Academic literature on the topic 'Electronic tool subject authority file'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic tool subject authority file.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic tool subject authority file"

1

Bennett, Rick, Edward T. O'Neill, and Kerre Kammerer. "assignFAST: An Autosuggest based tool for FAST Subject Assignment." Information Technology and Libraries 33, no. 1 (2014): 34. http://dx.doi.org/10.6017/ital.v33i1.5378.

Full text
Abstract:
<p><em>Subject assignment is really a three-phase task. The first phase is intellectual—reviewing the material and determining its topic. The second phase is more mechanical, identifying the correct subject heading(s). The final phase is retyping or cutting and pasting the heading(s) into the cataloging interface along with any diacritics, and potentially correcting formatting and subfield coding. If authority control is available in the interface, some of these tasks may be automated or partially automated.</em></p> <p><em>A cataloger with a reasonable knowledge of </em><a href="http://www.oclc.org/research/activities/fast.html"><em>FAST</em></a><a href="#_edn1">[i]</a>,<a href="#_edn2">[ii]</a><em> or even </em><a href="http://www.loc.gov/catdir/cpso/lcc.html"><em>LCSH</em></a><a href="#_edn3">[iii]</a><em> can quickly get to the proper heading, but usually needs to confirm the final details—was it plural? Am I thinking of an alternate form? Is it inverted? Etc. This often requires consulting the full authority file interface. assignFAST is a Web service that consolidates the entire second phase of the manual process of subject assignment for FAST subjects into a single step based on autosuggest technology.</em></p> <div><br /> <hr size="1" /><div><p><a href="#_ednref1">[i]</a> Chan, Lois Mai and Edward T. O'Neill. <em>FAST: Faceted Application of Subject Terminology, Prnciples and Applications</em> Libraries Unlimited, Santa Barbara, 2010.<br /> <a href="http://lu.com/showbook.cfm?isbn=9781591587224">http://lu.com/showbook.cfm?isbn=9781591587224</a>.</p></div> <div><p><a href="#_ednref2">[ii]</a> OCLC Research Activities associated with FAST are summarized at <a href="http://www.oclc.org/research/activities/fast/default.htm">http://www.oclc.org/research/activities/fast/</a></p></div> <div><p><a href="#_ednref3">[iii]</a> Chan, Lois M. <em>Library of Congress Subject Headings : Principles and Application: Principles and Application</em>. Westport, Conn: Libraries Unlimited, 2005.</p></div></div>
APA, Harvard, Vancouver, ISO, and other styles
2

Martin, Thomas, Megan Ranney, James Dorroh, Nicholas Asselin, and Indra Sarkar. "Health Information Exchange in Emergency Medical Services." Applied Clinical Informatics 09, no. 04 (2018): 884–91. http://dx.doi.org/10.1055/s-0038-1676041.

Full text
Abstract:
Background The Office of the National Coordinator for Health Information Technology has outlined the benefits of health information exchange in emergency medical services (EMSs) according to the SAFR model—search, alert, file, and reconcile—developed in collaboration with the California Emergency Medical Services Authority. Objective This scoping review aims to identify and characterize progress toward the adoption of prehospital health information exchange, as reported in the peer-reviewed literature. Methods A structured review of literature in MEDLINE-indexed journals was conducted using the “Electronic Health Records” topic-specific query, the “Emergency Medical Services” Medical Subject Headings descriptor, and a prehospital identifier. Results Our initial search yielded 368 nonduplicative, English-language articles; 131 articles underwent full-text review and 11 were selected for analysis according to pre-established inclusion criteria. Original research was thematically grouped according to the SAFR model. Conclusion Within isolated systems, there has been limited progress toward the adoption of prehospital health information exchange. Interoperability, accurate match algorithms, security, and wireless connectivity have been identified as potential barriers to adoption. Additional research is required to evaluate the role of health information exchange within EMSs.
APA, Harvard, Vancouver, ISO, and other styles
3

Alferov, V. P., I. G. Drovnikova, L. A. Obukhova, and E. A. Rogozin. "VERBAL MODEL OF MANAGEMENT OF A VULNERABLE PROCESS OF DEDICATING THE ACCESS OF USERS TO THE SOFTWARE OF THE ELECTRONIC DOCUMENT SYSTEM." Herald of Dagestan State Technical University. Technical Sciences 46, no. 2 (2019): 37–49. http://dx.doi.org/10.21822/2073-6185-2019-46-2-37-49.

Full text
Abstract:
Objectives Traditional methods for solving the problem of protecting the information resource of electronic document management systems based on protective basic functions (identification, authentication and verification of users, etc.) of available tools and information security subsystems have a significant drawback - inefficiency when an attacker masters the password of regular users. In order to eliminate it, it is necessary to develop new methods related to managing the weakly vulnerable process of delimiting user access not only to confidential information, but also to the software of the electronic document management system.Method One way to solve this problem is to use the modified “soft administration” method, which consists in automatically generating lists of allowed source files in the authorization matrix by reducing the lists and comparing file integrity functions with a reference list for an existing software package. This allows you to automate the process of developing access control rules and provide management of the weakly vulnerable process of access control to software tools of the electronic document management system.Result A verbal model is developed for automated control of a weakly vulnerable process of differentiating access to software tools of an electronic document management system, and a system of performance indicators for the functioning of a promising subsystem for protecting confidential information characterizing it as a control object is proposed.Conclusion The presented verbal model provides for the possibility of distributed control, in which the security administrator directly controls the specified process using a remote software tool. The formation (change) of the authority establishment matrix for managing a weakly vulnerable process of access control using a promising subsystem for protecting confidential information and the development of a system of indicators to comprehensively evaluate the effectiveness of its functioning is one of the most important tasks of protecting information from unauthorized access, guaranteeing the implementation of a security policy throughout the entire operation period secure electronic document management system.
APA, Harvard, Vancouver, ISO, and other styles
4

Swithenby, Stephen J. "Screen-based assessment." New Directions in the Teaching of Physical Sciences, no. 2 (December 1, 2006): 23–28. http://dx.doi.org/10.29311/ndtps.v0i2.429.

Full text
Abstract:
Inexorably and across several fronts, screen-based assessment is becoming a major part of the experience of university students, particularly but not exclusively in the sciences. This movement reflects the emphasis the Qualifications and Curriculum Authority (QCA) is giving to the development of screen-based assessment at secondary level, where the universal availability of an -assessment option in high stakes exams is an adopted goal.The drivers for this change are economic, pedagogic and opportunistic. Rapid technological progress is facilitating the wider availability of computer based tasks that reflect authentically the learning outcomes of science courses. There is growing experience in the design of such tasks, with increasing commercial involvement, particularly in the USA. An examination of theories of assessment demonstrates that there are sound pedagogic reasons to pursue these developments.The main focus of this review will be assessment for which a computer acts as a means of delivery, grading and feedback. I will outline the capabilities of contemporary systems, illustrate some good practice, and identify areas where the use of the technology is moving forward rapidly. There are exciting developments in the grading of free format responses, in diagram or text form, which are now emerging on a pilot basis. Of particular interest is the assessment of higher order cognitive and subject skills. Alsoimportant is the potential for item banks that can allow the sharing of the costs of authorship. Several of these issues are reviewed more fully in Conole and Warbuton.Finally, I will comment briefly on assessment that is facilitated by computers without the computer acting as a grading tool. At a mundane level, this might involve the electronic submission of traditional assignments. Of more interest are electronically mediated peer assessment, the generation of e-portfolios, the grading of screen based experimentation and the evaluation of the student’s performance in contributing to computer based group activities, e.g. Wikis, electronic conferences, etc.
APA, Harvard, Vancouver, ISO, and other styles
5

Стойка, Маріана. "CRYPTOCURRENCY – DEFİNİTİON, FUNCTİONS, ADVANTAGES AND RİSKS." Підприємництво і торгівля, no. 30 (July 1, 2021): 5–10. http://dx.doi.org/10.36477/2522-1256-2021-30-01.

Full text
Abstract:
The emergence of “virtual currencies” is extremely recent, with a history of only 13 years. Being an ultra-new economic tool, it arouses interest and effervescent reactions, especially in terms of definition, but also about the cumulative effects it has begun to produce in the economic world. The subject also becomes controversial due to the fact that, being an economic instrument of absolute novelty, it is reflected in the legislation of very few countries in the world. One of the definitions determines as virtual currency – the digital representation of the value that is not issued or guaranteed by a central bank or a public authority, which is not necessarily linked to a legal currency and which does not have the legal status of the currency, but which can be accepted by natural or legal persons as a means of exchange and which may be transferred, stored and traded by electronic means. The evaluation of cryptocurrency publications has shown that most of them are related to attempts to establish legislative agricultural work for the operation of virtual currencies. The functions of the cryptocurrencies that we have defined are: the exchange and payment function, the hoarding function, the investment function and the attraction of funds necessary for the activity. Thus, we established that virtual currencies, as well as fiduciary ones, have the role of: means of payment, means of accumulation, means of capitalization and investments. Likewise, through this research we managed to highlight the main features and peculiarities of cryptocurrencies. Among the basic characteristics of cryptocurrencies we highlight: the high degree of security, maximum speed of transactions, full freedom from financial organizations, irreversibility of operations, full anonymity of transactions, open source, they can be ”mined”. Another approach was to determine the advantages and disadvantages and risks of using cryptocurrencies. The main advantages of using cryptocurrencies are related to its functions an caracteristics, such as: it represents a real alternative to classic banking services, market freedom, privacy of transactions, high speed of trnasactions, alternative payment methos, increasing the customer base etc. On the other hand there are some disatvantages. They are related mosly with the following risks: legal uncertainty, market volatility, low degree of acceptance, unsecured crypto wallets, risks related to use for illegal or criminal purposes, money laundering risks. Taking in consideration the global trend of the digitization of the society, the share and importance of fiat currencies will tend to decrease for the benefit of virtual currencies. Cryptocurrencies are becoming a real alternative to physical currencies, but its main disadvantage is that the public autorities are missing controlling it yet. Even so, in the nearest future the money could become digital figures.
APA, Harvard, Vancouver, ISO, and other styles
6

Patdu, Ivy D. "Recommendations for Social Media Use in Hospitals and Health Care Facilities." Philippine Journal of Otolaryngology-Head and Neck Surgery 31, no. 1 (2016): 6–9. http://dx.doi.org/10.32412/pjohns.v31i1.299.

Full text
Abstract:
Social Media is the new avenue for creating connections and sharing of information. Through social media, one can reach a global community. In recent years, we have seen how social media has changed the way we do things. Social Media has been extensively utilized for health education and promotion, proving itself to be an invaluable tool for public health, professional networking and patient care benefit.
 
 The challenge has been to use the power afforded by social media responsibly, and to define the line between use and abuse. While there may be laws, implementation proves to be a challenge in the digital age. Therefore, self-regulation and institutional policy remain a critical part. It is therefore urged that hospitals and health care facilities adopt their own social media use policy appropriate for the institution.
 
 Below are proposed rules that could guide institutions in developing their own policy for social media use:
 
 Sec. 1. Declaration of Policy. The health facility recognizes that the exercise of the freedom of expression comes with a responsibility and a duty to respect the rights of others. The health facility likewise acknowledges the fundamental right to privacy of every individual. This policy shall provide rules for responsible social media use.
 
 Sec. 2. Definition. For purposes of this policy, the following definitions shall be used:
 
 Social Media refers to electronic communication, websites or applications through which users connect, interact or share information or other content with other individuals, collectively part of an online community. This includes Facebook, Twitter, Google+, Instagram, LinkedIn, Pinterest, Blogs, Social Networking sites.
 Health facility shall refer to the hospital or other health care facilities, including training and educational institutions.
 Individual shall refer to physicians, employees, other health facility staff, residents, or students to which this policy would apply
 
 
 Sec. 3. Applicability. This policy shall apply to all physicians, health professionals, employees and other health facility staff, including students or residents in training, practicing their profession, working, or fulfilling academic and clinical requirements within the health facility, whether temporary or permanent.
 
 Sec. 4. General Principles. Social media use shall be guided by the following principles:
 
 In using social media, an individual should always be mindful of his or her duties to the patient and community, his profession and his colleagues.
 The individual should always be conscious of his or her online image and how it impacts his or her profession, or the institution where he or she is professionally employed, affiliated or otherwise connected.
 Responsible social media use also requires the individual to ensure that in his or her social media activity, there is no law violated, including copyright, libel and cybercrime laws. At all times, the individual shall respect the right of privacy of others.
 Use of social media requires a personal commitment to uphold the ethical standards required of those providing health services, upon which patient trust is built.
 
 
 Sec. 5. Social Media for Health Education or Promotion
 a.The individual using social media for health education or promotion must be well-informed of the matter subject of the social media post, comment or other activity. The individual shall refrain from any activity which spreads or tends to spread misinformation.
 
 An article written by an individual and posted in social media must be evidence-based and disclose connections with pharmaceutical or health product companies or other sources of possible conflict of interest.
 
 c.Social media shall not be used to dispense specific medical diagnosis, advice, treatment or projection but shall consist of general opinions only. Use of social media should include statements that a person should not rely on the advice given online, and that medical concerns are best addressed in the appropriate setting.
 
 The individual shall be careful in posting or publishing his or her opinion and shall ensure that such opinion will not propagate misinformation or constitute a misrepresentation. The individual shall not make any misrepresentations in his or her social media activity relating to content, his or her employment or credentials, and any other information that may be misconstrued or taken out of context.
 
 
 
 Sec. 6. Professionalism in Social Media Use
 
 Individuals are discouraged from using a single account for both professional and private use. Be mindful that an electronic mail address used professionally may readily be linked to a social media site used privately.
 The individual shall conduct himself or herself in social media or online the same way that he would in the public, mindful of acting in a manner befitting his profession, or that would inspire trust in the service he or she provides, especially if the individual has not separated his or her professional and personal accounts in social media.
 The individual shall likewise refrain from using the name, logo or other symbol of an institution without prior authority in his or her social media activity. An individual shall not identify himself or herself as a representative of an institution in social media without being authorized to do so.
 Individuals shall not accept former or current patients as friends or contacts in their personal accounts, unless there is justification to do so, such as a pre-existing relationship or when unavoidable for patient care. In case of online interaction with patients, this should be limited to matters related to the patient’s treatment and management, and which could be properly disclosed.
 Informal and personal information concerning a patient, colleague or the health facility shall not be posted, shared or otherwise used in social media.
 Social media shall not be used to establish inappropriate relationships with patients or colleagues, and shall not be used to obtain information that would negatively impact on the provision of services and professional management of the patient.
 An individual shall refrain from posting, sharing or otherwise using photos or videos taken within the health facility, which would give the impression of unprofessionalism, show parts of the health facility where there is an expectation of privacy, or those which includes colleagues, employees, other health facility staff, or patients without their express consent. The consent requirement shall apply even if the other individuals included are not readily identifiable.
 
 
 Sec. 7. Responsible Social Media Activity
 
 In using social media, the individual shall respect the dignity, personality, privacy and peace of mind of another.
 The individual shall not post, share or otherwise use social media with the intent of damaging the reputation of any other individual or institution, especially if the subject is identified or identifiable.
 
 c.Derogatory comments about patients, colleagues, employers and institutions or companies should be avoided. An individual may “like” a defamatory post but he or she must use caution when sharing, retweeting or contributing anything that might be construed as a new defamatory statement. A post, comment or other social media activity is considered defamatory if:
 1) The activity imputes a discreditable act or condition to another;
 
 2) The activity is viewed or seen by any other person;
 3) The person or institution defamed is identified or readily identifiable;
 4) There is malice or intent to damage the reputation of another.
 
 He or she shall be careful of sharing posts or other contents that are unverified, particularly if it discredits another person or institution, or imputes the commission of a crime or violation of law even before trial and judgment, and violates the privacy of another. Fair and true reporting on matters of public concern shall be allowed provided that the content was obtained lawfully and with due respect for the right of privacy.
 An individual shall not use copyrighted materials other than for fair use where there is proper citation of source and author. Use of copyrighted material for purpose of criticism, comment, news, reporting, teaching, scholarship, research, and similar purposes is compatible with fair use.
 An individual is prohibited from:
 
 1) Social media activities that defame, harass, stalk, or bully another person or institution.
 2) The use or access of personal social media accounts of others without authority.
 3) Posting, sharing or otherwise using any information intended to be private or obtained through access to electronic data messages or documents.
 4) Posting, sharing or otherwise using recorded conversations between doctors, individuals or patients, when such recording, whether audio or video, was obtained without consent of all the parties to the conversation
 
 Individuals should use conservative privacy settings in their social media account used professionally. The individual should also practice due diligence in keeping their social media accounts safe such as through regular password change and logging out after social media use.
 
 
 Sec. 8. Health Information Privacy
 
 The individual shall respect the right to privacy of others and shall not collect, use, access or disclose information, pictures and other personal or sensitive information without obtaining consent from the individual concerned. Physicians, health facility employees and other health staff shall have the duty of protecting patient confidentiality in their social media activity.
 Personal health information, including photos or videos of patients, shall not be posted, shared or otherwise used in social media without consent of patient. Consent shall be obtained after explaining to the patient the purpose of the intended collection, use, access and disclosure. Consent for use of personal health information shall be written or evidenced by electronic means.
 An individual shall not post, share or otherwise use any information which could be used to identify patients without their consent, including patient’s location, room numbers, and photographs or videos of patients or their body parts, including code names referring to patients.
 The individual shall not post, share or otherwise use any other information acquired in attending to a patient in a professional capacity, and which would blacken the reputation of the patient. The duty of maintaining patient confidentiality remains even after patient’s death.
 An individual shall not post, share or otherwise use any information relating to the identity, status and personal details of persons with HIV, those who have undergone drug rehabilitation, and victims of domestic violence, rape and child abuse.
 
 
 Sec. 9. Compliance and Reporting.
 
 An individual shall strive to develop, support and maintain a privacy culture in the health facility. He or she shall abide by the social media use policy of the institution.
 An individual who becomes aware of unprofessional behavior, misinformation or privacy violations in social media shall report the matter to the hospital’s privacy officer or the proper office or authority within the facility.
 Health facilities shall in so far as practicable monitor the social media activity of all physicians, employees and other health facility staff, including students or residents in training, practicing their profession, working, or fulfilling academic and clinical requirements within the health facility, whether temporary or permanent.
 
 
 Sec. 10. Penalty. A violation of this policy may constitute a violation of the code of ethics of physicians and other professions, and other applicable laws.
 
 Health Professionals, employees and other Health Facility Staff. Any person found violating this policy will be considered in violation of health facility rules and regulations, and shall be subjected to health facility administrative proceedings, which after notice and hearing, and depending on the severity of the violation, could result to termination of service or withdrawal of privileges. A lighter penalty may likewise be imposed. In determining the severity of the violation, the following factors may be considered: previous violation, if any, the nature of the violation, and the extent of injury or damage.
 
 The penalty imposed by the health facility shall be without prejudice to the filing of a complaint before the Civil Service Commission, the Professional Regulations Commission, the Office of the Prosecutor or Ombudsman, or proper courts.
 
 Students. In case of students, they shall be reported to the college wherein they are enrolled and shall be subjected to disciplinary proceedings, which could result to expulsion, depending on the severity of the violation, and in accordance with the applicable University and respective College rules. A lighter penalty may likewise be imposed. The disciplinary proceedings shall be without prejudice to other applicable legal remedies.
 
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Vicky. "Seal Culture Still Remains in Electronic Commerce." M/C Journal 8, no. 2 (2005). http://dx.doi.org/10.5204/mcj.2335.

Full text
Abstract:

 
 
 History of Seal and Printing Cultures Implications of the four important Chinese inventions, the compass, gun powder, papermaking, and printing, have far-reaching significance for human civilisation. The Chinese seal is intimately related to printing. Seals have the practical function of duplicating impressions of words or patterns. This process shares a very similar concept to printing on a small scale. Printing originated from the function of seals for making duplicated impressions, and for this reason Wang believes that seals constitute the prototype of printing. Seals in Traditional Commere Seals in certain Asian countries, such as Taiwan and Japan, play a vital role similar to that played by signatures in Western society. Particularly, the Chinese seal has been an integral part of Chinese heritage and culture. Wong states that seals usually symbolise tokens of promise in Chinese society. Ancient seals in their various forms have played a major role in information systems, in terms of authority, authentication, identification, certified proof, and authenticity, and have also been used for tamper-proofing, impression duplication, and branding purposes. To illustrate, clay sealing has been applied to folded documents to detect when sealed documents have been exposed or tampered with. Interestingly, one of the features of digital signature technology is also designed to achieve this purpose. Wong records that when the commodity economy began to develop and business transactions became more frequent, seals were used to prove that particular goods had been certified by customs. Moreover, when the goods were subject to tax by the government, seals were applied to the goods to prove the levy paid. Seals continue to be used in Chinese society as personal identification and in business transactions, official and legal documents, administrative warrants and charters. Paper-based Contract Signing with Seal Certificates In Taiwan and Japan, in certain circumstances, when two parties wish to formalise a contract, the seals of the two parties must be affixed to the contract. As Figure 1 illustrates, seal certificates are required to be attached to the signed and sealed contract for authentication as well as the statement of intent of a voluntary agreement in Taiwan. Figure 1. Example of a contract attached with the seal certificates A person can have more than one seal; however, only one seal at a time is allowed to be registered with a jurisdictional registration authority. The purpose of seal registration is to prevent seal forgery and to prove the identity of the seal owner. Namely, the seal registration process aims to associate the identity of the seal owner with the seal owner’s nominated seal, through attestation by a jurisdictional registration authority. Upon confirmation of the seal registration, the registration authority issues a seal certificate with both the seals of the registration authority and the registration authority executive. Digital Signatures for Electronic Commerce Handwritten signatures and tangible ink seals are highly impractical within the electronic commerce environment. However, the shift towards electronic commerce by both the public and private sector is an inevitable trend. ‘Trust’ in electronic commerce is developed through the use of ‘digital signatures’ in conjunction with a trustworthy environment. In principle, digital signatures are designed to simulate the functions of handwritten signatures and traditional seals for the purposes of authentication, data integrity, and non-repudiation within the electronic commerce environment. Various forms of Public Key Infrastructure (PKI) are employed to ensure the reliability of using digital signatures so as to ensure the integrity of the message. PKI does not, however, contribute in any way to the signatory’s ability to verify and approve the content of an electronic document prior to the affixation of his/her digital signature. Shortcomings of Digital Signature Scheme One of the primary problems with existing digital signatures is that a digital signature does not ’feel’ like, or resemble, a traditional seal or signature to the human observer; it does not have a recognisably individual or aesthetic quality. Historically, the authenticity of documents has always been verified by visual examination of the document. Often in legal proceedings, examination of both the affixed signature or seal as an integral part of the document will occur, as well as the detection of any possible modifications to the document. Yet, the current digital signature regime overlooks the importance of this sense of visualisation. Currently, digital signatures, such as the OpenPGP (Pretty Good Privacy) digital signature, are appended to an electronic document as a long, incomprehensible string of arbitrary characters. As shown in Figure 2, this offers no sense of identity or ownership by simple visual inspection. Figure 2. Example of a PGP signature To add to this confusion for the user, a digital signature will be different each time the user applies it. The usual digital signature is formed as an amalgam of the contents of the digital document and the user’s private key, meaning that a digital signature attached to an electronic document will vary with each document. This again represents a departure from the traditional use of the term ‘signature’. A digital signature application generates its output by firstly applying a hash algorithm over the contents of the digital document and then encrypting that hash output value using the user’s private cryptographic key of the normal dual-key pair provided by the Public Key cryptography systems. Therefore, digital signatures are not like traditional signatures which an individual can identify as being uniquely theirs, or as a recognisable identity attributable to an individual entity. New Visualised Digital Signature Scheme Liu et al. have developed the visualised digital signature scheme to enhance existing digital signature schemes through visualisation; namely, this scheme makes the intangible digital signature virtually tangible. Liu et al.’s work employs the visualised digital signature scheme with the aim of developing visualised signing and verification in electronic situations. The visualised digital signature scheme is sustained by the digital certificate containing both the certificate issuer’s and potential signer’s seal images. This thereby facilitates verification of a signer’s seal by reference to the appropriate certificate. The mechanism of ensuring the integrity and authenticity of seal images is to incorporate the signer’s seal image into an X.509 v3 certificate, as outlined in RFC 3280. Thus, visualised digital signature applications will be able to accept the visualised digital certificate for use. The data structure format of the visualised digital certificate is detailed in Liu. The visualised signing and verification processes are intended to simulate traditional signing techniques incorporating visualisation. When the signer is signing the document, the user interface of the electronic contracting application should allow the signer to insert the seal from the seal image file location into the document. After the seal image object is embedded in the document, the document is referred to as a ’visually sealed’ document. The sealed document is ready to be submitted to the digital signing process, to be transmitted with the signer’s digital certificate to the other party for verification. The visualised signature verification process is analogous to the traditional, sealed paper-based document with the seal certificate attached for verification. In history, documents have always required visual stimulus for verification, which highlights the need for visual stimulus evidence to rapidly facilitate verification. The user interface of the electronic contracting application should display the visually sealed document together with the associated digital certificate for human verification. The verifier immediately perceives the claimed signer’s seal on the document, particularly when the signer’s seal is recognisable to the verifier. This would be the case particularity where regular business transactions between parties occur. Significantly, having both the issuing CA’s and the signer’s seal images on the digital certificate instils confidence that the signer’s public key is attested to by the CA, as shown in Figure 3. This is unlike the current digital signature verification process which presents long, meaningless strings to the verifier. Figure 3. Example of a new digital certificate presentation Conclusions Seals have a long history accompanying the civilisation of mankind. In particular, certain business documents and government communities within seal-culture societies still require the imprints of the participating entities. Inevitably, the use of modern technologies will replace traditional seals and handwritten signatures. Many involved in implementing electronic government services and electronic commerce care little about the absence of imprints and/or signatures; however, there is concern that the population may experience difficulty in adapting to a new electronic commerce system where traditional practices have become obsolete. The purpose of the visualised digital signature scheme is to explore enhancements to existing digital signature schemes through the integration of culturally relevant features. This article highlights the experience of the use and development of Chinese seals, particularly in visualised seals used in a recognition process. Importantly, seals in their various forms have played a major role in information systems for thousands of years. In the advent of the electronic commerce, seal cultures still remain in the digital signing environment. References Housley, R., et al. RFC 3280 Internet X.509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile. The Internet Engineering Task Force, 2002. Liu, V., et al. “Visually Sealed and Digital Signed Documents.” 27th Australasian Computer Science Conference. Dunedin, NZ: Australian Computer Science Communications, 2004. Liu, V. “Visually Sealed and Digital Signed Electronic Documents: Building on Asian Tradition.” Dissertation. Queensland University of Technology, 2004. Wang, P.Y. The Art of Seal Carving. Taipei: Council for Cultural Planning and Development, Executive Yuan, 1991. Wong, Y.C., and H.W. Yau. The Art of Chinese Seals through the Ages. Hong Kong: The Zhejiang Provincial Museum and the Art Museum of the Chinese University Hong Kong, 2000. 
 
 
 
 Citation reference for this article
 
 MLA Style
 Liu, Vicky. "Seal Culture Still Remains in Electronic Commerce." M/C Journal 8.2 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0506/03-liu.php>. APA Style
 Liu, V. (Jun. 2005) "Seal Culture Still Remains in Electronic Commerce," M/C Journal, 8(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0506/03-liu.php>. 
APA, Harvard, Vancouver, ISO, and other styles
8

Dushianthan, Ahilanandan, Howard Clark, Jens Madsen, et al. "Nebulised surfactant for the treatment of severe COVID-19 in adults (COV-Surf): A structured summary of a study protocol for a randomized controlled trial." Trials 21, no. 1 (2020). http://dx.doi.org/10.1186/s13063-020-04944-5.

Full text
Abstract:
Abstract Objectives SARS-Cov-2 virus preferentially binds to the Angiotensin Converting Enzyme 2 (ACE2) on alveolar epithelial type II cells, initiating an inflammatory response and tissue damage which may impair surfactant synthesis contributing to alveolar collapse, worsening hypoxia and leading to respiratory failure. The objective of this study is to evaluate the feasibility, safety and efficacy of nebulised surfactant in COVID-19 adult patients requiring mechanical ventilation for respiratory failure. Trial design This study is a dose-escalating randomized open-label clinical trial of 20 COVID-19 patients. Participants This study is conducted in two centres: University Hospital Southampton and University College London Hospitals. Eligible participants are aged ≥18, hospitalised with COVID-19 (confirmed by PCR), who require endotracheal intubation and are enrolled within 24 hours of mechanical ventilation. For patients unable to consent, assent is obtained from a personal legal representative (PerLR) or professional legal representative (ProfLR) prior to enrolment. The following are exclusion criteria: imminent expected death within 24 hours; specific contraindications to surfactant administration (e.g. known allergy, pneumothorax, pulmonary hemorrhage); known or suspected pregnancy; stage 4 chronic kidney disease or requiring dialysis (i.e., eGFR < 30); liver failure (Child-Pugh Class C); anticipated transfer to another hospital, which is not a study site, within 72 hours; current or recent (within 1 month) participation in another study that, in the opinion of the investigator, would prevent enrollment for safety reasons; and declined consent or assent. Intervention and comparator Intervention: The study is based on an investigational drug/device combination product. The surfactant product is Bovactant (Alveofact®), a natural animal derived (bovine) lung surfactant formulated as a lyophilized powder in 108 mg vials and reconstituted to 45 mg/mL in buffer supplied in a prefilled syringe. It is isolated by lung lavage and, by weight, is a mixture of: phospholipid (75% phosphatidylcholine, 13% phosphatidylglycerol, 3% phosphatidylethanolamine, 1% phosphatidylinositol and 1% sphingomyelin), 5% cholesterol, 1% lipid-soluble surfactant-associated proteins (SP-B and SP-C), very low levels of free fatty acid, lyso-phosphatidylcholine, water and 0.3% calcium. The Drug Delivery Device is the AeroFact-COVID™ nebulizer, an investigational device based on the Aerogen® Solo vibrating mesh nebulizer. The timing and escalation dosing plans for the surfactant are as follows. Cohort 1: Three patients will receive 10 vials (1080 mg) each of surfactant at dosing times of 0 hours, 8 hours and 24 hours. 2 controls with no placebo intervention. Cohort 2: Three patients will receive 10 vials (1080 mg) of surfactant at dosing times of 0 hours and 8 hours, and 30 vials (3240 mg) at a dosing time of 24 hours. 2 controls with no placebo intervention. Cohort 3: Three patients will receive 10 vials (1080 mg) of surfactant at a dosing time of 0 hours, and 30 vials (3240 mg) at dosing times of 8 hours and 24 hours. 2 controls with no placebo intervention. Cohort 4: Three patients will receive 30 (3240 mg) vials each of surfactant at dosing times of 0 hours, 8 hours and 24 hours. 2 controls. 2 controls with no placebo intervention. The trial steering committee, advised by the data monitoring committee, will review trial progression and dose escalation/maintenance/reduction after each cohort is completed (48-hour primary outcome timepoint reached) based on available feasibility, adverse event, safety and efficacy data. The trial will not be discontinued on the basis of lack of efficacy. The trial may be stopped early on the basis of safety or feasibility concerns. Comparator: No placebo intervention. All participants will receive usual standard of care in accordance with the local policies for mechanically ventilated patients and all other treatments will be left to the discretion of the attending physician. Main outcomes The co-primary outcome is the improvement in oxygenation (PaO2/FiO2 ratio) and pulmonary ventilation (Ventilation Index (VI), where VI = [RR x (PIP − PEEP) × PaCO2]/1000) at 48 hours after study initiation. The secondary outcomes include frequency and severity of adverse events (AEs), Adverse Device Effects (ADEs), Serious Adverse Events (SAEs) and Serious Adverse Device Events (SADEs), change in pulmonary compliance, change in positive end-expiratory pressure (PEEP) requirement of ventilatory support at 24 and 48 hours after study initiation, clinical improvement defined by time to one improvement point on the ordinal scale described in the WHO master protocol (2020) recorded while hospitalised, days of mechanical ventilation, mechanical ventilator free days (VFD) at day 21, length of intensive care unit stay, number of days hospitalised and mortality at day 28. Exploratory end points will include quantification of SARS-CoV-2 viral load from tracheal aspirates using PCR, surfactant dynamics (synthesis and turnover) and function (surface tension reduction) from deep tracheal aspirate samples (DTAS), surfactant phospholipid concentrations in plasma and DTAS, inflammatory markers (cellular and cytokine) in plasma and DTAS, and blood oxidative stress markers. Randomisation After informed assent, patients fulfilling inclusion criteria will be randomised to 3:2 for the treatment and control arms using an internet-based block randomization service (ALEA tool for clinical trials, FormsVision BV) in combination with electronic data collection. Randomisation will be done by the recruiting centre with a unique subject identifier specific to that centre. Blinding (masking) This is an open-labelled unblinded study. Numbers to be randomised (sample size) The total sample size is 20 COVID-19 mechanically ventilated patients (12 intervention; 8 control). Trial Status Current protocol version is V2 dated 5th of June 2020. The recruitment is currently ongoing and started on the 14th of October 2020. The anticipated study completion date is November 2021. Trial registration ClinicalTrials.gov: NCT04362059 (Registered 24 April 2020), EUDAMED number: CIV-GB-20-06-033328, EudraCT number: 2020-001886-35 (Registered 11 May 2020) Full protocol The full protocol is attached as an additional file, accessible from the Trials website (Additional file 1). In the interest in expediting dissemination of this material, the familiar formatting has been eliminated; this Letter serves as a summary of the key elements of the full protocol. The study protocol has been reported in accordance with the Standard Protocol Items: Recommendations for Clinical Interventional Trials (SPIRIT) guidelines (Additional file 2).
APA, Harvard, Vancouver, ISO, and other styles
9

Kennedy, Ümit. "Exploring YouTube as a Transformative Tool in the “The Power of MAKEUP!” Movement." M/C Journal 19, no. 4 (2016). http://dx.doi.org/10.5204/mcj.1127.

Full text
Abstract:
IntroductionSince its launch in 2005, YouTube has fast become one of the most popular video sharing sites, one of the largest sources of user generated content, and one of the most frequently visited sites globally (Burgess and Green). As YouTube’s popularity has increased, more and more people have taken up the site’s invitation to “Broadcast Yourself.” Vlogging (video blogging) on YouTube has increased in popularity, creating new genres and communities. Vlogging not only allows individuals to create their own mediated content for mass consumption—making it a site for participatory culture (Burgess and Green; Jenkins) and resembling contemporary forms of entertainment such as reality television—but it also allows individuals to engage in narrative and identity forming practices. Through filming their everyday lives, and presenting themselves on camera, YouTubers are engaging in a process of constructing and presenting their identity online. They often form communities around these identities and continue the practice in dialogue and collaboration with their communities of viewers on YouTube. Because of YouTube’s mass global reach, the ability to create one’s own mediated content and the ability to publicly play with and project different self representations becomes a powerful tool allowing YouTubers to publicly challenge social norms and encourage others to do the same. This paper will explore these features of YouTube using the recent “The Power of MAKEUP!” movement, started by NikkieTutorials, as an example. Through a virtual ethnography of the movement as developed by Christine Hine—following the people, dialogue, connections, and narratives that emerged from Nikkie’s original video—this paper will demonstrate that YouTube is not only a tool for self transformation, but has wider potential to transform norms in society. This is achieved mainly through mobilising communities that form around transformative practices, such as makeup transformations, on YouTube. Vlogging as an Identity Forming Practice Vlogging on YouTube is a contemporary form of autobiography in which individuals engage in a process of documenting their life on a daily or weekly basis and, in doing so, constructing their identity online. Although the aim of beauty vlogs is to teach new makeup techniques, demonstrate and review new products, or circulate beauty-related information, the videos include a large amount of self-disclosure. Beauty vloggers reveal intimate things about themselves and actively engage in the practice of self-representation while filming. Beauty vlogging is unique to other vlogging genres as it almost always involves an immediate transformation of the physical self in each video. The vloggers typically begin with their faces bare and “natural” and throughout the course of the video transform their faces into how they want to be seen, and ultimately, who they want to be that day, using makeup. Thus the process of self-representation is multi-dimensional as not only are they presenting the self, but they are also visually constructing the self on camera. The construction of identity that beauty vloggers engage in on YouTube can be likened to what Robert Ezra Park and later Erving Goffman refer to as the construction and performance of a mask. In his work Race and Culture, Park states that the original meaning of the word person is a mask (249). Goffman responds to this statement in his work The Presentation of Self in Everyday Life, saying the mask is “our truer self, the self we would like to be” (30). Beauty vloggers are engaging in the process of constructing their mask—their truer self and the self they would like to be—both through their performance on YouTube, and through the visual transformation that takes place on camera. Their performance on YouTube not only communicates a desired identity, but through their performance they realise this identity. The process of filming and the visual process of constructing or transforming the self on camera through makeup brings the subject into being. Scholarship in the fields of Life Writing and Digital Media including Autobiography, Automedia and Persona Studies has acknowledged and explored the ways narratives and identities—both online and offline—are constructed, created, shaped, chosen, and invented by the individual/author (Garner; Bridger; Eakin; Maguire; Poletti and Rak; Marshall; Smith and Watson). It is widely accepted that all representations of the self are constructed. Crucially, it is the process of documenting or communicating the self that is identity forming (Richardson; Bridger), as the process, including writing, filming, and posting, brings the subject or self into being (Neuman). The individual embodies their performance and realises the self through it. Park and Goffman argue that we all engage in this process of performing and realising the self through the roles we play in society. The significance of the beauty vlogger performance and transformation is the space in which it occurs and the community that it fosters. YouTube as a Transformative Tool and MirrorThe space in which beauty vloggers play with and transform the self on camera is significant as digital technologies such as YouTube invite exploration of the self. Networked digital media (Meikle and Young) invite multiplicity, heterogeneity, and fragmentation in/of identity performances (Bolter; Gergen; Turkle, "Parallel Lives"). These technologies create opportunities for defining and re-defining the self (Bolter 130), as they allow people to present a more multi-mediated self, using both audio-visual components and text (Papacharissi 643).YouTube, in particular, allows the individual to experiment with the self, and document an ongoing transformation, through film (Kavoori). Many scholars have described this ongoing process of identity construction online using the metaphor of “the mirror” (see Kavoori; Raun; and Procter as recent examples). In his research on trans gender vlogging on YouTube, Tobias Raun explores the theme of the mirror. He describes vlogging as a “transformative medium for working on, producing and exploring the self” (366). He argues the vlog acts as a mirror allowing the individual to try out and assume various identities (366). He writes, the mirroring function of the vlog “invites the YouTuber to assume the shape of a desired identity/representation, constantly assuming and evaluating oneself as an attractive image, trying out different ‘styles of the flesh’ (Butler 177), poses and appearances” (367). In reference to trans gender vlogging, Raun writes, “The vlog seems to serve an important function in the transitioning process, and is an important part of a process of self-invention, serving as a testing ground for experimentations with, and manifestations of (new) identities” (367). The mirror (vlog) gives the individual a place/space to construct and perform their mask (identity), and an opportunity to see the reflection and adjust the mask (identity) accordingly. An important feature of the vlog as a mirror is the fact that it is less like a conventional mirror and more like a window with a reflective surface. On YouTube the vlog always involves an audience, who not only watch the performance, but also respond to it. This is in keeping with Goffman’s assertion that there is always an audience involved in any performance of the self. On YouTube, Raun argues, “the need to represent oneself goes hand in hand with the need to connect and communicate” (Raun 369). Networked digital media such as YouTube are inherently social. They invite participation (Smith; Sauter)and community through community building functions such as the ability to like, subscribe, and comment. Michael Strangelove refers to YouTube as a social space, “as a domain of self-expression, community and public confession” (4). The audience and community are important in the process of identity construction and representation as they serve a crucial role in providing feedback and encouragement, legitimising the identity being presented. As Raun writes, the vlog is an opportunity “for seeing one’s own experiences and thoughts reflected in others” (366). Raun identifies that for the trans gender vloggers in his study, simply knowing there is an audience watching their vlogs is enough to affirm their identity. He writes the vlog can be both “an individual act of self validation and . . . a social act of recognition and encouragement” (368). However, in the case of beauty vlogging the audience do more than watch, they form communities embodying and projecting the performance in everyday life and thus collectively challenge social norms, as seen in the “The Power of MAKEUP!” movement. Exploring the “The Power of MAKEUP!” MovementOn 10 May 2015, Nikkie, a well-known beauty vlogger, uploaded a video to her YouTube channel NikkieTutorials titled “The Power of MAKEUP!” Nikkie’s video can be watched here. In her video Nikkie challenges “makeup shaming,” arguing that makeup is not only fun, but can “transform” you into who you want to be. Inspired by an episode of the reality television show RuPaul’s Drag Race, in which the competing drag queens transform half of their face into “glam” (drag), and leave the other half of their face bare (male), Nikkie demonstrates that anyone can use makeup as a transformative tool. In her video Nikkie mirrors the drag queen transformations, transforming half her face into “glam” and leaving the other half of her face bare, as shown in Figure 1. In only transforming half of her face, Nikkie emphasises the scope of the transformation, demonstrating just how much you can change your appearance using only makeup on your face. Nikkie’s video communicates that both a transformed “glam” image and an “unedited” image of the self are perfectly fine, “there are no rules” and neither representations of the self should bring you shame. Figure 1: thumbnail of Nikkie’s videoNikkie’s video started a movement and spread throughout the beauty community on YouTube as a challenge. Other famous beauty vloggers, and everyday makeup lovers, took on the challenge of creating YouTube videos or posting pictures on Instagram of their faces half bare and half transformed using makeup with the tag #thepowerofmakeupchallenge. Since its release in May 2015, Nikkie’s video has been watched over thirty million times, has been liked over five hundred and thirty thousand times, and has received over twenty three thousand comments, many of which echo Nikkie’s experience of “makeup shaming.” “The power of makeup” video went viral and was picked up not only by the online beauty community but also by mainstream media with articles by Huffington Post, Yahoo.com, Marie Claire, BuzzFeed, DailyLife, POPSUGAR, Enews, Urbanshowbiz, BoredPanda, and kickvick among others. On Instagram, thousands of everyday makeup lovers have recreated the transformation and uploaded their pictures of the finished result. Various hashtags have been created around this movement and can be searched on Instagram including #thepowerofmakeupchallenge, #powerofmakeupchallenge, #powerofmakeup. Nikkie’s Instagram page dedicated to the challenge can be seen here. “The power of makeup” video is a direct reaction against what Nikkie calls “makeup shaming”—the idea that makeup is bad, and the assumption that the leading motivation for using makeup is insecurity. In her video Nikkie also reacts to the idea that the made-up-girl is “not really you,” or worse is “fake.” In the introduction to her video Nikkie says,I’ve been noticing a lot lately that girls have been almost ashamed to say that they love makeup because nowadays when you say you love makeup you either do it because you want to look good for boys, you do it because you’re insecure, or you do it because you don’t love yourself. I feel like in a way lately it’s almost a crime to love doing your makeup. So after last weeks RuPaul’s Drag Race with the half drag half male, I was inspired to show you the power of makeup. I notice a lot that when I don’t wear makeup and I have my hair up in a bun and I meet people and I show them picture of my videos or, or whatever looks I have done, they look at me and straight up tell me “that is not you.” They tell me “that’s funny” because I don’t even look like that girl on the picture. So without any further ado I’m going to do half my face full on glam—I’m truly going to transform one side of my face—and the other side is going to be me, raw, unedited, nothing, me, just me. So let’s do it.In her introduction, Nikkie identifies a social attitude that many of her viewers can relate to, that the made-up face isn’t the “real you.” This idea reveals an interesting contradiction in social attitude. As this issue of Media/Culture highlights, the theme of transformation is increasingly popular in contemporary society. Renovation shows, weight loss shows, and “makeover” shows have increased in number and popularity around the world (Lewis). Tania Lewis attributes this to an international shift towards “the real” on television (447). Accompanying this turn towards “the real,” confession, intimacy, and authenticity are now demanded and consumed as entertainment (Goldthwaite; Dovey; King). Sites such as YouTube are arguably popular because they offer real stories, real lives, and have a core value of authenticity (Strangelove; Wesch; Young; Tolson). The power of makeup transformations are challenging because they juxtapose a transformation against the natural, on the self. By only transforming half their face, the beauty vloggers juxtapose the “makeover” (transformation) with “authenticity” (the natural). The power of makeup movement is therefore caught between two contemporary social values. However, the desire for authenticity, and the lack of acceptance that the transformed image is authentic seems to be the main criticism that the members of this movement receive. Beauty vloggers identify a strong social value that “natural” is “good” and any attempt to alter the natural is taboo. Even in the commercial world “natural beauty” is celebrated and features heavily in the marketing and advertising campaigns of popular beauty, cosmetic, and skincare brands. Consider Maybelline’s emphasis on “natural beauty” in their byline “Maybe she’s born with it. Maybe it’s Maybelline.” This is not the way the members of “the power of makeup” movement use and celebrate makeup. They use and celebrate makeup as a transformative and identity forming tool, and their use of makeup is most often criticised for not being natural. In her recreation of Nikkie’s video, Evelina Forsell says “people get upset when I’m not natural.” Like Nikkie, Evelina reveals she often receives the criticism that “the person with a full on face with makeup is not you.” Evelina’s video can be watched here.“The power of makeup” movement and its participants challenge this criticism that the made-up self is not the “real” self. Evelina directly responds to this criticism in her video, stating “when I have a full face of makeup . . . that’s still me, but a more . . . creative me, I guess.” The beauty vloggers in this movement use makeup and YouTube as extensions of the self, as tools for self-expression, self-realisation, and ongoing transformation. Beauty vloggers are demonstrating that makeup is a tool and extension of the self that allows them to explore and play with their self-representations. In the same way that technology enables the individual to extend and “reinvent him/herself online” (Papacharissi 645), so does makeup. And in the same way that technology becomes an extension of the self, or even a second self (Turkle, The Second Self; Vaast) so does makeup. Makeup is a tool and technique of the self. Vlogging is about storytelling (Kavoori), but it is also collective—it’s about telling collective stories (Raun 373) which can be seen in various vlogging genres. As Geert Lovink suggests, YouTube is one of the largest databases of global shared experience. YouTube’s global popularity can be attributed to Strangelove’s assertion that “there’s nothing more interesting to real people . . . than authentic stories told about other real people” (65). Individuals are drawn to Nikkie’s experience, seeing themselves reflected in her story. Famous beauty vloggers on YouTube, and everyday beauty lovers, find community in the collective experience of feeling shame for loving makeup and using makeup to transform and communicate their identity. Effectively, the movement forms communities of practice (Wenger) made up of hundreds of people brought together by the shared value and use of makeup as a transformative tool. The online spaces where these activities take place (mainly on YouTube and Instagram) form affinity spaces (Gee) where the community come together, share information, learn and develop their practice. Hundreds of YouTubers from all over the world took up Nikkie’s invitation to demonstrate the power of makeup by transforming themselves on camera. From well-established beauty vloggers with millions of viewers, to amateur beauty lovers with YouTube channels, many people felt moved by Nikkie’s example and embodied the message, adapting the transformation to suit their circumstances. The movement includes both men and women, children and adults. Some transformations are inspirational such as Shalom Blac’s in which she talks about accepting the scars that are all over her face, but also demonstrates how makeup can make them disappear. Shalom has almost five million views on her “POWER OF MAKEUP” video, and has been labelled “inspirational” by the media. Shalom Blac’s video can be watched here and the media article labelling her as “inspirational” can be viewed here. Others, such as PatrickStarrr, send a powerful message that “It’s okay to be yourself.” Unlike a traditional interpretation of that statement, Patrick is communicating that it is okay to be the self that you construct, on any given day. Patrick also has over four million views on his video which can be watched here. During her transformation, Nikkie points out each feature of her face that she does not like and demonstrates how she can change it using makeup. Nikkie’s video is primarily a tutorial, educating viewers on different makeup techniques that can manipulate the appearance of their natural features into how they would like them to appear. These techniques are also reproduced and embodied through the various contributors to the movement. Thus the tutorial is an educational tool enabling others to use makeup for their own self representations (see Paul A. Soukup for an overview of YouTube as an educational tool). A feminist perspective may deconstruct the empowering, educational intentions of Nikkie’s video, insisting that conceptions of beauty are a social construct (Travis, Meginnis, and Bardari) and should not be re-enforced by encouraging women (and men) to use make-up to feel good. However, this sort of discourse does not appear in the movement, and this paper seeks to analyse the movement as its contributors frame and present it. Rather, “the power of makeup” movement falls within a postfeminist framework celebrating choice, femininity, independence, and the individual construction of modern identity (McRobbie; Butler; Beck, Giddens and Lash). Postfeminism embraces postmodern notions of identity in which individuals are “called up to invent their own structures” (McRobbie 260). Through institutions such as education young women have “become more independent and able,” and “‘dis-embedded’ from communities where gender roles were fixed” (McRobbie 260). Angela McRobbie attributes this to the work of scholars such as Anthony Giddens and Ulrich Beck and their emphasis on individualisation and reflexive modernisation. These scholars take a Foucauldian approach to identity construction in the modern age, where the individual must choose their own structures “internally and individualistically” (260), engaging in an ongoing process of self-monitoring and self-improvement, and resulting in the current self-help culture (McRobbie). In addition to being an educational and constructive tool, Nikkie’s video is also an exercise in self-branding and self-promotion(see Marwick; Duffy and Hund; and van Nuenen for scholarship on self-branding). Through her ongoing presence on YouTube, presenting this video in conjunction with her other tutorials, Nikkie is establishing herself as a beauty vlogger/guru. Nikkie lists all of the products that she uses in her transformation below her video with links to where people can buy them. She also lists her social media accounts, ways that people can connect with her, and other videos that people might be interested in watching. There are also prompts to subscribe, both during her video and in the description bar below her video. Nikkie’s transformation is both an ongoing endeavour to create her image and public persona as a beauty vlogger, and a physical transformation on camera. There is also a third transformation that takes place because her vlog is in the public sphere and consequently mobilises a movement. The transformation is of the way people talk about and eventually perceive makeup. Nikkie’s video aims to end makeup shaming and promote makeup as an empowering tool. With each recreation of her video, with each Instagram photo featuring the transformation, and with each mainstream media article featuring the movement, #thepowerofmakeup movement community are transforming the image of the made-up girl—transforming the association of makeup with presenting an inauthentic identity—in society. ConclusionThe “The Power of MAKEUP!” movement, started by NikkieTutorials, demonstrates one way in which people are using YouTube as a transformative tool, and mirror, to document, construct, and present their identity online, using makeup. Through their online transformation the members of the movement not only engage in a process of constructing and presenting their identity, but they form communities who share a love of makeup and its transformative potential. By embodying Nikkie’s original message to rid makeup shaming and transform the self into a desired identity, the movement re-enforces the “made-up” image of the self as real and authentic, and challenges conceptions that the “made-up” image is “fake” and inauthentic. Ultimately, this case study explores YouTube as a site that allows individuals to play with, construct, and present their identity. YouTube is a tool with which, and a space in which, people can transform themselves, and in doing so create communities which can work together to publicly challenge social norms.References Beck, Ulrich, Anthony Giddens, and Scott Lash. Reflexive Modernization: Politics, Tradition and Aesthetics in the Modern Social Order. Cambridge, England: Polity Press in association with Blackwell Publishers, 1994. Bolter, Jay David. "Virtual Reality and the Redefinition of Self." Communication and Cyberspace: Social Interaction in an Electronic Environment. Eds. Ronald L. Jacobson, Lance Strate, and Stephanie B. Gibson. 2nd ed. Creskill, NJ: Hampton Press, 2002. 123–37. Bridger, Barbara. "Writing across the Borders of the Self." European Journal of Women's Studies 16.4 (2009): 337–52. Burgess, Jean, and Joshua Green. Youtube: Online Video and Participatory Culture. Cambridge: Polity, 2009. Butler, Judith. Gender Trouble: Feminism and the Subversion of Identity. Ed. MyiLibrary. New York: Routledge, 2006. Dovey, Jon. Freakshow: First Person Media and Factual Television. Ed. ebrary, Inc. London: Pluto Press, 2000. Duffy, Brooke Erin, and Emily Hund. “‘Having It All’ on Social Media: Entrepreneurial Femininity and Self-Branding among Fashion Bloggers." 1.2 (2015).Eakin, Paul John. "Living Autobiographically." Biography 28.1 (2005): 1.Garner, Helen. "I [Helen Garner Explores the New and Different Persona a Writer Must Adopt in Each Successive Work.]." Meanjin (Melbourne) 61.1 (2002): 40–43. Gee, James Paul. "Semiotic Social Spaces and Affinity Spaces." Beyond Communities of Practice. Eds. David Barton and Karin Tusting. Cambridge: Cambridge UP, 2005. 214–32. Gergen, Kenneth. The Saturated Self: Dilemmas of Identity in Contemporary Life. Basic Books, 1991. Giddens, Anthony. Modernity and Self-Identity: Self and Society in the Late Modern Age. Cambridge, England: Polity Press, 1991. Goffman, Erving. The Presentation of Self in Everyday Life. Garden City, NY: Doubleday, 1959. Goldthwaite, Melissa A. "Confessionals." College English (2003): 55–73.Hine, Christine. Ethnography for the Internet: Embedded, Embodied and Everyday. London: Bloomsbury, 2015. ———. Virtual Ethnography. Ed. Sage Research Methods, Online. London: SAGE, 2000. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. Updated and with a new afterword. New York: New York UP, 2008. Kavoori, Anandam P. Reading Youtube: The Critical Viewers Guide. New York: Peter Lang, 2011. King, Barry. "Stardom, Celebrity and the Parra-Confession." Social Semiotics 18.2 (2008): 115–32.Lewis, Tania. "Changing Rooms, Biggest Losers and Backyard Blitzes: A History of Makeover Television in the United Kingdom, United States and Australia." Journal of Media & Cultural Studies 22.4 (2008): 447–58.Lovink, Geert. "The Art of Watching Databases: Introduction to the Video Vortex Reader." Video Vortex Reader: Responses to Youtube. Eds. G. Lovink and S. Niederer. Amsterdam: Institute of Network Cultures, 2008. 9–12.Maguire, Emma. "Home, About, Shop, Contact: Constructing an Authorial Persona via the Author Website. " M/C Journal 17.3 (2014).Marshall, P. David. "Personifying Agency: The Public–Persona–Place–Issue Continuum." Celebrity Studies 4.3 (2013): 369–71.Marwick, Alice Emily. Status Update: Celebrity, Publicity, and Branding in the Social Media Age. New Haven: Yale UP, 2013.McRobbie, Angela. "Post‐Feminism and Popular Culture." Feminist Media Studies 4.3 (2004): 255–64.Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. Basingstoke: Palgrave Macmillan, 2012.Neuman, Shirley. "'Autobiography'." Essays on Life Writing: From Genre to Critical Practice. Ed. Marlene Kadar. Toronto: U of Toronto P, 1992. 213–30.Papacharissi, Z. "The Presentation of Self in Virtual Life: Characteristics of Personal Home Pages." Journal of Mass Communication Quarterly 79.3 (2002): 643–60. Park, Robert E. Race and Culture. New York: Free Press, 1950.Poletti, Anna, and Julie Rak. Identity Technologies: Constructing the Self Online. Madison, Wisconsin: U of Wisconsin P, 2014.Procter, Lesley. "A Mirror without a Tain: Personae, Avatars, and Selves in a Multi-User Virtual Environment." M/C Journal 17.3 (2014).Raun, Tobias. "Video Blogging as a Vehicle of Transformation: Exploring the Intersection between Trans Identity and Information Technology." International Journal of Cultural Studies 18.3 (2015): 365–78.Richardson, Laurel. "Getting Personal: Writing-Stories." International Journal of Qualitative Studies in Education 14.1 (2001): 33–38.Sauter, Theresa. "'What's on Your Mind?' Writing on Facebook as a Tool for Self-Formation." New Media & Society 16.5 (2014): 823–39.Smith, Michael J. "E-Merging Strategies of Identity: The Rhetorical Construction of Self in Personal Web Sites." Ohio University, 1998.Smith, Sidonie, and Julia Watson. Reading Autobiography: A Guide for Interpreting Life Narratives. 2nd ed. Minneapolis: U of Minnesota P, 2010.Soukup, Paul A. "Looking at, with, and through Youtube[TM]." Communication Research Trends 33.3 (2014): 3.Strangelove, Michael. Watching Youtube: Extraordinary Videos by Ordinary People. Toronto: U of Toronto P, 2010.Tolson, Andrew. "A New Authenticity? Communicative Practices on Youtube." Critical Discourse Studies 7.4 (2010): 277–89.Travis, Cheryl Brown, Kayce L. Meginnis, and Kristin M. Bardari. "Beauty, Sexuality, and Identity: The Social Control of Women." Sexuality, Society, and Feminism. Eds. Cheryl Brown Travis and Jacquelyn W. White. Psychology of Women; 4. Washington, DC: American Psychological Association, 2000. 237–72.Turkle, Sherry. "Parallel Lives: Working on Identity in Virtual Space." Constructing the Self in a Mediated World: Inquiries in Social Construction. Ed. Debra Grodin and Thomas R. Lindlof. Thousand Oaks, CA: Sage 1996.———. The Second Self: Computers and the Human Spirit. London: Granada, 1984.Vaast, Emmanuelle. "Playing with Masks: Fragmentation and Continuity in the Presentation of Self in an Occupational Online Forum." Information Technology & People 20.4 (2007): 334–51.Van Nuenen, Tom. "Here I Am: Authenticity and Self-Branding on Travel Blogs." Tourist Studies (2015).Wenger, Etienne. Communities of Practice : Learning, Meaning, and Identity. Cambridge: Cambridge UP, 1998.Wesch, Michael. "An Anthropological Introduction to Youtube." 2008. <http://mediatedcultures.net/youtube/an-anthropological-introduction-to-youtube-presented-at-the-library-of-congress/>.Young, Jeffrey R. "An Anthropologist Explores the Culture of Video Blogging. (Michael L. Wesch)." The Chronicle of Higher Education 53.36 (2007).
APA, Harvard, Vancouver, ISO, and other styles
10

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:

 
 
 On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. 
 
 
 
 Citation reference for this article
 
 MLA Style
 Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style
 Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>. 
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic tool subject authority file"

1

Sandner, Margit. "NSW online – das elektronische Tool zur Liste der fachlichen Nachschlagewerke zu den Normdateien (GKD, PND, SWD)." Universitätsbibliothek Chemnitz, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-82210.

Full text
Abstract:
Die „Liste der fachlichen Nachschlagewerke zu den Normdateien“ stellt mit ihren derzeit mehr als 1.800 Einträgen ein verbindliches Arbeitsinstrument für die tägliche Praxis in der kooperativen Normdatenpflege des deutschsprachigen Raumes, speziell für die Terminologiearbeit in der bibliothekarischen Sacherschließung, dar. In jedem Normdatensatz der Schlagwortnormdatei (SWD) werden für den Nachweis und die Begründung der Ansetzungs- und Verweisungsformen eines Deskriptors im Feld „Quelle“ Referenzwerke aus der so genannten Prioritätenliste (Rangfolge der Nachschlagewerke), darüber hinaus aus der gesamten NSW-Liste, festgehalten und normiert abgekürzt. Diese Liste erscheint – von der Deutschen Nationalbibliothek (DNB) regelmäßig aktualisiert – jährlich in gedruckter Form mit einem Änderungsdienst (Änderungen, Neuauflagen; Neuaufnahmen) und steht seit einigen Jahren auch elektronisch abrufbar bereit. Dennoch ist sie „in die Jahre“ gekommen. Eine verbesserte Form der NSW-Liste war daher ein langjähriges Desiderat. In dem Vortrag wird über die konzipierten Funktionalitäten, die datentechnische Realisierung, die praktische Verwendung, den aktuellen Entwicklungsstand und die potenzielle Weiterentwicklung des neuen NSW-Tools berichtet. Die Normdateiarbeit ist komplex und anspruchsvoll. Durch die praxisorientierte Aufbereitung in diesem Tool wird die Einhaltung der für alle Neuansetzungen verbindlichen Rangfolge ganz entscheidend erleichtert, was von Beginn an die Qualität jedes Normdatensatzes erhöht. Den größten Zeitgewinn in der täglichen Praxis bringt der sofortige Zugriff auf verlinkte Volltexte. - Angesichts des zunehmenden multilateralen Datentausches bei gleichzeitiger dramatischer Verknappung personeller Ressourcen trotz eines erheblichen Anstiegs des inhaltlich zu erschließenden Literaturaufkommens wird dies im Workflow des vor kurzem eingeführten Online-Redaktionsverfahrens (ONR) für Normdaten der wohl nachhaltigste Effekt von „NSW online“ sein und auch in der künftigen Gemeinsamen Normdatei (GND) bleiben.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Electronic tool subject authority file"

1

Art and Architecture Thesaurus, Second Edition, with the Authority Reference Tool, Version 2.1: Combination print & electronic package for single user: ... ART 2.1; Quick Reference Card for ART. 2nd ed. Oxford University Press, USA, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kosmin, Leslie, and Catherine Roberts. Company Meetings and Resolutions. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198832744.001.0001.

Full text
Abstract:
This new edition is the only work solely dedicated to the law of company meetings of solvent public and private companies that are registered and incorporated under the Companies Act 2006 and its predecessors. As before, the new edition is written by an author team of great authority who have specialized in company law throughout their careers. The third edition addresses the use of technology in company meetings, and in particular, considers whether it is lawful for a company registered under the Companies Act 2006 to hold a meeting of shareholders by electronic means only. The practical, as well as the legal issues are considered with regard to this issue. The changes brought in by the UK Corporate Governance Code 2018, with regard to the role of the Chair and the board at meetings of listed companies, is covered along with other developments relating to the duties and activities of the Chair such as in Re Dee Valley Group plc 2017. Other important new case law is also covered such as Sharp v Blank 2015 concerning the duty of directors to provide sufficient information to shareholders to enable them to make informed decisions. Amendments made by the Regulatory Reform Act 2013 to the Companies Act 2006 regarding approval by shareholders of director remuneration policy are duly considered. The Rt. Hon Lord Justice David Richards has written a foreword to the third edition, This book is the leading authority on the law of company meetings and resolutions and all practitioners advising on this subject will find this an invaluable tool for desk research as well as a handy companion at company meetings.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography