modes of Governance.” Journal of Public Policy 28.1 (2008): 1–17. Janssen, Marijn, et al. “Benefits, Adoption Barriers and Myths of Open Data and Open Government.” Information Systems Management 29.4 (2012): 258–68. Jenkins, Shannon. “Visa Privatisation Plan Scrapped, with New Approach to Tackle ’Emerging Global Threats’.” The Mandarin. 23 Mar. 2020. 19 Jan. 2021 <https://www.themandarin.com.au/128244-visa-privatisation-plan-scrapped-with-new-approach-to-tackle-emerging-global-threats/>. Jirotka, Marina, et al. “Responsible Research and Innovation in the Digital Age.” Communications of the ACM 60.6 (2016): 62–68. Kitchin, Rob. The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Thousand Oaks, CA: Sage, 2014. Konkel, Frank. “CIA Awards Secret Multibillion-Dollar Cloud Contract.” Nextgov 20 Nov. 2020. 19 Jan. 2021 <https://www.nextgov.com/it-modernization/2020/11/exclusive-cia-awards-secret-multibillion-dollar-cloud-contract/170227/>. Lance, Kate T., et al. “Cross‐Agency Coordination in the Shadow of Hierarchy: ‘Joining up’Government Geospatial Information Systems.” International Journal of Geographical Information Science, 23.2 (2009): 249–69. Lee, Ashlin J., and Peta S. Cook. “The Myth of the ‘Data‐Driven’ Society: Exploring the Interactions of Data Interfaces, Circulations, and Abstractions.” Sociology Compass 14.1 (2020): 1–14. Lyons, Glenn, et al. “The Importance of User Perspective in the Evolution of MaaS.” Transportation Research Part A: Policy and Practice 121(2019): 22-36. MacKenzie, Donald. “‘Making’, ‘Taking’ and the Material Political Economy of Algorithmic Trading.” Economy and Society 47.4 (2018): 501-23. Mayer-Schönberger, V., and K. Cukier. Big Data: A Revolution That Will Change How We Live, Work and Think. London: John Murray, 2013. Michel Foucault. Discipline and Punish. London: Penguin, 1977. Nardi, Bonnie, and Hamid Ekbia. Heteromation, and Other Stories of Computing and Capitalism. Cambridge, MA: MIT Press, 2017. O’Neil, Cathy. Weapons of Math Destruction – How Big Data Increases Inequality and Threatens Democracy. London: Penguin, 2017. Obermeyer, Ziad, et al. “Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations.” Science 366.6464 (2019): 447-53. Plantin, Jean-Christophe, et al. “Infrastructure Studies Meet Platform Studies in the Age of Google and Facebook.” New Media & Society 20.1 (2018): 293–310. Rosenblat, Alex, and Luke Stark. “Algorithmic Labor and Information Asymmetries: A Case Study of Uber’s Drivers.” International Journal of Communication 10 (2016): 3758–3784. Sawers, Paul. “Uber Drivers Sue for Data on Secret Profiling and Automated Decision-Making.” VentureBeat 20 July. 2020. 19 Jan. 2021 <https://venturebeat.com/2020/07/20/uber-drivers-sue-for-data-on-secret-profiling-and-automated-decision-making/>. Services Australia. About MyGov. Services Australia 19 Jan. 2021. 19 Jan. 2021 <https://www.servicesaustralia.gov.au/individuals/subjects/about-mygov>. Star, Susan Leigh. “Infrastructure and Ethnographic Practice: Working on the Fringes.” Scandinavian Journal of Information Systems 14.2 (2002):107-122. Stilgoe, Jack, et al. “Developing a Framework for Responsible Innovation.” Research Policy 42.9 (2013):1568-80. Suzor, Nicolas. Lawless: The Secret Rules That Govern Our Digital Lives. Cambridge: Cambridge University Press, 2019. Thomas, John Clayton, and Gregory Streib. “The New Face of Government: Citizen‐initiated Contacts in the Era of E‐Government.” Journal of Public Administration Research and Theory 13.1 (2003): 83-102. Van Dijck, José. “Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology.” Surveillance & Society 12.2 (2014): 197–208. ———. “Governing Digital Societies: Private Platforms, Public Values.” Computer Law & Security Review 36 (2020) 13 Apr. 2021 <https://www.sciencedirect.com/science/article/abs/pii/S0267364919303887>. ———. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press, 2013. Webster, Elizabeth, and Glenys Harding. “Outsourcing Public Employment Services: The Australian Experience.” Australian Economic Review 34.2 (2001): 231-42.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography