Journal articles on the topic 'Electronic government information – Access control – South Africa'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 24 journal articles for your research on the topic 'Electronic government information – Access control – South Africa.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Oyediran-Tidings, S. O., F. H. Nekhwevha, E. M. Ondari-Okemwa, and Oghenere Salubi. "Access to educational information enabled by ICT tools in the Fort Beaufort Education District (FBED), Eastern Cape, South Africa." Information Development 37, no. 3 (February 25, 2021): 402–16. http://dx.doi.org/10.1177/0266666921995232.

Full text
Abstract:
The benefits of the application of ICT tools in the education of high school learners have been well-established in various studies. As developments in technology have increased the reach of electronic information resources and enhanced learners’ access to educational information, it is imperative that these tools be available and accessible without any hindrances whatsoever to high school learners. This study was set out to evaluate the state of ICT infrastructure available to high school learners for the advancement of access to educational information while accentuating the efforts by the South African government to promote computer access in schools. This study underscores the importance of ICT tools for high school learners in ensuring quality educational outcome. A triangulated design was adopted to collect both qualitative and quantitative data on the condition of ICT-enabled access to educational information from Grade 12 learners and teachers in the Fort Beaufort Education District, Eastern Cape South Africa. Results show that learners’ access to educational information is constrained by inadequate provision of ICT infrastructure, restricted access to ICT tools, regulations for use of personal ICT tools and absence of information literacy for high school learners. The study, therefore, recommends the improved and dedicated provision of ICT resources, ICT-enabled educational information literacy program and flexibility of rules regarding the use of personal ICT tools at school.
APA, Harvard, Vancouver, ISO, and other styles
2

Jankeeparsad, Raphael W., Thanesha R. Jankeeparsad, and Gerhard Nienaber. "Acceptance of the eletronic method of filing tax returns by South African taxpayers: An exploratory study." Journal of Economic and Financial Sciences 9, no. 1 (December 18, 2017): 120–36. http://dx.doi.org/10.4102/jef.v9i1.33.

Full text
Abstract:
The South African government has benefited to date from information technology in many ways. The importance of understanding and influencing South African citizens’ acceptance of E-Government services is critical, given the substantial investment in government communication, information system technology and the potential for cost saving. One of the most successful E-Government initiatives, the electronic filing system (eFiling), allows tax returns to be filed electronically. Despite many taxpayers adopting this method, a large number are still using the traditional manual method of filing tax returns. This study utilised the decomposed theory of planned behaviour with factors adjusted specifically for South Africa as a developing country to identify the possible determinants of user acceptance of the eFiling system among taxpayers. This exploratory study was conducted by means of a questionnaire survey. For taxpayers using the manual method, lack of facilitating conditions such as access to computer and internet resources was the most significant barrier to eFiling usage, while taxpayers using the electronic method reported perceived usefulness as the primary determinant in their decision to use eFiling. Understanding these acceptance factors can extend our knowledge of taxpayers’ decision-making and lead to better planning and implementation of future E-Government initiatives in South Africa and other developing countries.
APA, Harvard, Vancouver, ISO, and other styles
3

Mawela, Tendani. "Exploring the role of social media in the G2C relationship." Information Development 33, no. 2 (July 9, 2016): 117–32. http://dx.doi.org/10.1177/0266666916639743.

Full text
Abstract:
This paper reports on a qualitative study regarding electronic citizen participation. The study assessed how government agencies based in South Africa used social media applications within the government to citizen (G2C) relationship for electronic participation. Textual data was sampled from provincial and municipal government department’s social media accounts and analysed thematically. The study found that there is a discrepancy in the adoption of social media in metropolitan municipalities and provincial government departments. Contrastingly, citizens were shown to have increasing access to social media, which have become essential components of their daily lives. Furthermore citizens were willing to use the applications to engage with government departments, which were found to be responding sporadically. The paper argues that there is an opportunity for the public sector to include social media in their e-participation endeavours. Several guiding principles are also offered.
APA, Harvard, Vancouver, ISO, and other styles
4

Ambira, Cleophas Mutundu, Henry Nyabuto Kemoni, and Patrick Ngulube. "A framework for electronic records management in support of e-government in Kenya." Records Management Journal 29, no. 3 (November 18, 2019): 305–19. http://dx.doi.org/10.1108/rmj-03-2018-0006.

Full text
Abstract:
Purpose This paper is based on the doctoral study conducted in 2016 at the University of South Africa. The purpose of this study was to investigate how the current state of management of electronic records in Kenya facilitates or undermines implementation of e-government with a view to develop a best-practice framework for management of electronic records in support of e-government. Design/methodology/approach The study used the interpretive research paradigm and adopted qualitative research methodology using phenomenological design. Maximum variation sampling was used to identify the research sample for the study. Findings The findings established that the general status of management of e-records (MER) in government ministries is inadequately positioned to support e-government; use of e-government in Kenya had grown significantly and more ministries were adopting e-government services; although some initiatives have been undertaken to enhance MER, the existing practices for MER require improvement to ensure they adequately support e-government. Research limitations/implications The limitations were access to respondents and the challenge of self-reported data. Practical implications Recommendations and a best-practice framework for managing electronic records in support of e-government have been provided. A proposal for implementation of the recommendations on a priority basis has also been provided. Social implications The study’s contribution to scholarly works and literature in the field resides in its findings and a framework that can be practically adopted for management of e-records in support of e-government. By establishing the nexus between management of e-records and e-government in Kenya, it is hoped that it will provide input to policymakers to consider records managers as key stakeholders in e-government. Originality/value The originality of this study stems from two aspects: original topic and understudied area.
APA, Harvard, Vancouver, ISO, and other styles
5

Sukatmi, Sukatmi, and Afriyanto Afriyanto. "IMPLEMENTASI E-GOVERNMENT BERBASIS SERVICE ORIENTED ARCHITECTURE (SOA) PADA KANTOR KECAMATAN NATAR LAMPUNG SELATAN." Jurnal Informasi dan Komputer 7, no. 1 (April 16, 2019): 75–82. http://dx.doi.org/10.35959/jik.v7i1.126.

Full text
Abstract:
E-government is short for from plan to implement the electronic the government .E-government is one of form or model of a system of government based on the power of digital technology, in which all in administrative work, the service for people, supervision and control section of the source of its power belonging to an organization concerned, financial, of taxes had not yet, levies which may be collected, white collar workers and rontje participated in this festival was brought under control in one system. E-government an outgrowth new as in order an increase of services the public allowing them to the main effort to lower the utilization of technology information and communication so that public services to village heads to be more transparent, accountable, effective and efficient. Offices of head of subdistricts natar is one of government institutions that is in south sample is taken at Lampung the Lampung provincial .As an institution of governance which had been has a duty and the obligation of serving the needs of the people is required to be able to always improve the quality of these services . One of the efforts to do is build e-government. through community service hence the need to do research in order to produce a e-government based Service Oriented Architecture (SOA) to the district office Natar Lampung South. Method of development systems used is Extreme Programming with the design of the Unified Modeling Gig Language (UML) and using the alchemy of PHP programming language, CSS and java. programing The end result of this research is e-government program having many access facilities for the office Natar Lampung South, so the society should not do went directly to the office in the search information and some services that needed.
APA, Harvard, Vancouver, ISO, and other styles
6

Dukhi, Natisha, Tholang Mokhele, Whadi-Ah Parker, Shandir Ramlagan, Razia Gaida, Musawenkosi Mabaso, Ronel Sewpaul, et al. "Compliance with Lockdown Regulations During the COVID-19 Pandemic in South Africa: Findings from an Online Survey." Open Public Health Journal 14, no. 1 (March 22, 2021): 45–55. http://dx.doi.org/10.2174/1874944502114010045.

Full text
Abstract:
Background: Background: SARS-CoV-2 has resulted in the COVID-19 pandemic. Based on a nationally representative online survey conducted several weeks on the pandemic, this paper explores how South Africans responded to the compliance regulations laid down by the national government and factors associated with individuals’ confidence in their community adhering to lockdown regulations. Methods: The study was conducted using a closed-ended questionnaire on a data-free online platform. Additionally, a telephonic survey was included to accommodate individuals who do not have access to smart-phones. The study population consisted of respondents who were 18 years and older and living in South Africa (n=19 933). Data were benchmarked to the 2019 midyear population estimates. Descriptive statistics and bivariate logistic regression are presented. Results: Over a quarter (26.1%) of respondents reported that they had not left home, indicating compliance with the COVID-19 control regulations, and 55.3% who did leave their homes did so to purchase essential items. A small proportion (1.2%) reported that they had visited friends. People, classified as coloured, those who were more literate (those with secondary, matric and tertiary education status), those residing in disadvantaged areas (informal settlements, townships, rural areas and farms), and those who perceived their risk of contracting COVID-19 as moderate and high, reported not being confident of their community adhering to lockdown. Conclusion: Communication strategies must be employed to ensure that important information regarding the pandemic be conveyed in the most important languages and be dispatched via various communication channels to reach as many people as possible.
APA, Harvard, Vancouver, ISO, and other styles
7

Mehta, Kedar, Mathias Ehrenwirth, Christoph Trinkl, Wilfried Zörner, and Rick Greenough. "The Energy Situation in Central Asia: A Comprehensive Energy Review Focusing on Rural Areas." Energies 14, no. 10 (May 13, 2021): 2805. http://dx.doi.org/10.3390/en14102805.

Full text
Abstract:
The northern part of the globe is dominated by industrialisation and is well-developed. For many years, the southern part of the world (South Asia, Africa etc.) has been a target of research concentrating on access to energy (mainly electricity) in rural regions. However, the Central Asian region has not been a focus of energy research compared to South East Asia and Africa. Despite plentiful domestically available energy resources, the energy supply in Central Asia is very unevenly distributed between urban and rural areas. Almost half of the total population of Central Asia lives in rural areas and there is a lack of access to modern energy services to meet primary needs. To analyse the energy situation (i.e., electricity, heating, hot water consumption, cooking, etc.) in rural Central Asia, this paper reviews residential energy consumption trends in rural Central Asian regions as compared to urban areas. Furthermore, the paper illustrates the potential of renewable energies in Central Asia. To perform the study, a qualitative comparative analysis was conducted based on a literature review, data, and statistical information. In summary, the presented article discusses the rural energy situation analytically and provides in-depth insights of Central Asian energy infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
8

Ramtohul, Avinash, and K. M. S. Soyjaudah. "Information security governance for e-services in southern African developing countries e-Government projects." Journal of Science & Technology Policy Management 7, no. 1 (March 7, 2016): 26–42. http://dx.doi.org/10.1108/jstpm-04-2014-0014.

Full text
Abstract:
Purpose – Highly sensitive information pertaining to citizens and government transactions is processed in an electronic format, making information security a critical part of e-Government applications and architectures. Information security measures should ideally span from authentication to authorisation and from logical/physical access control to auditing of electronic transactions and log books. The lack of such measures compromises confidentiality, integrity and availability of information. Today, most e-Government projects in developing countries in Southern Africa Developing Community (SADC) face challenges in two main areas, namely, information security and application software integration. This paper aims to discuss and analyse the information security requirements for e-Government projects and proposes an information security governance model for service-based architectures (SBAs). Design/methodology/approach – The current state of information security in emerging economies in SADC countries was researched. The main problems identified were the lack of software integration and information security governance, policy and administration. The design consists of three basic layers: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures, implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study. Findings – The main problems identified were the lack of software integration and information security governance, policy and administration. These challenges are causing e-government projects to stagnate. Practical implications – The proposed approach for implementing information security in e-Government systems will ensure a holistic approach to ensuring confidentiality, integrity and non-repudiation, allowing e-Government maturity to progress from “interaction” to “online transaction” stage in emerging economies. Originality/value – Research has not focused on developing a solution for emerging economies which are facing difficulties in integration software applications to deploy end-to-end e-services and to produce an underlying identity management architecture and information security governance to secure the e-services developed and deployed using an SBA. The work produced in this paper is specific to SBAs in e-government environments where legacy systems already exist. The work includes: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study.
APA, Harvard, Vancouver, ISO, and other styles
9

Motsuku, L., E. Chokunonga, M. Sengayi, E. Singh, L. Khoali, and M. Borok. "Strengthening African Population-Based Cancer Registration Through Regional Mentorship: UICC Fellowship Experience at Zimbabwe National Cancer Registry." Journal of Global Oncology 4, Supplement 2 (October 1, 2018): 65s. http://dx.doi.org/10.1200/jgo.18.68200.

Full text
Abstract:
Background: South Africa (SA) recently established an urban population-based cancer registry in Ekurhuleni metropolitan district in Gauteng Province. The Ekurhuleni Population-Based Cancer Registry (EPBCR) aims to inform cancer policy and comprehensive cancer control programs. The registry covers 3.5 million residents including public/private, rural/urban patients and a mix of the multiethnic SA population. The first complete year's data will be published in April 2018. It is crucial that high-quality data collected by newly established registries are comparable regionally and globally. The Union for International Cancer Control (UICC) fellowship provides a practical opportunity for South African National Cancer Registry staff to learn from the Zimbabwe National Cancer Registry (ZNCR), a well-established population-based registry in the region. Aim: To enhance the SA EPBCR through observation and application of methods for population-based cancer registration used at the ZNCR. Methods: A desktop review of published and unpublished articles/reports of the ZNCR was conducted. Semi-structured informal interviews were conducted with registry staff to understand data processes from case finding to reporting. Representative data sources were visited to understand case-finding processes. Results: The ZNCR was established in 1985 through a collaborative research agreement between the Ministry of Health (MoH) and International Agency for Research on Cancer (IARC). Its activities are overseen by a 17-member constituted multidisciplinary advisory committee. The registry staff comprise one registrar, one executive assistant (EA) and four health information assistants (HIA). The process of ensuring quality data are guided by the African Cancer Registry Network and the International Association of Cancer Registries standards for population-based cancer registries. The ZNCR uses a combination of active and passive case-finding methods where HIAs have unrestricted access to patient information in private and public sectors such as hospitals, pathology laboratories, radiotherapy centers and death registries. HIAs conduct patient interviews for accurate demographics and to complete missing information. Cases are coded according to International Classification of Diseases for Oncology-V3 and Canreg software is used for data entry, quality control and analysis. The hard copies are stored in locked cabinets in offices with restricted access. The data are then used for reporting and research. Conclusion: The support of government, commitment of advisory committee volunteers, highly trained and experienced staff are key elements behind the success of ZNCR. Strict adherence to international practices for population-based cancer registration has enabled ZNCR to produce high-quality data for research and cancer programs. The processes used by ZNCR will be customised and implemented at EPBCR.
APA, Harvard, Vancouver, ISO, and other styles
10

Popoola, Oluwatoyin Muse Johnson. "Preface to the Second Issue of Indian Pacific Journal of Accounting and Finance." Indian-Pacific Journal of Accounting and Finance 1, no. 2 (April 1, 2017): 1–3. http://dx.doi.org/10.52962/ipjaf.2017.1.2.10.

Full text
Abstract:
I welcome you to the Vol. 1 Issue 2 of Indian-Pacific Journal of Accounting and Finance. You will recall in Issue 1, I made known our commitment to publish high-quality, impactful papers and to bring scholars who share our vision and mission into the Editorial Advisory Board. Dr Ishaya John Dabari (Modibbo Adamawa University of Technology, Adamawa, Nigeria) has consented to join the Editorial Advisory Board. I am pleased to welcome him on board. In Issue 2, all the presentations are international research with emphasis on corporate governance and risk management, internal auditing, accounting information system, education, telecommunications, and banking sectors. In the first paper captioned “Effect of Risk Management Committee on Monitoring Mechanisms”, Dr Rachael Oluyemisi Arowolo (Chrisland University), Prof Dr Ayoib B. Che-Ahmad (Universiti Utara Malaysia), and Asst. Prof. Dr Oluwatoyin Muse Johnson Popoola (Universiti Utara Malaysia) examines the influence of risk management committee (RMC) on monitoring mechanisms (MM) in Sub-Saharan Africa. The paper provides empirical supports for RMC association with monitoring mechanisms to reduce agency problems, using the secondary data (2010-2012) of Nigerian non-financial listed companies. The article recommends to the board of Nigerian companies to explore the usefulness of RMC in monitoring the management and controlling shareholders to lessen agency problems and protect the interests of the minority shareholders. In the second paper entitled “Aligning Corporate Governance with Enterprise Risk Management Adoption in the Nigerian Deposit Money Banks”, Dr Ishaya John Dabari (Modibbo Adama University of Technology), Sini Fave Kwaji (Modibbo Adama University of Technology), and Ghazali Zulkurnai (Universiti Utara Malaysia) align corporate governance (CG) with Enterprise Risk Management (ERM) adoption in the Nigerian Deposit Money banks (DMBs). Their study used cross-sectional research design, survey method and questionnaire technique to collect data in 21 Nigerian DMBs. Out of 722 questionnaires distributed, 435 were found usable for further analysis through Structural Equation Modeling in Stata. The paper empirically reveals the significant positive relationship between CG and ERM adoption regarding internal audit effectiveness, human resource competency and top management commitment. The study provides insightful results for the banking industry, regulators, practitioners, academia and other stakeholders, perhaps to render assistance in the areas of policy formulation, implementation and evaluation. In the third paper titled “Independence and Management Support: The advocate for Internal Auditors’ Task Performance in Tertiary Institutions”, Oyewumi Hassan Kehinde (Universiti Utara Malaysia), Prof Dr Ayoib B. Che-Ahmad (Universiti Utara Malaysia), and Asst. Prof. Dr Oluwatoyin Muse Johnson Popoola (Universiti Utara Malaysia) examine the influence of independence (IND) and management support (MS) on the task performance (TP) of internal auditors in the South-West tertiary institutions in Nigeria. The study formulates and tests two hypotheses on the relationship between IND and TP in one hand, and MS and TP on the other hand. This study employs a quantitative approach, cross-sectional design, and survey questionnaire in obtaining data from 350 internal auditors from the internal audit departments/units of the universities, polytechnics, and colleges of education. The results of the PLS-SEM algorithm and bootstrapping reveal positive significant relationships between IND and TP, and the MS and TP, and hence, support the two hypotheses. The paper has a policy implication on the government/private proprietors who are owners of tertiary institutions; management and Council who control the institutions, internal auditors who are operators of internal auditing; regulatory authorities who perform oversight function on the institutions, and professional accounting and auditing bodies. The article adds to the body of knowledge and extends internal audit research to tertiary institutions. In the fourth paper entitled “Examining Information Disclosure on Regulatory Compliance of Telecommunication Companies in Nigeria”, Sini Fave Kwaji (Modibbo Adama University of Technology), Dr Ishaya John Dabari (Modibbo Adama University of Technology) examine the impact of information disclosure on regulatory compliance of telecommunication companies in Nigeria. The study adopted ex-post facto research design, which relies on secondary data collected from the financial statements of three (3) telecommunication companies out of the eight (8) telecommunication companies for the period of 2004 to 2015 and analysed through the multiple regression statistics. The results reveal that computed compliance index of telecommunication companies was above average (av. 75.6%) with the requirements of regulatory agencies. Also, the findings indicate that mandatory information disclosure (MID) recorded a significant impact at 10% (weak compliance), while voluntary information disclosure (VID) showed an effect at 5% (partial compliance). The article makes a clarion call for the enforcement of full compliance by all the telecommunication companies operating in Nigeria and therefore, recommends to the National Communication Commission (NCC) to monitor the compliance with the requirements of information disclosure and pursue its objective to achieve best corporate governance practices in Nigerian telecommunication companies. In the fifth paper titled “Examining CAATTs implementation by internal auditors in the public sector.” Dr Aidi Ahmi (Universiti Utara Malaysia), Associate Prof Dr Siti Zabedah Saidin (Universiti Utara Malaysia), and Dr Akilah Abdullah (Universiti Utara Malaysia) investigate the implementation of CAATTs by internal auditors in the Malaysian public sector. Their research reports the results from 12 interviews conducted with internal audit departments in both federal and state levels. The study revealed the implementation of CAATTs by internal auditors in public sector is still low because of lack of expertise, high implementation and maintenance cost, limited access of auditee’s data, and preference to conduct the audit manually. Furthermore, it is not mandatory for them to use CAATTs. The evidence is a contrast with the encouragement made by the government to improve the IT usage in public sector. The results implied that training for future auditors in CAATTs to ensure the successful implementation is crucial and strategic. For CAATTs to be a success, the head of internal audit must possess the awareness about the importance of CAATTs as well as enforcement of its implementation. As you read through this Vol. 1 Issue 2 of IPJAF, I would like to recap that the success of the journal depends on your active participation and those of your colleagues and friends through submission of high-quality articles for review and publication. I reiterate to our prospective authors to enjoy the benefits IPJAF provides about mentoring nature of the unique review process, which offers high quality, and helpful reviews tailored to assist authors in improving their manuscripts. I acknowledge your support as we endeavour to make IPJAF the most authoritative journal on accounting and finance for the community of academic, professional, industry, society and government.
APA, Harvard, Vancouver, ISO, and other styles
11

Modiba, Thomas Mashilo, and Mamotshabo Boloka. "The Usage of Government Law Libraries in South Africa." Mousaion: South African Journal of Information Studies 36, no. 4 (October 21, 2019). http://dx.doi.org/10.25159/2663-659x/4238.

Full text
Abstract:
Government law libraries have an important role to play in the development of the judicial system in South Africa by providing information resources to legal practitioners, so that they can perform their judicial duties effectively. The better the information services provided by government libraries in South Africa, the more likely it is that legal practitioners will use them and produce quality judgments, thus strengthening the judicial system. The objectives of this study were 1) to evaluate the accessibility and relevancy of the services offered by government law libraries in South Africa, and 2) to identify the factors that hinder this contribution to the legal practitioner’s information needs. Law librarians and library clerks were sampled to participate in this study. The findings suggest that government law resources are accessed both physically and electronically. The physical use of government law libraries to access law books, law journals, loose-leafs and law reports was found to be limited, because the printed legal information resources are outdated. However, government law libraries are used extensively to conduct legal research electronically using Sabinet, Juta Online Publications, LexisNexis, Westlaw, HeinOnline and SAFLII. The electronic resources were found to be accurate and up to date. As a result, the government law libraries services are relevant to both judicial officers and legal practitioners.
APA, Harvard, Vancouver, ISO, and other styles
12

Kariuki, Paul, Maria Lauda Goyayi, and Lizzy Oluwatoyin Ofusori. "COVID-19, migration and inclusive cities through e-governance: strategies to manage asylum seekers in Durban, South Africa." Digital Policy, Regulation and Governance ahead-of-print, ahead-of-print (August 25, 2021). http://dx.doi.org/10.1108/dprg-08-2020-0114.

Full text
Abstract:
Purpose This paper aims to examine the role of electronic governance (e-governance) in enabling asylum seekers’ access to public services in the city of Durban, South Africa. Because of COVID-19, the government scaled down its operations, limiting access to public services, including among migrants. Design/methodology/approach Because of COVID-19-related restrictions, a systematic review was conducted of the relevant academic literature as well as the information portals of relevant government departments, municipalities and research reports on migration and refugees in South Africa. A total of 320 peer-reviewed research articles were identified. These were filtered and 68 relevant articles were selected. Findings The study found that asylum seekers have limited access to public services via information communication technology-enabled mechanisms. Whilst the city government has embraced e-governance, it is still in its nascent stages. Research limitations/implications This study was limited to a desktop one because of COVID-19 restrictions and it focused exclusively on asylum seekers. Therefore, its findings can only be generalised to this category of people. Practical implications Future studies on this subject should gather data from all categories of migrants to gain in-depth perspectives. Social implications All spheres of governance in South Africa should recognise asylum seekers as a constituency that deserves access to public services. E-governance can facilitate easier access to these services, and policies need to be aligned with this reality. Originality/value This study examined the efficacy of e-governance in enabling access to government services by asylum seekers during COVID-19. To the best of the authors’ knowledge, no other study on this subject was conducted during this period.
APA, Harvard, Vancouver, ISO, and other styles
13

Molaoa, Thabang T., Feziwe B. Bisiwe, and Kwazi CZ Ndlovu. "End-stage kidney disease and rationing of kidney replacement therapy in the free state province, South Africa: a retrospective study." BMC Nephrology 22, no. 1 (May 11, 2021). http://dx.doi.org/10.1186/s12882-021-02387-x.

Full text
Abstract:
Abstract Background End-stage kidney disease (ESKD) and the required kidney replacement therapy (KRT) are significant public health challenges for low-and-middle-income countries. The South African government adopted a KRT rationing policy to balance the growing need for KRT and scarce resources. We aimed to describe the epidemiology and KRT access in patients with ESKD referred to the main public sector hospital in the Free State Province, South Africa. Methods A retrospective study of adult patients with ESKD admitted to Universitas Academic Hospital for KRT, was conducted between 1 January 2016 and 31 December 2018. A review of the KRT committee decisions to offer or deny KRT based on the KRT rationing policy of the Free State was undertaken. Demographic information, KRT committee outcomes, laboratory test results, and clinical details were collected from assessment tools, KRT committee meeting diaries, and electronic hospital records. Results Of 363 patients with ESKD referred for KRT access, 96 with incomplete records were excluded and 267 were included in the analysis. Median patient age was 40 (interquartile range, 33‒49) years, and male patients accounted for 56.2 % (150/267, p = 0.004) of the cohort. The average annual ESKD incidence was 49.9 (95 % confidence interval [CI], 35.8‒64.0) per-million-population. The most prevalent comorbidities were hypertension (42.3 %; 113/267), human immunodeficiency virus (HIV) (28.5 %; 76/267), and diabetes mellitus (19.1 %; 51/267). The KRT access rate was 30.7 % (82/267), with annual KRT incidence rates of 8.05 (95 % CI, 4.98‒11.1), 11.5 (95 % CI, 7.83‒15.1), and 14.1 (95 % CI, 10.3‒18.0) per-million-population in 2016, 2017, and 2018, respectively. Advanced organ dysfunction was the commonest reason recorded for KRT access denial (58.9 %; 109/185). Age (odds ratio [OR], 1.04; 95 % CI, 1.00‒1.07; p = 0.024) and diabetes (OR, 5.04; CI, 1.69‒15.03; p = 0.004) were independent predictors for exclusion from KRT, while hypertension (OR, 1.80; 1.06‒3.04; p = 0.029) independently predicted advanced organ dysfunction resulting in KRT exclusion. Conclusions Non-communicable and communicable diseases, including hypertension, diabetes, and HIV, contributed to ESKD, highlighting the need for improved early prevention strategies to address a growing incidence rate. Two-thirds of ESKD patients were unable to access KRT, with age, diabetes mellitus, and advanced organ dysfunction being significant factors adversely affecting KRT access.
APA, Harvard, Vancouver, ISO, and other styles
14

Ntale, Peter Dithan, and Muhammed Ngoma. "Is COVID-19 threatening electoral democracy in Uganda? Readiness to accept “scientific voting” (electronic voting) amidst the COVID-19 pandemic." Digital Policy, Regulation and Governance ahead-of-print, ahead-of-print (August 26, 2021). http://dx.doi.org/10.1108/dprg-01-2021-0025.

Full text
Abstract:
Purpose The purpose of this paper is to assess the readiness of Ugandans to accept electronic voting under the restrictive conditions of the COVID-19 pandemic. Design/methodology/approach A semi-structured questionnaire, built on a five-point-Likert scale with responses ranging from 1 – strongly disagree to 5 – strongly agree was used to get quantifiable data from four main electoral stakeholders i.e. the policymakers, urban and semi-urban youth, rural voters and government officials. These stakeholders were purposively and conveniently selected because of the influential roles they play in promoting electoral democracy in Uganda. Using a cross-sectional survey design, the authors adopted correlational and quantitative research designs to collect and analyse data. Data was collected from a maximum sample size of 384 as recommended by Krejcie and Morgan (1970) from which 252 useful responses (65.6% response rate) were obtained. Using a statistical package for social scientists version 21.0, the authors performed a Pearson correlation coefficient to determine the relationships between study variables and linear regression analysis to predict the readiness of the stakeholders to accept e-voting more especially under the constraints caused by the COVID-19 pandemic. Findings There was a positive significant relationship between perceived usefulness (PU) and attitude towards adoption, perceived ease of use and attitude towards adoption, attitude and readiness and finally trust propensity and readiness. The regression results show that 65% of the variations in readiness to adopt e-voting can be explained by perceived ease of use, PU, trust propensity and attitude towards adoption. Attitude towards adopting e-voting accounts for the highest variations in the model followed by trust propensity and finally PU. However, perceived ease of use was found to be insignificant. Research limitations/implications The study was limited to only PU, perceived ease of use, trust propensity, attitudes towards using/adoption and readiness to accept e-voting amidst the COVID-19 strict conditions. In Africa, electoral democracy can be influenced by a number of factors such as finances, education levels, sectarianism, voter rigging, perceived risk, political and economic environment. These were not taken into consideration yet they would affect the stakeholders’ attitudes and perceptions which would directly or indirectly affect the adoption of electronic voting. Practical implications Given the low levels of technology infrastructure in the country, there is a general low uptake of technology-oriented systems. The internet reach is low and quality is poor whilst the radio and televisions network is limited to a few urban settings, poor quality technology systems such as the recently acquired voter biometric systems and the constant government actions to switch off the internet and social media whenever there are contentious political issues. These inadequacies together with the restrictive COVID-19 conditions have compromised the participation of stakeholders which dents the stakeholders’ readiness to accept e-voting which consequently compromises electoral democracy in the country. Therefore, government, electoral observers, the international community and civil society organizations need to accelerate the technology infrastructure development in the country, training and development of technical skills and competences, as well as mass mobilization on the use of technology-oriented platforms aimed at promoting electoral democracy. The country should come up with ICT policies and regulations that encourage the use of ICT in areas that promote democracy. These may include; the use of an easy e-voting system such as emails and voting via the post office. Also, Lawmakers, civil society organizations and the international community should make it punitive for anyone who disenfranchises people through internet disconnection, denial of access to broadcast, print and online media. These interventions will restore peoples’ attitudes and perceptions towards electronic voting, consequently increasing their levels of participation in the electioneering process. Originality/value The Ministry of Health, the Uganda Police Force and other security agencies have come out strongly to enforce the COVID-19 standard operating procedures which among others include the banning of political gatherings, processions and meetings of any kind. As a remedy, the Electoral Commission is encouraging political parties, electoral candidates, voters and other stakeholders to use technology-oriented systems such as mobile phones, broadcast and print media, the internet and others to reach out to the electorate. With the government in full control of all these electronic, print and broadcast media, having previously switched them off during the 2011 and 2016 polls consequently disenfranchising many people from their democratic rights, it remains unknown the extent to which the electorate is ready to accept and appreciate scientific voting more so during this time when restrictions against COVID-19 are not making it any better for the voters and other key participants to carry out their political and civil activities.
APA, Harvard, Vancouver, ISO, and other styles
15

Gillett, James. "The Audience in Media Activism." M/C Journal 3, no. 1 (March 1, 2000). http://dx.doi.org/10.5204/mcj.1830.

Full text
Abstract:
Introduction Over the past thirty years media activism has expanded dramatically. Like never before, individuals and groups have access to personal computers, publishing software, fax, telecommunications, the Internet, community radio and television that enable them to participate in forms of cultural production previously reserved for an intellectual and political élite. Independently produced media among those who feel excluded from, even oppressed by, the dominant social order provides a means of raising awareness among oppressed or marginalised communities while at the same time challenging the meanings conveyed by social institutions like the mass media and the state. The use of media for the purposes of activism has occurred, by in large, in the context of new social movements. The AIDS movement in North America has provided an organisational and ideological infrastructure through which those infected have become involved in media production. This paper focusses on the development of media projects by AIDS activists for the purposes of sharing information about the treatment and management of HIV infection. Specifically I am interested in how the changing the needs of people with HIV/AIDS -- the intended audience -- as perceived by activists have shaped the evolution of treatment information projects. Community-Based Media Media projects designed as a forum for people with HIV/AIDS have been guided by the need to be and remain community-based. What constitutes community-based media has been taken up, in several different ways, in the literature on media activism. Downing, for instance, has examined the experiences of those involved in "self managed" media projects. In this analysis he illustrates how control over production is crucial to media projects that focus on challenging or resisting forms of political oppression. External influence or control only threatens to subvert collective efforts directed at achieving self representation. Smith looks at this issue in a different way, arguing that it is important to make the distinction between print media for women and feminist print media. According to Smith, the former tend to reflect the dominant gender order, contributing to the social forces that oppress and marginalise women, in part, because they do not focus on addressing or advancing the needs and concerns of women. Feminist media, in contrast, tends to be informed by a political analysis of gender: they are created and produced by and for women; they provide a forum for the voices of women who have been silenced through oppression or marginalisation; and they challenge and seek to transform patriarchal social relations. Trend takes this point further in his critique of media projects that have been informed by Leftist politics. The problem, he argues, has been that the media created or influenced by Leftist politics have been dominated by an intellectual élite that have ignored or chastised the voices and opinions of those who are oppressed or marginalised by the dominant social order. As an alternative, Trend looks to recent efforts among gay and lesbian media activists who have turned to new media technologies and their own experiences as the basis for subverting and challenging homophobia and hetrosexism. For each of these scholars, community-based media follow what might be called a peer model of communication: a specific group using media to speak for themselves and in doing so achieving some degree of self representation. A key issue raised in this work is how those involved in media projects understand the role that their audience plays in establishing and sustaining this community-based status. Treatment Information Projects as Community-Based Media Activism Political organizing around the treatment of HIV infection (what has been called AIDS treatment activism) has been a central component of the community-based response to HIV/AIDS (Ariss). Treatment activism among groups like ACT UP and AIDS ACTION NOW! have focussed on influencing those power structures (government and pharmaceutical companies) in control of the development and approval of medications (Carter; Carter & Watney). Treatment activism also refers to the creation of advocacy, support, and education programs for people living with HIV/AIDS. The development of forums which enable people with HIV/AIDS to share information about treatments and health care generally has been an important aspect of treatment activism in North America. A significant part of this type of treatment activism has been the production and dissemination of information about treatments and health management. Indeed, the importance of "staying informed" has always been high on the list of survival strategies for people with HIV/AIDS. Early in the epidemic, in the 1980s, the problem that people with HIV/AIDS faced was a lack of information about new and potentially beneficial treatments. In response, people with HIV/AIDS formed social networks, often in close proximity to AIDS organizations, in order to share strategies to promote their health and manage their infection. Eventually, such forums were expanded and became, or were integrated into, print media projects. In the United States, the most notable and enduring example is AIDS Treatment News. In Canada similar publications like The Positive Side and the Treatment Information Flash were started by people with HIV/AIDS with the support of grassroots, but increasingly government funded, AIDS service organizations. During this period media products like The Positive Side and Treatment Information Flash were produced by politically involved HIV- positive gay men who sought to provide information to all people with HIV/AIDS but also realised that their primary audience was gay men who were HIV infected or affected. With developments in the treatment of HIV/AIDS, the main issue for people with HIV/AIDS became gaining access to information rather than a lack of information. Pressure from the organised HIV/AIDS community eventually led to the development of and greater support (from government and private foundations) for treatment information organisations. In the United States, groups like Project Inform (PI) were established which focussed exclusively on interpreting medical information and making it available to people with HIV/AIDS. In Canada, a similar organisation was started, the Community AIDS Treatment Information Exchange (CATIE), initially a subcommittee of AIDS ACTION NOW! and then as an autonomous organisation. Treatment-specific organisations meant that existing media projects were given more resources and a broader scope in meeting the information needs of people with HIV/AIDS. Media projects that began earlier in the epidemic were faced with the challenge of adapting to changes in the AIDS epidemic and to the treatment of HIV/AIDS. Efforts were made, for instance, in treatment information projects in Canada with varying levels of success to include the voices of a more diverse range of people with HIV/AIDS. Also, a greater emphasis was placed on providing material that would be accessible to people with varying educational, cultural, and social backgrounds. In the case of The Positive Side and the Treatment Information Flash despite efforts effectively reaching a more diverse audience of people with HIV/AIDS, while remaining relevant to gay men with HIV/AIDS, was an ongoing challenge that called into question the effectiveness and relevancy of such media as a forum for all people with HIV/AIDS. In more recent years, with the rise of new medications and the use of combination therapy or treatment cocktails, as well as the rise in use and legitimacy of complementary therapies, the health care information needs of people with HIV/AIDS have grown exponentially. To meet the changes needs of people with HIV/AIDS, organisations like PI and CATIE have turned away from print media and instead embraced the phone, fax, and the Internet as an alternative means of disseminating treatment information. Also, the availability of information in currently less of a problems as it was in the 1980s and early 1990s (although accessibility continues to be a serious problem). Instead, people with HIV/AIDS were becoming overwhelmed by an overabundance of information. Treatment information projects had to go beyond simply making information available and understandable; people with HIV/AIDS needed to learn how to make sense of the wealth of information available in order to make informed decisions about their health. Print media projects like The Positive Side and the Treatment Information Flash were eventually incorporated into broader electronic media based projects that were more oriented toward provided a broad amount of treatment information to a diverse audience of people with HIV/AIDS. Early print media projects were unable to extend beyond their grassroots in the gay HIV-positive community. In this sense in the pursuit of becoming general media they no longer were "community-based" and as a result could no longer sustain themselves. Conclusion What community-based meant for those involved in projects like The Positive Side and the Treatment Information Flash revolved around ensuring that the media actively engaged an audience of people with HIV/AIDS and that the material in the publication was grounded in the experiences of people with HIV/AIDS." This understanding of community-based had two components. First, it was an attempt to remain accountable to the needs and concerns of those HIV-infected and affected. And, second, it was an effort to privilege and foster the opinions, views, and expertise of those living with HIV/AIDS. Achieving this required a political analysis that identified the dominant social order as working against, or simply ignoring, the best interests of those HIV-infected and affected. In response, people with HIV/AIDS needed to take control of the production and representation of information about managing HIV infection. As a result, becoming and remaining "community-based" was for a period of time an ongoing process that was negotiated between the audience and those involved in the media projects. This negotiation was seen as essential to providing an alternative forum for health care information that looked critically and pragmatically at dominant discourses about managing HIV infection. However, in recent years, the realisation that it is not possible to address people with HIV/AIDS as a unified, politically aware audience has called into question the viability of treatment information projects. As a result, early treatment publications have been replaced by large government funded treatment information organisations that provide general information through a variety of media which are intended for a diverse range of people with HIV/AIDS. The result is a greater gap between producer and consumer and a shift away from a consideration of the audience as an essential, potentially political entity in the production of AIDS treatment information. References Ariss, R. Against Death: The Practice of Living with AIDS. Australia: Gordon & Breach Publishers, 1996. Carter, G. ACT UP, the AIDS War and Activism. New Jersey: Open Magazine, 1992. Carter, E., and S. Watney. Taking Liberties: AIDS and Cultural Politics. London: Serpent's Tail, 1989. Downing, J. Radical Media. Boston: South End Press, 1984. Kahn, A. AIDS: The Winter War. Philadelphia: Temple UP, 1993. Smith, M. "Feminist Media and Cultural Politics." Women in Mass Communication. Ed. P. Creedon. London: Sage, 1993. Trend, D. "Rethinking Media Activism: Why the Left Is Losing the Cultural War." Socialist Review, 2 (1993): 5-33. Citation reference for this article MLA style: James Gillett. "The Audience in Media Activism: AIDS Treatment Information Projects." M/C: A Journal of Media and Culture 3.1 (2000). [your date of access] <http://www.uq.edu.au/mc/0003/activism.php>. Chicago style: James Gillett, "The Audience in Media Activism: AIDS Treatment Information Projects," M/C: A Journal of Media and Culture 3, no. 1 (2000), <http://www.uq.edu.au/mc/0003/activism.php> ([your date of access]). APA style: James Gillett. (2000) The Audience in Media Activism: AIDS Treatment Information Projects. M/C: A Journal of Media and Culture 3(1). <http://www.uq.edu.au/mc/0003/activism.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
16

Matthews, Nicole, Sherman Young, David Parker, and Jemina Napier. "Looking across the Hearing Line?: Exploring Young Deaf People’s Use of Web 2.0." M/C Journal 13, no. 3 (June 30, 2010). http://dx.doi.org/10.5204/mcj.266.

Full text
Abstract:
IntroductionNew digital technologies hold promise for equalising access to information and communication for the Deaf community. SMS technology, for example, has helped to equalise deaf peoples’ access to information and made it easier to communicate with both deaf and hearing people (Tane Akamatsu et al.; Power and Power; Power, Power, and Horstmanshof; Valentine and Skelton, "Changing", "Umbilical"; Harper). A wealth of anecdotal evidence and some recent academic work suggests that new media technology is also reshaping deaf peoples’ sense of local and global community (Breivik "Deaf"; Breivik, Deaf; Brueggeman). One focus of research on new media technologies has been on technologies used for point to point communication, including communication (and interpretation) via video (Tane Akamatsu et al.; Power and Power; Power, Power, and Horstmanshof). Another has been the use of multimedia technologies in formal educational setting for pedagogical purposes, particularly English language literacy (e.g. Marshall Gentry et al.; Tane Akamatsu et al.; Vogel et al.). An emphasis on the role of multimedia in deaf education is understandable, considering the on-going highly politicised contest over whether to educate young deaf people in a bilingual environment using a signed language (Swanwick & Gregory). However, the increasing significance of social and participatory media in the leisure time of Westerners suggests that such uses of Web 2.0 are also worth exploring. There have begun to be some academic accounts of the enthusiastic adoption of vlogging by sign language users (e.g. Leigh; Cavander and Ladner) and this paper seeks to add to this important work. Web 2.0 has been defined by its ability to, in Denise Woods’ word, “harness collective intelligence” (19.2) by providing opportunities for users to make, adapt, “mash up” and share text, photos and video. As well as its well-documented participatory possibilities (Bruns), its re-emphasis on visual (as opposed to textual) communication is of particular interest for Deaf communities. It has been suggested that deaf people are a ‘visual variety of the human race’ (Bahan), and the visually rich presents new opportunities for visually rich forms of communication, most importantly via signed languages. The central importance of signed languages for Deaf identity suggests that the visual aspects of interactive multimedia might offer possibilities of maintenance, enhancement and shifts in those identities (Hyde, Power and Lloyd). At the same time, the visual aspects of the Web 2.0 are often audio-visual, such that the increasingly rich resources of the net offer potential barriers as well as routes to inclusion and community (see Woods; Ellis; Cavander and Ladner). In particular, lack of captioning or use of Auslan in video resources emerges as a key limit to the accessibility of the visual Web to deaf users (Cahill and Hollier). In this paper we ask to what extent contemporary digital media might create moments of permeability in what Krentz has called “the hearing line, that invisible boundary separating deaf and hearing people”( 2)”. To provide tentative answers to these questions, this paper will explore the use of participatory digital media by a group of young Deaf people taking part in a small-scale digital moviemaking project in Sydney in 2009. The ProjectAs a starting point, the interdisciplinary research team conducted a video-making course for young deaf sign language users within the Department of Media, Music and Cultural Studies at Macquarie University. The research team was comprised of one deaf and four hearing researchers, with expertise in media and cultural studies, information technology, sign language linguistics/ deaf studies, and signed language interpreting. The course was advertised through the newsletter of partner organization the NSW Deaf Society, via a Sydney bilingual deaf school and through the dense electronic networks of Australian deaf people. The course attracted fourteen participants from NSW, Western Australia and Queensland ranging in age from 10 to 18. Twelve of the participants were male, and two female. While there was no aspiration to gather a representative group of young people, it is worth noting there was some diversity within the group: for example, one participant was a wheelchair user while another had in recent years moved to Sydney from Africa and had learned Auslan relatively recently. Students were taught a variety of storytelling techniques and video-making skills, and set loose in groups to devise, shoot and edit a number of short films. The results were shared amongst the class, posted on a private YouTube channel and made into a DVD which was distributed to participants.The classes were largely taught in Auslan by a deaf teacher, although two sessions were taught by (non-deaf) members of Macquarie faculty, including an AFI award winning director. Those sessions were interpreted into Auslan by a sign language interpreter. Participants were then allowed free creative time to shoot video in locations of their choice on campus, or to edit their footage in the computer lab. Formal teaching sessions lasted half of each day – in the afternoons, participants were free to use the facilities or participate in a range of structured activities. Participants were also interviewed in groups, and individually, and their participation in the project was observed by researchers. Our research interest was in what deaf young people would choose to do with Web 2.0 technologies, and most particularly the visually rich elements of participatory and social media, in a relatively unstructured environment. Importantly, our focus was not on evaluating the effectiveness of multimedia for teaching deaf young people, or the level of literacy deployed by deaf young people in using the applications. Rather we were interested to discover the kinds of stories participants chose to tell, the ways they used Web 2.0 applications and the modalities of communication they chose to use. Given that Auslan was the language of instruction of the course, would participants draw on the tradition of deaf jokes and storytelling and narrate stories to camera in Auslan? Would they use the format of the “mash-up”, drawing on found footage or photographs? Would they make more filmic movies using Auslan dialogue? How would they use captions and text in their movies: as subtitles for Auslan dialogue? As an alternative to signing? Or not at all? Our observations from the project point to the great significance of the visual dimensions of Web 2.0 for the deaf young people who participated in the project. Initially, this was evident in the kind of movies students chose to make. Only one group – three young people in their late teens which included both of the young women in the class - chose to make a dialogue heavy movie, a spoof of Charlie’s Angels, entitled Deaf Angels. This movie included long scenes of the Angels using Auslan to chat together, receiving instruction from “Charlie” in sign language via videophone and recruiting “extras”, again using Auslan, to sign a petition for Auslan to be made an official Australian language. In follow up interviews, one of the students involved in making this film commented “my clip is about making a political statement, while the other [students in the class] made theirs just for fun”. The next group of (three) films, all with the involvement of the youngest class member, included signed storytelling of a sort readily recognisable from signed videos on-line: direct address to camera, with the teller narrating but also taking on the roles of characters and presenting their dialogue directly via the sign language convention of “role shift” - also referred to as constructed action and constructed dialogue (Metzger). One of these movies was an interesting hybrid. The first half of the four minute film had two young actors staging a hold-up at a vending machine, with a subsequent chase and fight scene. Like most of the films made by participants in the class, it included only one line of signed dialogue, with the rest of the narrative told visually through action. However, at the end of the action sequence, with the victim safely dead, the narrative was then retold by one of the performers within a signed story, using conventions typically observed in signed storytelling - such as role shift, characterisation and spatial mapping (Mather & Winston; Rayman; Wilson).The remaining films similarly drew on action and horror genres with copious use of chase and fight scenes and melodramatic and sometimes quite beautiful climactic death tableaux. The movies included a story about revenging the death of a brother; a story about escaping from jail; a short story about a hippo eating a vet; a similar short comprised of stills showing a sequence of executions in the computer lab; and a ghost story. Notably, most of these movies contained very little dialogue – with only one or two lines of signed dialogue in each four to five minute video (with the exception of the gun handshape used in context to represent the object liberally throughout most films). The kinds of movies made by this limited group of people on this one occasion are suggestive. While participants drew on a number of genres and communication strategies in their film making, the researchers were surprised at how few of the movies drew on traditions of signed storytelling or jokes– particularly since the course was targeted at deaf sign language users and promoted as presented in Auslan. Consequently, our group of students were largely drawn from the small number of deaf schools in which Auslan is the main language of instruction – an exceptional circumstance in an Australian setting in which most deaf young people attend mainstream schools (Byrnes et al.; Power and Hyde). Looking across the Hearing LineWe can make sense of the creative choices made by the participants in the course in a number of ways. Although methods of captioning were briefly introduced during the course, iMovie (the package which participants were using) has limited captioning functionality. Indeed, one student, who was involved in making the only clip to include captioning which contextualised the narrative, commented in follow-up interviews that he would have liked more information about captioning. It’s also possible that the compressed nature of the course prevented participants from undertaking the time-consuming task of scripting and entering captions. As well as being the most fun approach to the projects, the use of visual story telling was probably the easiest. This was perhaps exacerbated by the lack of emphasis on scriptwriting (outside of structural elements and broad narrative sweeps) in the course. Greater emphasis on that aspect of film-making would have given participants a stronger foundational literacy for caption-based projectsDespite these qualifications, both the movies made by students and our observations suggest the significance of a shared visual culture in the use of the Web by these particular young people. During an afternoon when many of the students were away swimming, one student stayed in the lab to use the computers. Rather than working on a video project, he spent time trawling through YouTube for clips purporting to show ghost sightings and other paranormal phenomena. He drew these clips to the attention of one of the research team who was present in the lab, prompting a discussion about the believability of the ghosts and supernatural apparitions in the clips. While some of the clips included (uncaptioned) off-screen dialogue and commentary, this didn’t seem to be a barrier to this student’s enjoyment. Like many other sub-genres of YouTube clips – pranks, pratfalls, cute or alarmingly dangerous incidents involving children and animals – these supernatural videos as a genre rely very little on commentary or dialogue for their meaning – just as with the action films that other students drew on so heavily in their movie making. In an E-Tech paper entitled "The Cute Cat Theory of Digital Activism", Ethan Zuckerman suggests that “web 1.0 was invented to allow physicists to share research papers and web 2.0 was created to allow people to share pictures of cute cats”. This comment points out both the Web 2.0’s vast repository of entertaining material in the ‘funny video’genre which is visually based, dialogue free, entertaining material accessible to a wide range of people, including deaf sign language users. In the realm of leisure, at least, the visually rich resources of Web 2.0’s ubiquitous images and video materials may be creating a shared culture in which the line between hearing and deaf people’s entertainment activities is less clear than it may have been in the past. The ironic tone of Zuckerman’s observation, however, alerts us to the limits of a reliance on language-free materials as a route to accessibility. The kinds of videos that the participants in the course chose to make speaks to the limitations as well as resources offered by the visual Web. There is still a limited range of captioned material on You Tube. In interviews, both young people and their teachers emphasised the central importance of access to captioned video on-line, with the young people we interviewed strongly favouring captioned video over the inclusion on-screen of simultaneous signed interpretations of text. One participant who was a regular user of a range of on-line social networking commented that if she really liked the look of a particular movie which was uncaptioned, she would sometimes contact its maker and ask them to add captions to it. Interestingly, two student participants emphasised in interviews that signed video should also include captions so hearing people could have access to signed narratives. These students seemed to be drawing on ideas about “reverse discrimination”, but their concern reflected the approach of many of the student movies - using shared visual conventions that made their movies available to the widest possible audience. All the students were anxious that hearing people could understand their work, perhaps a consequence of the course’s location in the University as an overwhelmingly hearing environment. In this emphasis on captioning rather than sign as a route to making media accessible, we may be seeing a consequence of the emphasis Krentz describes as ubiquitous in deaf education “the desire to make the differences between deaf and hearing people recede” (16). Krentz suggests that his concept of the ‘hearing line’ “must be perpetually retested and re-examined. It reveals complex and shifting relationships between physical difference, cultural fabrication and identity” (7). The students’ movies and attitudes emphasised the reality of that complexity. Our research project explored how some young Deaf people attempted to create stories capable of crossing categories of deafness and ‘hearing-ness’… unstable (like other identity categories) while others constructed narratives that affirmed Deaf Culture or drew on the Deaf storytelling traditions. This is of particular interest in the Web 2.0 environment, given that its technologies are often lauded as having the politics of participation. The example of the Deaf Community asks reasonable questions about the validity of those claims, and it’s hard to escape the conclusion that there is still less than appropriate access and that some users are more equal than others.How do young people handle the continuing lack of material available to the on the Web? The answer repeatedly offered by our young male interviewees was ‘I can’t be bothered’. As distinct from “I can’t understand” or “I won’t go there” this answer, represented a disengagement from demands to identify your literacy levels, reveal your preferred means of communication; to rehearse arguments about questions of access or expose attempts to struggle to make sense of texts that fail to employ readily accessible means of communicating. Neither an admission of failure or a demand for change, CAN’T-BE-BOTHERED in this context offers a cool way out of an accessibility impasse. This easily-dismissed comment in interviews was confirmed in a whole-group discussions, when students came to a consensus that if when searching for video resources on the Net they found video that included neither signing nor captions, they would move on to find other more accessible resources. Even here, though, the ground continues to shift. YouTube recently announced that it was making its auto-captioning feature open to everybody - a machine generated system that whilst not perfect does attempt to make all YouTube videos accessible to deaf people. (Bertolucci).The importance of captioning of non-signed video is thrown into further significance by our observation from the course of the use of YouTube as a search engine by the participants. Many of the students when asked to research information on the Web bypassed text-based search engines and used the more visual results presented on YouTube directly. In research on deaf adolescents’ search strategies on the Internet, Smith points to the promise of graphical interfaces for deaf young people as a strategy for overcoming the English literacy difficulties experienced by many deaf young people (527). In the years since Smith’s research was undertaken, the graphical and audiovisual resources available on the Web have exploded and users are increasingly turning to these resources in their searches, providing new possibilities for Deaf users (see for instance Schonfeld; Fajardo et al.). Preliminary ConclusionsA number of recent writers have pointed out the ways that the internet has made everyday communication with government services, businesses, workmates and friends immeasurably easier for deaf people (Power, Power and Horstmanshof; Keating and Mirus; Valentine and Skelton, "Changing", "Umbilical"). The ready availability of information in a textual and graphical form on the Web, and ready access to direct contact with others on the move via SMS, has worked against what has been described as deaf peoples’ “information deprivation”, while everyday tasks – booking tickets, for example – are no longer a struggle to communicate face-to-face with hearing people (Valentine and Skelton, "Changing"; Bakken 169-70).The impacts of new technologies should not be seen in simple terms, however. Valentine and Skelton summarise: “the Internet is not producing either just positive or just negative outcomes for D/deaf people but rather is generating a complex set of paradoxical effects for different users” (Valentine and Skelton, "Umbilical" 12). They note, for example, that the ability, via text-based on-line social media to interact with other people on-line regardless of geographic location, hearing status or facility with sign language has been highly valued by some of their deaf respondents. They comment, however, that the fact that many deaf people, using the Internet, can “pass” minimises the need for hearing people in a phonocentric society to be aware of the diversity of ways communication can take place. They note, for example, that “few mainstream Websites demonstrate awareness of D/deaf peoples’ information and communication needs/preferences (eg. by incorporating sign language video clips)” ("Changing" 11). As such, many deaf people have an enhanced ability to interact with a range of others, but in a mode favoured by the dominant culture, a culture which is thus unchallenged by exposure to alternative strategies of communication. Our research, preliminary as it is, suggests a somewhat different take on these complex questions. The visually driven, image-rich approach taken to movie making, Web-searching and information sharing by our participants suggests the emergence of a certain kind of on-line culture which seems likely to be shared by deaf and hearing young people. However where Valentine and Skelton suggest deaf people, in order to participate on-line, are obliged to do so, on the terms of the hearing majority, the increasingly visual nature of Web 2.0 suggests that the terrain may be shifting – even if there is still some way to go.AcknowledgementsWe would like to thank Natalie Kull and Meg Stewart for their research assistance on this project, and participants in the course and members of the project’s steering group for their generosity with their time and ideas.ReferencesBahan, B. "Upon the Formation of a Visual Variety of the Human Race. In H-Dirksen L. Baumann (ed.), Open Your Eyes: Deaf Studies Talking. London: University of Minnesota Press, 2007.Bakken, F. “SMS Use among Deaf Teens and Young Adults in Norway.” In R. Harper, L. Palen, and A. Taylor (eds.), The Inside Text: Social, Cultural and Design Perspectives on SMS. Netherlands: Springe, 2005. 161-74. Berners-Lee, Tim. Weaving the Web. London: Orion Business, 1999.Bertolucci, Jeff. “YouTube Offers Auto-Captioning to All Users.” PC World 5 Mar. 2010. 5 Mar. 2010 < http://www.macworld.com/article/146879/2010/03/YouTube_captions.html >.Breivik, Jan Kare. Deaf Identities in the Making: Local Lives, Transnational Connections. Washington, D.C.: Gallaudet University Press, 2005.———. “Deaf Identities: Visible Culture, Hidden Dilemmas and Scattered Belonging.” In H.G. Sicakkan and Y.G. Lithman (eds.), What Happens When a Society Is Diverse: Exploring Multidimensional Identities. Lewiston, New York: Edwin Mellen Press, 2006. 75-104.Brueggemann, B.J. (ed.). Literacy and Deaf People’s Cultural and Contextual Perspectives. Washington, DC: Gaudellet University Press, 2004. Bruns, Axel. Blogs, Wikipedia, Second Life and Beyond: From Production to Produsage. New York: Peter Lang, 2008.Byrnes, Linda, Jeff Sigafoos, Field Rickards, and P. Margaret Brown. “Inclusion of Students Who Are Deaf or Hard of Hearing in Government Schools in New South Wales, Australia: Development and Implementation of a Policy.” Journal of Deaf Studies and Deaf Education 7.3 (2002): 244-257.Cahill, Martin, and Scott Hollier. Social Media Accessibility Review 1.0. Media Access Australia, 2009. Cavender, Anna, and Richard Ladner. “Hearing Impairments.” In S. Harper and Y. Yesilada (eds.), Web Accessibility. London: Springer, 2008.Ellis, Katie. “A Purposeful Rebuilding: YouTube, Representation, Accessibility and the Socio-Political Space of Disability." Telecommunications Journal of Australia 60.2 (2010): 1.1-21.12.Fajardo, Inmaculada, Elena Parra, and Jose J. Canas. “Do Sign Language Videos Improve Web Navigation for Deaf Signer Users?” Journal of Deaf Studies and Deaf Education 15.3 (2009): 242-262.Harper, Phil. “Networking the Deaf Nation.” Australian Journal of Communication 30.3 (2003): 153-166.Hyde, M., D. Power, and K. Lloyd. "W(h)ither the Deaf Community? Comments on Trevor Johnston’s Population, Genetics and the Future of Australian Sign Language." Sign Language Studies 6.2 (2006): 190-201. Keating, Elizabeth, and Gene Mirus. “American Sign Language in Virtual Space: Interactions between Deaf Users of Computer-Mediated Video.” Language in Society 32.5 (Nov. 2003): 693-714.Krentz, Christopher. Writing Deafness: The Hearing Line in Nineteenth-Century Literature. Chapel Hill, NC: University of North Carolina Press, 2007.Leigh, Irene. A Lens on Deaf Identities. Oxford: Oxford UP. 2009.Marshall Gentry, M., K.M. Chinn, and R.D. Moulton. “Effectiveness of Multimedia Reading Materials When Used with Children Who Are Deaf.” American Annals of the Deaf 5 (2004): 394-403.Mather, S., and E. Winston. "Spatial Mapping and Involvement in ASL Storytelling." In C. Lucas (ed.), Pinky Extension and Eye Gaze: Language Use in Deaf Communities. Washington, DC: Gallaudet University Press, 1998. 170-82.Metzger, M. "Constructed Action and Constructed Dialogue in American Sign Language." In C. Lucas (ed.), Sociolinguistics in Deaf Communities. Washington, DC: Gallaudet University Press, 1995. 255-71.Power, Des, and G. Leigh. "Principles and Practices of Literacy Development for Deaf Learners: A Historical Overview." Journal of Deaf Studies and Deaf Education 5.1 (2000): 3-8.Power, Des, and Merv Hyde. “The Characteristics and Extent of Participation of Deaf and Hard-of-Hearing Students in Regular Classes in Australian Schools.” Journal of Deaf Studies and Deaf Education 7.4 (2002): 302-311.Power, M., and D. Power “Everyone Here Speaks TXT: Deaf People Using SMS in Australia and the Rest of the World.” Journal of Deaf Studies and Deaf Education 9.3 (2004). Power, M., D. Power, and L. Horstmanshof. “Deaf People Communicating via SMS, TTY, Relay Service, Fax, and Computers in Australia.” Journal of Deaf Studies and Deaf Education 12.1 (2007): 80-92. Rayman, J. "Storytelling in the Visual Mode: A Comparison of ASL and English." In E. Wilson (ed.), Storytelling & Conversation: Discourse in Deaf Communities. Washington, DC: Gallaudet University Press, 2002. 59-82.Schonfeld, Eric. "ComScore: YouTube Now 25 Percent of All Google Searches." Tech Crunch 18 Dec. 2008. 14 May 2009 < http://www.techcrunch.com/2008/12/18/comscore-YouTube-now-25-percent-of-all-google-searches/?rss >.Smith, Chad. “Where Is It? How Deaf Adolescents Complete Fact-Based Internet Search Tasks." American Annals of the Deaf 151.5 (2005-6).Swanwick, R., and S. Gregory (eds.). Sign Bilingual Education: Policy and Practice. Coleford: Douglas McLean Publishing, 2007.Tane Akamatsu, C., C. Mayer, and C. Farrelly. “An Investigation of Two-Way Text Messaging Use with Deaf Students at the Secondary Level.” Journal of Deaf Studies and Deaf Education 11.1 (2006): 120-131.Valentine, Gill, and Tracy Skelton. “Changing Spaces: The Role of the Internet in Shaping Deaf Geographies.” Social and Cultural Geography 9.5 (2008): 469-85.———. “‘An Umbilical Cord to the World’: The Role of the Internet in D/deaf People’s Information and Communication Practices." Information, Communication and Society 12.1 (2009): 44-65.Vogel, Jennifer, Clint Bowers, Cricket Meehan, Raegan Hoeft, and Kristy Bradley. “Virtual Reality for Life Skills Education: Program Evaluation.” Deafness and Education International 61 (2004): 39-47.Wilson, J. "The Tobacco Story: Narrative Structure in an ASL Story." In C. Lucas (ed.), Multicultural Aspects of Sociolinguistics in Deaf Communities. Washington, DC: Gallaudet University Press, 1996. 152-80.Winston (ed.). Storytelling and Conversation: Discourse in Deaf Communities. Washington, D.C: Gallaudet University Press. 59-82.Woods, Denise. “Communicating in Virtual Worlds through an Accessible Web 2.0 Solution." Telecommunications Journal of Australia 60.2 (2010): 19.1-19.16YouTube Most Viewed. Online video. YouTube 2009. 23 May 2009 < http://www.YouTube.com/browse?s=mp&t=a >.
APA, Harvard, Vancouver, ISO, and other styles
17

Humphry, Justine, and César Albarrán Torres. "A Tap on the Shoulder: The Disciplinary Techniques and Logics of Anti-Pokie Apps." M/C Journal 18, no. 2 (April 29, 2015). http://dx.doi.org/10.5204/mcj.962.

Full text
Abstract:
In this paper we explore the rise of anti-gambling apps in the context of the massive expansion of gambling in new spheres of life (online and offline) and an acceleration in strategies of anticipatory and individualised management of harm caused by gambling. These apps, and the techniques and forms of labour they demand, are examples of and a mechanism through which a mode of governance premised on ‘self-care’ and ‘self-control’ is articulated and put into practice. To support this argument, we explore two government initiatives in the Australian context. Quit Pokies, a mobile app project between the Moreland City Council, North East Primary Care Partnership and the Victorian Local Governance Association, is an example of an emerging service paradigm of ‘self-care’ that uses online and mobile platforms with geo-location to deliver real time health and support interventions. A similar mobile app, Gambling Terminator, was launched by the NSW government in late 2012. Both apps work on the premise that interrupting a gaming session through a trigger, described by Quit Pokies’ creator as a “tap on the shoulder” provides gamblers the opportunity to take a reflexive stance and cut short their gambling practice in the course of play. We critically examine these apps as self-disciplining techniques of contemporary neo-liberalism directed towards anticipating and reducing the personal harm and social risk associated with gambling. We analyse the material and discursive elements, and new forms of user labour, through which this consumable media is framed and assembled. We argue that understanding the role of these apps, and mobile media more generally, in generating new techniques and technologies of the self, is important for identifying emerging modes of governance and their implications at a time when gambling is going through an immense period of cultural normalisation in online and offline environments. The Australian context is particularly germane for the way gambling permeates everyday spaces of sociality and leisure, and the potential of gambling interventions to interrupt and re-configure these spaces and institute a new kind of subject-state relation. Gambling in Australia Though a global phenomenon, the growth and expansion of gambling manifests distinctly in Australia because of its long cultural and historical attachment to games of chance. Australians are among the biggest betters and losers in the world (Ziolkowski), mainly on Electronic Gaming Machines (EGM) or pokies. As of 2013, according to The World Count of Gaming Machine (Ziolkowski), there were 198,150 EGMs in the country, of which 197,274 were slot machines, with the rest being electronic table games of roulette, blackjack and poker. There are 118 persons per machine in Australia. New South Wales is the jurisdiction with most EGMs (95,799), followed by Queensland (46,680) and Victoria (28,758) (Ziolkowski). Gambling is significant in Australian cultural history and average Australian households spend at least some money on different forms of gambling, from pokies to scratch cards, every year (Worthington et al.). In 1985, long-time gambling researcher Geoffrey Caldwell stated thatAustralians seem to take a pride in the belief that we are a nation of gamblers. Thus we do not appear to be ashamed of our gambling instincts, habits and practices. Gambling is regarded by most Australians as a normal, everyday practice in contrast to the view that gambling is a sinful activity which weakens the moral fibre of the individual and the community. (Caldwell 18) The omnipresence of gambling opportunities in most Australian states has been further facilitated by the availability of online and mobile gambling and gambling-like spaces. Social casino apps, for instance, are widely popular in Australia. The slots social casino app Slotomania was the most downloaded product in the iTunes store in 2012 (Metherell). In response to the high rate of different forms of gambling in Australia, a range of disparate interest groups have identified the expansion of gambling as a concerning trend. Health researchers have pointed out that online gamblers have a higher risk of experiencing problems with gambling (at 30%) compared to 15% in offline bettors (Hastings). The incidence of gambling problems is also disproportionately high in specific vulnerable demographics, including university students (Cervini), young adults prone to substance abuse problems (Hayatbakhsh et al.), migrants (Tanasornnarong et al.; Scull & Woolcock; Ohtsuka & Ohtsuka), pensioners (Hing & Breen), female players (Lee), Aboriginal communities (Young et al.; McMillen & Donnelly) and individuals experiencing homelessness (Holsworth et al.). While there is general recognition of the personal and public health impacts of gambling in Australia, there is a contradiction in the approach to gambling at a governance level. On one hand, its expansion is promoted and even encouraged by the federal and state governments, as gambling is an enormous source of revenue, as evidenced, for example, by the construction of the new Crown casino in Barangaroo in Sydney (Markham & Young). Campaigns trying to limit the use of poker machines, which are associated with concerns over problem gambling and addiction, are deemed by the gambling lobby as un-Australian. Paradoxically, efforts to restrict gambling or control gambling winnings have also been described as un-Australian, such as in the Australian Taxation Office’s campaign against MONA’s founder, David Walsh, whose immense art collection was acquired with the funds from a gambling scheme (Global Mail). On the other hand, people experiencing problems with gambling are often categorised as addicts and the ultimate blame (and responsibility) is attributed to the individual. In Australia, attitudes towards people who are arguably addicted to gambling are different than those towards individuals afflicted by alcohol or drug abuse (Jean). While “Australians tend to be sympathetic towards people with alcohol and other drug addictions who seek help,” unless it is seen as one of the more socially acceptable forms of occasional, controlled gambling (such as sports betting, gambling on the Melbourne Cup or celebrating ANZAC Day with Two-Up), gambling is framed as an individual “problem” and “moral failing” (Jean). The expansion of gambling is the backdrop to another development in health care and public health discourse, which have for some time now been devoted to the ideal of what Lupton has called the “digitally engaged patient” (Lupton). Technologies are central to the delivery of this model of health service provision that puts the patient at the centre of, and responsible for, their own health and medical care. Lupton has pointed out how this discourse, while appearing new, is in fact the latest version of the 1970s emphasis on the ‘patient as consumer’, an idea given an extra injection by the massive development and availability of digital and interactive web-based and mobile platforms, many of these directed towards the provision of health and health-related information and services. What this means for patients is that, rather than relying solely on professional medical expertise and care, the patient is encouraged to take on some of this medical/health work to conduct practices of ‘self-care’ (Lupton). The Discourse of ‘Self-Management’ and ‘Self-Care’ The model of ‘self-care’ and ‘self-management’ by ‘empowering’ digital technology has now become a dominant discourse within health and medicine, and is increasingly deployed across a range of related sectors such as welfare services. In recent research conducted on homelessness and mobile media, for example, government department staff involved in the reform of welfare services referred to ‘self-management’ as the new service paradigm that underpins their digital reform strategy. Echoing ideas and language similar to the “digitally engaged patient”, customers of Centrelink, Medicare and other ‘human services’ are being encouraged (through planned strategic initiatives aimed at shifting targeted customer groups online) to transact with government services digitally and manage their own personal profiles and health information. One departmental staff member described this in terms of an “opportunity cost”, the savings in time otherwise spent standing in long queues in service centres (Humphry). Rather than view these examples as isolated incidents taking place within or across sectors or disciplines, these are better understood as features of an emerging ‘discursive formation’ , a term Foucault used to describe the way in which particular institutions and/or the state establish a regime of truth, or an accepted social reality and which gives definition to a new historical episteme and subject: in this case that of the self-disciplined and “digitally engaged medical/health patient”. As Foucault explained, once this subject has become fully integrated into and across the social field, it is no longer easy to excavate, since it lies below the surface of articulation and is held together through everyday actions, habits and institutional routines and techniques that appear to be universal, necessary and/normal. The way in which this citizen subject becomes a universal model and norm, however, is not a straightforward or linear story and since we are in the midst of its rise, is not a story with a foretold conclusion. Nevertheless, across a range of different fields of governance: medicine; health and welfare, we can see signs of this emerging figure of the self-caring “digitally engaged patient” constituted from a range of different techniques and practices of self-governance. In Australia, this figure is at the centre of a concerted strategy of service digitisation involving a number of cross sector initiatives such as Australia’s National EHealth Strategy (2008), the National Digital Economy Strategy (2011) and the Australian Public Service Mobile Roadmap (2013). This figure of the self-caring “digitally engaged” patient, aligns well and is entirely compatible with neo-liberal formulations of the individual and the reduced role of the state as a provider of welfare and care. Berry refers to Foucault’s definition of neoliberalism as outlined in his lectures to the College de France as a “particular form of post-welfare state politics in which the state essentially outsources the responsibility of the ‘well-being' of the population” (65). In the case of gambling, the neoliberal defined state enables the wedding of two seemingly contradictory stances: promoting gambling as a major source of revenue and capitalisation on the one hand, and identifying and treating gambling addiction as an individual pursuit and potential risk on the other. Risk avoidance strategies are focused on particular groups of people who are targeted for self-treatment to avoid the harm of gambling addiction, which is similarly framed as individual rather than socially and systematically produced. What unites and makes possible this alignment of neoliberalism and the new “digitally engaged subject/patient” is first and foremost, the construction of a subject in a chronic state of ill health. This figure is positioned as terminal from the start. They are ‘sick’, a ‘patient’, an ‘addict’: in need of immediate and continuous treatment. Secondly, this neoliberal patient/addict is enabled (we could even go so far as to say ‘empowered’) by digital technology, especially smartphones and the apps available through these devices in the form of a myriad of applications for intervening and treating ones afflictions. These apps range fromself-tracking programs such as mood regulators through to social media interventions. Anti-Pokie Apps and the Neoliberal Gambler We now turn to two examples which illustrate this alignment between neoliberalism and the new “digitally engaged subject/patient” in relation to gambling. Anti-gambling apps function to both replace or ‘take the place’ of institutions and individuals actively involved in the treatment of problem gambling and re-engineer this service through the logics of ‘self-care’ and ‘self-management’. Here, we depart somewhat from Foucault’s model of disciplinary power summed up in the institution (with the prison exemplifying this disciplinary logic) and move towards Deleuze’s understanding of power as exerted by the State not through enclosures but through diffuse and rhizomatic information flows and technologies (Deleuze). At the same time, we retain Foucault’s attention to the role and agency of the user in this power-dynamic, identifiable in the technics of self-regulation and in his ideas on governmentality. We now turn to analyse these apps more closely, and explore the way in which these articulate and perform these disciplinary logics. The app Quit Pokies was a joint venture of the North East Primary Care Partnership, the Victorian Local Governance Association and the Moreland City Council, launched in early 2014. The idea of the rational, self-reflexive and agentic user is evident in the description of the app by app developer Susan Rennie who described it this way: What they need is for someone to tap them on the shoulder and tell them to get out of there… I thought the phone could be that tap on the shoulder. The “tap on the shoulder” feature uses geolocation and works by emitting a sound alert when the user enters a gaming venue. It also provides information about each user’s losses at that venue. This “tap on the shoulder” is both an alert and a reprimand from past gambling sessions. Through the Responsible Gambling Fund, the NSW government also launched an anti-pokie app in 2013, Gambling Terminator, including a similar feature. The app runs on Apple and Android smartphone platforms, and when a person is inside a gambling venue in New South Wales it: sends reminder messages that interrupt gaming-machine play and gives you a chance to re-think your choices. It also provides instant access to live phone and online counselling services which operate 24 hours a day, seven days a week. (Google Play Store) Yet an approach that tries to prevent harm by anticipating the harm that will come from gambling at the point of entering a venue, also eliminates the chance of potential negotiations and encounters a user might have during a visit to the pub and how this experience will unfold. It reduces the “tap on the shoulder”, which may involve a far wider set of interactions and affects, to a software operation and it frames the pub or the club (which under some conditions functions as hubs for socialization and community building) as dangerous places that should be avoided. This has the potential to lead to further stigmatisation of gamblers, their isolation and their exclusion from everyday spaces. Moreland Mayor, Councillor Tapinos captures the implicit framing of self-care as a private act in his explanation of the app as a method for problem gamblers to avoid being stigmatised by, for example, publicly attending group meetings. Yet, curiously, the app has the potential to create a new kind of public stigmatisation through potentially drawing other peoples’ attention to users’ gambling play (as the alarm is triggered) generating embarrassment and humiliation at being “caught out” in an act framed as aberrant and literally, “alarming”. Both Quit Pokies and Gambling Terminator require their users to perform ‘acts’ of physical and affective labour aimed at behaviour change and developing the skills of self-control. After downloading Quit Pokies on the iPhone and launching the app, the user is presented an initial request: “Before you set up this app. please write a list of the pokies venues that you regularly use because the app will ask you to identify these venues so it can send you alerts if you spend time in these locations. It will also use your set up location to identify other venues you might use so we recommend that you set up the App in the location where you spend most time. Congratulation on choosing Quit Pokies.”Self-performed processes include installation, setting up, updating the app software, programming in gambling venues to be detected by the smartphone’s inbuilt GPS, monitoring and responding to the program’s alerts and engaging in alternate “legitimate” forms of leisure such as going to the movies or the library, having coffee with a friend or browsing Facebook. These self-performed labours can be understood as ‘technologies of the self’, a term used by Foucault to describe the way in which social members are obliged to regulate and police their ‘selves’ through a range of different techniques. While Foucault traces the origins of ‘technologies of the self’ to the Greco-Roman texts with their emphasis on “care of oneself” as one of the duties of citizenry, he notes the shift to “self-knowledge” under Christianity around the 8th century, where it became bound up in ideals of self-renunciation and truth. Quit Pokies and Gambling Terminator may signal a recuperation of the ideal of self-care, over confession and disclosure. These apps institute a set of bodily activities and obligations directed to the user’s health and wellbeing, aided through activities of self-examination such as charting your recovery through a Recovery Diary and implementing a number of suggested “Strategies for Change” such as “writing a list” and “learning about ways to manage your money better”. Writing is central to the acts of self-examination. As Jeremy Prangnell, gambling counsellor from Mission Australia for Wollongong and Shellharbour regions explained the app is “like an electronic diary, which is a really common tool for people who are trying to change their behaviour” (Thompson). The labours required by users are also implicated in the functionality and performance of the platform itself suggesting the way in which ‘technologies of the self’ simultaneously function as a form of platform work: user labour that supports and sustains the operation of digital systems and is central to the performance and continuation of digital capitalism in general (Humphry, Demanding Media). In addition to the acts of labour performed on the self and platform, bodies are themselves potentially mobilised (and put into new circuits of consumption and production), as a result of triggers to nudge users away from gambling venues, towards a range of other cultural practices in alternative social spaces considered to be more legitimate.Conclusion Whether or not these technological interventions are effective or successful is yet to be tested. Indeed, the lack of recent activity in the community forums and preponderance of issues reported on installation and use suggests otherwise, pointing to a need for more empirical research into these developments. Regardless, what we’ve tried to identify is the way in which apps such as these embody a new kind of subject-state relation that emphasises self-control of gambling harm and hastens the divestment of institutional and social responsibility at a time when gambling is going through an immense period of expansion in many respects backed by and sanctioned by the state. Patterns of smartphone take up in the mainstream population and the rise of the so called ‘mobile only population’ (ACMA) provide support for this new subject and service paradigm and are often cited as the rationale for digital service reform (APSMR). Media convergence feeds into these dynamics: service delivery becomes the new frontier for the merging of previously separate media distribution systems (Dwyer). Letters, customer service centres, face-to-face meetings and web sites, are combined and in some instances replaced, with online and mobile media platforms, accessible from multiple and mobile devices. These changes are not, however, simply the migration of services to a digital medium with little effective change to the service itself. Health and medical services are re-invented through their technological re-assemblage, bringing into play new meanings, practices and negotiations among the state, industry and neoliberal subjects (in the case of problem gambling apps, a new subjectivity, the ‘neoliberal addict’). These new assemblages are as much about bringing forth a new kind of subject and mode of governance, as they are a solution to problem gambling. This figure of the self-treating “gambler addict” can be seen to be a template for, and prototype of, a more generalised and universalised self-governing citizen: one that no longer needs or makes demands on the state but who can help themselves and manage their own harm. Paradoxically, there is the potential for new risks and harms to the very same users that accompanies this shift: their outright exclusion as a result of deprivation from basic and assumed digital access and literacy, the further stigmatisation of gamblers, the elimination of opportunities for proximal support and their exclusion from everyday spaces. References Albarrán-Torres, César. “Gambling-Machines and the Automation of Desire.” Platform: Journal of Media and Communication 5.1 (2013). Australian Communications and Media Authority. “Australians Cut the Cord.” Research Snapshots. Sydney: ACMA (2013) Berry, David. Critical Theory and the Digital. Broadway, New York: Bloomsbury Academic, 2014 Berry, David. Stunlaw: A Critical Review of Politics, Arts and Technology. 2012. ‹http://stunlaw.blogspot.com.au/2012/03/code-foucault-and-neoliberal.html›. Caldwell, G. “Some Historical and Sociological Characteristics of Australian Gambling.” Gambling in Australia. Eds. G. Caldwell, B. Haig, M. Dickerson, and L. Sylan. Sydney: Croom Helm Australia, 1985. 18-27. Cervini, E. “High Stakes for Gambling Students.” The Age 8 Nov. 2013. ‹http://www.theage.com.au/national/education/high-stakes-for-gambling-students-20131108-2x5cl.html›. Deleuze, Gilles. "Postscript on the Societies of Control." October (1992): 3-7. Foucault, Michel. “Technologies of the Self.” Eds. Luther H. Martin, Huck Gutman and Patrick H. Hutton. Boston: University of Massachusetts Press, 1988 Hastings, E. “Online Gamblers More at Risk of Addiction.” Herald Sun 13 Oct. 2013. ‹http://www.heraldsun.com.au/news/online-gamblers-more-at-risk-of-addiction/story-fni0fiyv-1226739184629#!›.Hayatbakhsh, Mohammad R., et al. "Young Adults' Gambling and Its Association with Mental Health and Substance Use Problems." Australian and New Zealand Journal of Public Health 36.2 (2012): 160-166. Hing, Nerilee, and Helen Breen. "A Profile of Gaming Machine Players in Clubs in Sydney, Australia." Journal of Gambling Studies 18.2 (2002): 185-205. Holdsworth, Louise, Margaret Tiyce, and Nerilee Hing. "Exploring the Relationship between Problem Gambling and Homelessness: Becoming and Being Homeless." Gambling Research 23.2 (2012): 39. Humphry, Justine. “Demanding Media: Platform Work and the Shaping of Work and Play.” Scan: Journal of Media Arts Culture, 10.2 (2013): 1-13. Humphry, Justine. “Homeless and Connected: Mobile Phones and the Internet in the Lives of Homeless Australians.” Australian Communications Consumer Action Network. Sep. 2014. ‹https://www.accan.org.au/grants/completed-grants/619-homeless-and-connected›.Lee, Timothy Jeonglyeol. "Distinctive Features of the Australian Gambling Industry and Problems Faced by Australian Women Gamblers." Tourism Analysis 14.6 (2009): 867-876. Lupton, D. “The Digitally Engaged Patient: Self-Monitoring and Self-Care in the Digital Health Era.” Social Theory & Health 11.3 (2013): 256-70. Markham, Francis, and Martin Young. “Packer’s Barangaroo Casino and the Inevitability of Pokies.” The Conversation 9 July 2013. ‹http://theconversation.com/packers-barangaroo-casino-and-the-inevitability-of-pokies-15892›. Markham, Francis, and Martin Young. “Who Wins from ‘Big Gambling’ in Australia?” The Conversation 6 Mar. 2014. ‹http://theconversation.com/who-wins-from-big-gambling-in-australia-22930›.McMillen, Jan, and Katie Donnelly. "Gambling in Australian Indigenous Communities: The State of Play." The Australian Journal of Social Issues 43.3 (2008): 397. Ohtsuka, Keis, and Thai Ohtsuka. “Vietnamese Australian Gamblers’ Views on Luck and Winning: Universal versus Culture-Specific Schemas.” Asian Journal of Gambling Issues and Public Health 1.1 (2010): 34-46. Scull, Sue, Geoffrey Woolcock. “Problem Gambling in Non-English Speaking Background Communities in Queensland, Australia: A Qualitative Exploration.” International Gambling Studies 5.1 (2005): 29-44. Tanasornnarong, Nattaporn, Alun Jackson, and Shane Thomas. “Gambling among Young Thai People in Melbourne, Australia: An Exploratory Study.” International Gambling Studies 4.2 (2004): 189-203. Thompson, Angela, “Live Gambling Odds Tipped for the Chop.” Illawarra Mercury 22 May 2013: 6. Metherell, Mark. “Virtual Pokie App a Hit - But ‘Not Gambling.’” Sydney Morning Herald 13 Jan. 2013. ‹http://www.smh.com.au/digital-life/smartphone-apps/virtual-pokie-app-a-hit--but-not-gambling-20130112-2cmev.html#ixzz2QVlsCJs1›. Worthington, Andrew, et al. "Gambling Participation in Australia: Findings from the National Household Expenditure Survey." Review of Economics of the Household 5.2 (2007): 209-221. Young, Martin, et al. "The Changing Landscape of Indigenous Gambling in Northern Australia: Current Knowledge and Future Directions." International Gambling Studies 7.3 (2007): 327-343. Ziolkowski, S. “The World Count of Gaming Machines 2013.” Gaming Technologies Association, 2014. ‹http://www.gamingta.com/pdf/World_Count_2014.pdf›.
APA, Harvard, Vancouver, ISO, and other styles
18

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
19

Arnold, Bruce, and Margalit Levin. "Ambient Anomie in the Virtualised Landscape? Autonomy, Surveillance and Flows in the 2020 Streetscape." M/C Journal 13, no. 2 (May 3, 2010). http://dx.doi.org/10.5204/mcj.221.

Full text
Abstract:
Our thesis is that the city’s ambience is now an unstable dialectic in which we are watchers and watched, mirrored and refracted in a landscape of iPhone auteurs, eTags, CCTV and sousveillance. Embrace ambience! Invoking Benjamin’s spirit, this article does not seek to limit understanding through restriction to a particular theme or theoretical construct (Buck-Morss 253). Instead, it offers snapshots of interactions at the dawn of the postmodern city. That bricolage also engages how people appropriate, manipulate, disrupt and divert urban spaces and strategies of power in their everyday life. Ambient information can both liberate and disenfranchise the individual. This article asks whether our era’s dialectics result in a new personhood or merely restate the traditional spectacle of ‘bright lights, big city’. Does the virtualized city result in ambient anomie and satiation or in surprise, autonomy and serendipity? (Gumpert 36) Since the steam age, ambience has been characterised in terms of urban sound, particularly the alienation attributable to the individual’s experience as a passive receptor of a cacophony of sounds – now soft, now loud, random and recurrent–from the hubbub of crowds, the crash and grind of traffic, the noise of industrial processes and domestic activity, factory whistles, fire alarms, radio, television and gramophones (Merchant 111; Thompson 6). In the age of the internet, personal devices such as digital cameras and iPhones, and urban informatics such as CCTV networks and e-Tags, ambience is interactivity, monitoring and signalling across multiple media, rather than just sound. It is an interactivity in which watchers observe the watched observing them and the watched reshape the fabric of virtualized cities merely by traversing urban precincts (Hillier 295; De Certeau 163). It is also about pervasive although unevenly distributed monitoring of individuals, using sensors that are remote to the individual (for example cameras or tag-readers mounted above highways) or are borne by the individual (for example mobile phones or badges that systematically report the location to a parent, employer or sex offender register) (Holmes 176; Savitch 130). That monitoring reflects what Doel and Clark characterized as a pervasive sense of ambient fear in the postmodern city, albeit fear that like much contemporary anxiety is misplaced–you are more at risk from intimates than from strangers, from car accidents than terrorists or stalkers–and that is ahistorical (Doel 13; Scheingold 33). Finally, it is about cooption, with individuals signalling their identity through ambient advertising: wearing tshirts, sweatshirts, caps and other apparel that display iconic faces such as Obama and Monroe or that embody corporate imagery such as the Nike ‘Swoosh’, Coca-Cola ‘Ribbon’, Linux Penguin and Hello Kitty feline (Sayre 82; Maynard 97). In the postmodern global village much advertising is ambient, rather than merely delivered to a device or fixed on a billboard. Australian cities are now seas of information, phantasmagoric environments in which the ambient noise encountered by residents and visitors comprises corporate signage, intelligent traffic signs, displays at public transport nodes, shop-window video screens displaying us watching them, and a plethora of personal devices showing everything from the weather to snaps of people in the street or neighborhood satellite maps. They are environments through which people traverse both as persons and abstractions, virtual presences on volatile digital maps and in online social networks. Spectacle, Anomie or Personhood The spectacular city of modernity is a meme of communication, cultural and urban development theory. It is spectacular in the sense that of large, artificial, even sublime. It is also spectacular because it is built around the gaze, whether the vistas of Hausmann’s boulevards, the towers of Manhattan and Chicago, the shopfront ‘sea of light’ and advertising pillars noted by visitors to Weimar Berlin or the neon ‘neo-baroque’ of Las Vegas (Schivelbusch 114; Fritzsche 164; Ndalianis 535). In the year 2010 it aspires to 2020 vision, a panoptic and panspectric gaze on the part of governors and governed alike (Kullenberg 38). In contrast to the timelessness of Heidegger’s hut and the ‘fixity’ of rural backwaters, spectacular cities are volatile domains where all that is solid continues to melt into air with the aid of jackhammers and the latest ‘new media’ potentially result in a hypereality that make it difficult to determine what is real and what is not (Wark 22; Berman 19). The spectacular city embodies a dialectic. It is anomic because it induces an alienation in the spectator, a fatigue attributable to media satiation and to a sense of being a mere cog in a wheel, a disempowered and readily-replaceable entity that is denied personhood–recognition as an autonomous individual–through subjection to a Fordist and post-Fordist industrial discipline or the more insidious imprisonment of being ‘a housewife’, one ant in a very large ant hill (Dyer-Witheford 58). People, however, are not automatons: they experience media, modernity and urbanism in different ways. The same attributes that erode the selfhood of some people enhance the autonomy and personhood of others. The spectacular city, now a matrix of digits, information flows and opportunities, is a realm in which people can subvert expectations and find scope for self-fulfillment, whether by wearing a hoodie that defeats CCTV or by using digital technologies to find and associate with other members of stigmatized affinity groups. One person’s anomie is another’s opportunity. Ambience and Virtualisation Eighty years after Fritz Lang’s Metropolis forecast a cyber-sociality, digital technologies are resulting in a ‘virtualisation’ of social interactions and cities. In post-modern cityscapes, the space of flows comprises an increasing number of electronic exchanges through physically disjointed places (Castells 2002). Virtualisation involves supplementation or replacement of face-to-face contact with hypersocial communication via new media, including SMS, email, blogging and Facebook. In 2010 your friends (or your boss or a bully) may always be just a few keystrokes away, irrespective of whether it is raining outside, there is a public transport strike or the car is in for repairs (Hassan 69; Baron 215). Virtualisation also involves an abstraction of bodies and physical movements, with the information that represents individual identities or vehicles traversing the virtual spaces comprised of CCTV networks (where viewers never encounter the person or crowd face to face), rail ticketing systems and road management systems (x e-Tag passed by this tag reader, y camera logged a specific vehicle onto a database using automated number-plate recognition software) (Wood 93; Lyon 253). Surveillant Cities Pervasive anxiety is a permanent and recurrent feature of urban experience. Often navigated by an urgency to control perceived disorder, both physically and through cultivated dominant theory (early twentieth century gendered discourses to push women back into the private sphere; ethno-racial closure and control in the Black Metropolis of 1940s Chicago), history is punctuated by attempts to dissolve public debate and infringe minority freedoms (Wilson 1991). In the Post-modern city unprecedented technological capacity generates a totalizing media vector whose plausible by-product is the perception of an ambient menace (Wark 3). Concurrent faith in technology as a cost-effective mechanism for public management (policing, traffic, planning, revenue generation) has resulted in emergence of the surveillant city. It is both a social and architectural fabric whose infrastructure is dotted with sensors and whose people assume that they will be monitored by private/public sector entities and directed by interactive traffic management systems – from electronic speed signs and congestion indicators through to rail schedule displays –leveraging data collected through those sensors. The fabric embodies tensions between governance (at its crudest, enforcement of law by police and their surrogates in private security services) and the soft cage of digital governmentality, with people being disciplined through knowledge that they are being watched and that the observation may be shared with others in an official or non-official shaming (Parenti 51; Staples 41). Encounters with a railway station CCTV might thus result in exhibition of the individual in court or on broadcast television, whether in nightly news or in a ‘reality tv’ crime expose built around ‘most wanted’ footage (Jermyn 109). Misbehaviour by a partner might merely result in scrutiny of mobile phone bills or web browser histories (which illicit content has the partner consumed, which parts of cyberspace has been visited), followed by a visit to the family court. It might instead result in digital viligilantism, with private offences being named and shamed on electronic walls across the global village, such as Facebook. iPhone Auteurism Activists have responded to pervasive surveillance by turning the cameras on ‘the watchers’ in an exercise of ‘sousveillance’ (Bennett 13; Huey 158). That mirroring might involve the meticulous documentation, often using the same geospatial tools deployed by public/private security agents, of the location of closed circuit television cameras and other surveillance devices. One outcome is the production of maps identifying who is watching and where that watching is taking place. As a corollary, people with anxieties about being surveilled, with a taste for street theatre or a receptiveness to a new form of urban adventure have used those maps to traverse cities via routes along which they cannot be identified by cameras, tags and other tools of the panoptic sort, or to simply adopt masks at particular locations. In 2020 can anyone aspire to be a protagonist in V for Vendetta? (iSee) Mirroring might take more visceral forms, with protestors for example increasingly making a practice of capturing images of police and private security services dealing with marches, riots and pickets. The advent of 3G mobile phones with a still/video image capability and ongoing ‘dematerialisation’ of traditional video cameras (ie progressively cheaper, lighter, more robust, less visible) means that those engaged in political action can document interaction with authority. So can passers-by. That ambient imaging, turning the public gaze on power and thereby potentially redefining the ‘public’ (given that in Australia the community has been embodied by the state and discourse has been mediated by state-sanctioned media), poses challenges for media scholars and exponents of an invigorated civil society in which we are looking together – and looking at each other – rather than bowling alone. One challenge for consumers in construing ambient media is trust. Can we believe what we see, particularly when few audiences have forensic skills and intermediaries such as commercial broadcasters may privilege immediacy (the ‘breaking news’ snippet from participants) over context and verification. Social critics such as Baudelaire and Benjamin exalt the flaneur, the free spirit who gazed on the street, a street that was as much a spectacle as the theatre and as vibrant as the circus. In 2010 the same technologies that empower citizen journalism and foster a succession of velvet revolutions feed flaneurs whose streetwalking doesn’t extend beyond a keyboard and a modem. The US and UK have thus seen emergence of gawker services, with new media entrepreneurs attempting to build sustainable businesses by encouraging fans to report the location of celebrities (and ideally provide images of those encounters) for the delectation of people who are web surfing or receiving a tweet (Burns 24). In the age of ambient cameras, where the media are everywhere and nowhere (and micro-stock photoservices challenge agencies such as Magnum), everyone can join the paparazzi. Anyone can deploy that ambient surveillance to become a stalker. The enthusiasm with which fans publish sightings of celebrities will presumably facilitate attacks on bodies rather than images. Information may want to be free but so, inconveniently, do iconoclasts and practitioners of participatory panopticism (Dodge 431; Dennis 348). Rhetoric about ‘citizen journalism’ has been co-opted by ‘old media’, with national broadcasters and commercial enterprises soliciting still images and video from non-professionals, whether for free or on a commercial basis. It is a world where ‘journalists’ are everywhere and where responsibility resides uncertainly at the editorial desk, able to reject or accept offerings from people with cameras but without the industrial discipline formerly exercised through professional training and adherence to formal codes of practice. It is thus unsurprising that South Australia’s Government, echoed by some peers, has mooted anti-gawker legislation aimed at would-be auteurs who impede emergency services by stopping their cars to take photos of bushfires, road accidents or other disasters. The flipside of that iPhone auteurism is anxiety about the public gaze, expressed through moral panics regarding street photography and sexting. Apart from a handful of exceptions (notably photography in the Sydney Opera House precinct, in the immediate vicinity of defence facilities and in some national parks), Australian law does not prohibit ‘street photography’ which includes photographs or videos of streetscapes or public places. Despite periodic assertions that it is a criminal offence to take photographs of people–particularly minors–without permission from an official, parent/guardian or individual there is no general restriction on ambient photography in public spaces. Moral panics about photographs of children (or adults) on beaches or in the street reflect an ambient anxiety in which danger is associated with strangers and strangers are everywhere (Marr 7; Bauman 93). That conceptualisation is one that would delight people who are wholly innocent of Judith Butler or Andrea Dworkin, in which the gaze (ever pervasive, ever powerful) is tantamount to a violation. The reality is more prosaic: most child sex offences involve intimates, rather than the ‘monstrous other’ with the telephoto lens or collection of nastiness on his iPod (Cossins 435; Ingebretsen 190). Recognition of that reality is important in considering moves that would egregiously restrict legitimate photography in public spaces or happy snaps made by doting relatives. An ambient image–unposed, unpremeditated, uncoerced–of an intimate may empower both authors and subjects when little is solid and memory is fleeting. The same caution might usefully be applied in considering alarms about sexting, ie creation using mobile phones (and access by phone or computer monitor) of intimate images of teenagers by teenagers. Australian governments have moved to emulate their US peers, treating such photography as a criminal offence that can be conceptualized as child pornography and addressed through permanent inclusion in sex offender registers. Lifelong stigmatisation is inappropriate in dealing with naïve or brash 12 and 16 year olds who have been exchanging intimate images without an awareness of legal frameworks or an understanding of consequences (Shafron-Perez 432). Cameras may be everywhere among the e-generation but legal knowledge, like the future, is unevenly distributed. Digital Handcuffs Generations prior to 2008 lost themselves in the streets, gaining individuality or personhood by escaping the surveillance inherent in living at home, being observed by neighbours or simply surrounded by colleagues. Streets offered anonymity and autonomy (Simmel 1903), one reason why heterodox sexuality has traditionally been negotiated in parks and other beats and on kerbs where sex workers ply their trade (Dalton 375). Recent decades have seen a privatisation of those public spaces, with urban planning and digital technologies imposing a new governmentality on hitherto ambient ‘deviance’ and on voyeuristic-exhibitionist practice such as heterosexual ‘dogging’ (Bell 387). That governmentality has been enforced through mechanisms such as replacement of traditional public toilets with ‘pods’ that are conveniently maintained by global service providers such as Veolia (the unromantic but profitable rump of former media & sewers conglomerate Vivendi) and function as billboards for advertising groups such as JC Decaux. Faces encountered in the vicinity of the twenty-first century pissoir are thus likely to be those of supermodels selling yoghurt, low interest loans or sportsgear – the same faces sighted at other venues across the nation and across the globe. Visiting ‘the mens’ gives new meaning to the word ambience when you are more likely to encounter Louis Vuitton and a CCTV camera than George Michael. George’s face, or that of Madonna, Barack Obama, Kevin 07 or Homer Simpson, might instead be sighted on the tshirts or hoodies mentioned above. George’s music might also be borne on the bodies of people you see in the park, on the street, or in the bus. This is the age of ambient performance, taken out of concert halls and virtualised on iPods, Walkmen and other personal devices, music at the demand of the consumer rather than as rationed by concert managers (Bull 85). The cost of that ambience, liberation of performance from time and space constraints, may be a Weberian disenchantment (Steiner 434). Technology has also removed anonymity by offering digital handcuffs to employees, partners, friends and children. The same mobile phones used in the past to offer excuses or otherwise disguise the bearer’s movement may now be tied to an observer through location services that plot the person’s movement across Google Maps or the geospatial information of similar services. That tracking is an extension into the private realm of the identification we now take for granted when using taxis or logistics services, with corporate Australia for example investing in systems that allow accurate determination of where a shipment is located (on Sydney Harbour Bridge? the loading dock? accompanying the truck driver on unauthorized visits to the pub?) and a forecast of when it will arrive (Monmonier 76). Such technologies are being used on a smaller scale to enforce digital Fordism among the binary proletariat in corporate buildings and campuses, with ‘smart badges’ and biometric gateways logging an individual’s movement across institutional terrain (so many minutes in the conference room, so many minutes in the bathroom or lingering among the faux rainforest near the Vice Chancellery) (Bolt). Bright Lights, Blog City It is a truth universally acknowledged, at least by right-thinking Foucauldians, that modernity is a matter of coercion and anomie as all that is solid melts into air. If we are living in an age of hypersocialisation and hypercapitalism – movies and friends on tap, along with the panoptic sorting by marketers and pervasive scrutiny by both the ‘information state’ and public audiences (the million people or one person reading your blog) that is an inevitable accompaniment of the digital cornucopia–we might ask whether everyone is or should be unhappy. This article began by highlighting traditional responses to the bright lights, brashness and excitement of the big city. One conclusion might be that in 2010 not much has changed. Some people experience ambient information as liberating; others as threatening, productive of physical danger or of a more insidious anomie in which personal identity is blurred by an ineluctable electro-smog. There is disagreement about the professionalism (for which read ethics and inhibitions) of ‘citizen media’ and about a culture in which, as in the 1920s, audiences believe that they ‘own the image’ embodying the celebrity or public malefactor. Digital technologies allow you to navigate through the urban maze and allow officials, marketers or the hostile to track you. Those same technologies allow you to subvert both the governmentality and governance. You are free: Be ambient! References Baron, Naomi. Always On: Language in an Online and Mobile World. New York: Oxford UP, 2008. Bauman, Zygmunt. Liquid Modernity. Oxford: Polity Press, 2000. Bell, David. “Bodies, Technologies, Spaces: On ‘Dogging’.” Sexualities 9.4 (2006): 387-408. Bennett, Colin. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge: MIT Press, 2008. Berman, Marshall. All That Is Solid Melts into Air: The Experience of Modernity. London: Verso, 2001. Bolt, Nate. “The Binary Proletariat.” First Monday 5.5 (2000). 25 Feb 2010 ‹http://131.193.153.231/www/issues/issue5_5/bolt/index.html›. Buck-Morss, Susan. The Dialectics of Seeing: Walter Benjamin and the Arcades Project. Cambridge: MIT Press, 1991. Bull, Michael. Sounding Out the City: Personal Stereos and the Management of Everyday Life. Oxford: Berg, 2003. Bull, Michael. Sound Moves: iPod Culture and the Urban Experience. London: Routledge, 2008 Burns, Kelli. Celeb 2.0: How Social Media Foster Our Fascination with Popular Culture. Santa Barbara: ABC-CLIO, 2009. Castells, Manuel. “The Urban Ideology.” The Castells Reader on Cities and Social Theory. Ed. Ida Susser. Malden: Blackwell, 2002. 34-70. Cossins, Anne, Jane Goodman-Delahunty, and Kate O’Brien. “Uncertainty and Misconceptions about Child Sexual Abuse: Implications for the Criminal Justice System.” Psychiatry, Psychology and the Law 16.4 (2009): 435-452. Dalton, David. “Policing Outlawed Desire: ‘Homocriminality’ in Beat Spaces in Australia.” Law & Critique 18.3 (2007): 375-405. De Certeau, Michel. The Practice of Everyday Life. Berkeley: University of California P, 1984. Dennis, Kingsley. “Keeping a Close Watch: The Rise of Self-Surveillance and the Threat of Digital Exposure.” The Sociological Review 56.3 (2008): 347-357. Dodge, Martin, and Rob Kitchin. “Outlines of a World Coming into Existence: Pervasive Computing and the Ethics of Forgetting.” Environment & Planning B: Planning & Design 34.3 (2007): 431-445. Doel, Marcus, and David Clarke. “Transpolitical Urbanism: Suburban Anomaly and Ambient Fear.” Space & Culture 1.2 (1998): 13-36. Dyer-Witheford, Nick. Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism. Champaign: U of Illinois P, 1999. Fritzsche, Peter. Reading Berlin 1900. Cambridge: Harvard UP, 1998. Gumpert, Gary, and Susan Drucker. “Privacy, Predictability or Serendipity and Digital Cities.” Digital Cities II: Computational and Sociological Approaches. Berlin: Springer, 2002. 26-40. Hassan, Robert. The Information Society. Cambridge: Polity Press, 2008. Hillier, Bill. “Cities as Movement Economies.” Intelligent Environments: Spatial Aspects of the Information Revolution. Ed. Peter Drioege. Amsterdam: Elsevier, 1997. 295-342. Holmes, David. “Cybercommuting on an Information Superhighway: The Case of Melbourne’s CityLink.” The Cybercities Reader. Ed. Stephen Graham. London: Routledge, 2004. 173-178. Huey, Laura, Kevin Walby, and Aaron Doyle. “Cop Watching in the Downtown Eastside: Exploring the Use of CounterSurveillance as a Tool of Resistance.” Surveillance and Security: Technological Politics and Power in Everyday Life. Ed. Torin Monahan. London: Routledge, 2006. 149-166. Ingebretsen, Edward. At Stake: Monsters and the Rhetoric of Fear in Public Culture. Chicago: U of Chicago P, 2001. iSee. “Now More Than Ever”. 20 Feb 2010 ‹http://www.appliedautonomy.com/isee/info.html›. Jackson, Margaret, and Julian Ligertwood. "Identity Management: Is an Identity Card the Solution for Australia?” Prometheus 24.4 (2006): 379-387. Jermyn, Deborah. Crime Watching: Investigating Real Crime TV. London: IB Tauris, 2007. Kullenberg, Christopher. “The Social Impact of IT: Surveillance and Resistance in Present-Day Conflicts.” FlfF-Kommunikation 1 (2009): 37-40. Lyon, David. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. London: Routledge, 2003. Marr, David. The Henson Case. Melbourne: Text, 2008. Maynard, Margaret. Dress and Globalisation. Manchester: Manchester UP, 2004. Merchant, Carolyn. The Columbia Guide to American Environmental History. New York: Columbia UP, 2002. Monmonier, Mark. “Geolocation and Locational Privacy: The ‘Inside’ Story on Geospatial Tracking’.” Privacy and Technologies of Identity: A Cross-disciplinary Conversation. Ed. Katherine Strandburg and Daniela Raicu. Berlin: Springer, 2006. 75-92. Ndalianis, Angela. “Architecture of the Senses: Neo-Baroque Entertainment Spectacles.” Rethinking Media Change: The Aesthetics of Tradition. Ed. David Thorburn and Henry Jenkins. Cambridge: MIT Press, 2004. 355-374. Parenti, Christian. The Soft Cage: Surveillance in America. New York: Basic Books, 2003. Sayre, Shay. “T-shirt Messages: Fortune or Folly for Advertisers.” Advertising and Popular Culture: Studies in Variety and Versatility. Ed. Sammy Danna. New York: Popular Press, 1992. 73-82. Savitch, Henry. Cities in a Time of Terror: Space, Territory and Local Resilience. Armonk: Sharpe, 2008. Scheingold, Stuart. The Politics of Street Crime: Criminal Process and Cultural Obsession. Philadephia: Temple UP, 1992. Schivelbusch, Wolfgang. Disenchanted Night: The Industrialization of Light in the Nineteenth Century. Berkeley: U of California Press, 1995. Shafron-Perez, Sharon. “Average Teenager or Sex Offender: Solutions to the Legal Dilemma Caused by Sexting.” John Marshall Journal of Computer & Information Law 26.3 (2009): 431-487. Simmel, Georg. “The Metropolis and Mental Life.” Individuality and Social Forms. Ed. Donald Levine. Chicago: University of Chicago P, 1971. Staples, William. Everyday Surveillance: Vigilance and Visibility in Postmodern Life. Lanham: Rowman & Littlefield, 2000. Steiner, George. George Steiner: A Reader. New York: Oxford UP, 1987. Thompson, Emily. The Soundscape of Modernity: Architectural Acoustics and the Culture of Listening in America. Cambridge: The MIT Press, 2004. Wark, Mackenzie. Virtual Geography: Living with Global Media Events. Bloomington: Indiana UP, 1994. Wilson, Elizabeth. The Sphinx in the City: Urban Life, the Control of Disorder and Women. Berkeley: University of California P, 1991. Wood, David. “Towards Spatial Protocol: The Topologies of the Pervasive Surveillance Society.” Augmenting Urban Spaces: Articulating the Physical and Electronic City. Eds. Allesandro Aurigi and Fiorella de Cindio. Aldershot: Ashgate, 2008. 93-106.
APA, Harvard, Vancouver, ISO, and other styles
20

White, Peter B., and Naomi White. "Staying Safe and Guilty Pleasures." M/C Journal 10, no. 1 (March 1, 2007). http://dx.doi.org/10.5204/mcj.2614.

Full text
Abstract:
Introduction In a period marked by the pervasiveness of new mobile technologies saturating urban areas of the Asia-Pacific region, it can be easy to forget the realities of life in the rural areas. In a location such as Australia, in which 80% of the population lives in urban areas, one must be reminded of the sociotechnological realities of rural existence where often-newer mobile communication devices cease to function. This paper focuses on these black spots – and often forgotten areas – where examples of older, mediated technologies such as UHF Citizen Band (CB) radios can be found as integral to practices of everyday rural life. As Anderson notes, constructs of the nation are formed through contested notions of what individuals and communities imagine and project as a sense of place. In Australia, one of the dominant contested imageries can be found in the urban and rural divide, a divide that is not just social and cultural but technological; it is marked by a digital divide. This divide neatly corresponds to the images of Australia experienced by Australians (predominantly living in urban areas) and exported tourist images of the rugged vast rural landscapes. The remote Australia Outback is a popular destination for domestic tourists. Its sparsely populated and rough terrain attracts tourists seeking a quintessentially Australian experience. Roads are often unmade and in poor condition. Fuel and food supplies and health services are widely separated and there is almost no permanent accommodation. Apart from a small number of regional centres there is no access to mobile phones or radio broadcasts. As a consequence tourists must be largely self sufficient. While the primary roads carry significant road traffic it is possible to drive all day on secondary roads without seeing another person. Isolation and self-sufficiency are both an attraction and a challenge. Travelling in campervans, towing caravans or camper trailers and staying in caravan parks, national parks, roadside stops or alone in the bush, tourists spend extended times in areas where there are few other tourists. Many tourists deal with this isolation by equipping their vehicles with CB radios. Depending on the terrain, they are able to listen to, and participate in conversations with other CB users within a 10-20 kilometre range. In some areas where there are repeater stations, the range of radio transmissions can be extended. This paper examines the role of these CB radios in the daily life of tourists in the Australian Outback. Theoretical Issues The links between travel, the new communications technologies and the diminished spatial-time divide have been explored by John Urry. According to Urry, mobile electronic devices make it possible for people “to leave traces of their selves in informational space” (266). Using these informational traces, mobile communication technologies ‘track’ the movements of travellers, enabling them to communicate synchronously. People become ’nodes in multiple networks of communication and mobility’ (266). Another consequence of readily available communication independent of location is for the meaning of social connections. Social encounters provide tourists with the opportunity to develop and affirm understandings of their shared common occupation of unfamiliar social and cultural landscapes (Harrison). Both transitory and enduring relationships provide information, companionship and resources that allow tourists to create, share and give meaning to their experiences (Stokowski). Communication technology also enables individuals to enter and remain part of social networks while physically absent and distant from them (Johnsen; Makimoto and Manners, Urry). The result is a “nomadic intimacy” in an everyday social and physical environment characterised by extended spaces and individual freedom to move around in these spaces (Fortunati). For travellers in the Australian Outback, this “nomadic intimacy” is both literal and metaphorical. Research has shown that travellers use mobile communications services and a range of other communication strategies to maintain a “symbolic proximity” with family, friends and colleagues (Wurtzel and Turner) and to promote a sense of “presence while absent”, or ‘co-presence’ (Gergen; Lury; Short, Williams and Christie; White and White, “Keeping Connected”; White and White, “Home and Away”). Central to the original notion of co-presence was that it was contingent on those involved in a given communication both being and feeling close enough to perceive each other and to be perceived in the course of their activities (Goffman). That is, the notion of co-presence initially referred to physical presence in face-to-face contact and interactions. However, increasing use of mobile phones in particular has meant that this sense of connection can be affirmed at a distance. But what happens when travellers do not have access to mobile phones and the Internet, and as a consequence, do not have access to their networks of family, friends and colleagues? How do they deal with travel and isolation in a harsh environment? These issues are the starting point for the present paper, which examines travellers’ experience of CB radio in the remote Australian Outback. This exploration of how the CB radio has been incorporated into the daily lives of these travellers can be seen as a contribution to an understanding of the domestication of mobile communications (Haddon). Methodology People were included in the study if they used CB radios while travelling in remote parts of Western Australian and the Northern Territory. The participants were approached in caravan parks, camping grounds and at roadside stops. Most were travelling in caravans while others were using camper trailers and campervans. Twenty-four travellers were interviewed, twelve men and twelve women. All were travelling with partners or spouses, and one group of two couples was travelling together. They ranged in age from twenty five to seventy years, and all were Australian residents. The duration of their travels varied from six weeks to eleven months. Participants were interviewed using a semi-structured interview schedule. The interviews were transcribed and then thematically coded with respect to regularly articulated points of view. Where points of view were distinctive, they were noted during the coding process as contrasting instances. While the relatively small sample size limits generalizability, the issues raised by the respondents provide insights into the meaning of CB radio use in the daily life of travellers in the Australian Outback. Findings Staying Safe The primary reason given for travelling with a CB radio was personal safety. The tourists interviewed were aware of the risks associated with travelling in the Outback. Health emergencies, car accidents and problems with tyres in a harsh and hot environment without ready access to water were often mentioned. ‘If you call a May Day someone will come out and answer…” (Female, 55). Another interviewee reported that: Last year we helped some folk who were bogged in the sand right at the end of the road in the middle of nowhere. The wife just started calling the various channels explaining that they were bogged and asking whether there was anyone out there….We went and towed them out. …. It would have been a long walk for them to get help. (Female, 55) Even though most interviewees had not themselves experienced a personal emergency, many recounted stories about how CB radio had been used to come to the aid of someone in distress. Road conditions were another concern. Travellers were often rightly very concerned about hazards ahead. One traveller noted: You are always going to hear someone who gives you an insight as to what is happening up ahead on the road. If there’s an accident up ahead someone’s going to get on the radio and let people know. Or there could be road works or the road could be shitty. (Male, 50) Safety arose in another context. Tourists share the rough and often dusty roads with road trains towing up to three trailers. These vehicles can be 50 metres long. A road train creates wind turbulence when it passes a car and trailer or caravan and the dust it raises reduces visibility. Because of this car drivers and caravanners need to be extremely careful when they pass or are passed by one. Passing a road train at 100 km can take 2.5km. Interviewees reported that they communicated with road train drivers to negotiate a safe time and place to pass. One caravanner noted: Sometimes you see a road train coming up behind you. You call him up and say ” I’ll pull over for you mate and slow down and you go”. You use it a lot because it’s safer. We are not in a hurry. Road trains are working and they are in a hurry and he (sic.) is bigger, so he has the right of way. (Male, 50) As with the dominant rationale for installing and using a CB radio, Rice and Katz showed that concern about safety is the primary motive for women acquiring a mobile phone, and safety was also important for men. The social contact enabled by CB radio provided a means of tracking the movements of other travellers who were nearby. This tracking ability engendered a sense of comfort and enabled them to communicate and exchange information synchronously in a potentially dangerous environment. As a consequence, a ‘metaworld’ (Suvantola) of ‘informational traces’ (Urry) was created. Making Oneself Known All interactions entail conventions and signals that enable a conversation to commence. These conventions were also seen to apply to CB conversations. Driving in a car or truck involves being physically enclosed with the drivers and passengers being either invisible or only partially visible to other travellers. Caravanners deal with this lack of visibility in a number of ways. Many have their first names, the name of their caravan and the channel they use on the rear of their van. A typical sign was “Bill and Rose, Travelling Everywhere, Channel 18” or “Harry and Mary, Bugger Work, Gone Fishing”, Channel 18” clearly visible to anyone coming from behind. (The male partner’s name was invariably first.) A sign that identified the occupants was seen as an invitation to chat by other travellers. One traveller said that if he saw such a sign he would call up by saying: “Hello Harry and Mary”. From then on who knows where it goes. It depends on the people. If someone comes back really cheery and a bit cheeky I can be cheery and cheeky back. (Male, 50) The names of caravans were used in other more personal ways. One couple from South Africa had given their van a Zulu name and that was seen as a way of identifying their origins and encouraging a specific kind of conversation while they were on the road. This couple reported that People call us up and ask us what it means. We have lots of calls about that. We’ve had more conversations about that than anything else. (Male, 67) Another caravanner reported that he had seen a van with “Nanna and Poppa’ on the back. They used that as a cue to start a conversation about their grandchildren. But caravan names linked to their CB radio channel can have a deeper personal meaning. One couple had their first names and the number 58 on the rear of their van. (The number 58 is beyond the range of CB channels.) On further questioning the number 58 was revealed to be the football club number of a daughter who had died. The sign was an attempt to deal with their grief and its public display a way of entering into a conversation about grief and loss. It has probably backfired because it puts people back into their shell because they think “We don’t want to talk about death”. But because of the sign we’ve met people who’ve lost a child too. (Male, 50) As Featherstone notes, drivers develop competence in switching between a range of communicative modes while they are travelling. These range from body gestures to formal signalling devices on other cars. Signage on caravans designed to invite conversation was a specialised signalling device specific to the CB user. Talking Loneliness was another theme emerging from the interviews. One of the attractions of the Outback is its sparse population. As one interviewee noted ‘You can travel all day and not see another soul’ (Female, 35). But this loneliness can be a challenge. Some of these roads are pretty lonely, the radio lets you know that there’s somebody else out there. (Male, 54) Hearing other travellers talk was comforting. As with previous research showing that travellers use mobile communications services to maintain a “symbolic proximity” (Gergen; Lury; Short, Williams and Christie; White and White, “Keeping Connected”) the CB conversations enabled the travellers to feel this sense of connection. These interactions also offered them the possibility of converting mediated relationships into face-to-face encounters along the road. That is, some travellers reported that CB-based chats with people while they were driving would lead to a decision to stop along the road for a shared morning tea or lunch. Conventions governed the use of specific channels. Some of these are government regulated, while others are user generated. For instance, Channels 18 and 40, were seen as ‘working channels’. Some interviewees felt very strongly about people who ‘cluttered up’ these channels and moved to another unused channel when they wanted to have an extended conversation. One couple was unaware of the local convention and could not understand why no one was calling them up. They later discovered that they were on the ‘wrong channel’. Interviewees travelling in a convoy would use the standard channel for travellers and then agree to move to another channel of their choice. When we travelling in a convoy we go off Channel 18 and use another channel to talk. The girls love it to talk about their knitting and work out what they’ve done wrong. We sometimes tell jokes. Also we work out what we are going to do in the next town. (Male, 67) These extended conversations parallel the lengthy conversations between drivers equipped with CB radio in the United States during the 1970’s which Dannaher described as ‘as diverse as those found at a cocktail party’. They also provided a sense of the “nomadic intimacy” described by Fortunati. Eavesdropping While travellers used Channel 18 for conversations they set their radio to automatically scan all forty channels. When a conversation was located the radio would stop scanning and they could listen to what was being said. This meant that travellers would overhear conversations between strangers. We scan all the channels so you can hear anyone coming up behind, especially trucks and you can hear them say “that damn caravan” and you can say ’ that damn caravan will pull over at the first opportunity.” (Female, 44) But the act of listening in to other people’s conversations created moral dilemmas for some travellers. One interviewee described it as “voyeurism for the ears”. While she described listening to farm conversations as giving her an insight into daily life on huge cattle station she was tempted to butt into one conversation that she was listening to. On reflection she decided against entering the conversation. She said: I didn’t want them to know that we were eavesdropping on their conversation. I’d be embarrassed if a third-party knew that we were listening in. I guess that I’ve been taught that you shouldn’t listen in to other people’s conversations. It’s not good manners… (Female, 35) When travellers overheard conversations between road train or truck drivers they had mixed responses. These conversations were often sexually loaded and seen as coarse by the middle class travellers. Some were forgiving of the conversational excesses, distinguishing themselves from the rough and tumble world of the ‘truckies’. One traveller noted that the truck drivers use a lot of bad language, but you’ve got to go with that, because that’s the type of people they are. But you have to go with the flow. We know that we are ‘playing’ and the truckies are ‘working’ so you have to be considerate to them. (Female, 50) While the language of the truck drivers was often threatening to middle class travellers, overhearing their conversations was also seen as a comfort. One traveller remarked that sometimes you hear truckies talking about their families and they obviously know each other. It’s kind of nice to see how they think. (Female, 50) Travellers had similar feelings when they overheard conversations from cattle stations. Also, local cattle station workers and their families would use CB radios for their social and working communications. Travellers would often overhear these conversations. One traveller noted that when we are driving through a cattle station we work out which channel they are using, and we lock it on that one. And then we listen until they are out of range. We are city people and listening to the station chatter gives us a bit of an insight into what it must be like as a farmer working land out here. And then we talk about the farmers’ conversations. (Female, 35) Another traveller noted: If you are travelling and there’s nothing you can see you can listen to the farmer talking to his wife or the kids. It’s absolutely awesome to hear conversations on radio. (Female, 67) This empathic listening allows the travellers to imagine the lives of others in settings quite different from those with which they are familiar. Furthermore, hearing farmers talking about fixing the fence in the left paddock or rounding up strays makes ‘you feel that you’re not alone’. The networking of the travellers’ social life arising from listening in to others meant that they were able to learn about the environment in which they found themselves, as well as enabling them to feel that they continued to remain embedded or ‘co-present’ in social relationships in circumstances of considerable physical isolation. Conclusions The accounts provided by tourists illustrated the way communications technologies – in this case, CB radio – enabled people to become ’nodes in multiple networks of communication and mobility’ described by Urry and to maintain ‘co-presence’. The CB radio allowed tourists to remain part of social networks while being physically absent from them (Gergen). Their responses also demonstrated the significance of CB radio in giving meaning to the experience of travel. The CB radio was shown to be an important part of the travel experience in the remote Australian Outback. The use of CB made it possible for travellers in the Australian Outback to obtain information vital for the safe traverse of the huge distances and isolated roads. The technology enabled them to break down the atomism and frontier-like isolation of the highway. Drivers and their passengers could reach out to other travellers and avoid remaining unconnected strangers. Long hours on the road could be dealt with by listening in on others’ conversations, even though some ambivalence was expressed about this activity. Despite an awareness that they could be violating the personal boundaries of others and that their conversations could be overheard, the use of CB radio meant staying safe and enjoying guilty pleasures. Imagined or not. References Anderson, Benedict. Imagined Community. London: Verso, 1983 Dannefer, W. Dale. “The C.B. Phenomenon: A Sociological Appraisal.” Journal of Popular Culture 12 (1979): 611-19. Featherstone, Mike. “Automobilities: An Introduction.” Theory, Culture and Society 21.4/5 (2004): 1-24. Fortunati, Leopoldina. “The Mobile Phone: Towards New Categories and Social Relations.” Information, Communication and Society 5.2 (2002): 513-28. Gergen, Kenneth. “The Challenge of Absence Presence.” Perpetual Contact: Mobile Communications, Private Talk, Public Performance. Ed. James Katz. Cambridge: Cambridge UP, 2002. 227-54. Goffman, Erving. Behavior in Public Places: Notes on the Social Organization of Gatherings. New York: Free Press of Glencoe, 1963. Haddon, Leslie. “Domestication and Mobile Telephony.” Machines That Become Us: The Social Context of Personal Communication Technology. Ed. James E. Katz. New Brunswick, N.J.: Transaction Publishers, 2003. 43-55. Harrison, Julia. Being a Tourist: Finding Meaning in Pleasure Travel. Vancouver: U of British Columbia P, 2003. Johnsen, Truls Erik. “The Social Context of Mobile Use of Norwegian Teens.” Machines That Become Us: The Social Context of Personal Communication Technology. Ed. James Katz. London: Transaction Publishers, 2003. 161-69. Ling, Richard. “One Can Talk about Common Manners! The Use of Mobile Telephones in Inappropiate Situations.” Communications on the Move: The Experience of Mobile Telephony in the 1990s (Report of Cost 248: The Future European Telecommunications User Mobile Workgroup). Ed. Leslie Haddon. Farsta, Sweden: Telia AB, 1997. 97-120. Lury, Celia. “The Objects of Travel.” Touring Cultures: Transformations of Travel and Theory. Eds. Chris Rojek and John Urry. London: Routledge, 1997. 75-95. Rice, Ronald E., and James E. Katz. “Comparing Internet and Mobile Phone Usage: Digital Divides of Usage, Adoption and Dropouts.” Telecommunications Policy 27 (2003): 597-623. Short, J., E. Williams, and B. Christie. The Social Psychology of Telecommunications. New York: Wiley, 1976. Stokowski, Patricia. “Social Networks and Tourist Behavior.” American Behavioural Scientist 36.2 (1992): 212-21. Suvantola, Jaakko. Tourist’s Experience of Place. Aldershot: Ashgate, 2002. Urry, John. “Mobility and Proximity.” Sociology 36.2 (2002): 255-74. ———. “Social Networks, Travel and Talk.” British Journal of Sociology 54.2 (2003): 155-75. White, Naomi Rosh, and Peter B. White. “Home and Away: Tourists in a Connected World.” Annals of Tourism Research 34. 1 (2007): 88-104. White, Peter B., and Naomi Rosh White. “Keeping Connected: Travelling with the Telephone.” Convergence: The International Journal of Research into New Media Technologies 11.2 (2005): 102-18. Williams, Stephen, and Lynda Williams. “Space Invaders: The Negotiation of Teenage Boundaries through the Mobile Phone.” The Sociological Review 53.2 (2005): 314-31. Wurtzel, Alan H., and Colin Turner. “Latent Functions of the Telephone: What Missing the Extension Means.” The Social Impact of the Telephone. Ed. Ithiel de Sola Pool. Cambridge: MIT Press, 1977. 246-61. Citation reference for this article MLA Style White, Peter B., and Naomi White. "Staying Safe and Guilty Pleasures: Tourists and CB Radio in the Australian Outback." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/11-white-white.php>. APA Style White, P., and N. White. (Mar. 2007) "Staying Safe and Guilty Pleasures: Tourists and CB Radio in the Australian Outback," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/11-white-white.php>.
APA, Harvard, Vancouver, ISO, and other styles
21

Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2696.

Full text
Abstract:
Introduction It has frequently been noted that ICTs and social networking applications have blurred the once-clear boundary between work, leisure and entertainment, just as they have collapsed the distinction between public and private space. While each individual has a sense of what “home” means, both in terms of personal experience and more conceptually, the following three examples of online interaction (based on participants’ interest, or involvement, in activities traditionally associated with the home: pet care, craft and cooking) suggest that the utilisation of online communication technologies can lead to refined and extended definitions of what “home” is. These examples show how online communication can assist in meeting the basic human needs for love, companionship, shelter and food – needs traditionally supplied by the home environment. They also provide individuals with a considerably expanded range of opportunities for personal expression and emotional connection, as well as creative and commercial production, than that provided by the purely physical (and, no doubt, sometimes isolated and isolating) domestic environment. In this way, these case studies demonstrate the interplay and melding of physical and virtual “home” as domestic practices leach from the most private spaces of the physical home into the public space of the Internet (for discussion, see Gorman-Murray, Moss, and Rose). At the same time, online interaction can assert an influence on activity within the physical space of the home, through the sharing of advice about, and modeling of, domestic practices and processes. A Dog’s (Virtual) Life The first case study primarily explores the role of online communities in the formation and expression of affective values and personal identity – as traditionally happens in the domestic environment. Garber described the 1990s as “the decade of the dog” (20), citing a spate of “new anthropomorphic” (22) dog books, Internet “dog chat” sites, remakes of popular classics such as Lassie Come Home, dog friendly urban amenities, and the meteoric rise of services for pampered pets (28-9). Loving pets has become a lifestyle and culture, witnessed and commodified in Pet Superstores as well as in dog collectables and antiques boutiques, and in publications like The Bark (“the New Yorker of Dog Magazines”) and Clean Run, the international agility magazine, Website, online book store and information gateway for agility products and services. Available online resources for dog lovers have similarly increased rapidly during the decade since Garber’s book was published, with the virtual world now catering for serious hobby trainers, exhibitors and professionals as well as the home-based pet lover. At a recent survey, Yahoo Groups – a personal communication portal that facilitates social networking, in this case enabling users to set up electronic mailing lists and Internet forums – boasted just over 9,600 groups servicing dog fanciers and enthusiasts. The list Dogtalk is now an announcement only mailing list, but was a vigorous discussion forum until mid-2006. Members of Dogtalk were Australian-based “clicker-trainers”, serious hobbyist dog trainers, many of whom operated micro-businesses providing dog training or other pet-related services. They shared an online community, but could also engage in “flesh-meets” at seminars, conferences and competitive dog sport meets. An author of this paper (Rutherford) joined this group two years ago because of her interest in clicker training. Clicker training is based on an application of animal learning theory, particularly psychologist E. F. Skinner’s operant conditioning, so called because of the trademark use of a distinctive “click” sound to mark a desired behaviour that is then rewarded. Clicker trainers tend to dismiss anthropomorphic pack theory that positions the human animal as fundamentally opposed to non-human animals and, thus, foster a partnership (rather than a dominator) mode of social and learning relationships. Partnership and nurturance are common themes within the clicker community (as well as in more traditional “home” locations); as is recognising and valuing the specific otherness of other species. Typically, members regard their pets as affective equals or near-equals to the human animals that are recognised members of their kinship networks. A significant function of the episodic biographical narratives and responses posted to this list was thus to affirm and legitimate this intra-specific kinship as part of normative social relationship – a perspective that is not usually validated in the general population. One of the more interesting nexus that evolved within Dogtalk links the narrativisation of the pet in the domestic sphere with the pictorial genre of the family album. Emergent technologies, such as digital cameras together with Web-based image manipulation software and hosting (as provided by portals like Photobucket and Flickr ) democratise high quality image creation and facilitate the sharing of these images. Increasingly, the Dogtalk list linked to images uploaded to free online galleries, discussed digital image composition and aesthetics, and shared technical information about cameras and online image distribution. Much of this cultural production and circulation was concerned with digitally inscribing particular relationships with individual animals into cultural memory: a form of family group biography (for a discussion of the family photograph as a display of extended domestic space, see Rose). The other major non-training thread of the community involves the sharing and witnessing of the trauma suffered due to the illness and loss of pets. While mourning for human family members is supported in the off-line world – with social infrastructure, such as compassionate leave and/or bereavement counselling, part of professional entitlements – public mourning for pets is not similarly supported. Yet, both cultural studies (in its emphasis on cultural memory) and trauma theory have highlighted the importance of social witnessing, whereby traumatic memories must be narratively integrated into memory and legitimised by the presence of a witness in order to loosen their debilitating hold (Felman and Laub 57). Postings on the progress of a beloved animal’s illness or other misfortune and death were thus witnessed and affirmed by other Dogtalk list members – the sick or deceased pet becoming, in the process, a feature of community memory, not simply an individual loss. In terms of such biographical narratives, memory and history are not identical: “Any memories capable of being formed, retained or articulated by an individual are always a function of socially constituted forms, narratives and relations … Memory is always subject to active social manipulation and revision” (Halbwachs qtd. in Crewe 75). In this way, emergent technologies and social software provide sites, akin to that of physical homes, for family members to process individual memories into cultural memory. Dogzonline, the Australian Gateway site for purebred dog enthusiasts, has a forum entitled “Rainbow Bridge” devoted to textual and pictorial memorialisation of deceased pet dogs. Dogster hosts the For the Love of Dogs Weblog, in which images and tributes can be posted, and also provides links to other dog oriented Weblogs and Websites. An interesting combination of both therapeutic narrative and the commodification of affect is found in Lightning Strike Pet Loss Support which, while a memorial and support site, also provides links to the emerging profession of pet bereavement counselling and to suppliers of monuments and tributary urns for home or other use. loobylu and Narratives of Everyday Life The second case study focuses on online interactions between craft enthusiasts who are committed to the production of distinctive objects to decorate and provide comfort in the home, often using traditional methods. In the case of some popular craft Weblogs, online conversations about craft are interspersed with, or become secondary to, the narration of details of family life, the exploration of important life events or the recording of personal histories. As in the previous examples, the offering of advice and encouragement, and expressions of empathy and support, often characterise these interactions. The loobylu Weblog was launched in 2001 by illustrator and domestic crafts enthusiast Claire Robertson. Robertson is a toy maker and illustrator based in Melbourne, Australia, whose clients have included prominent publishing houses, magazines and the New York Public Library (Robertson “Recent Client List” online). She has achieved a measure of public recognition: her loobylu Weblog has won awards and been favourably commented upon in the Australian press (see Robertson “Press for loobylu” online). In 2005, an article in The Age placed Robertson in the context of a contemporary “craft revolution”, reporting her view that this “revolution” is in “reaction to mass consumerism” (Atkinson online). The hand-made craft objects featured in Robertson’s Weblogs certainly do suggest engagement with labour-intensive pursuits and the construction of unique objects that reject processes of mass production and consumption. In this context, loobylu is a vehicle for the display and promotion of Robertson’s work as an illustrator and as a craft practitioner. While skills-based, it also, however, promotes a family-centred lifestyle; it advocates the construction by hand of objects designed to enhance the appearance of the family home and the comfort of its inhabitants. Its specific subject matter extends to related aspects of home and family as, in addition to instructions, ideas and patterns for craft, the Weblog features information on commercially available products for home and family, recipes, child rearing advice and links to 27 other craft and other sites (including Nigella Lawson’s, discussed below). The primary member of its target community is clearly the traditional homemaker – the mother – as well as those who may aspire to this role. Robertson does not have the “celebrity” status of Lawson and Jamie Oliver (discussed below), nor has she achieved their market saturation. Indeed, Robertson’s online presence suggests a modest level of engagement that is placed firmly behind other commitments: in February 2007, she announced an indefinite suspension of her blog postings so that she could spend more time with her family (Robertson loobylu 17 February 2007). Yet, like Lawson and Oliver, Robertson has exploited forms of domestic competence traditionally associated with women and the home, and the non-traditional medium of the Internet has been central to her endeavours. The content of the loobylu blog is, unsurprisingly, embedded in, or an accessory to, a unifying running commentary on Robertson’s domestic life as a parent. Miles, who has described Weblogs as “distributed documentaries of the everyday” (66) sums this up neatly: “the weblogs’ governing discursive quality is the manner in which it is embodied within the life world of its author” (67). Landmark family events are narrated on loobylu and some attract deluges of responses: the 19 June 2006 posting announcing the birth of Robertson’s daughter Lily, for example, drew 478 responses; five days later, one describing the difficult circumstances of her birth drew 232 comments. All of these comments are pithy, with many being simple empathetic expressions or brief autobiographically based commentaries on these events. Robertson’s news of her temporary retirement from her blog elicited 176 comments that both supported her decision and also expressed a sense of loss. Frequent exclamation marks attest visually to the emotional intensity of the responses. By narrating aspects of major life events to which the target audience can relate, the postings represent a form of affective mass production and consumption: they are triggers for a collective outpouring of largely homogeneous emotional reaction (joy, in the case of Lily’s birth). As collections of texts, they can be read as auto/biographic records, arranged thematically, that operate at both the individual and the community levels. Readers of the family narratives and the affirming responses to them engage in a form of mass affirmation and consumerism of domestic experience that is easy, immediate, attractive and free of charge. These personal discourses blend fluidly with those of a commercial nature. Some three weeks after loobylu announced the birth of her daughter, Robertson shared on her Weblog news of her mastitis, Lily’s first smile and the family’s favourite television programs at the time, information that many of us would consider to be quite private details of family life. Three days later, she posted a photograph of a sleeping baby with a caption that skilfully (and negatively) links it to her daughter: “Firstly – I should mention that this is not a photo of Lily”. The accompanying text points out that it is a photo of a baby with the “Zaky Infant Sleeping Pillow” and provides a link to the online pregnancystore.com, from which it can be purchased. A quotation from the manufacturer describing the merits of the pillow follows. Robertson then makes a light-hearted comment on her experiences of baby-induced sleep-deprivation, and the possible consequences of possessing the pillow. Comments from readers also similarly alternate between the personal (sharing of experiences) to the commercial (comments on the product itself). One offshoot of loobylu suggests that the original community grew to an extent that it could support specialised groups within its boundaries. A Month of Softies began in November 2004, describing itself as “a group craft project which takes place every month” and an activity that “might give you a sense of community and kinship with other similar minded crafty types across the Internet and around the world” (Robertson A Month of Softies online). Robertson gave each month a particular theme, and readers were invited to upload a photograph of a craft object they had made that fitted the theme, with a caption. These were then included in the site’s gallery, in the order in which they were received. Added to the majority of captions was also a link to the site (often a business) of the creator of the object; another linking of the personal and the commercial in the home-based “cottage industry” sense. From July 2005, A Month of Softies operated through a Flickr site. Participants continued to submit photos of their craft objects (with captions), but also had access to a group photograph pool and public discussion board. This extension simulates (albeit in an entirely visual way) the often home-based physical meetings of craft enthusiasts that in contemporary Australia take the form of knitting, quilting, weaving or other groups. Chatting with, and about, Celebrity Chefs The previous studies have shown how the Internet has broken down many barriers between what could be understood as the separate spheres of emotional (that is, home-based private) and commercial (public) life. The online environment similarly enables the formation and development of fan communities by facilitating communication between those fans and, sometimes, between fans and the objects of their admiration. The term “fan” is used here in the broadest sense, referring to “a person with enduring involvement with some subject or object, often a celebrity, a sport, TV show, etc.” (Thorne and Bruner 52) rather than focusing on the more obsessive and, indeed, more “fanatical” aspects of such involvement, behaviour which is, increasingly understood as a subculture of more variously constituted fandoms (Jenson 9-29). Our specific interest in fandom in relation to this discussion is how, while marketers and consumer behaviourists study online fan communities for clues on how to more successfully market consumer goods and services to these groups (see, for example, Kozinets, “I Want to Believe” 470-5; “Utopian Enterprise” 67-88; Algesheimer et al. 19-34), fans regularly subvert the efforts of those urging consumer consumption to utilise even the most profit-driven Websites for non-commercial home-based and personal activities. While it is obvious that celebrities use the media to promote themselves, a number of contemporary celebrity chefs employ the media to construct and market widely recognisable personas based on their own, often domestically based, life stories. As examples, Jamie Oliver and Nigella Lawson’s printed books and mass periodical articles, television series and other performances across a range of media continuously draw on, elaborate upon, and ultimately construct their own lives as the major theme of these works. In this, these – as many other – celebrity chefs draw upon this revelation of their private lives to lend authenticity to their cooking, to the point where their work (whether cookbook, television show, advertisement or live chat room session with their fans) could be described as “memoir-illustrated-with-recipes” (Brien and Williamson). This generic tendency influences these celebrities’ communities, to the point where a number of Websites devoted to marketing celebrity chefs as product brands also enable their fans to share their own life stories with large readerships. Oliver and Lawson’s official Websites confirm the privileging of autobiographical and biographical information, but vary in tone and approach. Each is, for instance, deliberately gendered (see Hollows’ articles for a rich exploration of gender, Oliver and Lawson). Oliver’s hip, boyish, friendly, almost frantic site includes the what are purported-to-be self-revelatory “Diary” and “About me” sections, a selection of captioned photographs of the chef, his family, friends, co-workers and sponsors, and his Weblog as well as footage streamed “live from Jamie’s phone”. This self-revelation – which includes significant details about Oliver’s childhood and his domestic life with his “lovely girls, Jools [wife Juliette Norton], Poppy and Daisy” – completely blurs the line between private life and the “Jamie Oliver” brand. While such revelation has been normalised in contemporary culture, this practice stands in great contrast to that of renowned chefs and food writers such as Elizabeth David, Julia Child, James Beard and Margaret Fulton, whose work across various media has largely concentrated on food, cooking and writing about cooking. The difference here is because Oliver’s (supposedly private) life is the brand, used to sell “Jamie Oliver restaurant owner and chef”, “Jamie Oliver cookbook author and TV star”, “Jamie Oliver advertising spokesperson for Sainsbury’s supermarket” (from which he earns an estimated £1.2 million annually) (Meller online) and “Jamie Oliver social activist” (made MBE in 2003 after his first Fifteen restaurant initiative, Oliver was named “Most inspiring political figure” in the 2006 Channel 4 Political Awards for his intervention into the provision of nutritious British school lunches) (see biographies by Hildred and Ewbank, and Smith). Lawson’s site has a more refined, feminine appearance and layout and is more mature in presentation and tone, featuring updates on her (private and public) “News” and forthcoming public appearances, a glamorous selection of photographs of herself from the past 20 years, and a series of print and audio interviews. Although Lawson’s children have featured in some of her television programs and her personal misfortunes are well known and regularly commented upon by both herself and journalists (her mother, sister and husband died of cancer) discussions of these tragedies, and other widely known aspects of her private life such as her second marriage to advertising mogul Charles Saatchi, is not as overt as on Oliver’s site, and the user must delve to find it. The use of Lawson’s personal memoir, as sales tool, is thus both present and controlled. This is in keeping with Lawson’s professional experience prior to becoming the “domestic goddess” (Lawson 2000) as an Oxford graduated journalist on the Spectator and deputy literary editor of the Sunday Times. Both Lawson’s and Oliver’s Websites offer readers various ways to interact with them “personally”. Visitors to Oliver’s site can ask him questions and can access a frequently asked question area, while Lawson holds (once monthly, now irregularly) a question and answer forum. In contrast to this information about, and access to, Oliver and Lawson’s lives, neither of their Websites includes many recipes or other food and cooking focussed information – although there is detailed information profiling their significant number of bestselling cookbooks (Oliver has published 8 cookbooks since 1998, Lawson 5 since 1999), DVDs and videos of their television series and one-off programs, and their name branded product lines of domestic kitchenware (Oliver and Lawson) and foodstuffs (Oliver). Instruction on how to purchase these items is also featured. Both these sites, like Robertson’s, provide various online discussion fora, allowing members to comment upon these chefs’ lives and work, and also to connect with each other through posted texts and images. Oliver’s discussion forum section notes “this is the place for you all to chat to each other, exchange recipe ideas and maybe even help each other out with any problems you might have in the kitchen area”. Lawson’s front page listing states: “You will also find a moderated discussion forum, called Your Page, where our registered members can swap ideas and interact with each other”. The community participants around these celebrity chefs can be, as is the case with loobylu, divided into two groups. The first is “foodie (in Robertson’s case, craft) fans” who appear to largely engage with these Websites to gain, and to share, food, cooking and craft-related information. Such fans on Oliver and Lawson’s discussion lists most frequently discuss these chefs’ television programs and books and the recipes presented therein. They test recipes at home and discuss the results achieved, any problems encountered and possible changes. They also post queries and share information about other recipes, ingredients, utensils, techniques, menus and a wide range of food and cookery-related matters. The second group consists of “celebrity fans” who are attracted to the chefs (as to Robertson as craft maker) as personalities. These fans seek and share biographical information about Oliver and Lawson, their activities and their families. These two areas of fan interest (food/cooking/craft and the personal) are not necessarily or always separated, and individuals can be active members of both types of fandoms. Less foodie-orientated users, however (like users of Dogtalk and loobylu), also frequently post their own auto/biographical narratives to these lists. These narratives, albeit often fragmented, may begin with recipes and cooking queries or issues, but veer off into personal stories that possess only minimal or no relationship to culinary matters. These members also return to the boards to discuss their own revealed life stories with others who have commented on these narratives. Although research into this aspect is in its early stages, it appears that the amount of public personal revelation either encouraged, or allowed, is in direct proportion to the “open” friendliness of these sites. More thus are located in Oliver’s and less in Lawson’s, and – as a kind of “control” in this case study, but not otherwise discussed – none in that of Australian chef Neil Perry, whose coolly sophisticated Website perfectly complements Perry’s professional persona as the epitome of the refined, sophisticated and, importantly in this case, unapproachable, high-end restaurant chef. Moreover, non-cuisine related postings are made despite clear directions to the contrary – Lawson’s site stating: “We ask that postings are restricted to topics relating to food, cooking, the kitchen and, of course, Nigella!” and Oliver making the plea, noted above, for participants to keep their discussions “in the kitchen area”. Of course, all such contemporary celebrity chefs are supported by teams of media specialists who selectively construct the lives that these celebrities share with the public and the postings about others’ lives that are allowed to remain on their discussion lists. The intersection of the findings reported above with the earlier case studies suggests, however, that even these most commercially-oriented sites can provide a fruitful data regarding their function as home-like spaces where domestic practices and processes can be refined, and emotional relationships formed and fostered. In Summary As convergence results in what Turow and Kavanaugh call “the wired homestead”, our case studies show that physically home-based domestic interests and practices – what could be called “home truths” – are also contributing to a refiguration of the private/public interplay of domestic activities through online dialogue. In the case of Dogtalk, domestic space is reconstituted through virtual spaces to include new definitions of family and memory. In the case of loobylu, the virtual interaction facilitates a development of craft-based domestic practices within the physical space of the home, thus transforming domestic routines. Jamie Oliver’s and Nigella Lawson’s sites facilitate development of both skills and gendered identities by means of a bi-directional nexus between domestic practices, sites of home labour/identity production and public media spaces. As participants modify and redefine these online communities to best suit their own needs and desires, even if this is contrary to the stated purposes for which the community was instituted, online communities can be seen to be domesticated, but, equally, these modifications demonstrate that the activities and relationships that have traditionally defined the home are not limited to the physical space of the house. While virtual communities are “passage points for collections of common beliefs and practices that united people who were physically separated” (Stone qtd in Jones 19), these interactions can lead to shared beliefs, for example, through advice about pet-keeping, craft and cooking, that can significantly modify practices and routines in the physical home. Acknowledgments An earlier version of this paper was presented at the Association of Internet Researchers’ International Conference, Brisbane, 27-30 September 2006. The authors would like to thank the referees of this article for their comments and input. Any errors are, of course, our own. References Algesheimer, R., U. Dholake, and A. Herrmann. “The Social Influence of Brand Community: Evidence from European Car Clubs”. Journal of Marketing 69 (2005): 19-34. Atkinson, Frances. “A New World of Craft”. The Age (11 July 2005). 28 May 2007 http://www.theage.com.au/articles/2005/07/10/1120934123262.html>. Brien, Donna Lee, and Rosemary Williamson. “‘Angels of the Home’ in Cyberspace: New Technologies and Biographies of Domestic Production”. Paper. Biography and New Technologies conference. Humanities Research Centre, Australian National University, Canberra, ACT. 12-14 Sep. 2006. Crewe, Jonathan. “Recalling Adamastor: Literature as Cultural Memory in ‘White’ South Africa”. In Acts of Memory: Cultural Recall in the Present, eds. Mieke Bal, Jonathan Crewe, and Leo Spitzer. Hanover, NH: Dartmouth College, 1999. 75-86. Felman, Shoshana, and Dori Laub. Testimony: Crises of Witnessing in Literature, Psychoanalysis, and History. New York: Routledge, 1992. Garber, Marjorie. Dog Love. New York: Touchstone/Simon and Schuster, 1996. Gorman-Murray, Andrew. “Homeboys: Uses of Home by Gay Australian Men”. Social and Cultural Geography 7.1 (2006): 53-69. Halbwachs, Maurice. On Collective Memory. Trans. Lewis A. Closer. Chicago: U of Chicago P, 1992. Hildred, Stafford, and Tim Ewbank. Jamie Oliver: The Biography. London: Blake, 2001. Hollows, Joanne. “Feeling like a Domestic Goddess: Post-Feminism and Cooking.” European Journal of Cultural Studies 6.2 (2003): 179-202. ———. “Oliver’s Twist: Leisure, Labour and Domestic Masculinity in The Naked Chef.” International Journal of Cultural Studies 6.2 (2003): 229-248. Jenson, J. “Fandom as Pathology: The Consequences of Characterization”. The Adoring Audience; Fan Culture and Popular Media. Ed. L. A. Lewis. New York, NY: Routledge, 1992. 9-29. Jones, Steven G., ed. Cybersociety, Computer-Mediated Communication and Community. Thousand Oaks, CA: Sage, 1995. Kozinets, R.V. “‘I Want to Believe’: A Netnography of the X’Philes’ Subculture of Consumption”. Advances in Consumer Research 34 (1997): 470-5. ———. “Utopian Enterprise: Articulating the Meanings of Star Trek’s Culture of Consumption.” Journal of Consumer Research 28 (2001): 67-88. Lawson, Nigella. How to Be a Domestic Goddess: Baking and the Art of Comfort Cooking. London: Chatto and Windus, 2000. Meller, Henry. “Jamie’s Tips Spark Asparagus Shortages”. Daily Mail (17 June 2005). 21 Aug. 2007 http://www.dailymail.co.uk/pages/live/articles/health/dietfitness.html? in_article_id=352584&in_page_id=1798>. Miles, Adrian. “Weblogs: Distributed Documentaries of the Everyday.” Metro 143: 66-70. Moss, Pamela. “Negotiating Space in Home Environments: Older Women Living with Arthritis.” Social Science and Medicine 45.1 (1997): 23-33. Robertson, Claire. Claire Robertson Illustration. 2000-2004. 28 May 2007 . Robertson, Claire. loobylu. 16 Feb. 2007. 28 May 2007 http://www.loobylu.com>. Robertson, Claire. “Press for loobylu.” Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/press.html>. Robertson, Claire. A Month of Softies. 28 May 2007. 21 Aug. 2007 . Robertson, Claire. “Recent Client List”. Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/clients.html>. Rose, Gillian. “Family Photographs and Domestic Spacings: A Case Study.” Transactions of the Institute of British Geographers NS 28.1 (2003): 5-18. Smith, Gilly. Jamie Oliver: Turning Up the Heat. Sydney: Macmillian, 2006. Thorne, Scott, and Gordon C. Bruner. “An Exploratory Investigation of the Characteristics of Consumer Fanaticism.” Qualitative Market Research: An International Journal 9.1 (2006): 51-72. Turow, Joseph, and Andrea Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, MA: MIT Press, 2003. Citation reference for this article MLA Style Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/10-brien.php>. APA Style Brien, D., L. Rutherford, and R. Williamson. (Aug. 2007) "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/10-brien.php>.
APA, Harvard, Vancouver, ISO, and other styles
22

Ruch, Adam, and Steve Collins. "Zoning Laws: Facebook and Google+." M/C Journal 14, no. 5 (October 18, 2011). http://dx.doi.org/10.5204/mcj.411.

Full text
Abstract:
As the single most successful social-networking Website to date, Facebook has caused a shift in both practice and perception of online socialisation, and its relationship to the offline world. While not the first online social networking service, Facebook’s user base dwarfs its nearest competitors. Mark Zuckerberg’s creation boasts more than 750 million users (Facebook). The currently ailing MySpace claimed a ceiling of 100 million users in 2006 (Cashmore). Further, the accuracy of this number has been contested due to a high proportion of fake or inactive accounts. Facebook by contrast, claims 50% of its user base logs in at least once a day (Facebook). The popular and mainstream uptake of Facebook has shifted social use of the Internet from various and fragmented niche groups towards a common hub or portal around which much everyday Internet use is centred. The implications are many, but this paper will focus on the progress what Mimi Marinucci terms the “Facebook effect” (70) and the evolution of lists as a filtering mechanism representing one’s social zones within Facebook. This is in part inspired by the launch of Google’s new social networking service Google+ which includes “circles” as a fundamental design feature for sorting contacts. Circles are an acknowledgement of the shortcomings of a single, unified friends list that defines the Facebook experience. These lists and circles are both manifestations of the same essential concept: our social lives are, in fact, divided into various zones not defined by an online/offline dichotomy, by fantasy role-play, deviant sexual practices, or other marginal or minority interests. What the lists and circles demonstrate is that even very common, mainstream people occupy different roles in everyday life, and that to be effective social tools, social networking sites must grant users control over their various identities and over who knows what about them. Even so, the very nature of computer-based social tools lead to problematic definitions of identities and relationships using discreet terms, in contrast to more fluid, performative constructions of an individual and their relations to others. Building the Monolith In 1995, Sherry Turkle wrote that “the Internet has become a significant social laboratory for experimenting with the constructions and reconstructions of self that characterize postmodern life” (180). Turkle describes the various deliberate acts of personnae creation possible online in contrast to earlier constraints placed upon the “cycling through different identities” (179). In the past, Turkle argues, “lifelong involvement with families and communities kept such cycling through under fairly stringent control” (180). In effect, Turkle was documenting the proliferation of identity games early adopters of Internet technologies played through various means. Much of what Turkle focused on were MUDs (Multi-User Dungeons) and MOOs (MUD Object Oriented), explicit play-spaces that encouraged identity-play of various kinds. Her contemporary Howard Rheingold focused on what may be described as the more “true to life” communities of the WELL (Whole Earth ‘Lectronic Link) (1–38). In particular, Rheingold explored a community established around the shared experience of parenting, especially of young children. While that community was not explicitly built on the notion of role-play, the parental identity was an important quality of community members. Unlike contemporary social media networks, these early communities were built on discreet platforms. MUDs, MOOs, Bulletin Board Systems, UseNet Groups and other early Internet communication platforms were generally hosted independently of one another, and even had to be dialled into via modem separately in some cases (such as the WELL). The Internet was a truly disparate entity in 1995. The discreetness of each community supported the cordoning off of individual roles or identities between them. Thus, an individual could quite easily be “Pete” a member of the parental WELL group and “Gorak the Destroyer,” a role-player on a fantasy MUD without the two roles ever being associated with each other. As Turkle points out, even within each MUD ample opportunity existed to play multiple characters (183–192). With only a screen name and associated description to identify an individual within the MUD environment, nothing technical existed to connect one player’s multiple identities, even within the same community. As the Internet has matured, however, the tendency has been shifting towards monolithic hubs, a notion of collecting all of “the Internet” together. From a purely technical and operational perspective, this has led to the emergence of the ISP (Internet service provider). Users can make a connection to one point, and then be connected to everything “on the Net” instead of individually dialling into servers and services one at a time as was the case in the early 1980s with companies such as Prodigy, the Source, CompuServe, and America On-Line (AOL). The early information service providers were largely walled gardens. A CompuServe user could only access information on the CompuServe network. Eventually the Internet became the network of choice and services migrated to it. Standards such as HTTP for Web page delivery and SMTP for email became established and dominate the Internet today. Technically, this has made the Internet much easier to use. The services that have developed on this more rationalised and unified platform have also tended toward monolithic, centralised architectures, despite the Internet’s apparent fundamental lack of a hierarchy. As the Internet replaced the closed networks, the wider Web of HTTP pages, forums, mailing lists and other forms of Internet communication and community thrived. Perhaps they required slightly more technological savvy than the carefully designed experience of walled-garden ISPs such as AOL, but these fora and IRC (Internet Relay Chat) rooms still provided the discreet environments within which to role-play. An individual could hold dozens of login names to as many different communities. These various niches could be simply hobby sites and forums where a user would deploy their identity as model train enthusiast, musician, or pet owner. They could also be explicitly about role-play, continuing the tradition of MUDs and MOOs into the new millennium. Pseudo- and polynymity were still very much part of the Internet experience. Even into the early parts of the so-called Web 2.0 explosion of more interactive Websites which allowed for easier dialog between site owner and viewer, a given identity would be very much tied to a single site, blog or even individual comments. There was no “single sign on” to link my thread from a music forum to the comments I made on a videogame blog to my aquarium photos at an image gallery site. Today, Facebook and Google, among others, seek to change all that. The Facebook Effect Working from a psychological background Turkle explored the multiplicity of online identities as a valuable learning, even therapeutic, experience. She assessed the experiences of individuals who were coming to terms with aspects of their own personalities, from simple shyness to exploring their sexuality. In “You Can’t Front on Facebook,” Mimi Marinucci summarizes an analysis of online behaviour by another psychologist, John Suler (67–70). Suler observed an “online disinhibition effect” characterised by users’ tendency to express themselves more openly online than offline (321). Awareness of this effect was drawn (no pun intended) into popular culture by cartoonist Mike Krahulik’s protagonist John Gabriel. Although Krahulik’s summation is straight to the point, Suler offers a more considered explanation. There are six general reasons for the online disinhibition effect: being anonymous, being invisible, the communications being out of sync, the strange sensation that a virtual interlocutor is all in the mind of the user, the general sense that the online world simply is not real and the minimisation of status and authority (321–325). Of the six, the notion of anonymity is most problematic, as briefly explored above in the case of AOL. The role of pseudonymity has been explored in more detail in Ruch, and will be considered with regard to Facebook and Google+ below. The Facebook effect, Marinucci argues, mitigates all six of these issues. Though Marinucci explains the mitigation of each factor individually, her final conclusion is the most compelling reason: “Facebook often facilitates what is best described as an integration of identities, and this integration of identities in turn functions as something of an inhibiting factor” (73). Ruch identifies this phenomenon as the “aggregation of identities” (219). Similarly, Brady Robards observes that “social network sites such as MySpace and Facebook collapse the entire array of social relationships into just one category, that of ‘Friend’” (20). Unlike earlier community sites, Ruch notes “Facebook rejects both the mythical anonymity of the Internet, but also the actual pseudo- or polynonymous potential of the technologies” (219). Essentially, Facebook works to bring the offline social world online, along with all the conventional baggage that accompanies the individual’s real-world social life. Facebook, and now Google+, present a hard, dichotomous approach to online identity: anonymous and authentic. Their socially networked individual is the “real” one, using a person’s given name, and bringing all (or as many as the sites can capture) their contacts from the offline world into the online one, regardless of context. The Facebook experience is one of “friending” everyone one has any social contact with into one homogeneous group. Not only is Facebook avoiding the multiple online identities that interested Turkle, but it is disregarding any multiplicity of identity anywhere, including any online/offline split. David Kirkpatrick reports Mark Zuckerberg’s rejection of this construction of identity is explained by his belief that “You have one identity … having two identities for yourself is an example of a lack of integrity” (199). Arguably, Zuckerberg’s calls for accountability through identity continue a perennial concern for anonymity online fuelled by “on the Internet no one knows you’re a dog” style moral panics. Over two decades ago Lindsy Van Gelder recounted the now infamous case of “Joan and Alex” (533) and Julian Dibbell recounted “a rape in cyberspace” (11). More recent anxieties concern the hacking escapades of Anonymous and LulzSec. Zuckerberg’s approach has been criticised by Christopher Poole, the founder of 4Chan—a bastion of Internet anonymity. During his keynote presentation at South by SouthWest 2011 Poole argued that Zuckerberg “equates anonymity with a lack of authenticity, almost a cowardice.” Yet in spite of these objections, Facebook has mainstream appeal. From a social constructivist perspective, this approach to identity would be satisfying the (perceived?) need for a mainstream, context-free, general social space online to cater for the hundreds of millions of people who now use the Internet. There is no specific, pre-defined reason to join Facebook in the way there is a particular reason to join a heavy metal music message board. Facebook is catering to the need to bring “real” social life online generally, with “real” in this case meaning “offline and pre-existing.” Very real risks of missing “real life” social events (engagements, new babies, party invitations etc) that were shared primarily via Facebook became salient to large groups of individuals not consciously concerned with some particular facet of identity performance. The commercial imperatives towards monolithic Internet and identity are obvious. Given that both Facebook and Google+ are in the business of facilitating the sale of advertising, their core business value is the demographic information they can sell to various companies for target advertising. Knowing a user’s individual identity and tastes is extremely important to those in the business of selling consumers what they currently want as well as predicting their future desires. The problem with this is the dawning realisation that even for the average person, role-playing is part of everyday life. We simply aren’t the same person in all contexts. None of the roles we play need to be particularly scandalous for this to be true, but we have different comfort zones with people that are fuelled by context. Suler proposes and Marinucci confirms that inhibition may be just as much part of our authentic self as the uninhibited expression experienced in more anonymous circumstances. Further, different contexts will inform what we inhibit and what we express. It is not as though there is a simple binary between two different groups and two different personal characteristics to oscillate between. The inhibited personnae one occupies at one’s grandmother’s home is a different inhibited self one plays at a job interview or in a heated discussion with faculty members at a university. One is politeness, the second professionalism, the third scholarly—yet they all restrain the individual in different ways. The Importance of Control over Circles Google+ is Google’s latest foray into the social networking arena. Its previous ventures Orkut and Google Buzz did not fare well, both were variously marred by legal issues concerning privacy, security, SPAM and hate groups. Buzz in particular fell afoul of associating Google accounts with users” real life identities, and (as noted earlier), all the baggage that comes with it. “One user blogged about how Buzz automatically added her abusive ex-boyfriend as a follower and exposed her communications with a current partner to him. Other bloggers commented that repressive governments in countries such as China or Iran could use Buzz to expose dissidents” (Novak). Google+ takes a different approach to its predecessors and its main rival, Facebook. Facebook allows for the organisation of “friends” into lists. Individuals can span more than one list. This is an exercise analogous to what Erving Goffman refers to as “audience segregation” (139). According to the site’s own statistics the average Facebook user has 130 friends, we anticipate it would be time-consuming to organise one’s friends according to real life social contexts. Yet without such organisation, Facebook overlooks the social structures and concomitant behaviours inherent in everyday life. Even broad groups offer little assistance. For example, an academic’s “Work People” list may include the Head of Department as well as numerous other lecturers with whom a workspace is shared. There are things one might share with immediate colleagues that should not be shared with the Head of Department. As Goffman states, “when audience segregation fails and an outsider happens upon a performance that was not meant for him, difficult problems in impression management arise” (139). By homogenising “friends” and social contexts users are either inhibited or run the risk of some future awkward encounters. Google+ utilises “circles” as its method for organising contacts. The graphical user interface is intuitive, facilitated by an easy drag and drop function. Use of “circles” already exists in the vocabulary used to describe our social structures. “List” by contrast reduces the subject matter to simple data. The utility of Facebook’s friends lists is hindered by usability issues—an unintuitive and convoluted process that was added to Facebook well after its launch, perhaps a reaction to privacy concerns rather than a genuine attempt to emulate social organisation. For a cogent breakdown of these technical and design problems see Augusto Sellhorn. Organising friends into lists is a function offered by Facebook, but Google+ takes a different approach: organising friends in circles is a central feature; the whole experience is centred around attempting to mirror the social relations of real life. Google’s promotional video explains the centrality of emulating “real life relationships” (Google). Effectively, Facebook and Google+ have adopted two different systemic approaches to dealing with the same issue. Facebook places the burden of organising a homogeneous mass of “friends” into lists on the user as an afterthought of connecting with another user. In contrast, Google+ builds organisation into the act of connecting. Whilst Google+’s approach is more intuitive and designed to facilitate social networking that more accurately reflects how real life social relationships are structured, it suffers from forcing direct correlation between an account and the account holder. That is, use of Google+ mandates bringing online the offline. Google+ operates a real names policy and on the weekend of 23 July 2011 suspended a number of accounts for violation of Google’s Community Standards. A suspension notice posted by Violet Blue reads: “After reviewing your profile, we determined the name you provided violates our Community Standards.” Open Source technologist Kirrily Robert polled 119 Google+ users about their experiences with the real names policy. The results posted to her on blog reveal that users desire pseudonymity, many for reasons of privacy and/or safety rather than the lack of integrity thought by Zuckerberg. boyd argues that Google’s real names policy is an abuse of power and poses danger to those users employing “nicks” for reasons including being a government employment or the victim of stalking, rape or domestic abuse. A comprehensive list of those at risk has been posted to the Geek Feminism Wiki (ironically, the Wiki utilises “Connect”, Facebook’s attempt at a single sign on solution for the Web that connects users’ movements with their Facebook profile). Facebook has a culture of real names stemming from its early adopters drawn from trusted communities, and this culture became a norm for that service (boyd). But as boyd also points out, “[r]eal names are by no means universal on Facebook.” Google+ demands real names, a demand justified by rhetoric of designing a social networking system that is more like real life. “Real”, in this case, is represented by one’s given name—irrespective of the authenticity of one’s pseudonym or the complications and dangers of using one’s given name. Conclusion There is a multiplicity of issues concerning social networks and identities, privacy and safety. This paper has outlined the challenges involved in moving real life to the online environment and the contests in trying to designate zones of social context. Where some earlier research into the social Internet has had a positive (even utopian) feel, the contemporary Internet is increasingly influenced by powerful and competing corporations. As a result, the experience of the Internet is not necessarily as flexible as Turkle or Rheingold might have envisioned. Rather than conducting identity experimentation or exercising multiple personnae, we are increasingly obligated to perform identity as it is defined by the monolithic service providers such as Facebook and Google+. This is not purely an indictment of Facebook or Google’s corporate drive, though they are obviously implicated, but has as much to do with the new social practice of “being online.” So, while there are myriad benefits to participating in this new social context, as Poole noted, the “cost of failure is really high when you’re contributing as yourself.” Areas for further exploration include the implications of Facebook positioning itself as a general-purpose user authentication tool whereby users can log into a wide array of Websites using their Facebook credentials. If Google were to take a similar action the implications would be even more convoluted, given the range of other services Google offers, from GMail to the Google Checkout payment service. While the monolithic centralisation of these services will have obvious benefits, there will be many more subtle problems which must be addressed. References Blue, Violet. “Google Plus Deleting Accounts en Masse: No Clear Answers.” zdnet.com (2011). 10 Aug. 2011 ‹http://www.zdnet.com/blog/violetblue/google-plus-deleting-accounts-en-masse-no-clear-answers/56›. boyd, danah. “Real Names Policies Are an Abuse of Power.” zephoria.org (2011). 10 Aug. 2011 ‹http://www.zephoria.org/thoughts/archives/2011/08/04/real-names.html›. Cashmore, Pete. “MySpace Hits 100 Million Accounts.” mashable.com (2006). 10 Aug. 2011 ‹http://mashable.com/2006/08/09/myspace-hits-100-million-accounts›. Dibble, Julian. My Tiny Life: Crime and Passion in a Virtual World. New York: Henry Holt & Company, 1998. Facebook. “Fact Sheet.” Facebook (2011). 10 Aug. 2011 ‹http://www.facebook.com/press/info.php?statistic›. Geek Feminism Wiki. “Who Is Harmed by a Real Names Policy?” 2011. 10 Aug. 2011 ‹http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy› Goffman, Erving. The Presentation of Self in Everyday Life. London: Penguin, 1959. Google. “The Google+ Project: Explore Circles.” Youtube.com (2011). 10 Aug. 2011 ‹http://www.youtube.com/watch?v=ocPeAdpe_A8›. Kirkpatrick, David. The Facebook Effect. New York: Simon & Schuster, 2010. Marinucci, Mimi. “You Can’t Front on Facebook.” Facebook and Philosophy. Ed. Dylan Wittkower. Chicago & La Salle, Illinois: Open Court, 2010. 65–74. Novak, Peter. “Privacy Commissioner Reviewing Google Buzz.” CBC News: Technology and Science (2010). 10 Aug. 2011 ‹http://www.cbc.ca/news/technology/story/2010/02/16/google-buzz-privacy.html›. Poole, Christopher. Keynote presentation. South by SouthWest. Texas, Austin, 2011. Robards, Brady. “Negotiating Identity and Integrity on Social Network Sites for Educators.” International Journal for Educational Integrity 6.2 (2010): 19–23. Robert, Kirrily. “Preliminary Results of My Survey of Suspended Google Accounts.” 2011. 10 Aug. 2011 ‹http://infotrope.net/2011/07/25/preliminary-results-of-my-survey-of-suspended-google-accounts/›. Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper Perennial, 1993. Ruch, Adam. “The Decline of Pseudonymity.” Posthumanity. Eds. Adam Ruch and Ewan Kirkland. Oxford: Inter-Disciplinary.net Press, 2010: 211–220. Sellhorn, Augusto. “Facebook Friend Lists Suck When Compared to Google+ Circles.” sellmic.com (2011). 10 Aug. 2011 ‹http://sellmic.com/blog/2011/07/01/facebook-friend-lists-suck-when-compared-to-googleplus-circles›. Suler, John. “The Online Disinhibition Effect.” CyberPsychology and Behavior 7 (2004): 321–326. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon & Schuster, 1995. Van Gelder, Lindsy. “The Strange Case of the Electronic Lover.” Computerization and Controversy: Value Conflicts and Social Choices Ed. Rob Kling. New York: Academic Press, 1996: 533–46.
APA, Harvard, Vancouver, ISO, and other styles
23

Deer, Patrick, and Toby Miller. "A Day That Will Live In … ?" M/C Journal 5, no. 1 (March 1, 2002). http://dx.doi.org/10.5204/mcj.1938.

Full text
Abstract:
By the time you read this, it will be wrong. Things seemed to be moving so fast in these first days after airplanes crashed into the World Trade Center, the Pentagon, and the Pennsylvania earth. Each certainty is as carelessly dropped as it was once carelessly assumed. The sounds of lower Manhattan that used to serve as white noise for residents—sirens, screeches, screams—are no longer signs without a referent. Instead, they make folks stare and stop, hurry and hustle, wondering whether the noises we know so well are in fact, this time, coefficients of a new reality. At the time of writing, the events themselves are also signs without referents—there has been no direct claim of responsibility, and little proof offered by accusers since the 11th. But it has been assumed that there is a link to US foreign policy, its military and economic presence in the Arab world, and opposition to it that seeks revenge. In the intervening weeks the US media and the war planners have supplied their own narrow frameworks, making New York’s “ground zero” into the starting point for a new escalation of global violence. We want to write here about the combination of sources and sensations that came that day, and the jumble of knowledges and emotions that filled our minds. Working late the night before, Toby was awoken in the morning by one of the planes right overhead. That happens sometimes. I have long expected a crash when I’ve heard the roar of jet engines so close—but I didn’t this time. Often when that sound hits me, I get up and go for a run down by the water, just near Wall Street. Something kept me back that day. Instead, I headed for my laptop. Because I cannot rely on local media to tell me very much about the role of the US in world affairs, I was reading the British newspaper The Guardian on-line when it flashed a two-line report about the planes. I looked up at the calendar above my desk to see whether it was April 1st. Truly. Then I got off-line and turned on the TV to watch CNN. That second, the phone rang. My quasi-ex-girlfriend I’m still in love with called from the mid-West. She was due to leave that day for the Bay Area. Was I alright? We spoke for a bit. She said my cell phone was out, and indeed it was for the remainder of the day. As I hung up from her, my friend Ana rang, tearful and concerned. Her husband, Patrick, had left an hour before for work in New Jersey, and it seemed like a dangerous separation. All separations were potentially fatal that day. You wanted to know where everyone was, every minute. She told me she had been trying to contact Palestinian friends who worked and attended school near the event—their ethnic, religious, and national backgrounds made for real poignancy, as we both thought of the prejudice they would (probably) face, regardless of the eventual who/what/when/where/how of these events. We agreed to meet at Bruno’s, a bakery on La Guardia Place. For some reason I really took my time, though, before getting to Ana. I shampooed and shaved under the shower. This was a horror, and I needed to look my best, even as men and women were losing and risking their lives. I can only interpret what I did as an attempt to impose normalcy and control on the situation, on my environment. When I finally made it down there, she’d located our friends. They were safe. We stood in the street and watched the Towers. Horrified by the sight of human beings tumbling to their deaths, we turned to buy a tea/coffee—again some ludicrous normalization—but were drawn back by chilling screams from the street. Racing outside, we saw the second Tower collapse, and clutched at each other. People were streaming towards us from further downtown. We decided to be with our Palestinian friends in their apartment. When we arrived, we learnt that Mark had been four minutes away from the WTC when the first plane hit. I tried to call my daughter in London and my father in Canberra, but to no avail. I rang the mid-West, and asked my maybe-former novia to call England and Australia to report in on me. Our friend Jenine got through to relatives on the West Bank. Israeli tanks had commenced a bombardment there, right after the planes had struck New York. Family members spoke to her from under the kitchen table, where they were taking refuge from the shelling of their house. Then we gave ourselves over to television, like so many others around the world, even though these events were happening only a mile away. We wanted to hear official word, but there was just a huge absence—Bush was busy learning to read in Florida, then leading from the front in Louisiana and Nebraska. As the day wore on, we split up and regrouped, meeting folks. One guy was in the subway when smoke filled the car. Noone could breathe properly, people were screaming, and his only thought was for his dog DeNiro back in Brooklyn. From the panic of the train, he managed to call his mom on a cell to ask her to feed “DeNiro” that night, because it looked like he wouldn’t get home. A pregnant woman feared for her unborn as she fled the blasts, pushing the stroller with her baby in it as she did so. Away from these heart-rending tales from strangers, there was the fear: good grief, what horrible price would the US Government extract for this, and who would be the overt and covert agents and targets of that suffering? What blood-lust would this generate? What would be the pattern of retaliation and counter-retaliation? What would become of civil rights and cultural inclusiveness? So a jumble of emotions came forward, I assume in all of us. Anger was not there for me, just intense sorrow, shock, and fear, and the desire for intimacy. Network television appeared to offer me that, but in an ultimately unsatisfactory way. For I think I saw the end-result of reality TV that day. I have since decided to call this ‘emotionalization’—network TV’s tendency to substitute analysis of US politics and economics with a stress on feelings. Of course, powerful emotions have been engaged by this horror, and there is value in addressing that fact and letting out the pain. I certainly needed to do so. But on that day and subsequent ones, I looked to the networks, traditional sources of current-affairs knowledge, for just that—informed, multi-perspectival journalism that would allow me to make sense of my feelings, and come to a just and reasoned decision about how the US should respond. I waited in vain. No such commentary came forward. Just a lot of asinine inquiries from reporters that were identical to those they pose to basketballers after a game: Question—‘How do you feel now?’ Answer—‘God was with me today.’ For the networks were insistent on asking everyone in sight how they felt about the end of las torres gemelas. In this case, we heard the feelings of survivors, firefighters, viewers, media mavens, Republican and Democrat hacks, and vacuous Beltway state-of-the-nation pundits. But learning of the military-political economy, global inequality, and ideologies and organizations that made for our grief and loss—for that, there was no space. TV had forgotten how to do it. My principal feeling soon became one of frustration. So I headed back to where I began the day—The Guardian web site, where I was given insightful analysis of the messy factors of history, religion, economics, and politics that had created this situation. As I dealt with the tragedy of folks whose lives had been so cruelly lost, I pondered what it would take for this to stop. Or whether this was just the beginning. I knew one thing—the answers wouldn’t come from mainstream US television, no matter how full of feelings it was. And that made Toby anxious. And afraid. He still is. And so the dreams come. In one, I am suddenly furloughed from my job with an orchestra, as audience numbers tumble. I make my evening-wear way to my locker along with the other players, emptying it of bubble gum and instrument. The next night, I see a gigantic, fifty-feet high wave heading for the city beach where I’ve come to swim. Somehow I am sheltered behind a huge wall, as all the people around me die. Dripping, I turn to find myself in a media-stereotype “crack house” of the early ’90s—desperate-looking black men, endless doorways, sudden police arrival, and my earnest search for a passport that will explain away my presence. I awake in horror, to the realization that the passport was already open and stamped—racialization at work for Toby, every day and in every way, as a white man in New York City. Ana’s husband, Patrick, was at work ten miles from Manhattan when “it” happened. In the hallway, I overheard some talk about two planes crashing, but went to teach anyway in my usual morning stupor. This was just the usual chatter of disaster junkies. I didn’t hear the words, “World Trade Center” until ten thirty, at the end of the class at the college I teach at in New Jersey, across the Hudson river. A friend and colleague walked in and told me the news of the attack, to which I replied “You must be fucking joking.” He was a little offended. Students were milling haphazardly on the campus in the late summer weather, some looking panicked like me. My first thought was of some general failure of the air-traffic control system. There must be planes falling out of the sky all over the country. Then the height of the towers: how far towards our apartment in Greenwich Village would the towers fall? Neither of us worked in the financial district a mile downtown, but was Ana safe? Where on the college campus could I see what was happening? I recognized the same physical sensation I had felt the morning after Hurricane Andrew in Miami seeing at a distance the wreckage of our shattered apartment across a suburban golf course strewn with debris and flattened power lines. Now I was trapped in the suburbs again at an unbridgeable distance from my wife and friends who were witnessing the attacks first hand. Were they safe? What on earth was going on? This feeling of being cut off, my path to the familiar places of home blocked, remained for weeks my dominant experience of the disaster. In my office, phone calls to the city didn’t work. There were six voice-mail messages from my teenaged brother Alex in small-town England giving a running commentary on the attack and its aftermath that he was witnessing live on television while I dutifully taught my writing class. “Hello, Patrick, where are you? Oh my god, another plane just hit the towers. Where are you?” The web was choked: no access to newspapers online. Email worked, but no one was wasting time writing. My office window looked out over a soccer field to the still woodlands of western New Jersey: behind me to the east the disaster must be unfolding. Finally I found a website with a live stream from ABC television, which I watched flickering and stilted on the tiny screen. It had all already happened: both towers already collapsed, the Pentagon attacked, another plane shot down over Pennsylvania, unconfirmed reports said, there were other hijacked aircraft still out there unaccounted for. Manhattan was sealed off. George Washington Bridge, Lincoln and Holland tunnels, all the bridges and tunnels from New Jersey I used to mock shut down. Police actions sealed off the highways into “the city.” The city I liked to think of as the capital of the world was cut off completely from the outside, suddenly vulnerable and under siege. There was no way to get home. The phone rang abruptly and Alex, three thousand miles away, told me he had spoken to Ana earlier and she was safe. After a dozen tries, I managed to get through and spoke to her, learning that she and Toby had seen people jumping and then the second tower fall. Other friends had been even closer. Everyone was safe, we thought. I sat for another couple of hours in my office uselessly. The news was incoherent, stories contradictory, loops of the planes hitting the towers only just ready for recycling. The attacks were already being transformed into “the World Trade Center Disaster,” not yet the ahistorical singularity of the emergency “nine one one.” Stranded, I had to spend the night in New Jersey at my boss’s house, reminded again of the boundless generosity of Americans to relative strangers. In an effort to protect his young son from the as yet unfiltered images saturating cable and Internet, my friend’s TV set was turned off and we did our best to reassure. We listened surreptitiously to news bulletins on AM radio, hoping that the roads would open. Walking the dog with my friend’s wife and son we crossed a park on the ridge on which Upper Montclair sits. Ten miles away a huge column of smoke was rising from lower Manhattan, where the stunning absence of the towers was clearly visible. The summer evening was unnervingly still. We kicked a soccer ball around on the front lawn and a woman walked distracted by, shocked and pale up the tree-lined suburban street, suffering her own wordless trauma. I remembered that though most of my students were ordinary working people, Montclair is a well-off dormitory for the financial sector and high rises of Wall Street and Midtown. For the time being, this was a white-collar disaster. I slept a short night in my friend’s house, waking to hope I had dreamed it all, and took the commuter train in with shell-shocked bankers and corporate types. All men, all looking nervously across the river toward glimpses of the Manhattan skyline as the train neared Hoboken. “I can’t believe they’re making us go in,” one guy had repeated on the station platform. He had watched the attacks from his office in Midtown, “The whole thing.” Inside the train we all sat in silence. Up from the PATH train station on 9th street I came onto a carless 6th Avenue. At 14th street barricades now sealed off downtown from the rest of the world. I walked down the middle of the avenue to a newspaper stand; the Indian proprietor shrugged “No deliveries below 14th.” I had not realized that the closer to the disaster you came, the less information would be available. Except, I assumed, for the evidence of my senses. But at 8 am the Village was eerily still, few people about, nothing in the sky, including the twin towers. I walked to Houston Street, which was full of trucks and police vehicles. Tractor trailers sat carrying concrete barriers. Below Houston, each street into Soho was barricaded and manned by huddles of cops. I had walked effortlessly up into the “lockdown,” but this was the “frozen zone.” There was no going further south towards the towers. I walked the few blocks home, found my wife sleeping, and climbed into bed, still in my clothes from the day before. “Your heart is racing,” she said. I realized that I hadn’t known if I would get back, and now I never wanted to leave again; it was still only eight thirty am. Lying there, I felt the terrible wonder of a distant bystander for the first-hand witness. Ana’s face couldn’t tell me what she had seen. I felt I needed to know more, to see and understand. Even though I knew the effort was useless: I could never bridge that gap that had trapped me ten miles away, my back turned to the unfolding disaster. The television was useless: we don’t have cable, and the mast on top of the North Tower, which Ana had watched fall, had relayed all the network channels. I knew I had to go down and see the wreckage. Later I would realize how lucky I had been not to suffer from “disaster envy.” Unbelievably, in retrospect, I commuted into work the second day after the attack, dogged by the same unnerving sensation that I would not get back—to the wounded, humbled former center of the world. My students were uneasy, all talked out. I was a novelty, a New Yorker living in the Village a mile from the towers, but I was forty-eight hours late. Out of place in both places. I felt torn up, but not angry. Back in the city at night, people were eating and drinking with a vengeance, the air filled with acrid sicklysweet smoke from the burning wreckage. Eyes stang and nose ran with a bitter acrid taste. Who knows what we’re breathing in, we joked nervously. A friend’s wife had fallen out with him for refusing to wear a protective mask in the house. He shrugged a wordlessly reassuring smile. What could any of us do? I walked with Ana down to the top of West Broadway from where the towers had commanded the skyline over SoHo; downtown dense smoke blocked the view to the disaster. A crowd of onlookers pushed up against the barricades all day, some weeping, others gawping. A tall guy was filming the grieving faces with a video camera, which was somehow the worst thing of all, the first sign of the disaster tourism that was already mushrooming downtown. Across the street an Asian artist sat painting the street scene in streaky black and white; he had scrubbed out two white columns where the towers would have been. “That’s the first thing I’ve seen that’s made me feel any better,” Ana said. We thanked him, but he shrugged blankly, still in shock I supposed. On the Friday, the clampdown. I watched the Mayor and Police Chief hold a press conference in which they angrily told the stream of volunteers to “ground zero” that they weren’t needed. “We can handle this ourselves. We thank you. But we don’t need your help,” Commissioner Kerik said. After the free-for-all of the first couple of days, with its amazing spontaneities and common gestures of goodwill, the clampdown was going into effect. I decided to go down to Canal Street and see if it was true that no one was welcome anymore. So many paths through the city were blocked now. “Lock down, frozen zone, war zone, the site, combat zone, ground zero, state troopers, secured perimeter, national guard, humvees, family center”: a disturbing new vocabulary that seemed to stamp the logic of Giuliani’s sanitized and over-policed Manhattan onto the wounded hulk of the city. The Mayor had been magnificent in the heat of the crisis; Churchillian, many were saying—and indeed, Giuliani quickly appeared on the cover of Cigar Afficionado, complete with wing collar and the misquotation from Kipling, “Captain Courageous.” Churchill had not believed in peacetime politics either, and he never got over losing his empire. Now the regime of command and control over New York’s citizens and its economy was being stabilized and reimposed. The sealed-off, disfigured, and newly militarized spaces of the New York through which I have always loved to wander at all hours seemed to have been put beyond reach for the duration. And, in the new post-“9/11” post-history, the duration could last forever. The violence of the attacks seemed to have elicited a heavy-handed official reaction that sought to contain and constrict the best qualities of New York. I felt more anger at the clampdown than I did at the demolition of the towers. I knew this was unreasonable, but I feared the reaction, the spread of the racial harassment and racial profiling that I had already heard of from my students in New Jersey. This militarizing of the urban landscape seemed to negate the sprawling, freewheeling, boundless largesse and tolerance on which New York had complacently claimed a monopoly. For many the towers stood for that as well, not just as the monumental outposts of global finance that had been attacked. Could the American flag mean something different? For a few days, perhaps—on the helmets of firemen and construction workers. But not for long. On the Saturday, I found an unmanned barricade way east along Canal Street and rode my bike past throngs of Chinatown residents, by the Federal jail block where prisoners from the first World Trade Center bombing were still being held. I headed south and west towards Tribeca; below the barricades in the frozen zone, you could roam freely, the cops and soldiers assuming you belonged there. I felt uneasy, doubting my own motives for being there, feeling the blood drain from my head in the same numbing shock I’d felt every time I headed downtown towards the site. I looped towards Greenwich Avenue, passing an abandoned bank full of emergency supplies and boxes of protective masks. Crushed cars still smeared with pulverized concrete and encrusted with paperwork strewn by the blast sat on the street near the disabled telephone exchange. On one side of the avenue stood a horde of onlookers, on the other television crews, all looking two blocks south towards a colossal pile of twisted and smoking steel, seven stories high. We were told to stay off the street by long-suffering national guardsmen and women with southern accents, kids. Nothing happening, just the aftermath. The TV crews were interviewing worn-out, dust-covered volunteers and firemen who sat quietly leaning against the railings of a park filled with scraps of paper. Out on the West Side highway, a high-tech truck was offering free cellular phone calls. The six lanes by the river were full of construction machinery and military vehicles. Ambulances rolled slowly uptown, bodies inside? I locked my bike redundantly to a lamppost and crossed under the hostile gaze of plainclothes police to another media encampment. On the path by the river, two camera crews were complaining bitterly in the heat. “After five days of this I’ve had enough.” They weren’t talking about the trauma, bodies, or the wreckage, but censorship. “Any blue light special gets to roll right down there, but they see your press pass and it’s get outta here. I’ve had enough.” I fronted out the surly cops and ducked under the tape onto the path, walking onto a Pier on which we’d spent many lazy afternoons watching the river at sunset. Dust everywhere, police boats docked and waiting, a crane ominously dredging mud into a barge. I walked back past the camera operators onto the highway and walked up to an interview in process. Perfectly composed, a fire chief and his crew from some small town in upstate New York were politely declining to give details about what they’d seen at “ground zero.” The men’s faces were dust streaked, their eyes slightly dazed with the shock of a horror previously unimaginable to most Americans. They were here to help the best they could, now they’d done as much as anyone could. “It’s time for us to go home.” The chief was eloquent, almost rehearsed in his precision. It was like a Magnum press photo. But he was refusing to cooperate with the media’s obsessive emotionalism. I walked down the highway, joining construction workers, volunteers, police, and firemen in their hundreds at Chambers Street. No one paid me any attention; it was absurd. I joined several other watchers on the stairs by Stuyvesant High School, which was now the headquarters for the recovery crews. Just two or three blocks away, the huge jagged teeth of the towers’ beautiful tracery lurched out onto the highway above huge mounds of debris. The TV images of the shattered scene made sense as I placed them into what was left of a familiar Sunday afternoon geography of bike rides and walks by the river, picnics in the park lying on the grass and gazing up at the infinite solidity of the towers. Demolished. It was breathtaking. If “they” could do that, they could do anything. Across the street at tables military policeman were checking credentials of the milling volunteers and issuing the pink and orange tags that gave access to ground zero. Without warning, there was a sudden stampede running full pelt up from the disaster site, men and women in fatigues, burly construction workers, firemen in bunker gear. I ran a few yards then stopped. Other people milled around idly, ignoring the panic, smoking and talking in low voices. It was a mainly white, blue-collar scene. All these men wearing flags and carrying crowbars and flashlights. In their company, the intolerance and rage I associated with flags and construction sites was nowhere to be seen. They were dealing with a torn and twisted otherness that dwarfed machismo or bigotry. I talked to a moustachioed, pony-tailed construction worker who’d hitched a ride from the mid-west to “come and help out.” He was staying at the Y, he said, it was kind of rough. “Have you been down there?” he asked, pointing towards the wreckage. “You’re British, you weren’t in World War Two were you?” I replied in the negative. “It’s worse ’n that. I went down last night and you can’t imagine it. You don’t want to see it if you don’t have to.” Did I know any welcoming ladies? he asked. The Y was kind of tough. When I saw TV images of President Bush speaking to the recovery crews and steelworkers at “ground zero” a couple of days later, shouting through a bullhorn to chants of “USA, USA” I knew nothing had changed. New York’s suffering was subject to a second hijacking by the brokers of national unity. New York had never been America, and now its terrible human loss and its great humanity were redesignated in the name of the nation, of the coming war. The signs without a referent were being forcibly appropriated, locked into an impoverished patriotic framework, interpreted for “us” by a compliant media and an opportunistic regime eager to reign in civil liberties, to unloose its war machine and tighten its grip on the Muslim world. That day, drawn to the river again, I had watched F18 fighter jets flying patterns over Manhattan as Bush’s helicopters came in across the river. Otherwise empty of air traffic, “our” skies were being torn up by the military jets: it was somehow the worst sight yet, worse than the wreckage or the bands of disaster tourists on Canal Street, a sign of further violence yet to come. There was a carrier out there beyond New York harbor, there to protect us: the bruising, blustering city once open to all comers. That felt worst of all. In the intervening weeks, we have seen other, more unstable ways of interpreting the signs of September 11 and its aftermath. Many have circulated on the Internet, past the blockages and blockades placed on urban spaces and intellectual life. Karl-Heinz Stockhausen’s work was banished (at least temporarily) from the canon of avant-garde electronic music when he described the attack on las torres gemelas as akin to a work of art. If Jacques Derrida had described it as an act of deconstruction (turning technological modernity literally in on itself), or Jean Baudrillard had announced that the event was so thick with mediation it had not truly taken place, something similar would have happened to them (and still may). This is because, as Don DeLillo so eloquently put it in implicit reaction to the plaintive cry “Why do they hate us?”: “it is the power of American culture to penetrate every wall, home, life and mind”—whether via military action or cultural iconography. All these positions are correct, however grisly and annoying they may be. What GK Chesterton called the “flints and tiles” of nineteenth-century European urban existence were rent asunder like so many victims of high-altitude US bombing raids. As a First-World disaster, it became knowable as the first-ever US “ground zero” such precisely through the high premium immediately set on the lives of Manhattan residents and the rarefied discussion of how to commemorate the high-altitude towers. When, a few weeks later, an American Airlines plane crashed on take-off from Queens, that borough was left open to all comers. Manhattan was locked down, flown over by “friendly” bombers. In stark contrast to the open if desperate faces on the street of 11 September, people went about their business with heads bowed even lower than is customary. Contradictory deconstructions and valuations of Manhattan lives mean that September 11 will live in infamy and hyper-knowability. The vengeful United States government and population continue on their way. Local residents must ponder insurance claims, real-estate values, children’s terrors, and their own roles in something beyond their ken. New York had been forced beyond being the center of the financial world. It had become a military target, a place that was receiving as well as dispatching the slings and arrows of global fortune. Citation reference for this article MLA Style Deer, Patrick and Miller, Toby. "A Day That Will Live In … ?" M/C: A Journal of Media and Culture 5.1 (2002). [your date of access] < http://www.media-culture.org.au/0203/adaythat.php>. Chicago Style Deer, Patrick and Miller, Toby, "A Day That Will Live In … ?" M/C: A Journal of Media and Culture 5, no. 1 (2002), < http://www.media-culture.org.au/0203/adaythat.php> ([your date of access]). APA Style Deer, Patrick and Miller, Toby. (2002) A Day That Will Live In … ?. M/C: A Journal of Media and Culture 5(1). < http://www.media-culture.org.au/0203/adaythat.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
24

Leotta, Alfio. "Navigating Movie (M)apps: Film Locations, Tourism and Digital Mapping Tools." M/C Journal 19, no. 3 (June 22, 2016). http://dx.doi.org/10.5204/mcj.1084.

Full text
Abstract:
The digital revolution has been characterized by the overlapping of different media technologies and platforms which reshaped both traditional forms of audiovisual consumption and older conceptions of place and space. John Agnew claims that, traditionally, the notion of place has been associated with two different meanings: ‘the first is a geometric conception of place as a mere part of space and the second is a phenomenological understanding of a place as a distinctive coming together in space’ (317). Both of the dominant meanings have been challenged by the idea that the world itself is increasingly “placeless” as space-spanning connections and flows of information, things, and people undermine the rootedness of a wide range of processes anywhere in particular (Friedman). On the one hand, by obliterating physical distance, new technologies such as the Internet and the cell phone are making places obsolete, on the other hand, the proliferation of media representations favoured by these technologies are making places more relevant than ever. These increasing mediatisation processes, in fact, generate what Urry and Larsen call ‘imaginative geographies’, namely the conflation of representational spaces and physical spaces that substitute and enhance each other in contingent ways (116). The smartphone as a new hybrid media platform that combines different technological features such as digital screens, complex software applications, cameras, tools for online communication and GPS devices, has played a crucial role in the construction of new notions of place. This article examines a specific type of phone applications: mobile, digital mapping tools that allow users to identify film-locations. In doing so it will assess how new media platforms can potentially reconfigure notions of both media consumption, and (physical and imagined) mobility. Furthermore, the analysis of digital movie maps and their mediation of film locations will shed light on the way in which contemporary leisure activities reshape the cultural, social and geographic meaning of place. Digital, Mobile Movie MapsDigital movie maps can be defined as software applications, conceived for smart phones or other mobile devices, which enable users to identify the geographical position of film locations. These applications rely on geotagging which is the process of adding geospatial metadata (usually latitudinal and longitudinal coordinates) to texts or images. From this point of view these phone apps belong to a broader category of media that Tristan Thielmann calls geomedia: converging applications of interactive, digital, mapping tools and mobile and networked media technologies. According to Hjorth, recent studies on mobile media practices show a trend toward “re-enacting the importance of place and home as both a geo-imaginary and socio-cultural precept” (Hjorth 371). In 2008 Google announced that Google Maps and Google Earth will become the basic platform for any information search. Similarly, in 2010 Flickr started georeferencing their complete image stock (Thielmann 8). Based on these current developments media scholars such as Thielmann claim that geomedia will emerge in the future as one of the most pervasive forms of digital technology (8).In my research I identified 44 phone geomedia apps that offered content variously related to film locations. In every case the main functionality of the apps consisted in matching geographic data concerning the locations with visual and written information about the corresponding film production. ‘Scene Seekers’, the first app able to match the title of a film with the GPS map of its locations, was released in 2009. Gradually, subsequent film-location apps incorporated a number of other functions including:Trivia and background information about films and locationsSubmission forms which allow users to share information about their favourite film locatiosLocation photosLinks to film downloadFilm-themed itinerariesAudio guidesOnline discussion groupsCamera/video function which allow users to take photos of the locations and share them on social mediaFilm stills and film clipsAfter identifying the movie map apps, I focused on the examination of the secondary functions they offered and categorized the applications based on both their main purpose and their main target users (as explicitly described in the app store). Four different categories of smart phone applications emerged. Apps conceived for:Business (for location scouts and producers)Entertainment (for trivia and quiz buffs)Education (for students and film history lovers)Travel (for tourists)‘Screen New South Wales Film Location Scout’, an app designed for location scouts requiring location contact information across the state of New South Wales, is an example of the first category. The app provides lists, maps and images of locations used in films shot in the region as well as contact details for local government offices. Most of these types of apps are available for free download and are commissioned by local authorities in the hope of attracting major film productions, which in turn might bring social and economic benefits to the region.A small number of the apps examined target movie fans and quiz buffs. ‘James Bond and Friends’, for example, focuses on real life locations where spy/thriller movies have been shot in London. Interactive maps and photos of the locations show their geographical position. The app also offers a wealth of trivia on spy/thriller movies and tests users’ knowledge of James Bond films with quizzes about the locations. While some of these apps provide information on how to reach particular film locations, the emphasis is on trivia and quizzes rather than travel itself.Some of the apps are explicitly conceived for educational purposes and target film students, film scholars and users interested in the history of film more broadly. The Italian Ministry for Cultural Affairs, for example, developed a number of smartphone apps designed to promote knowledge about Italian Cinema. Each application focuses on one Italian city, and was designed for users wishing to acquire more information about the movie industry in that urban area. The ‘Cinema Roma’ app, for example, contains a selection of geo-referenced film sets from a number of famous films shot in Rome. The film spots are presented via a rich collection of historical images and texts from the Italian National Photographic Archive.Finally, the majority of the apps analysed (around 60%) explicitly targets tourists. One of the most popular film-tourist applications is the ‘British Film Locations’ app with over 100,000 downloads since its launch in 2011. ‘British Film Locations’ was commissioned by VisitBritain, the British tourism agency. Visit Britain has attempted to capitalize on tourists’ enthusiasm around film blockbusters since the early 2000s as their research indicated that 40% of potential visitors would be very likely to visit the place they had seen in films or on TV (VisitBritain). British Film Locations enables users to discover and photograph the most iconic British film locations in cinematic history. Film tourists can search by film title, each film is accompanied by a detailed synopsis and list of locations so users can plan an entire British film tour. The app also allows users to take photos of the location and automatically share them on social networks such as Facebook or Twitter.Movie Maps and Film-TourismAs already mentioned, the majority of the film-location phone apps are designed for travel purposes and include functionalities that cater for the needs of the so called ‘post-tourists’. Maxine Feifer employed this term to describe the new type of tourist arising out of the shift from mass to post-Fordist consumption. The post-tourist crosses physical and virtual boundaries and shifts between experiences of everyday life, either through the actual or the simulated mobility allowed by the omnipresence of signs and electronic images in the contemporary age (Leotta). According to Campbell the post-tourist constructs his or her own tourist experience and destination, combining these into a package of overlapping and disjunctive elements: the imagined (dreams and screen cultures), the real (actual travels and guides) and the virtual (myths and internet) (203). More recently a number of scholars (Guttentag, Huang et al., Neuhofer et al.) have engaged with the application and implications of virtual reality on the planning, management and marketing of post-tourist experiences. Film-induced tourism is an expression of post-tourism. Since the mid-1990s a growing number of scholars (Riley and Van Doren, Tooke and Baker, Hudson and Ritchie, Leotta) have engaged with the study of this phenomenon, which Sue Beeton defined as “visitation to sites where movies and TV programmes have been filmed as well as to tours to production studios, including film-related theme parks” (11). Tourists’ fascination with film sets and locations is a perfect example of Baudrillard’s theory of hyperreality. Such places are simulacra which embody the blurred boundaries between reality and representation in a world in which unmediated access to reality is impossible (Baudrillard).Some scholars have focused on the role of mediated discourse in preparing both the site and the traveller for the process of tourist consumption (Friedberg, Crouch et al.). In particular, John Urry highlights the interdependence between tourism and the media with the concept of the ‘tourist gaze’. Urry argues that the gaze dominates tourism, which is primarily concerned with the commodification of images and visual consumption. According to Urry, movies and television play a crucial role in shaping the tourist gaze as the tourist compares what is gazed at with the familiar image of the object of the gaze. The tourist tries to reproduce his or her own expectations, which have been “constructed and sustained through a variety of non-tourist practices, such as film, TV, literature, records, and videos” (Urry 3). The inclusion of the camera functionality in digital movie maps such as ‘British Film Locations’ fulfils the need to actually reproduce the film images that the tourist has seen at home.Film and MapsThe convergence between film and (virtual) travel is also apparent in the prominent role that cartography plays in movies. Films often allude to maps in their opening sequences to situate their stories in time and space. In turn, the presence of detailed geographical descriptions of space at the narrative level often contributes to establish a stronger connection between film and viewers (Conley). Tom Conley notes that a number of British novels and their cinematic adaptations including Tolkien’s The Lord of the Rings (LOTR) and Stevenson’s Treasure Island belong to the so called ‘cartographic fiction’ genre. In these stories, maps are deployed to undo the narrative thread and inspire alternative itineraries to the extent of legitimising an interactive relation between text and reader or viewer (Conley 225).The popularity of LOTR locations as film-tourist destinations within New Zealand may be, in part, explained by the prominence of maps as both aesthetic and narrative devices (Leotta). The authenticity of the LOTR geography (both the novel and the film trilogy) is reinforced, in fact, by the reoccurring presence of the map. Tolkien designed very detailed maps of Middle Earth that were usually published in the first pages of the books. These maps play a crucial role in the immersion into the imaginary geography of Middle Earth, which represents one of the most important pleasures of reading LOTR (Simmons). The map also features extensively in the cinematic versions of both LOTR and The Hobbit. The Fellowship of the Ring opens with several shots of a map of Middle Earth, anticipating the narrative of displacement that characterizes LOTR. Throughout the trilogy the physical dimensions of the protagonists’ journey are emphasized by the foregrounding of the landscape as a map.The prominence of maps and geographical exploration as a narrative trope in ‘cartographic fiction’ such as LOTR may be responsible for activating the ‘tourist imagination’ of film viewers (Crouch et al.). The ‘tourist imagination’ is a construct that explains the sense of global mobility engendered by the daily consumption of the media, as well as actual travel. As Crouch, Jackson and Thompson put it, “the activity of tourism itself makes sense only as an imaginative process which involves a certain comprehension of the world and enthuses a distinctive emotional engagement with it” (Crouch et al. 1).The use of movie maps, the quest for film locations in real life may reproduce some of the cognitive and emotional pleasures that were activated while watching the movie, particularly if maps, travel and geographic exploration are prominent narrative elements. Several scholars (Couldry, Hills, Beeton) consider film-induced tourism as a contemporary form of pilgrimage and movie maps are becoming an inextricable part of this media ritual. Hudson and Ritchie note that maps produced by local stakeholders to promote the locations of films such as Sideways and LOTR proved to be extremely popular among tourists (391-392). In their study about the impact of paper movie maps on tourist behaviour in the UK, O’Connor and Pratt found that movie maps are an essential component in the marketing mix of a film location. For example, the map of Pride and Prejudice Country developed by the Derbyshire and Lincolnshire tourist boards significantly helped converting potential visitors into tourists as almost two in five visitors stated it ‘definitely’ turned a possible visit into a certainty (O’Connor and Pratt).Media Consumption and PlaceDigital movie maps have the potential to further reconfigure traditional understandings of media consumption and place. According to Nana Verhoeff digital mapping tools encourage a performative cartographic practice in the sense that the dynamic map emerges and changes during the users’ journey. The various functionalities of digital movie maps favour the hybridization between film reception and space navigation as by clicking on the movie map the user could potentially watch a clip of the film, read about both the film and the location, produce his/her own images and comments of the location and share it with other fans online.Furthermore, digital movie maps facilitate and enhance what Nick Couldry, drawing upon Claude Levi Strauss, calls “parcelling out”: the marking out as significant of differences in ritual space (83). According to Couldry, media pilgrimages, the visitation of TV or film locations are rituals that are based from the outset on an act of comparison between the cinematic depiction of place and its physical counterpart. Digital movie maps have the potential to facilitate this comparison by immediately retrieving images of the location as portrayed in the film. Media locations are rife with the marking of differences between the media world and the real locations as according to Couldry some film tourists seek precisely these differences (83).The development of smart phone movie maps, may also contribute to redefine the notion of audiovisual consumption. According to Nanna Verhoeff, mobile screens of navigation fundamentally revise the spatial coordinates of previously dominant, fixed and distancing cinematic screens. One of the main differences between mobile digital screens and larger, cinematic screens is that rather than being surfaces of projection or transmission, they are interfaces of software applications that combine different technological properties of the hybrid screen device: a camera, an interface for online communication, a GPS device (Verhoeff). Because of these characteristics of hybridity and intimate closeness, mobile screens involve practices of mobile and haptic engagement that turn the classical screen as distanced window on the world, into an interactive, hybrid navigation device that repositions the viewer as central within the media world (Verhoeff).In their discussion of the relocation of cinema into the iPhone, Francesco Casetti and Sara Sampietro reached similar conclusions as they define the iPhone as both a visual device and an interactive interface that mobilizes the eye as well as the hand (Casetti and Sampietro 23). The iPhone constructs an ‘existential bubble’ in which the spectator can find refuge while remaining exposed to the surrounding environment. When the surrounding environment is the real life film location, the consumption or re-consumption of the film text allowed by the digital movie map is informed by multi-sensorial and cognitive stimuli that are drastically different from traditional viewing experiences.The increasing popularity of digital movie maps is a phenomenon that could be read in conjunction with the emergence of innovative locative media such as the Google glasses and other applications of Augmented Reality (A.R.). Current smart phones available in the market are already capable to support A.R. applications and it appears likely that this will become a standard feature of movie apps within the next few years (Sakr). Augmented reality refers to the use of data overlays on real-time camera view of a location which make possible to show virtual objects within their spatial context. The camera eye on the device registers physical objects on location, and transmits these images in real time on the screen. On-screen this image is combined with different layers of data: still image, text and moving image.In a film-tourism application of augmented reality tourists would be able to point their phone camera at the location. As the camera identifies the location images from the film will overlay the image of the ‘real location’. The user, therefore, will be able to simultaneously see and walk in both the real location and the virtual film set. The notion of A.R. is related to the haptic aspect of engagement which in turn brings together the doing, the seeing and the feeling (Verhoeff). In film theory the idea of the haptic has come to stand for an engaged look that involves, and is aware of, the body – primarily that of the viewer (Marx, Sobchack). The future convergence between cinematic and mobile technologies is likely to redefine both perspectives on haptic perception of cinema and theories of film spectatorship.The application of A.R. to digital, mobile maps of film-locations will, in part, fulfill the prophecies of René Barjavel. In 1944, before Bazin’s seminal essay on the myth of total cinema, French critic Barjavel, asserted in his book Le Cinema Total that the technological evolution of the cinematic apparatus will eventually result in the total enveloppement (envelopment or immersion) of the film-viewer. This enveloppement will be characterised by the multi-sensorial experience and the full interactivity of the spectator within the movie itself. More recently, Thielmann has claimed that geomedia such as movie maps constitute a first step toward the vision that one day it might be possible to establish 3-D spaces as a medial interface (Thielmann).Film-Tourism, Augmented Reality and digital movie maps will produce a complex immersive and inter-textual media system which is at odds with Walter Benjamin’s famous thesis on the loss of ‘aura’ in the age of mechanical reproduction (Benjamin), as one of the pleasures of film-tourism is precisely the interaction with the auratic place, the actual film location or movie set. According to Nick Couldry, film tourists are interested in the aura of the place and filming itself. The notion of aura is associated here with both the material history of the location and the authentic experience of it (104).Film locations, as mediated by digital movie maps, are places in which people have a complex sensorial, emotional, cognitive and imaginative involvement. The intricate process of remediation of the film-locations can be understood as a symptom of what Lash and Urry have called the ‘re-subjectification of space’ in which ‘locality’ is re-weighted with a more subjective and affective charge of place (56). According to Lash and Urry the aesthetic-expressive dimensions of the experience of place have become as important as the cognitive ones. By providing new layers of cultural meaning and alternative modes of affective engagement, digital movie maps will contribute to redefine both the notion of tourist destination and the construction of place identity. These processes can potentially be highly problematic as within this context the identity and meanings of place are shaped and controlled by the capital forces that finance and distribute the digital movie maps. Future critical investigations of digital cartography will need to address the way in which issues of power and control are deeply enmeshed within new tourist practices. ReferencesAgnew, John, “Space and Place.” Handbook of Geographical Knowledge. Eds. John Agnew and David Livingstone. London: Sage, 2011. 316-330Barjavel, René. Cinema Total. Paris: Denoel, 1944.Baudrillard, Jean. Simulations. Trans. Paul Foss et al. New York: Semiotext(e), 1983.Beeton, Sue. Film Induced Tourism. Buffalo: Channel View Publications, 2005.Benjamin, Walter. Illuminations. Translated by Harry Zohn. Glasgow: Fontana, 1979.Campbell, Nick. “Producing America.” The Media and the Tourist Imagination. Eds. David Crouch et al. London: Routledge, 2005. 198-214.Casetti, Francesco, and Sara Sampietro. “With Eyes, with Hands: The Relocation of Cinema into the iPhone.” Moving Data: The iPhone and the Future of Media. Eds. Pelle Snickars and Patrick Vonderau. New York: Columbia University Press, 2013. 19-30.Claudell, Tom, and David Mizell. “Augmented Reality: An Application of Heads-Up Display Technology to Manual Manufacturing Processes.” Proceedings of 1992 IEEE Hawaii International Conference, 1992.Conley, Tom. “The Lord of the Rings and The Fellowship of the Map.” From Hobbits to Hollywood. Ed. Ernst Mathijs and Matthew Pomerance. Amsterdam: Rodopi, 2006. 215–30.Couldry, Nick. “The View from inside the 'Simulacrum‘: Visitors’ Tales from the Set of Coronation Street.” Leisure Studies 17.2 (1998): 94-107.Couldry, Nick. Media Rituals: A Critical Approach. London: Routledge, 2003. 75-94.Crouch, David, Rhona Jackson, and Felix Thompson. The Media and the Tourist Imagination. London: Routledge, 2005Feifer, Maxine. Going Places: The Ways of the Tourist from Imperial Rome to the Present Day. London: Macmillan, 1985.Friedberg, Anne. Window Shopping: Cinema and the Postmodern. Berkeley: University of California Press, 1993.Friedman, Thomas. The World Is Flat: A Brief History of the Twentieth Century. New York: Farrar, Strauss and Giroux, 2005.Guttentag, Daniel. “Virtual Reality: Applications and Implications for Tourism.” Tourism Management 31.5 (2010): 637-651.Hill, Matt. Fan Cultures. London: Routledge. 2002.Huang, Yu Chih, et al. “Exploring User Acceptance of 3D Virtual Worlds in Tourism Marketing”. Tourism Management 36 (2013): 490-501.Hjorth, Larissa. “The Game of Being Mobile. One Media History of Gaming and Mobile Technologies in Asia-Pacific.” Convergence 13.4 (2007): 369–381.Hudson, Simon, and Brent Ritchie. “Film Tourism and Destination Marketing: The Case of Captain Corelli’s Mandolin.” Journal of Vacation Marketing 12.3 (2006): 256–268.Jackson, Rhona. “Converging Cultures; Converging Gazes; Contextualizing Perspectives.” The Media and the Tourist Imagination. Eds. David Crouch et al. London: Routledge, 2005. 183-197.Kim, Hyounggon, and Sarah Richardson. “Motion Pictures Impacts on Destination Images.” Annals of Tourism Research 25.2 (2005): 216–327.Lash, Scott, and John Urry. Economies of Signs and Space. London: Sage, 1994.Leotta, Alfio. Touring the Screen: Tourism and New Zealand Film Geographies. London: Intellect Books, 2011.Marks, Laura. “Haptic Visuality: Touching with the Eyes.” Framework the Finnish Art Review 2 (2004): 78-82.Neuhofer, Barbara, Dimitrios Buhalis, and Adele Ladkin. ”A Typology of Technology-Enhanced Tourism Experiences.” International Journal of Tourism Research 16.4 (2014): 340-350.O’Connor, Noelle, and Stephen Pratt. Using Movie Maps to Leverage a Tourism Destination – Pride and Prejudice (2005). Paper presented at the 4th Tourism & Hospitality Research Conference – Reflection: Irish Tourism & Hospitality. Tralee Institute of Technology Conference, Tralee, Co. Kerry, Ireland. 2008.Riley, Roger, and Carlton Van Doren. “Films as Tourism Promotion: A “Pull” Factor in a “Push” Location.” Tourism Management 13.3 (1992): 267-274.Sakr, Sharif. “Augmented Reality App Concept Conjures Movie Scenes Shot in Your Location”. Engadget 2011. 1 Feb. 2016 <http://www.engadget.com/2011/06/22/augmented-reality-app-concept-conjures-movie-scenes-shot-in-your/>.Simmons, Laurence. “The Lord of the Rings: The Fellowship of the Ring.” The Cinema of Australia and New Zealand. Eds. Geoff Mayer and Keith Beattie. London: Wallflower, 2007. 223–32.Sobchack, Vivian. Carnal Thoughts: Embodiment and Moving Image Culture. Berkeley: University of California. 2004.Thielmann, Tristan. “Locative Media and Mediated Localities: An Introduction to Media Geography.” Aether 5a Special Issue on Locative Media (Spring 2010): 1-17.Tooke, Nichola, and Michael Baker. “Seeing Is Believing: The Effect of Film on Visitor Numbers to Screened Location.” Tourism Management 17.2 (1996): 87-94.Tzanelli, Rodanthi. The Cinematic Tourist. New York: Routledge, 2007.Urry, John. The Tourist Gaze. London: Sage, 2002.Urry, John, and Jonas Larsen. The Tourist Gaze 3.0. London: Sage, 2011.Verhoeff, Nana. Mobile Screens: The Visual Regime of Navigation. Amsterdam University Press, 2012.VisitBritain. “Films Continue to Draw Tourists to Britain.” 2010. 20 Oct. 2012 <http://www.visitbritain.org/mediaroom/archive/2011/filmtourism.aspx>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography