To see the other types of publications on this topic, follow the link: Electronic tool subject authority file.

Journal articles on the topic 'Electronic tool subject authority file'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 journal articles for your research on the topic 'Electronic tool subject authority file.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bennett, Rick, Edward T. O'Neill, and Kerre Kammerer. "assignFAST: An Autosuggest based tool for FAST Subject Assignment." Information Technology and Libraries 33, no. 1 (2014): 34. http://dx.doi.org/10.6017/ital.v33i1.5378.

Full text
Abstract:
<p><em>Subject assignment is really a three-phase task. The first phase is intellectual—reviewing the material and determining its topic. The second phase is more mechanical, identifying the correct subject heading(s). The final phase is retyping or cutting and pasting the heading(s) into the cataloging interface along with any diacritics, and potentially correcting formatting and subfield coding. If authority control is available in the interface, some of these tasks may be automated or partially automated.</em></p> <p><em>A cataloger with a reasonable knowledge of </em><a href="http://www.oclc.org/research/activities/fast.html"><em>FAST</em></a><a href="#_edn1">[i]</a>,<a href="#_edn2">[ii]</a><em> or even </em><a href="http://www.loc.gov/catdir/cpso/lcc.html"><em>LCSH</em></a><a href="#_edn3">[iii]</a><em> can quickly get to the proper heading, but usually needs to confirm the final details—was it plural? Am I thinking of an alternate form? Is it inverted? Etc. This often requires consulting the full authority file interface. assignFAST is a Web service that consolidates the entire second phase of the manual process of subject assignment for FAST subjects into a single step based on autosuggest technology.</em></p> <div><br /> <hr size="1" /><div><p><a href="#_ednref1">[i]</a> Chan, Lois Mai and Edward T. O'Neill. <em>FAST: Faceted Application of Subject Terminology, Prnciples and Applications</em> Libraries Unlimited, Santa Barbara, 2010.<br /> <a href="http://lu.com/showbook.cfm?isbn=9781591587224">http://lu.com/showbook.cfm?isbn=9781591587224</a>.</p></div> <div><p><a href="#_ednref2">[ii]</a> OCLC Research Activities associated with FAST are summarized at <a href="http://www.oclc.org/research/activities/fast/default.htm">http://www.oclc.org/research/activities/fast/</a></p></div> <div><p><a href="#_ednref3">[iii]</a> Chan, Lois M. <em>Library of Congress Subject Headings : Principles and Application: Principles and Application</em>. Westport, Conn: Libraries Unlimited, 2005.</p></div></div>
APA, Harvard, Vancouver, ISO, and other styles
2

Martin, Thomas, Megan Ranney, James Dorroh, Nicholas Asselin, and Indra Sarkar. "Health Information Exchange in Emergency Medical Services." Applied Clinical Informatics 09, no. 04 (2018): 884–91. http://dx.doi.org/10.1055/s-0038-1676041.

Full text
Abstract:
Background The Office of the National Coordinator for Health Information Technology has outlined the benefits of health information exchange in emergency medical services (EMSs) according to the SAFR model—search, alert, file, and reconcile—developed in collaboration with the California Emergency Medical Services Authority. Objective This scoping review aims to identify and characterize progress toward the adoption of prehospital health information exchange, as reported in the peer-reviewed literature. Methods A structured review of literature in MEDLINE-indexed journals was conducted using the “Electronic Health Records” topic-specific query, the “Emergency Medical Services” Medical Subject Headings descriptor, and a prehospital identifier. Results Our initial search yielded 368 nonduplicative, English-language articles; 131 articles underwent full-text review and 11 were selected for analysis according to pre-established inclusion criteria. Original research was thematically grouped according to the SAFR model. Conclusion Within isolated systems, there has been limited progress toward the adoption of prehospital health information exchange. Interoperability, accurate match algorithms, security, and wireless connectivity have been identified as potential barriers to adoption. Additional research is required to evaluate the role of health information exchange within EMSs.
APA, Harvard, Vancouver, ISO, and other styles
3

Alferov, V. P., I. G. Drovnikova, L. A. Obukhova, and E. A. Rogozin. "VERBAL MODEL OF MANAGEMENT OF A VULNERABLE PROCESS OF DEDICATING THE ACCESS OF USERS TO THE SOFTWARE OF THE ELECTRONIC DOCUMENT SYSTEM." Herald of Dagestan State Technical University. Technical Sciences 46, no. 2 (2019): 37–49. http://dx.doi.org/10.21822/2073-6185-2019-46-2-37-49.

Full text
Abstract:
Objectives Traditional methods for solving the problem of protecting the information resource of electronic document management systems based on protective basic functions (identification, authentication and verification of users, etc.) of available tools and information security subsystems have a significant drawback - inefficiency when an attacker masters the password of regular users. In order to eliminate it, it is necessary to develop new methods related to managing the weakly vulnerable process of delimiting user access not only to confidential information, but also to the software of the electronic document management system.Method One way to solve this problem is to use the modified “soft administration” method, which consists in automatically generating lists of allowed source files in the authorization matrix by reducing the lists and comparing file integrity functions with a reference list for an existing software package. This allows you to automate the process of developing access control rules and provide management of the weakly vulnerable process of access control to software tools of the electronic document management system.Result A verbal model is developed for automated control of a weakly vulnerable process of differentiating access to software tools of an electronic document management system, and a system of performance indicators for the functioning of a promising subsystem for protecting confidential information characterizing it as a control object is proposed.Conclusion The presented verbal model provides for the possibility of distributed control, in which the security administrator directly controls the specified process using a remote software tool. The formation (change) of the authority establishment matrix for managing a weakly vulnerable process of access control using a promising subsystem for protecting confidential information and the development of a system of indicators to comprehensively evaluate the effectiveness of its functioning is one of the most important tasks of protecting information from unauthorized access, guaranteeing the implementation of a security policy throughout the entire operation period secure electronic document management system.
APA, Harvard, Vancouver, ISO, and other styles
4

Swithenby, Stephen J. "Screen-based assessment." New Directions in the Teaching of Physical Sciences, no. 2 (December 1, 2006): 23–28. http://dx.doi.org/10.29311/ndtps.v0i2.429.

Full text
Abstract:
Inexorably and across several fronts, screen-based assessment is becoming a major part of the experience of university students, particularly but not exclusively in the sciences. This movement reflects the emphasis the Qualifications and Curriculum Authority (QCA) is giving to the development of screen-based assessment at secondary level, where the universal availability of an -assessment option in high stakes exams is an adopted goal.The drivers for this change are economic, pedagogic and opportunistic. Rapid technological progress is facilitating the wider availability of computer based tasks that reflect authentically the learning outcomes of science courses. There is growing experience in the design of such tasks, with increasing commercial involvement, particularly in the USA. An examination of theories of assessment demonstrates that there are sound pedagogic reasons to pursue these developments.The main focus of this review will be assessment for which a computer acts as a means of delivery, grading and feedback. I will outline the capabilities of contemporary systems, illustrate some good practice, and identify areas where the use of the technology is moving forward rapidly. There are exciting developments in the grading of free format responses, in diagram or text form, which are now emerging on a pilot basis. Of particular interest is the assessment of higher order cognitive and subject skills. Alsoimportant is the potential for item banks that can allow the sharing of the costs of authorship. Several of these issues are reviewed more fully in Conole and Warbuton.Finally, I will comment briefly on assessment that is facilitated by computers without the computer acting as a grading tool. At a mundane level, this might involve the electronic submission of traditional assignments. Of more interest are electronically mediated peer assessment, the generation of e-portfolios, the grading of screen based experimentation and the evaluation of the student’s performance in contributing to computer based group activities, e.g. Wikis, electronic conferences, etc.
APA, Harvard, Vancouver, ISO, and other styles
5

Стойка, Маріана. "CRYPTOCURRENCY – DEFİNİTİON, FUNCTİONS, ADVANTAGES AND RİSKS." Підприємництво і торгівля, no. 30 (July 1, 2021): 5–10. http://dx.doi.org/10.36477/2522-1256-2021-30-01.

Full text
Abstract:
The emergence of “virtual currencies” is extremely recent, with a history of only 13 years. Being an ultra-new economic tool, it arouses interest and effervescent reactions, especially in terms of definition, but also about the cumulative effects it has begun to produce in the economic world. The subject also becomes controversial due to the fact that, being an economic instrument of absolute novelty, it is reflected in the legislation of very few countries in the world. One of the definitions determines as virtual currency – the digital representation of the value that is not issued or guaranteed by a central bank or a public authority, which is not necessarily linked to a legal currency and which does not have the legal status of the currency, but which can be accepted by natural or legal persons as a means of exchange and which may be transferred, stored and traded by electronic means. The evaluation of cryptocurrency publications has shown that most of them are related to attempts to establish legislative agricultural work for the operation of virtual currencies. The functions of the cryptocurrencies that we have defined are: the exchange and payment function, the hoarding function, the investment function and the attraction of funds necessary for the activity. Thus, we established that virtual currencies, as well as fiduciary ones, have the role of: means of payment, means of accumulation, means of capitalization and investments. Likewise, through this research we managed to highlight the main features and peculiarities of cryptocurrencies. Among the basic characteristics of cryptocurrencies we highlight: the high degree of security, maximum speed of transactions, full freedom from financial organizations, irreversibility of operations, full anonymity of transactions, open source, they can be ”mined”. Another approach was to determine the advantages and disadvantages and risks of using cryptocurrencies. The main advantages of using cryptocurrencies are related to its functions an caracteristics, such as: it represents a real alternative to classic banking services, market freedom, privacy of transactions, high speed of trnasactions, alternative payment methos, increasing the customer base etc. On the other hand there are some disatvantages. They are related mosly with the following risks: legal uncertainty, market volatility, low degree of acceptance, unsecured crypto wallets, risks related to use for illegal or criminal purposes, money laundering risks. Taking in consideration the global trend of the digitization of the society, the share and importance of fiat currencies will tend to decrease for the benefit of virtual currencies. Cryptocurrencies are becoming a real alternative to physical currencies, but its main disadvantage is that the public autorities are missing controlling it yet. Even so, in the nearest future the money could become digital figures.
APA, Harvard, Vancouver, ISO, and other styles
6

Patdu, Ivy D. "Recommendations for Social Media Use in Hospitals and Health Care Facilities." Philippine Journal of Otolaryngology-Head and Neck Surgery 31, no. 1 (2016): 6–9. http://dx.doi.org/10.32412/pjohns.v31i1.299.

Full text
Abstract:
Social Media is the new avenue for creating connections and sharing of information. Through social media, one can reach a global community. In recent years, we have seen how social media has changed the way we do things. Social Media has been extensively utilized for health education and promotion, proving itself to be an invaluable tool for public health, professional networking and patient care benefit.
 
 The challenge has been to use the power afforded by social media responsibly, and to define the line between use and abuse. While there may be laws, implementation proves to be a challenge in the digital age. Therefore, self-regulation and institutional policy remain a critical part. It is therefore urged that hospitals and health care facilities adopt their own social media use policy appropriate for the institution.
 
 Below are proposed rules that could guide institutions in developing their own policy for social media use:
 
 Sec. 1. Declaration of Policy. The health facility recognizes that the exercise of the freedom of expression comes with a responsibility and a duty to respect the rights of others. The health facility likewise acknowledges the fundamental right to privacy of every individual. This policy shall provide rules for responsible social media use.
 
 Sec. 2. Definition. For purposes of this policy, the following definitions shall be used:
 
 Social Media refers to electronic communication, websites or applications through which users connect, interact or share information or other content with other individuals, collectively part of an online community. This includes Facebook, Twitter, Google+, Instagram, LinkedIn, Pinterest, Blogs, Social Networking sites.
 Health facility shall refer to the hospital or other health care facilities, including training and educational institutions.
 Individual shall refer to physicians, employees, other health facility staff, residents, or students to which this policy would apply
 
 
 Sec. 3. Applicability. This policy shall apply to all physicians, health professionals, employees and other health facility staff, including students or residents in training, practicing their profession, working, or fulfilling academic and clinical requirements within the health facility, whether temporary or permanent.
 
 Sec. 4. General Principles. Social media use shall be guided by the following principles:
 
 In using social media, an individual should always be mindful of his or her duties to the patient and community, his profession and his colleagues.
 The individual should always be conscious of his or her online image and how it impacts his or her profession, or the institution where he or she is professionally employed, affiliated or otherwise connected.
 Responsible social media use also requires the individual to ensure that in his or her social media activity, there is no law violated, including copyright, libel and cybercrime laws. At all times, the individual shall respect the right of privacy of others.
 Use of social media requires a personal commitment to uphold the ethical standards required of those providing health services, upon which patient trust is built.
 
 
 Sec. 5. Social Media for Health Education or Promotion
 a.The individual using social media for health education or promotion must be well-informed of the matter subject of the social media post, comment or other activity. The individual shall refrain from any activity which spreads or tends to spread misinformation.
 
 An article written by an individual and posted in social media must be evidence-based and disclose connections with pharmaceutical or health product companies or other sources of possible conflict of interest.
 
 c.Social media shall not be used to dispense specific medical diagnosis, advice, treatment or projection but shall consist of general opinions only. Use of social media should include statements that a person should not rely on the advice given online, and that medical concerns are best addressed in the appropriate setting.
 
 The individual shall be careful in posting or publishing his or her opinion and shall ensure that such opinion will not propagate misinformation or constitute a misrepresentation. The individual shall not make any misrepresentations in his or her social media activity relating to content, his or her employment or credentials, and any other information that may be misconstrued or taken out of context.
 
 
 
 Sec. 6. Professionalism in Social Media Use
 
 Individuals are discouraged from using a single account for both professional and private use. Be mindful that an electronic mail address used professionally may readily be linked to a social media site used privately.
 The individual shall conduct himself or herself in social media or online the same way that he would in the public, mindful of acting in a manner befitting his profession, or that would inspire trust in the service he or she provides, especially if the individual has not separated his or her professional and personal accounts in social media.
 The individual shall likewise refrain from using the name, logo or other symbol of an institution without prior authority in his or her social media activity. An individual shall not identify himself or herself as a representative of an institution in social media without being authorized to do so.
 Individuals shall not accept former or current patients as friends or contacts in their personal accounts, unless there is justification to do so, such as a pre-existing relationship or when unavoidable for patient care. In case of online interaction with patients, this should be limited to matters related to the patient’s treatment and management, and which could be properly disclosed.
 Informal and personal information concerning a patient, colleague or the health facility shall not be posted, shared or otherwise used in social media.
 Social media shall not be used to establish inappropriate relationships with patients or colleagues, and shall not be used to obtain information that would negatively impact on the provision of services and professional management of the patient.
 An individual shall refrain from posting, sharing or otherwise using photos or videos taken within the health facility, which would give the impression of unprofessionalism, show parts of the health facility where there is an expectation of privacy, or those which includes colleagues, employees, other health facility staff, or patients without their express consent. The consent requirement shall apply even if the other individuals included are not readily identifiable.
 
 
 Sec. 7. Responsible Social Media Activity
 
 In using social media, the individual shall respect the dignity, personality, privacy and peace of mind of another.
 The individual shall not post, share or otherwise use social media with the intent of damaging the reputation of any other individual or institution, especially if the subject is identified or identifiable.
 
 c.Derogatory comments about patients, colleagues, employers and institutions or companies should be avoided. An individual may “like” a defamatory post but he or she must use caution when sharing, retweeting or contributing anything that might be construed as a new defamatory statement. A post, comment or other social media activity is considered defamatory if:
 1) The activity imputes a discreditable act or condition to another;
 
 2) The activity is viewed or seen by any other person;
 3) The person or institution defamed is identified or readily identifiable;
 4) There is malice or intent to damage the reputation of another.
 
 He or she shall be careful of sharing posts or other contents that are unverified, particularly if it discredits another person or institution, or imputes the commission of a crime or violation of law even before trial and judgment, and violates the privacy of another. Fair and true reporting on matters of public concern shall be allowed provided that the content was obtained lawfully and with due respect for the right of privacy.
 An individual shall not use copyrighted materials other than for fair use where there is proper citation of source and author. Use of copyrighted material for purpose of criticism, comment, news, reporting, teaching, scholarship, research, and similar purposes is compatible with fair use.
 An individual is prohibited from:
 
 1) Social media activities that defame, harass, stalk, or bully another person or institution.
 2) The use or access of personal social media accounts of others without authority.
 3) Posting, sharing or otherwise using any information intended to be private or obtained through access to electronic data messages or documents.
 4) Posting, sharing or otherwise using recorded conversations between doctors, individuals or patients, when such recording, whether audio or video, was obtained without consent of all the parties to the conversation
 
 Individuals should use conservative privacy settings in their social media account used professionally. The individual should also practice due diligence in keeping their social media accounts safe such as through regular password change and logging out after social media use.
 
 
 Sec. 8. Health Information Privacy
 
 The individual shall respect the right to privacy of others and shall not collect, use, access or disclose information, pictures and other personal or sensitive information without obtaining consent from the individual concerned. Physicians, health facility employees and other health staff shall have the duty of protecting patient confidentiality in their social media activity.
 Personal health information, including photos or videos of patients, shall not be posted, shared or otherwise used in social media without consent of patient. Consent shall be obtained after explaining to the patient the purpose of the intended collection, use, access and disclosure. Consent for use of personal health information shall be written or evidenced by electronic means.
 An individual shall not post, share or otherwise use any information which could be used to identify patients without their consent, including patient’s location, room numbers, and photographs or videos of patients or their body parts, including code names referring to patients.
 The individual shall not post, share or otherwise use any other information acquired in attending to a patient in a professional capacity, and which would blacken the reputation of the patient. The duty of maintaining patient confidentiality remains even after patient’s death.
 An individual shall not post, share or otherwise use any information relating to the identity, status and personal details of persons with HIV, those who have undergone drug rehabilitation, and victims of domestic violence, rape and child abuse.
 
 
 Sec. 9. Compliance and Reporting.
 
 An individual shall strive to develop, support and maintain a privacy culture in the health facility. He or she shall abide by the social media use policy of the institution.
 An individual who becomes aware of unprofessional behavior, misinformation or privacy violations in social media shall report the matter to the hospital’s privacy officer or the proper office or authority within the facility.
 Health facilities shall in so far as practicable monitor the social media activity of all physicians, employees and other health facility staff, including students or residents in training, practicing their profession, working, or fulfilling academic and clinical requirements within the health facility, whether temporary or permanent.
 
 
 Sec. 10. Penalty. A violation of this policy may constitute a violation of the code of ethics of physicians and other professions, and other applicable laws.
 
 Health Professionals, employees and other Health Facility Staff. Any person found violating this policy will be considered in violation of health facility rules and regulations, and shall be subjected to health facility administrative proceedings, which after notice and hearing, and depending on the severity of the violation, could result to termination of service or withdrawal of privileges. A lighter penalty may likewise be imposed. In determining the severity of the violation, the following factors may be considered: previous violation, if any, the nature of the violation, and the extent of injury or damage.
 
 The penalty imposed by the health facility shall be without prejudice to the filing of a complaint before the Civil Service Commission, the Professional Regulations Commission, the Office of the Prosecutor or Ombudsman, or proper courts.
 
 Students. In case of students, they shall be reported to the college wherein they are enrolled and shall be subjected to disciplinary proceedings, which could result to expulsion, depending on the severity of the violation, and in accordance with the applicable University and respective College rules. A lighter penalty may likewise be imposed. The disciplinary proceedings shall be without prejudice to other applicable legal remedies.
 
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Vicky. "Seal Culture Still Remains in Electronic Commerce." M/C Journal 8, no. 2 (2005). http://dx.doi.org/10.5204/mcj.2335.

Full text
Abstract:

 
 
 History of Seal and Printing Cultures Implications of the four important Chinese inventions, the compass, gun powder, papermaking, and printing, have far-reaching significance for human civilisation. The Chinese seal is intimately related to printing. Seals have the practical function of duplicating impressions of words or patterns. This process shares a very similar concept to printing on a small scale. Printing originated from the function of seals for making duplicated impressions, and for this reason Wang believes that seals constitute the prototype of printing. Seals in Traditional Commere Seals in certain Asian countries, such as Taiwan and Japan, play a vital role similar to that played by signatures in Western society. Particularly, the Chinese seal has been an integral part of Chinese heritage and culture. Wong states that seals usually symbolise tokens of promise in Chinese society. Ancient seals in their various forms have played a major role in information systems, in terms of authority, authentication, identification, certified proof, and authenticity, and have also been used for tamper-proofing, impression duplication, and branding purposes. To illustrate, clay sealing has been applied to folded documents to detect when sealed documents have been exposed or tampered with. Interestingly, one of the features of digital signature technology is also designed to achieve this purpose. Wong records that when the commodity economy began to develop and business transactions became more frequent, seals were used to prove that particular goods had been certified by customs. Moreover, when the goods were subject to tax by the government, seals were applied to the goods to prove the levy paid. Seals continue to be used in Chinese society as personal identification and in business transactions, official and legal documents, administrative warrants and charters. Paper-based Contract Signing with Seal Certificates In Taiwan and Japan, in certain circumstances, when two parties wish to formalise a contract, the seals of the two parties must be affixed to the contract. As Figure 1 illustrates, seal certificates are required to be attached to the signed and sealed contract for authentication as well as the statement of intent of a voluntary agreement in Taiwan. Figure 1. Example of a contract attached with the seal certificates A person can have more than one seal; however, only one seal at a time is allowed to be registered with a jurisdictional registration authority. The purpose of seal registration is to prevent seal forgery and to prove the identity of the seal owner. Namely, the seal registration process aims to associate the identity of the seal owner with the seal owner’s nominated seal, through attestation by a jurisdictional registration authority. Upon confirmation of the seal registration, the registration authority issues a seal certificate with both the seals of the registration authority and the registration authority executive. Digital Signatures for Electronic Commerce Handwritten signatures and tangible ink seals are highly impractical within the electronic commerce environment. However, the shift towards electronic commerce by both the public and private sector is an inevitable trend. ‘Trust’ in electronic commerce is developed through the use of ‘digital signatures’ in conjunction with a trustworthy environment. In principle, digital signatures are designed to simulate the functions of handwritten signatures and traditional seals for the purposes of authentication, data integrity, and non-repudiation within the electronic commerce environment. Various forms of Public Key Infrastructure (PKI) are employed to ensure the reliability of using digital signatures so as to ensure the integrity of the message. PKI does not, however, contribute in any way to the signatory’s ability to verify and approve the content of an electronic document prior to the affixation of his/her digital signature. Shortcomings of Digital Signature Scheme One of the primary problems with existing digital signatures is that a digital signature does not ’feel’ like, or resemble, a traditional seal or signature to the human observer; it does not have a recognisably individual or aesthetic quality. Historically, the authenticity of documents has always been verified by visual examination of the document. Often in legal proceedings, examination of both the affixed signature or seal as an integral part of the document will occur, as well as the detection of any possible modifications to the document. Yet, the current digital signature regime overlooks the importance of this sense of visualisation. Currently, digital signatures, such as the OpenPGP (Pretty Good Privacy) digital signature, are appended to an electronic document as a long, incomprehensible string of arbitrary characters. As shown in Figure 2, this offers no sense of identity or ownership by simple visual inspection. Figure 2. Example of a PGP signature To add to this confusion for the user, a digital signature will be different each time the user applies it. The usual digital signature is formed as an amalgam of the contents of the digital document and the user’s private key, meaning that a digital signature attached to an electronic document will vary with each document. This again represents a departure from the traditional use of the term ‘signature’. A digital signature application generates its output by firstly applying a hash algorithm over the contents of the digital document and then encrypting that hash output value using the user’s private cryptographic key of the normal dual-key pair provided by the Public Key cryptography systems. Therefore, digital signatures are not like traditional signatures which an individual can identify as being uniquely theirs, or as a recognisable identity attributable to an individual entity. New Visualised Digital Signature Scheme Liu et al. have developed the visualised digital signature scheme to enhance existing digital signature schemes through visualisation; namely, this scheme makes the intangible digital signature virtually tangible. Liu et al.’s work employs the visualised digital signature scheme with the aim of developing visualised signing and verification in electronic situations. The visualised digital signature scheme is sustained by the digital certificate containing both the certificate issuer’s and potential signer’s seal images. This thereby facilitates verification of a signer’s seal by reference to the appropriate certificate. The mechanism of ensuring the integrity and authenticity of seal images is to incorporate the signer’s seal image into an X.509 v3 certificate, as outlined in RFC 3280. Thus, visualised digital signature applications will be able to accept the visualised digital certificate for use. The data structure format of the visualised digital certificate is detailed in Liu. The visualised signing and verification processes are intended to simulate traditional signing techniques incorporating visualisation. When the signer is signing the document, the user interface of the electronic contracting application should allow the signer to insert the seal from the seal image file location into the document. After the seal image object is embedded in the document, the document is referred to as a ’visually sealed’ document. The sealed document is ready to be submitted to the digital signing process, to be transmitted with the signer’s digital certificate to the other party for verification. The visualised signature verification process is analogous to the traditional, sealed paper-based document with the seal certificate attached for verification. In history, documents have always required visual stimulus for verification, which highlights the need for visual stimulus evidence to rapidly facilitate verification. The user interface of the electronic contracting application should display the visually sealed document together with the associated digital certificate for human verification. The verifier immediately perceives the claimed signer’s seal on the document, particularly when the signer’s seal is recognisable to the verifier. This would be the case particularity where regular business transactions between parties occur. Significantly, having both the issuing CA’s and the signer’s seal images on the digital certificate instils confidence that the signer’s public key is attested to by the CA, as shown in Figure 3. This is unlike the current digital signature verification process which presents long, meaningless strings to the verifier. Figure 3. Example of a new digital certificate presentation Conclusions Seals have a long history accompanying the civilisation of mankind. In particular, certain business documents and government communities within seal-culture societies still require the imprints of the participating entities. Inevitably, the use of modern technologies will replace traditional seals and handwritten signatures. Many involved in implementing electronic government services and electronic commerce care little about the absence of imprints and/or signatures; however, there is concern that the population may experience difficulty in adapting to a new electronic commerce system where traditional practices have become obsolete. The purpose of the visualised digital signature scheme is to explore enhancements to existing digital signature schemes through the integration of culturally relevant features. This article highlights the experience of the use and development of Chinese seals, particularly in visualised seals used in a recognition process. Importantly, seals in their various forms have played a major role in information systems for thousands of years. In the advent of the electronic commerce, seal cultures still remain in the digital signing environment. References Housley, R., et al. RFC 3280 Internet X.509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile. The Internet Engineering Task Force, 2002. Liu, V., et al. “Visually Sealed and Digital Signed Documents.” 27th Australasian Computer Science Conference. Dunedin, NZ: Australian Computer Science Communications, 2004. Liu, V. “Visually Sealed and Digital Signed Electronic Documents: Building on Asian Tradition.” Dissertation. Queensland University of Technology, 2004. Wang, P.Y. The Art of Seal Carving. Taipei: Council for Cultural Planning and Development, Executive Yuan, 1991. Wong, Y.C., and H.W. Yau. The Art of Chinese Seals through the Ages. Hong Kong: The Zhejiang Provincial Museum and the Art Museum of the Chinese University Hong Kong, 2000. 
 
 
 
 Citation reference for this article
 
 MLA Style
 Liu, Vicky. "Seal Culture Still Remains in Electronic Commerce." M/C Journal 8.2 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0506/03-liu.php>. APA Style
 Liu, V. (Jun. 2005) "Seal Culture Still Remains in Electronic Commerce," M/C Journal, 8(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0506/03-liu.php>. 
APA, Harvard, Vancouver, ISO, and other styles
8

Dushianthan, Ahilanandan, Howard Clark, Jens Madsen, et al. "Nebulised surfactant for the treatment of severe COVID-19 in adults (COV-Surf): A structured summary of a study protocol for a randomized controlled trial." Trials 21, no. 1 (2020). http://dx.doi.org/10.1186/s13063-020-04944-5.

Full text
Abstract:
Abstract Objectives SARS-Cov-2 virus preferentially binds to the Angiotensin Converting Enzyme 2 (ACE2) on alveolar epithelial type II cells, initiating an inflammatory response and tissue damage which may impair surfactant synthesis contributing to alveolar collapse, worsening hypoxia and leading to respiratory failure. The objective of this study is to evaluate the feasibility, safety and efficacy of nebulised surfactant in COVID-19 adult patients requiring mechanical ventilation for respiratory failure. Trial design This study is a dose-escalating randomized open-label clinical trial of 20 COVID-19 patients. Participants This study is conducted in two centres: University Hospital Southampton and University College London Hospitals. Eligible participants are aged ≥18, hospitalised with COVID-19 (confirmed by PCR), who require endotracheal intubation and are enrolled within 24 hours of mechanical ventilation. For patients unable to consent, assent is obtained from a personal legal representative (PerLR) or professional legal representative (ProfLR) prior to enrolment. The following are exclusion criteria: imminent expected death within 24 hours; specific contraindications to surfactant administration (e.g. known allergy, pneumothorax, pulmonary hemorrhage); known or suspected pregnancy; stage 4 chronic kidney disease or requiring dialysis (i.e., eGFR < 30); liver failure (Child-Pugh Class C); anticipated transfer to another hospital, which is not a study site, within 72 hours; current or recent (within 1 month) participation in another study that, in the opinion of the investigator, would prevent enrollment for safety reasons; and declined consent or assent. Intervention and comparator Intervention: The study is based on an investigational drug/device combination product. The surfactant product is Bovactant (Alveofact®), a natural animal derived (bovine) lung surfactant formulated as a lyophilized powder in 108 mg vials and reconstituted to 45 mg/mL in buffer supplied in a prefilled syringe. It is isolated by lung lavage and, by weight, is a mixture of: phospholipid (75% phosphatidylcholine, 13% phosphatidylglycerol, 3% phosphatidylethanolamine, 1% phosphatidylinositol and 1% sphingomyelin), 5% cholesterol, 1% lipid-soluble surfactant-associated proteins (SP-B and SP-C), very low levels of free fatty acid, lyso-phosphatidylcholine, water and 0.3% calcium. The Drug Delivery Device is the AeroFact-COVID™ nebulizer, an investigational device based on the Aerogen® Solo vibrating mesh nebulizer. The timing and escalation dosing plans for the surfactant are as follows. Cohort 1: Three patients will receive 10 vials (1080 mg) each of surfactant at dosing times of 0 hours, 8 hours and 24 hours. 2 controls with no placebo intervention. Cohort 2: Three patients will receive 10 vials (1080 mg) of surfactant at dosing times of 0 hours and 8 hours, and 30 vials (3240 mg) at a dosing time of 24 hours. 2 controls with no placebo intervention. Cohort 3: Three patients will receive 10 vials (1080 mg) of surfactant at a dosing time of 0 hours, and 30 vials (3240 mg) at dosing times of 8 hours and 24 hours. 2 controls with no placebo intervention. Cohort 4: Three patients will receive 30 (3240 mg) vials each of surfactant at dosing times of 0 hours, 8 hours and 24 hours. 2 controls. 2 controls with no placebo intervention. The trial steering committee, advised by the data monitoring committee, will review trial progression and dose escalation/maintenance/reduction after each cohort is completed (48-hour primary outcome timepoint reached) based on available feasibility, adverse event, safety and efficacy data. The trial will not be discontinued on the basis of lack of efficacy. The trial may be stopped early on the basis of safety or feasibility concerns. Comparator: No placebo intervention. All participants will receive usual standard of care in accordance with the local policies for mechanically ventilated patients and all other treatments will be left to the discretion of the attending physician. Main outcomes The co-primary outcome is the improvement in oxygenation (PaO2/FiO2 ratio) and pulmonary ventilation (Ventilation Index (VI), where VI = [RR x (PIP − PEEP) × PaCO2]/1000) at 48 hours after study initiation. The secondary outcomes include frequency and severity of adverse events (AEs), Adverse Device Effects (ADEs), Serious Adverse Events (SAEs) and Serious Adverse Device Events (SADEs), change in pulmonary compliance, change in positive end-expiratory pressure (PEEP) requirement of ventilatory support at 24 and 48 hours after study initiation, clinical improvement defined by time to one improvement point on the ordinal scale described in the WHO master protocol (2020) recorded while hospitalised, days of mechanical ventilation, mechanical ventilator free days (VFD) at day 21, length of intensive care unit stay, number of days hospitalised and mortality at day 28. Exploratory end points will include quantification of SARS-CoV-2 viral load from tracheal aspirates using PCR, surfactant dynamics (synthesis and turnover) and function (surface tension reduction) from deep tracheal aspirate samples (DTAS), surfactant phospholipid concentrations in plasma and DTAS, inflammatory markers (cellular and cytokine) in plasma and DTAS, and blood oxidative stress markers. Randomisation After informed assent, patients fulfilling inclusion criteria will be randomised to 3:2 for the treatment and control arms using an internet-based block randomization service (ALEA tool for clinical trials, FormsVision BV) in combination with electronic data collection. Randomisation will be done by the recruiting centre with a unique subject identifier specific to that centre. Blinding (masking) This is an open-labelled unblinded study. Numbers to be randomised (sample size) The total sample size is 20 COVID-19 mechanically ventilated patients (12 intervention; 8 control). Trial Status Current protocol version is V2 dated 5th of June 2020. The recruitment is currently ongoing and started on the 14th of October 2020. The anticipated study completion date is November 2021. Trial registration ClinicalTrials.gov: NCT04362059 (Registered 24 April 2020), EUDAMED number: CIV-GB-20-06-033328, EudraCT number: 2020-001886-35 (Registered 11 May 2020) Full protocol The full protocol is attached as an additional file, accessible from the Trials website (Additional file 1). In the interest in expediting dissemination of this material, the familiar formatting has been eliminated; this Letter serves as a summary of the key elements of the full protocol. The study protocol has been reported in accordance with the Standard Protocol Items: Recommendations for Clinical Interventional Trials (SPIRIT) guidelines (Additional file 2).
APA, Harvard, Vancouver, ISO, and other styles
9

Kennedy, Ümit. "Exploring YouTube as a Transformative Tool in the “The Power of MAKEUP!” Movement." M/C Journal 19, no. 4 (2016). http://dx.doi.org/10.5204/mcj.1127.

Full text
Abstract:
IntroductionSince its launch in 2005, YouTube has fast become one of the most popular video sharing sites, one of the largest sources of user generated content, and one of the most frequently visited sites globally (Burgess and Green). As YouTube’s popularity has increased, more and more people have taken up the site’s invitation to “Broadcast Yourself.” Vlogging (video blogging) on YouTube has increased in popularity, creating new genres and communities. Vlogging not only allows individuals to create their own mediated content for mass consumption—making it a site for participatory culture (Burgess and Green; Jenkins) and resembling contemporary forms of entertainment such as reality television—but it also allows individuals to engage in narrative and identity forming practices. Through filming their everyday lives, and presenting themselves on camera, YouTubers are engaging in a process of constructing and presenting their identity online. They often form communities around these identities and continue the practice in dialogue and collaboration with their communities of viewers on YouTube. Because of YouTube’s mass global reach, the ability to create one’s own mediated content and the ability to publicly play with and project different self representations becomes a powerful tool allowing YouTubers to publicly challenge social norms and encourage others to do the same. This paper will explore these features of YouTube using the recent “The Power of MAKEUP!” movement, started by NikkieTutorials, as an example. Through a virtual ethnography of the movement as developed by Christine Hine—following the people, dialogue, connections, and narratives that emerged from Nikkie’s original video—this paper will demonstrate that YouTube is not only a tool for self transformation, but has wider potential to transform norms in society. This is achieved mainly through mobilising communities that form around transformative practices, such as makeup transformations, on YouTube. Vlogging as an Identity Forming Practice Vlogging on YouTube is a contemporary form of autobiography in which individuals engage in a process of documenting their life on a daily or weekly basis and, in doing so, constructing their identity online. Although the aim of beauty vlogs is to teach new makeup techniques, demonstrate and review new products, or circulate beauty-related information, the videos include a large amount of self-disclosure. Beauty vloggers reveal intimate things about themselves and actively engage in the practice of self-representation while filming. Beauty vlogging is unique to other vlogging genres as it almost always involves an immediate transformation of the physical self in each video. The vloggers typically begin with their faces bare and “natural” and throughout the course of the video transform their faces into how they want to be seen, and ultimately, who they want to be that day, using makeup. Thus the process of self-representation is multi-dimensional as not only are they presenting the self, but they are also visually constructing the self on camera. The construction of identity that beauty vloggers engage in on YouTube can be likened to what Robert Ezra Park and later Erving Goffman refer to as the construction and performance of a mask. In his work Race and Culture, Park states that the original meaning of the word person is a mask (249). Goffman responds to this statement in his work The Presentation of Self in Everyday Life, saying the mask is “our truer self, the self we would like to be” (30). Beauty vloggers are engaging in the process of constructing their mask—their truer self and the self they would like to be—both through their performance on YouTube, and through the visual transformation that takes place on camera. Their performance on YouTube not only communicates a desired identity, but through their performance they realise this identity. The process of filming and the visual process of constructing or transforming the self on camera through makeup brings the subject into being. Scholarship in the fields of Life Writing and Digital Media including Autobiography, Automedia and Persona Studies has acknowledged and explored the ways narratives and identities—both online and offline—are constructed, created, shaped, chosen, and invented by the individual/author (Garner; Bridger; Eakin; Maguire; Poletti and Rak; Marshall; Smith and Watson). It is widely accepted that all representations of the self are constructed. Crucially, it is the process of documenting or communicating the self that is identity forming (Richardson; Bridger), as the process, including writing, filming, and posting, brings the subject or self into being (Neuman). The individual embodies their performance and realises the self through it. Park and Goffman argue that we all engage in this process of performing and realising the self through the roles we play in society. The significance of the beauty vlogger performance and transformation is the space in which it occurs and the community that it fosters. YouTube as a Transformative Tool and MirrorThe space in which beauty vloggers play with and transform the self on camera is significant as digital technologies such as YouTube invite exploration of the self. Networked digital media (Meikle and Young) invite multiplicity, heterogeneity, and fragmentation in/of identity performances (Bolter; Gergen; Turkle, "Parallel Lives"). These technologies create opportunities for defining and re-defining the self (Bolter 130), as they allow people to present a more multi-mediated self, using both audio-visual components and text (Papacharissi 643).YouTube, in particular, allows the individual to experiment with the self, and document an ongoing transformation, through film (Kavoori). Many scholars have described this ongoing process of identity construction online using the metaphor of “the mirror” (see Kavoori; Raun; and Procter as recent examples). In his research on trans gender vlogging on YouTube, Tobias Raun explores the theme of the mirror. He describes vlogging as a “transformative medium for working on, producing and exploring the self” (366). He argues the vlog acts as a mirror allowing the individual to try out and assume various identities (366). He writes, the mirroring function of the vlog “invites the YouTuber to assume the shape of a desired identity/representation, constantly assuming and evaluating oneself as an attractive image, trying out different ‘styles of the flesh’ (Butler 177), poses and appearances” (367). In reference to trans gender vlogging, Raun writes, “The vlog seems to serve an important function in the transitioning process, and is an important part of a process of self-invention, serving as a testing ground for experimentations with, and manifestations of (new) identities” (367). The mirror (vlog) gives the individual a place/space to construct and perform their mask (identity), and an opportunity to see the reflection and adjust the mask (identity) accordingly. An important feature of the vlog as a mirror is the fact that it is less like a conventional mirror and more like a window with a reflective surface. On YouTube the vlog always involves an audience, who not only watch the performance, but also respond to it. This is in keeping with Goffman’s assertion that there is always an audience involved in any performance of the self. On YouTube, Raun argues, “the need to represent oneself goes hand in hand with the need to connect and communicate” (Raun 369). Networked digital media such as YouTube are inherently social. They invite participation (Smith; Sauter)and community through community building functions such as the ability to like, subscribe, and comment. Michael Strangelove refers to YouTube as a social space, “as a domain of self-expression, community and public confession” (4). The audience and community are important in the process of identity construction and representation as they serve a crucial role in providing feedback and encouragement, legitimising the identity being presented. As Raun writes, the vlog is an opportunity “for seeing one’s own experiences and thoughts reflected in others” (366). Raun identifies that for the trans gender vloggers in his study, simply knowing there is an audience watching their vlogs is enough to affirm their identity. He writes the vlog can be both “an individual act of self validation and . . . a social act of recognition and encouragement” (368). However, in the case of beauty vlogging the audience do more than watch, they form communities embodying and projecting the performance in everyday life and thus collectively challenge social norms, as seen in the “The Power of MAKEUP!” movement. Exploring the “The Power of MAKEUP!” MovementOn 10 May 2015, Nikkie, a well-known beauty vlogger, uploaded a video to her YouTube channel NikkieTutorials titled “The Power of MAKEUP!” Nikkie’s video can be watched here. In her video Nikkie challenges “makeup shaming,” arguing that makeup is not only fun, but can “transform” you into who you want to be. Inspired by an episode of the reality television show RuPaul’s Drag Race, in which the competing drag queens transform half of their face into “glam” (drag), and leave the other half of their face bare (male), Nikkie demonstrates that anyone can use makeup as a transformative tool. In her video Nikkie mirrors the drag queen transformations, transforming half her face into “glam” and leaving the other half of her face bare, as shown in Figure 1. In only transforming half of her face, Nikkie emphasises the scope of the transformation, demonstrating just how much you can change your appearance using only makeup on your face. Nikkie’s video communicates that both a transformed “glam” image and an “unedited” image of the self are perfectly fine, “there are no rules” and neither representations of the self should bring you shame. Figure 1: thumbnail of Nikkie’s videoNikkie’s video started a movement and spread throughout the beauty community on YouTube as a challenge. Other famous beauty vloggers, and everyday makeup lovers, took on the challenge of creating YouTube videos or posting pictures on Instagram of their faces half bare and half transformed using makeup with the tag #thepowerofmakeupchallenge. Since its release in May 2015, Nikkie’s video has been watched over thirty million times, has been liked over five hundred and thirty thousand times, and has received over twenty three thousand comments, many of which echo Nikkie’s experience of “makeup shaming.” “The power of makeup” video went viral and was picked up not only by the online beauty community but also by mainstream media with articles by Huffington Post, Yahoo.com, Marie Claire, BuzzFeed, DailyLife, POPSUGAR, Enews, Urbanshowbiz, BoredPanda, and kickvick among others. On Instagram, thousands of everyday makeup lovers have recreated the transformation and uploaded their pictures of the finished result. Various hashtags have been created around this movement and can be searched on Instagram including #thepowerofmakeupchallenge, #powerofmakeupchallenge, #powerofmakeup. Nikkie’s Instagram page dedicated to the challenge can be seen here. “The power of makeup” video is a direct reaction against what Nikkie calls “makeup shaming”—the idea that makeup is bad, and the assumption that the leading motivation for using makeup is insecurity. In her video Nikkie also reacts to the idea that the made-up-girl is “not really you,” or worse is “fake.” In the introduction to her video Nikkie says,I’ve been noticing a lot lately that girls have been almost ashamed to say that they love makeup because nowadays when you say you love makeup you either do it because you want to look good for boys, you do it because you’re insecure, or you do it because you don’t love yourself. I feel like in a way lately it’s almost a crime to love doing your makeup. So after last weeks RuPaul’s Drag Race with the half drag half male, I was inspired to show you the power of makeup. I notice a lot that when I don’t wear makeup and I have my hair up in a bun and I meet people and I show them picture of my videos or, or whatever looks I have done, they look at me and straight up tell me “that is not you.” They tell me “that’s funny” because I don’t even look like that girl on the picture. So without any further ado I’m going to do half my face full on glam—I’m truly going to transform one side of my face—and the other side is going to be me, raw, unedited, nothing, me, just me. So let’s do it.In her introduction, Nikkie identifies a social attitude that many of her viewers can relate to, that the made-up face isn’t the “real you.” This idea reveals an interesting contradiction in social attitude. As this issue of Media/Culture highlights, the theme of transformation is increasingly popular in contemporary society. Renovation shows, weight loss shows, and “makeover” shows have increased in number and popularity around the world (Lewis). Tania Lewis attributes this to an international shift towards “the real” on television (447). Accompanying this turn towards “the real,” confession, intimacy, and authenticity are now demanded and consumed as entertainment (Goldthwaite; Dovey; King). Sites such as YouTube are arguably popular because they offer real stories, real lives, and have a core value of authenticity (Strangelove; Wesch; Young; Tolson). The power of makeup transformations are challenging because they juxtapose a transformation against the natural, on the self. By only transforming half their face, the beauty vloggers juxtapose the “makeover” (transformation) with “authenticity” (the natural). The power of makeup movement is therefore caught between two contemporary social values. However, the desire for authenticity, and the lack of acceptance that the transformed image is authentic seems to be the main criticism that the members of this movement receive. Beauty vloggers identify a strong social value that “natural” is “good” and any attempt to alter the natural is taboo. Even in the commercial world “natural beauty” is celebrated and features heavily in the marketing and advertising campaigns of popular beauty, cosmetic, and skincare brands. Consider Maybelline’s emphasis on “natural beauty” in their byline “Maybe she’s born with it. Maybe it’s Maybelline.” This is not the way the members of “the power of makeup” movement use and celebrate makeup. They use and celebrate makeup as a transformative and identity forming tool, and their use of makeup is most often criticised for not being natural. In her recreation of Nikkie’s video, Evelina Forsell says “people get upset when I’m not natural.” Like Nikkie, Evelina reveals she often receives the criticism that “the person with a full on face with makeup is not you.” Evelina’s video can be watched here.“The power of makeup” movement and its participants challenge this criticism that the made-up self is not the “real” self. Evelina directly responds to this criticism in her video, stating “when I have a full face of makeup . . . that’s still me, but a more . . . creative me, I guess.” The beauty vloggers in this movement use makeup and YouTube as extensions of the self, as tools for self-expression, self-realisation, and ongoing transformation. Beauty vloggers are demonstrating that makeup is a tool and extension of the self that allows them to explore and play with their self-representations. In the same way that technology enables the individual to extend and “reinvent him/herself online” (Papacharissi 645), so does makeup. And in the same way that technology becomes an extension of the self, or even a second self (Turkle, The Second Self; Vaast) so does makeup. Makeup is a tool and technique of the self. Vlogging is about storytelling (Kavoori), but it is also collective—it’s about telling collective stories (Raun 373) which can be seen in various vlogging genres. As Geert Lovink suggests, YouTube is one of the largest databases of global shared experience. YouTube’s global popularity can be attributed to Strangelove’s assertion that “there’s nothing more interesting to real people . . . than authentic stories told about other real people” (65). Individuals are drawn to Nikkie’s experience, seeing themselves reflected in her story. Famous beauty vloggers on YouTube, and everyday beauty lovers, find community in the collective experience of feeling shame for loving makeup and using makeup to transform and communicate their identity. Effectively, the movement forms communities of practice (Wenger) made up of hundreds of people brought together by the shared value and use of makeup as a transformative tool. The online spaces where these activities take place (mainly on YouTube and Instagram) form affinity spaces (Gee) where the community come together, share information, learn and develop their practice. Hundreds of YouTubers from all over the world took up Nikkie’s invitation to demonstrate the power of makeup by transforming themselves on camera. From well-established beauty vloggers with millions of viewers, to amateur beauty lovers with YouTube channels, many people felt moved by Nikkie’s example and embodied the message, adapting the transformation to suit their circumstances. The movement includes both men and women, children and adults. Some transformations are inspirational such as Shalom Blac’s in which she talks about accepting the scars that are all over her face, but also demonstrates how makeup can make them disappear. Shalom has almost five million views on her “POWER OF MAKEUP” video, and has been labelled “inspirational” by the media. Shalom Blac’s video can be watched here and the media article labelling her as “inspirational” can be viewed here. Others, such as PatrickStarrr, send a powerful message that “It’s okay to be yourself.” Unlike a traditional interpretation of that statement, Patrick is communicating that it is okay to be the self that you construct, on any given day. Patrick also has over four million views on his video which can be watched here. During her transformation, Nikkie points out each feature of her face that she does not like and demonstrates how she can change it using makeup. Nikkie’s video is primarily a tutorial, educating viewers on different makeup techniques that can manipulate the appearance of their natural features into how they would like them to appear. These techniques are also reproduced and embodied through the various contributors to the movement. Thus the tutorial is an educational tool enabling others to use makeup for their own self representations (see Paul A. Soukup for an overview of YouTube as an educational tool). A feminist perspective may deconstruct the empowering, educational intentions of Nikkie’s video, insisting that conceptions of beauty are a social construct (Travis, Meginnis, and Bardari) and should not be re-enforced by encouraging women (and men) to use make-up to feel good. However, this sort of discourse does not appear in the movement, and this paper seeks to analyse the movement as its contributors frame and present it. Rather, “the power of makeup” movement falls within a postfeminist framework celebrating choice, femininity, independence, and the individual construction of modern identity (McRobbie; Butler; Beck, Giddens and Lash). Postfeminism embraces postmodern notions of identity in which individuals are “called up to invent their own structures” (McRobbie 260). Through institutions such as education young women have “become more independent and able,” and “‘dis-embedded’ from communities where gender roles were fixed” (McRobbie 260). Angela McRobbie attributes this to the work of scholars such as Anthony Giddens and Ulrich Beck and their emphasis on individualisation and reflexive modernisation. These scholars take a Foucauldian approach to identity construction in the modern age, where the individual must choose their own structures “internally and individualistically” (260), engaging in an ongoing process of self-monitoring and self-improvement, and resulting in the current self-help culture (McRobbie). In addition to being an educational and constructive tool, Nikkie’s video is also an exercise in self-branding and self-promotion(see Marwick; Duffy and Hund; and van Nuenen for scholarship on self-branding). Through her ongoing presence on YouTube, presenting this video in conjunction with her other tutorials, Nikkie is establishing herself as a beauty vlogger/guru. Nikkie lists all of the products that she uses in her transformation below her video with links to where people can buy them. She also lists her social media accounts, ways that people can connect with her, and other videos that people might be interested in watching. There are also prompts to subscribe, both during her video and in the description bar below her video. Nikkie’s transformation is both an ongoing endeavour to create her image and public persona as a beauty vlogger, and a physical transformation on camera. There is also a third transformation that takes place because her vlog is in the public sphere and consequently mobilises a movement. The transformation is of the way people talk about and eventually perceive makeup. Nikkie’s video aims to end makeup shaming and promote makeup as an empowering tool. With each recreation of her video, with each Instagram photo featuring the transformation, and with each mainstream media article featuring the movement, #thepowerofmakeup movement community are transforming the image of the made-up girl—transforming the association of makeup with presenting an inauthentic identity—in society. ConclusionThe “The Power of MAKEUP!” movement, started by NikkieTutorials, demonstrates one way in which people are using YouTube as a transformative tool, and mirror, to document, construct, and present their identity online, using makeup. Through their online transformation the members of the movement not only engage in a process of constructing and presenting their identity, but they form communities who share a love of makeup and its transformative potential. By embodying Nikkie’s original message to rid makeup shaming and transform the self into a desired identity, the movement re-enforces the “made-up” image of the self as real and authentic, and challenges conceptions that the “made-up” image is “fake” and inauthentic. Ultimately, this case study explores YouTube as a site that allows individuals to play with, construct, and present their identity. YouTube is a tool with which, and a space in which, people can transform themselves, and in doing so create communities which can work together to publicly challenge social norms.References Beck, Ulrich, Anthony Giddens, and Scott Lash. Reflexive Modernization: Politics, Tradition and Aesthetics in the Modern Social Order. Cambridge, England: Polity Press in association with Blackwell Publishers, 1994. Bolter, Jay David. "Virtual Reality and the Redefinition of Self." Communication and Cyberspace: Social Interaction in an Electronic Environment. Eds. Ronald L. Jacobson, Lance Strate, and Stephanie B. Gibson. 2nd ed. Creskill, NJ: Hampton Press, 2002. 123–37. Bridger, Barbara. "Writing across the Borders of the Self." European Journal of Women's Studies 16.4 (2009): 337–52. Burgess, Jean, and Joshua Green. Youtube: Online Video and Participatory Culture. Cambridge: Polity, 2009. Butler, Judith. Gender Trouble: Feminism and the Subversion of Identity. Ed. MyiLibrary. New York: Routledge, 2006. Dovey, Jon. Freakshow: First Person Media and Factual Television. Ed. ebrary, Inc. London: Pluto Press, 2000. Duffy, Brooke Erin, and Emily Hund. “‘Having It All’ on Social Media: Entrepreneurial Femininity and Self-Branding among Fashion Bloggers." 1.2 (2015).Eakin, Paul John. "Living Autobiographically." Biography 28.1 (2005): 1.Garner, Helen. "I [Helen Garner Explores the New and Different Persona a Writer Must Adopt in Each Successive Work.]." Meanjin (Melbourne) 61.1 (2002): 40–43. Gee, James Paul. "Semiotic Social Spaces and Affinity Spaces." Beyond Communities of Practice. Eds. David Barton and Karin Tusting. Cambridge: Cambridge UP, 2005. 214–32. Gergen, Kenneth. The Saturated Self: Dilemmas of Identity in Contemporary Life. Basic Books, 1991. Giddens, Anthony. Modernity and Self-Identity: Self and Society in the Late Modern Age. Cambridge, England: Polity Press, 1991. Goffman, Erving. The Presentation of Self in Everyday Life. Garden City, NY: Doubleday, 1959. Goldthwaite, Melissa A. "Confessionals." College English (2003): 55–73.Hine, Christine. Ethnography for the Internet: Embedded, Embodied and Everyday. London: Bloomsbury, 2015. ———. Virtual Ethnography. Ed. Sage Research Methods, Online. London: SAGE, 2000. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. Updated and with a new afterword. New York: New York UP, 2008. Kavoori, Anandam P. Reading Youtube: The Critical Viewers Guide. New York: Peter Lang, 2011. King, Barry. "Stardom, Celebrity and the Parra-Confession." Social Semiotics 18.2 (2008): 115–32.Lewis, Tania. "Changing Rooms, Biggest Losers and Backyard Blitzes: A History of Makeover Television in the United Kingdom, United States and Australia." Journal of Media & Cultural Studies 22.4 (2008): 447–58.Lovink, Geert. "The Art of Watching Databases: Introduction to the Video Vortex Reader." Video Vortex Reader: Responses to Youtube. Eds. G. Lovink and S. Niederer. Amsterdam: Institute of Network Cultures, 2008. 9–12.Maguire, Emma. "Home, About, Shop, Contact: Constructing an Authorial Persona via the Author Website. " M/C Journal 17.3 (2014).Marshall, P. David. "Personifying Agency: The Public–Persona–Place–Issue Continuum." Celebrity Studies 4.3 (2013): 369–71.Marwick, Alice Emily. Status Update: Celebrity, Publicity, and Branding in the Social Media Age. New Haven: Yale UP, 2013.McRobbie, Angela. "Post‐Feminism and Popular Culture." Feminist Media Studies 4.3 (2004): 255–64.Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. Basingstoke: Palgrave Macmillan, 2012.Neuman, Shirley. "'Autobiography'." Essays on Life Writing: From Genre to Critical Practice. Ed. Marlene Kadar. Toronto: U of Toronto P, 1992. 213–30.Papacharissi, Z. "The Presentation of Self in Virtual Life: Characteristics of Personal Home Pages." Journal of Mass Communication Quarterly 79.3 (2002): 643–60. Park, Robert E. Race and Culture. New York: Free Press, 1950.Poletti, Anna, and Julie Rak. Identity Technologies: Constructing the Self Online. Madison, Wisconsin: U of Wisconsin P, 2014.Procter, Lesley. "A Mirror without a Tain: Personae, Avatars, and Selves in a Multi-User Virtual Environment." M/C Journal 17.3 (2014).Raun, Tobias. "Video Blogging as a Vehicle of Transformation: Exploring the Intersection between Trans Identity and Information Technology." International Journal of Cultural Studies 18.3 (2015): 365–78.Richardson, Laurel. "Getting Personal: Writing-Stories." International Journal of Qualitative Studies in Education 14.1 (2001): 33–38.Sauter, Theresa. "'What's on Your Mind?' Writing on Facebook as a Tool for Self-Formation." New Media & Society 16.5 (2014): 823–39.Smith, Michael J. "E-Merging Strategies of Identity: The Rhetorical Construction of Self in Personal Web Sites." Ohio University, 1998.Smith, Sidonie, and Julia Watson. Reading Autobiography: A Guide for Interpreting Life Narratives. 2nd ed. Minneapolis: U of Minnesota P, 2010.Soukup, Paul A. "Looking at, with, and through Youtube[TM]." Communication Research Trends 33.3 (2014): 3.Strangelove, Michael. Watching Youtube: Extraordinary Videos by Ordinary People. Toronto: U of Toronto P, 2010.Tolson, Andrew. "A New Authenticity? Communicative Practices on Youtube." Critical Discourse Studies 7.4 (2010): 277–89.Travis, Cheryl Brown, Kayce L. Meginnis, and Kristin M. Bardari. "Beauty, Sexuality, and Identity: The Social Control of Women." Sexuality, Society, and Feminism. Eds. Cheryl Brown Travis and Jacquelyn W. White. Psychology of Women; 4. Washington, DC: American Psychological Association, 2000. 237–72.Turkle, Sherry. "Parallel Lives: Working on Identity in Virtual Space." Constructing the Self in a Mediated World: Inquiries in Social Construction. Ed. Debra Grodin and Thomas R. Lindlof. Thousand Oaks, CA: Sage 1996.———. The Second Self: Computers and the Human Spirit. London: Granada, 1984.Vaast, Emmanuelle. "Playing with Masks: Fragmentation and Continuity in the Presentation of Self in an Occupational Online Forum." Information Technology & People 20.4 (2007): 334–51.Van Nuenen, Tom. "Here I Am: Authenticity and Self-Branding on Travel Blogs." Tourist Studies (2015).Wenger, Etienne. Communities of Practice : Learning, Meaning, and Identity. Cambridge: Cambridge UP, 1998.Wesch, Michael. "An Anthropological Introduction to Youtube." 2008. <http://mediatedcultures.net/youtube/an-anthropological-introduction-to-youtube-presented-at-the-library-of-congress/>.Young, Jeffrey R. "An Anthropologist Explores the Culture of Video Blogging. (Michael L. Wesch)." The Chronicle of Higher Education 53.36 (2007).
APA, Harvard, Vancouver, ISO, and other styles
10

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:

 
 
 On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. 
 
 
 
 Citation reference for this article
 
 MLA Style
 Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style
 Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>. 
APA, Harvard, Vancouver, ISO, and other styles
11

Bruns, Axel. "What's the Story." M/C Journal 2, no. 5 (1999). http://dx.doi.org/10.5204/mcj.1774.

Full text
Abstract:
Practically any good story follows certain narrative conventions in order to hold its readers' attention and leave them with a feeling of satisfaction -- this goes for fictional tales as well as for many news reports (we do tend to call them 'news stories', after all), for idle gossip as well as for academic papers. In the Western tradition of storytelling, it's customary to start with the exposition, build up to major events, and end with some form of narrative closure. Indeed, audience members will feel disturbed if there is no sense of closure at the end -- their desire for closure is a powerful one. From this brief description of narrative patterns it is also clear that such narratives depend crucially on linear progression through the story in order to work -- there may be flashbacks and flashforwards, but very few stories, it seems, could get away with beginning with their point of closure, and work back to the exposition. Closure, as the word suggests, closes the story, and once reached, the audience is left with the feeling of now knowing the whole story, of having all the pieces necessary to understand its events. To understand how important the desire to reach this point is to the audience, just observe the discussions of holes in the plot which people have when they're leaving a cinema: they're trying to reach a better sense of closure than was afforded them by the movie itself. In linearly progressing media, this seems, if you'll pardon the pun, straightforward. Readers know when they've finished an article or a book, viewers know when a movie or a broadcast is over, and they'll be able to assess then if they've reached sufficient closure -- if their desires have been fulfilled. On the World Wide Web, this is much more difficult: "once we have it in our hands, the whole of a book is accessible to us readers. However, in front of an electronic read-only hypertext document we are at the mercy of the author since we will only be able to activate the links which the author has provided" (McKnight et al. 119). In many cases, it's not even clear whether we've reached the end of the text already: just where does a Website end? Does the question even make sense? Consider the following example, reported by Larry Friedlander: I watched visitors explore an interactive program in a museum, one that contained a vast amount of material -- pictures, film, historic explanations, models, simulations. I was impressed by the range of subject matter and by the ambitiousness and polish of the presentation. ... But to my surprise, as I watched visitors going down one pathway after another, I noticed a certain dispirited glaze spread over their faces. They seemed to lose interest quite quickly and, in fact, soon stopped their explorations. (163) Part of the problem here may just have been the location of the programme, of course -- when you're out in public, you might just not have the time to browse as extensively as you could from your computer at home. But there are other explanations, too: the sheer amount of options for exploration may have been overwhelming -- there may not have been any apparent purpose to aim for, any closure to arrive at. This is a problem inherent in hypertext, particularly in networked systems like the Web: it "changes our conception of an ending. Different readers can choose not only to end the text at different points but also to add to and extend it. In hypertext there is no final version, and therefore no last word: a new idea or reinterpretation is always possible. ... By privileging intertextuality, hypertext provides a large number of points to which other texts can attach themselves" (Snyder 57). In other words, there will always be more out there than any reader could possibly explore, since new documents are constantly being added. There is no ending if a text is constantly extended. (In print media this problem appears only to a far more limited extent: there, intertextuality is mostly implicit, and even though new articles may constantly be added -- 'linked', if you will -- to a discourse, due to the medium's physical nature they're still very much separate entities, while Web links make intertextuality explicit and directly connect texts.) Does this mark the end of closure, then? Adding to the problem is the fact that it's not even possible to know how much of the hypertextual information available is still left unexplored, since there is no universal register of all the information available on the Web -- "the extent of hypertext is unknowable because it lacks clear boundaries and is often multi-authored" (Snyder 19). While reading a book you can check how many more pages you've got to go, but on the Web this is not an option. Our traditions of information transmission create this desire for closure, but the inherent nature of the medium prevents us from ever satisfying it. Barrett waxes lyrical in describing this dilemma: contexts presented online are often too limited for what we really want: an environment that delivers objects of desire -- to know more, see more, learn more, express more. We fear being caught in Medusa's gaze, of being transfixed before the end is reached; yet we want the head of Medusa safely on our shield to freeze the bitstream, the fleeting imagery, the unstoppable textualisations. We want, not the dead object, but the living body in its connections to its world, connections that sustain it, give it meaning. (xiv-v) We want nothing less, that is, than closure without closing: we desire the knowledge we need, and the feeling that that knowledge is sufficient to really know about a topic, but we don't want to devalue that knowledge in the same process by removing it from its context and reducing it to trivial truisms. We want the networked knowledge base that the Web is able to offer, but we don't want to feel overwhelmed by the unfathomable dimensions of that network. This is increasingly difficult the more knowledge is included in that network -- "with the growth of knowledge comes decreasing certainty. The confidence that went with objectivity must give way to the insecurity that comes from knowing that all is relative" (Smith 206). The fact that 'all is relative' is one which predates the Net, of course, and it isn't the Internet or the World Wide Web that has destroyed objectivity -- objectivity has always been an illusion, no matter how strongly journalists or scientists have at times laid claims ot it. Internet-based media have simply stripped away more of the pretences, and laid bare the subjective nature of all information; in the process, they have also uncovered the fact that the desire for closure must ultimately remain unfulfilled in any sufficiently non-trivial case. Nonetheless, the early history of the Web has seen attempts to connect all the information available (LEO, one of the first major German Internet resource centres, for example, took its initials from its mission to 'Link Everything Online') -- but as the amount of information on the Net exploded, more and more editorial choices of what to include and what to leave out had to be made, so that now even search engines like Yahoo! and Altavista quite clearly and openly offer only a selection of what they consider useful sites on the Web. Web browsers still hoping to find everything on a certain topic would be well-advised to check with all major search engines, as well as important resource centres in the specific field. The average Web user would probably be happy with picking the search engine, Web directory or Web ring they find easiest to use, and sticking with it. The multitude of available options here actually shows one strength of the Internet and similar networks -- "the computer permits many [organisational] structures to coexist in the same electronic text: tree structures, circles, and lines can cross and recross without obstructing one another. The encyclopedic impulse to organise can run riot in this new technology of writing" (Bolter 95). Still, this multitude of options is also likely to confuse some users: in particular, "novices do not know in which order they need to read the material or how much they should read. They don't know what they don't know. Therefore learners might be sidetracked into some obscure corner of the information space instead or covering the important basic information" (Nielsen 190). They're like first-time visitors to a library -- but this library has constantly shifting aisles, more or less well-known pathways into specialty collections, fiercely competing groups of librarians, and it extends almost infinitely. Of course, the design of the available search and information tools plays an important role here, too -- far more than it is possible to explore at this point. Gay makes the general observation that "visual interfaces and navigational tools that allow quick browsing of information layout and database components are more effective at locating information ... than traditional index or text-based search tools. However, it should be noted that users are less secure in their findings. Users feel that they have not conducted complete searches when they use visual tools and interfaces" (185). Such technical difficulties (especially for novices) will slow take-up of and low satisfaction with the medium (and many negative views of the Web can probably be traced to this dissatisfaction with the result of searches -- in other words, to a lack of satisfaction of the desire for closure); while many novices eventually overcome their initial confusion and become more Web-savvy, others might disregard the medium as unsuitable for their needs. At the other extreme of the scale, the inherent lack for closure, in combination with the societally deeply ingrained desire for it, may also be a strong contributing factor for another negative phenomenon associated with the Internet: that of Net users becoming Net junkies, who spend every available moment online. Where the desire to know, to get to the bottom (or more to the point: to the end) of a topic, becomes overwhelming, and where the fundamental unattainability of this goal remains unrealised, the step to an obsession with finding information seems a small one; indeed, the neverending search for that piece of knowledge surpassing all previously found ones seems to have obvious similarities to drug addiction with its search for the high to better all previous highs. And most likely, the addiction is only heightened by the knowledge that on the Web, new pieces of information are constantly being added -- an endless, and largely free, supply of drugs... There is no easy solution to this problem -- in the end, it is up to the user to avoid becoming an addict, and to keep in mind that there is no such thing as total knowledge. Web designers and content providers can help, though: "there are ways of orienting the reader in an electronic document, but in any true hypertext the ending must remain tentative. An electronic text never needs to end" (Bolter 87). As Tennant & Heilmeier elaborate, "the coming ease-of-use problem is one of developing transparent complexity -- of revealing the limits and the extent of vast coverage to users, and showing how the many known techniques for putting it all together can be used most effectively -- of complexity that reveals itself as powerful simplicity" (122). We have been seeing, therefore, the emergence of a new class of Websites: resource centres which help their visitors to understand a certain topic and view it from all possible angles, which point them in the direction of further information on- and off-site, and which give them an indication of how much they need to know to understand the topic to a certain degree. In this, they must ideally be very transparent, as Tennant & Heilmeier point out -- having accepted that there is no such thing as objectivity, it is necessary for these sites to point out that their offered insight into the field is only one of many possible approaches, and that their presented choice of information is based on subjective editorial decisions. They may present preferred readings, but they must indicate that these readings are open for debate. They may help satisfy some of their readers' desire for closure, but they must at the same time point out that they do so by presenting a temporary ending beyond which a more general story continues. If, as suggested above, closure crucially depends on a linear mode of presentation, such sites in their arguments help trace one linear route through the network of knowledge available online; they impose a linear from-us-to-you model of transmission on the normally unordered many-to-many structure of the Net. In the face of much doomsaying about the broadcast media, then, here is one possible future for these linear transmission media, and it's no surprise that such Internet 'push' broad- or narrowcasting is a growth area of the Net -- simply put, it serves the apparent need of users to be told stories, to have their desire for closure satisfied through clear narrative progressions from exposition through development to end. (This isn't 'push' as such, really: it's more a kind of 'push on demand'.) But at the same time, this won't mean the end of the unstructured, networked information that the Web offers: even such linear media ultimately build on that networked pool of knowledge. The Internet has simply made this pool public -- passively as well as actively accessible to everybody. Now, however, Web designers (and this includes each and every one of us, ultimately) must work "with the users foremost in mind, making sure that at every point there is a clear, simple and focussed experience that hooks them into the welter of information presented" (Friedlander 164); they must play to the desire for closure. (As with any preferred reading, however, there is also a danger that that closure is premature, and that the users' process or meaning-making is contained and stifled rather than aided.) To return briefly to Friedlander's experience with the interactive museum exhibit: he draws the conclusion that visitors were simply overwhelmed by the sheer mass of information and were reluctant to continue accumulating facts without a guiding purpose, without some sense of how or why they could use all this material. The technology that delivers immense bundles of data does not simultaneously deliver a reason for accumulating so much information, nor a way for the user to order and make sense of it. That is the designer's task. The pressing challenge of multimedia design is to transform information into usable and useful knowledge. (163) Perhaps this transformation is exactly what is at the heart of fulfilling the desire for closure: we feel satisfied when we feel we know something, have learnt something from a presentation of information (no matter if it's a news report or a fictional story). Nonetheless, this satisfaction must of necessity remain intermediate -- there is always much more still to be discovered. "From the hypertext viewpoint knowledge is infinite: we can never know the whole extent of it but only have a perspective on it. ... Life is in real-time and we are forced to be selective, we decide that this much constitutes one node and only these links are worth representing" (Beardon & Worden 69). This is not inherently different from processes in other media, where bandwidth limitations may even force much stricter gatekeeping regiments, but as in many cases the Internet brings these processes out into the open, exposes their workings and stresses the fundamental subjectivity of information. Users of hypertext (as indeed users of any medium) must be aware of this: "readers themselves participate in the organisation of the encyclopedia. They are not limited to the references created by the editors, since at any point they can initiate a search for a word or phrase that takes them to another article. They might also make their own explicit references (hypertextual links) for their own purposes ... . It is always a short step from electronic reading to electronic writing, from determining the order of texts to altering their structure" (Bolter 95). Significantly, too, it is this potential for wide public participation which has made the Internet into the medium of the day, and led to the World Wide Web's exponential growth; as Bolter describes, "today we cannot hope for permanence and for general agreement on the order of things -- in encyclopedias any more than in politics and the arts. What we have instead is a view of knowledge as collections of (verbal and visual) ideas that can arrange themselves into a kaleidoscope of hierarchical and associative patterns -- each pattern meeting the needs of one class of readers on one occasion" (97). To those searching for some meaningful 'universal truth', this will sound defeatist, but ultimately it is closer to realism -- one person's universal truth is another one's escapist phantasy, after all. This doesn't keep most of us from hoping and searching for that deeper insight, however -- and from the preceding discussion, it seems likely that in this we are driven by the desire for closure that has been imprinted in us so deeply by the multitudes of narrative structures we encounter each day. It's no surprise, then, that, as Barrett writes, "the virtual environment is a place of longing. Cyberspace is an odyssey without telos, and therefore without meaning. ... Yet cyberspace is also the theatre of operations for the reconstruction of the lost body of knowledge, or, perhaps more correctly, not the reconstruction, but the always primary construction of a body of knowing. Thought and language in a virtual environment seek a higher synthesis, a re-imagining of an idea in the context of its truth" (xvi). And so we search on, following that by definition end-less quest to satisfy our desire for closure, and sticking largely to the narrative structures handed down to us through the generations. This article is no exception, of course -- but while you may gain some sense of closure from it, it is inevitable that there is a deeper feeling of a lack of closure, too, as the article takes its place in a wider hypertextual context, where so much more is still left unexplored: other articles in this issue, other issues of M/C, and further journals and Websites adding to the debate. Remember this, then: you decide when and where to stop. References Barrett, Edward, and Marie Redmont, eds. Contextual Media: Multimedia and Interpretation. Cambridge, Mass.: MIT P, 1995. Barrett, Edward. "Hiding the Head of Medusa: Objects and Desire in a Virtual Environment." Barrett & Redmont xi- vi. Beardon, Colin, and Suzette Worden. "The Virtual Curator: Multimedia Technologies and the Roles of Museums." Barrett & Redmont 63-86. Bolter, Jay David. Writing Space: The Computer, Hypertext, and the History of Writing. Hillsdale, N.J.: Lawrence Erlbaum Associates, 1991. Friedlander, Larry. "Spaces of Experience on Designing Multimedia Applications." Barrett & Redmont 163-74. Gay, Geri. "Issues in Accessing and Constructing Multimedia Documents." Barrett & Redmont 175-88. McKnight, Cliff, John Richardson, and Andrew Dillon. "The Authoring of Hypertext Documents." Hypertext: Theory into Practice. Ed. Ray McAleese. Oxford: Intellect, 1993. Nielsen, Jakob. Hypertext and Hypermedia. Boston: Academic Press, 1990. Smith, Anthony. Goodbye Gutenberg: The Newspaper Revolution of the 1980's [sic]. New York: Oxford UP, 1980. Snyder, Ilana. Hypertext: The ELectronic Labyrinth. Carlton South: Melbourne UP, 1996. Tennant, Harry, and George H. Heilmeier. "Knowledge and Equality: Harnessing the Truth of Information Abundance." Technology 2001: The Future of Computing and Communications. Ed. Derek Leebaert. Cambridge, Mass.: MIT P, 1991. Citation reference for this article MLA style: Axel Bruns. "What's the Story: The Unfulfilled Desire for Closure on the Web." M/C: A Journal of Media and Culture 2.5 (1999). [your date of access] <http://www.uq.edu.au/mc/9907/closure.php>. Chicago style: Axel Bruns, "What's the Story: The Unfulfilled Desire for Closure on the Web," M/C: A Journal of Media and Culture 2, no. 5 (1999), <http://www.uq.edu.au/mc/9907/closure.php> ([your date of access]). APA style: Axel Bruns. (1999) What's the story: the unfulfilled desire for closure on the Web. M/C: A Journal of Media and Culture 2(5). <http://www.uq.edu.au/mc/9907/closure.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
12

Humphry, Justine, and César Albarrán Torres. "A Tap on the Shoulder: The Disciplinary Techniques and Logics of Anti-Pokie Apps." M/C Journal 18, no. 2 (2015). http://dx.doi.org/10.5204/mcj.962.

Full text
Abstract:
In this paper we explore the rise of anti-gambling apps in the context of the massive expansion of gambling in new spheres of life (online and offline) and an acceleration in strategies of anticipatory and individualised management of harm caused by gambling. These apps, and the techniques and forms of labour they demand, are examples of and a mechanism through which a mode of governance premised on ‘self-care’ and ‘self-control’ is articulated and put into practice. To support this argument, we explore two government initiatives in the Australian context. Quit Pokies, a mobile app project between the Moreland City Council, North East Primary Care Partnership and the Victorian Local Governance Association, is an example of an emerging service paradigm of ‘self-care’ that uses online and mobile platforms with geo-location to deliver real time health and support interventions. A similar mobile app, Gambling Terminator, was launched by the NSW government in late 2012. Both apps work on the premise that interrupting a gaming session through a trigger, described by Quit Pokies’ creator as a “tap on the shoulder” provides gamblers the opportunity to take a reflexive stance and cut short their gambling practice in the course of play. We critically examine these apps as self-disciplining techniques of contemporary neo-liberalism directed towards anticipating and reducing the personal harm and social risk associated with gambling. We analyse the material and discursive elements, and new forms of user labour, through which this consumable media is framed and assembled. We argue that understanding the role of these apps, and mobile media more generally, in generating new techniques and technologies of the self, is important for identifying emerging modes of governance and their implications at a time when gambling is going through an immense period of cultural normalisation in online and offline environments. The Australian context is particularly germane for the way gambling permeates everyday spaces of sociality and leisure, and the potential of gambling interventions to interrupt and re-configure these spaces and institute a new kind of subject-state relation. Gambling in Australia Though a global phenomenon, the growth and expansion of gambling manifests distinctly in Australia because of its long cultural and historical attachment to games of chance. Australians are among the biggest betters and losers in the world (Ziolkowski), mainly on Electronic Gaming Machines (EGM) or pokies. As of 2013, according to The World Count of Gaming Machine (Ziolkowski), there were 198,150 EGMs in the country, of which 197,274 were slot machines, with the rest being electronic table games of roulette, blackjack and poker. There are 118 persons per machine in Australia. New South Wales is the jurisdiction with most EGMs (95,799), followed by Queensland (46,680) and Victoria (28,758) (Ziolkowski). Gambling is significant in Australian cultural history and average Australian households spend at least some money on different forms of gambling, from pokies to scratch cards, every year (Worthington et al.). In 1985, long-time gambling researcher Geoffrey Caldwell stated thatAustralians seem to take a pride in the belief that we are a nation of gamblers. Thus we do not appear to be ashamed of our gambling instincts, habits and practices. Gambling is regarded by most Australians as a normal, everyday practice in contrast to the view that gambling is a sinful activity which weakens the moral fibre of the individual and the community. (Caldwell 18) The omnipresence of gambling opportunities in most Australian states has been further facilitated by the availability of online and mobile gambling and gambling-like spaces. Social casino apps, for instance, are widely popular in Australia. The slots social casino app Slotomania was the most downloaded product in the iTunes store in 2012 (Metherell). In response to the high rate of different forms of gambling in Australia, a range of disparate interest groups have identified the expansion of gambling as a concerning trend. Health researchers have pointed out that online gamblers have a higher risk of experiencing problems with gambling (at 30%) compared to 15% in offline bettors (Hastings). The incidence of gambling problems is also disproportionately high in specific vulnerable demographics, including university students (Cervini), young adults prone to substance abuse problems (Hayatbakhsh et al.), migrants (Tanasornnarong et al.; Scull & Woolcock; Ohtsuka & Ohtsuka), pensioners (Hing & Breen), female players (Lee), Aboriginal communities (Young et al.; McMillen & Donnelly) and individuals experiencing homelessness (Holsworth et al.). While there is general recognition of the personal and public health impacts of gambling in Australia, there is a contradiction in the approach to gambling at a governance level. On one hand, its expansion is promoted and even encouraged by the federal and state governments, as gambling is an enormous source of revenue, as evidenced, for example, by the construction of the new Crown casino in Barangaroo in Sydney (Markham & Young). Campaigns trying to limit the use of poker machines, which are associated with concerns over problem gambling and addiction, are deemed by the gambling lobby as un-Australian. Paradoxically, efforts to restrict gambling or control gambling winnings have also been described as un-Australian, such as in the Australian Taxation Office’s campaign against MONA’s founder, David Walsh, whose immense art collection was acquired with the funds from a gambling scheme (Global Mail). On the other hand, people experiencing problems with gambling are often categorised as addicts and the ultimate blame (and responsibility) is attributed to the individual. In Australia, attitudes towards people who are arguably addicted to gambling are different than those towards individuals afflicted by alcohol or drug abuse (Jean). While “Australians tend to be sympathetic towards people with alcohol and other drug addictions who seek help,” unless it is seen as one of the more socially acceptable forms of occasional, controlled gambling (such as sports betting, gambling on the Melbourne Cup or celebrating ANZAC Day with Two-Up), gambling is framed as an individual “problem” and “moral failing” (Jean). The expansion of gambling is the backdrop to another development in health care and public health discourse, which have for some time now been devoted to the ideal of what Lupton has called the “digitally engaged patient” (Lupton). Technologies are central to the delivery of this model of health service provision that puts the patient at the centre of, and responsible for, their own health and medical care. Lupton has pointed out how this discourse, while appearing new, is in fact the latest version of the 1970s emphasis on the ‘patient as consumer’, an idea given an extra injection by the massive development and availability of digital and interactive web-based and mobile platforms, many of these directed towards the provision of health and health-related information and services. What this means for patients is that, rather than relying solely on professional medical expertise and care, the patient is encouraged to take on some of this medical/health work to conduct practices of ‘self-care’ (Lupton). The Discourse of ‘Self-Management’ and ‘Self-Care’ The model of ‘self-care’ and ‘self-management’ by ‘empowering’ digital technology has now become a dominant discourse within health and medicine, and is increasingly deployed across a range of related sectors such as welfare services. In recent research conducted on homelessness and mobile media, for example, government department staff involved in the reform of welfare services referred to ‘self-management’ as the new service paradigm that underpins their digital reform strategy. Echoing ideas and language similar to the “digitally engaged patient”, customers of Centrelink, Medicare and other ‘human services’ are being encouraged (through planned strategic initiatives aimed at shifting targeted customer groups online) to transact with government services digitally and manage their own personal profiles and health information. One departmental staff member described this in terms of an “opportunity cost”, the savings in time otherwise spent standing in long queues in service centres (Humphry). Rather than view these examples as isolated incidents taking place within or across sectors or disciplines, these are better understood as features of an emerging ‘discursive formation’ , a term Foucault used to describe the way in which particular institutions and/or the state establish a regime of truth, or an accepted social reality and which gives definition to a new historical episteme and subject: in this case that of the self-disciplined and “digitally engaged medical/health patient”. As Foucault explained, once this subject has become fully integrated into and across the social field, it is no longer easy to excavate, since it lies below the surface of articulation and is held together through everyday actions, habits and institutional routines and techniques that appear to be universal, necessary and/normal. The way in which this citizen subject becomes a universal model and norm, however, is not a straightforward or linear story and since we are in the midst of its rise, is not a story with a foretold conclusion. Nevertheless, across a range of different fields of governance: medicine; health and welfare, we can see signs of this emerging figure of the self-caring “digitally engaged patient” constituted from a range of different techniques and practices of self-governance. In Australia, this figure is at the centre of a concerted strategy of service digitisation involving a number of cross sector initiatives such as Australia’s National EHealth Strategy (2008), the National Digital Economy Strategy (2011) and the Australian Public Service Mobile Roadmap (2013). This figure of the self-caring “digitally engaged” patient, aligns well and is entirely compatible with neo-liberal formulations of the individual and the reduced role of the state as a provider of welfare and care. Berry refers to Foucault’s definition of neoliberalism as outlined in his lectures to the College de France as a “particular form of post-welfare state politics in which the state essentially outsources the responsibility of the ‘well-being' of the population” (65). In the case of gambling, the neoliberal defined state enables the wedding of two seemingly contradictory stances: promoting gambling as a major source of revenue and capitalisation on the one hand, and identifying and treating gambling addiction as an individual pursuit and potential risk on the other. Risk avoidance strategies are focused on particular groups of people who are targeted for self-treatment to avoid the harm of gambling addiction, which is similarly framed as individual rather than socially and systematically produced. What unites and makes possible this alignment of neoliberalism and the new “digitally engaged subject/patient” is first and foremost, the construction of a subject in a chronic state of ill health. This figure is positioned as terminal from the start. They are ‘sick’, a ‘patient’, an ‘addict’: in need of immediate and continuous treatment. Secondly, this neoliberal patient/addict is enabled (we could even go so far as to say ‘empowered’) by digital technology, especially smartphones and the apps available through these devices in the form of a myriad of applications for intervening and treating ones afflictions. These apps range fromself-tracking programs such as mood regulators through to social media interventions. Anti-Pokie Apps and the Neoliberal Gambler We now turn to two examples which illustrate this alignment between neoliberalism and the new “digitally engaged subject/patient” in relation to gambling. Anti-gambling apps function to both replace or ‘take the place’ of institutions and individuals actively involved in the treatment of problem gambling and re-engineer this service through the logics of ‘self-care’ and ‘self-management’. Here, we depart somewhat from Foucault’s model of disciplinary power summed up in the institution (with the prison exemplifying this disciplinary logic) and move towards Deleuze’s understanding of power as exerted by the State not through enclosures but through diffuse and rhizomatic information flows and technologies (Deleuze). At the same time, we retain Foucault’s attention to the role and agency of the user in this power-dynamic, identifiable in the technics of self-regulation and in his ideas on governmentality. We now turn to analyse these apps more closely, and explore the way in which these articulate and perform these disciplinary logics. The app Quit Pokies was a joint venture of the North East Primary Care Partnership, the Victorian Local Governance Association and the Moreland City Council, launched in early 2014. The idea of the rational, self-reflexive and agentic user is evident in the description of the app by app developer Susan Rennie who described it this way: What they need is for someone to tap them on the shoulder and tell them to get out of there… I thought the phone could be that tap on the shoulder. The “tap on the shoulder” feature uses geolocation and works by emitting a sound alert when the user enters a gaming venue. It also provides information about each user’s losses at that venue. This “tap on the shoulder” is both an alert and a reprimand from past gambling sessions. Through the Responsible Gambling Fund, the NSW government also launched an anti-pokie app in 2013, Gambling Terminator, including a similar feature. The app runs on Apple and Android smartphone platforms, and when a person is inside a gambling venue in New South Wales it: sends reminder messages that interrupt gaming-machine play and gives you a chance to re-think your choices. It also provides instant access to live phone and online counselling services which operate 24 hours a day, seven days a week. (Google Play Store) Yet an approach that tries to prevent harm by anticipating the harm that will come from gambling at the point of entering a venue, also eliminates the chance of potential negotiations and encounters a user might have during a visit to the pub and how this experience will unfold. It reduces the “tap on the shoulder”, which may involve a far wider set of interactions and affects, to a software operation and it frames the pub or the club (which under some conditions functions as hubs for socialization and community building) as dangerous places that should be avoided. This has the potential to lead to further stigmatisation of gamblers, their isolation and their exclusion from everyday spaces. Moreland Mayor, Councillor Tapinos captures the implicit framing of self-care as a private act in his explanation of the app as a method for problem gamblers to avoid being stigmatised by, for example, publicly attending group meetings. Yet, curiously, the app has the potential to create a new kind of public stigmatisation through potentially drawing other peoples’ attention to users’ gambling play (as the alarm is triggered) generating embarrassment and humiliation at being “caught out” in an act framed as aberrant and literally, “alarming”. Both Quit Pokies and Gambling Terminator require their users to perform ‘acts’ of physical and affective labour aimed at behaviour change and developing the skills of self-control. After downloading Quit Pokies on the iPhone and launching the app, the user is presented an initial request: “Before you set up this app. please write a list of the pokies venues that you regularly use because the app will ask you to identify these venues so it can send you alerts if you spend time in these locations. It will also use your set up location to identify other venues you might use so we recommend that you set up the App in the location where you spend most time. Congratulation on choosing Quit Pokies.”Self-performed processes include installation, setting up, updating the app software, programming in gambling venues to be detected by the smartphone’s inbuilt GPS, monitoring and responding to the program’s alerts and engaging in alternate “legitimate” forms of leisure such as going to the movies or the library, having coffee with a friend or browsing Facebook. These self-performed labours can be understood as ‘technologies of the self’, a term used by Foucault to describe the way in which social members are obliged to regulate and police their ‘selves’ through a range of different techniques. While Foucault traces the origins of ‘technologies of the self’ to the Greco-Roman texts with their emphasis on “care of oneself” as one of the duties of citizenry, he notes the shift to “self-knowledge” under Christianity around the 8th century, where it became bound up in ideals of self-renunciation and truth. Quit Pokies and Gambling Terminator may signal a recuperation of the ideal of self-care, over confession and disclosure. These apps institute a set of bodily activities and obligations directed to the user’s health and wellbeing, aided through activities of self-examination such as charting your recovery through a Recovery Diary and implementing a number of suggested “Strategies for Change” such as “writing a list” and “learning about ways to manage your money better”. Writing is central to the acts of self-examination. As Jeremy Prangnell, gambling counsellor from Mission Australia for Wollongong and Shellharbour regions explained the app is “like an electronic diary, which is a really common tool for people who are trying to change their behaviour” (Thompson). The labours required by users are also implicated in the functionality and performance of the platform itself suggesting the way in which ‘technologies of the self’ simultaneously function as a form of platform work: user labour that supports and sustains the operation of digital systems and is central to the performance and continuation of digital capitalism in general (Humphry, Demanding Media). In addition to the acts of labour performed on the self and platform, bodies are themselves potentially mobilised (and put into new circuits of consumption and production), as a result of triggers to nudge users away from gambling venues, towards a range of other cultural practices in alternative social spaces considered to be more legitimate.Conclusion Whether or not these technological interventions are effective or successful is yet to be tested. Indeed, the lack of recent activity in the community forums and preponderance of issues reported on installation and use suggests otherwise, pointing to a need for more empirical research into these developments. Regardless, what we’ve tried to identify is the way in which apps such as these embody a new kind of subject-state relation that emphasises self-control of gambling harm and hastens the divestment of institutional and social responsibility at a time when gambling is going through an immense period of expansion in many respects backed by and sanctioned by the state. Patterns of smartphone take up in the mainstream population and the rise of the so called ‘mobile only population’ (ACMA) provide support for this new subject and service paradigm and are often cited as the rationale for digital service reform (APSMR). Media convergence feeds into these dynamics: service delivery becomes the new frontier for the merging of previously separate media distribution systems (Dwyer). Letters, customer service centres, face-to-face meetings and web sites, are combined and in some instances replaced, with online and mobile media platforms, accessible from multiple and mobile devices. These changes are not, however, simply the migration of services to a digital medium with little effective change to the service itself. Health and medical services are re-invented through their technological re-assemblage, bringing into play new meanings, practices and negotiations among the state, industry and neoliberal subjects (in the case of problem gambling apps, a new subjectivity, the ‘neoliberal addict’). These new assemblages are as much about bringing forth a new kind of subject and mode of governance, as they are a solution to problem gambling. This figure of the self-treating “gambler addict” can be seen to be a template for, and prototype of, a more generalised and universalised self-governing citizen: one that no longer needs or makes demands on the state but who can help themselves and manage their own harm. Paradoxically, there is the potential for new risks and harms to the very same users that accompanies this shift: their outright exclusion as a result of deprivation from basic and assumed digital access and literacy, the further stigmatisation of gamblers, the elimination of opportunities for proximal support and their exclusion from everyday spaces. References Albarrán-Torres, César. “Gambling-Machines and the Automation of Desire.” Platform: Journal of Media and Communication 5.1 (2013). Australian Communications and Media Authority. “Australians Cut the Cord.” Research Snapshots. Sydney: ACMA (2013) Berry, David. Critical Theory and the Digital. Broadway, New York: Bloomsbury Academic, 2014 Berry, David. Stunlaw: A Critical Review of Politics, Arts and Technology. 2012. ‹http://stunlaw.blogspot.com.au/2012/03/code-foucault-and-neoliberal.html›. Caldwell, G. “Some Historical and Sociological Characteristics of Australian Gambling.” Gambling in Australia. Eds. G. Caldwell, B. Haig, M. Dickerson, and L. Sylan. Sydney: Croom Helm Australia, 1985. 18-27. Cervini, E. “High Stakes for Gambling Students.” The Age 8 Nov. 2013. ‹http://www.theage.com.au/national/education/high-stakes-for-gambling-students-20131108-2x5cl.html›. Deleuze, Gilles. "Postscript on the Societies of Control." October (1992): 3-7. Foucault, Michel. “Technologies of the Self.” Eds. Luther H. Martin, Huck Gutman and Patrick H. Hutton. Boston: University of Massachusetts Press, 1988 Hastings, E. “Online Gamblers More at Risk of Addiction.” Herald Sun 13 Oct. 2013. ‹http://www.heraldsun.com.au/news/online-gamblers-more-at-risk-of-addiction/story-fni0fiyv-1226739184629#!›.Hayatbakhsh, Mohammad R., et al. "Young Adults' Gambling and Its Association with Mental Health and Substance Use Problems." Australian and New Zealand Journal of Public Health 36.2 (2012): 160-166. Hing, Nerilee, and Helen Breen. "A Profile of Gaming Machine Players in Clubs in Sydney, Australia." Journal of Gambling Studies 18.2 (2002): 185-205. Holdsworth, Louise, Margaret Tiyce, and Nerilee Hing. "Exploring the Relationship between Problem Gambling and Homelessness: Becoming and Being Homeless." Gambling Research 23.2 (2012): 39. Humphry, Justine. “Demanding Media: Platform Work and the Shaping of Work and Play.” Scan: Journal of Media Arts Culture, 10.2 (2013): 1-13. Humphry, Justine. “Homeless and Connected: Mobile Phones and the Internet in the Lives of Homeless Australians.” Australian Communications Consumer Action Network. Sep. 2014. ‹https://www.accan.org.au/grants/completed-grants/619-homeless-and-connected›.Lee, Timothy Jeonglyeol. "Distinctive Features of the Australian Gambling Industry and Problems Faced by Australian Women Gamblers." Tourism Analysis 14.6 (2009): 867-876. Lupton, D. “The Digitally Engaged Patient: Self-Monitoring and Self-Care in the Digital Health Era.” Social Theory & Health 11.3 (2013): 256-70. Markham, Francis, and Martin Young. “Packer’s Barangaroo Casino and the Inevitability of Pokies.” The Conversation 9 July 2013. ‹http://theconversation.com/packers-barangaroo-casino-and-the-inevitability-of-pokies-15892›. Markham, Francis, and Martin Young. “Who Wins from ‘Big Gambling’ in Australia?” The Conversation 6 Mar. 2014. ‹http://theconversation.com/who-wins-from-big-gambling-in-australia-22930›.McMillen, Jan, and Katie Donnelly. "Gambling in Australian Indigenous Communities: The State of Play." The Australian Journal of Social Issues 43.3 (2008): 397. Ohtsuka, Keis, and Thai Ohtsuka. “Vietnamese Australian Gamblers’ Views on Luck and Winning: Universal versus Culture-Specific Schemas.” Asian Journal of Gambling Issues and Public Health 1.1 (2010): 34-46. Scull, Sue, Geoffrey Woolcock. “Problem Gambling in Non-English Speaking Background Communities in Queensland, Australia: A Qualitative Exploration.” International Gambling Studies 5.1 (2005): 29-44. Tanasornnarong, Nattaporn, Alun Jackson, and Shane Thomas. “Gambling among Young Thai People in Melbourne, Australia: An Exploratory Study.” International Gambling Studies 4.2 (2004): 189-203. Thompson, Angela, “Live Gambling Odds Tipped for the Chop.” Illawarra Mercury 22 May 2013: 6. Metherell, Mark. “Virtual Pokie App a Hit - But ‘Not Gambling.’” Sydney Morning Herald 13 Jan. 2013. ‹http://www.smh.com.au/digital-life/smartphone-apps/virtual-pokie-app-a-hit--but-not-gambling-20130112-2cmev.html#ixzz2QVlsCJs1›. Worthington, Andrew, et al. "Gambling Participation in Australia: Findings from the National Household Expenditure Survey." Review of Economics of the Household 5.2 (2007): 209-221. Young, Martin, et al. "The Changing Landscape of Indigenous Gambling in Northern Australia: Current Knowledge and Future Directions." International Gambling Studies 7.3 (2007): 327-343. Ziolkowski, S. “The World Count of Gaming Machines 2013.” Gaming Technologies Association, 2014. ‹http://www.gamingta.com/pdf/World_Count_2014.pdf›.
APA, Harvard, Vancouver, ISO, and other styles
13

Ensminger, David Allen. "Populating the Ambient Space of Texts: The Intimate Graffiti of Doodles. Proposals Toward a Theory." M/C Journal 13, no. 2 (2010). http://dx.doi.org/10.5204/mcj.219.

Full text
Abstract:
In a media saturated world, doodles have recently received the kind of attention usually reserved for coverage of racy extra marital affairs, corrupt governance, and product malfunction. Former British Prime Minister Blair’s private doodling at a World Economic Forum meeting in 2005 raised suspicions that he, according to one keen graphologist, struggled “to maintain control in a confusing world," which infers he was attempting to cohere a scattershot, fragmentary series of events (Spiegel). However, placid-faced Microsoft CEO Bill Gates, who sat nearby, actually scrawled the doodles. In this case, perhaps the scrawls mimicked the ambience in the room: Gates might have been ‘tuning’–registering the ‘white noise’ of the participants, letting his unconscious dictate doodles as a way to cope with the dissonance trekking in with the officialspeak. The doodles may have documented and registered the space between words, acting like deposits from his gestalt.Sometimes the most intriguing doodles co-exist with printed texts. This includes common vernacular graffiti that lines public and private books and magazines. Such graffiti exposes tensions in the role of readers as well as horror vacui: a fear of unused, empty space. Yet, school children fingering fresh pages and stiff book spines for the first few times often consider their book pages as sanctioned, discreet, and inviolable. The book is an object of financial and cultural investment, or imbued both with mystique and ideologies. Yet, in the e-book era, the old-fashioned, physical page is a relic of sorts, a holdover from coarse papyrus culled from wetland sage, linking us to the First Dynasty in Egypt. Some might consider the page as a vessel for typography, a mere framing device for text. The margins may reflect a perimeter of nothingness, an invisible borderland that doodles render visible by inhabiting them. Perhaps the margins are a bare landscape, like unmarred flat sand in a black and white panchromatic photo with unique tonal signature and distinct grain. Perhaps the margins are a mute locality, a space where words have evaporated, or a yet-to-be-explored environment, or an ambient field. Then comes the doodle, an icon of vernacular art.As a modern folklorist, I have studied and explored vernacular art at length, especially forms that may challenge and fissure aesthetic, cultural, and social mores, even within my own field. For instance, I contend that Grandma Prisbrey’s “Bottle Village,” featuring millions of artfully arranged pencils, bottles, and dolls culled from dumps in Southern California, is a syncretic culturescape with underlying feminist symbolism, not merely the product of trauma and hoarding (Ensminger). Recently, I flew to Oregon to deliver a paper on Mexican-American gravesite traditions. In a quest for increased multicultural tolerance, I argued that inexpensive dimestore objects left on Catholic immigrant graves do not represent a messy landscape of trinkets but unique spiritual environments with links to customs 3,000 years old. For me, doodles represent a variation on graffiti-style art with cultural antecedents stretching back throughout history, ranging from ancient scrawls on Greek ruins to contemporary park benches (with chiseled names, dates, and symbols), public bathroom latrinalia, and spray can aerosol art, including ‘bombing’ and ‘tagging’ hailed as “Spectacular Vernaculars” by Russell Potter (1995). Noted folklorist Alan Dundes mused on the meaning of latrinalia in Here I Sit – A Study of American Latrinalia (1966), which has inspired pop culture books and web pages for the preservation and discussion of such art (see for instance, www.itsallinthehead.com/gallery1.html). Older texts such as Classic American Graffiti by Allen Walker Read (1935), originally intended for “students of linguistics, folk-lore, abnormal psychology,” reveal the field’s longstanding interest in marginal, crude, and profane graffiti.Yet, to my knowledge, a monograph on doodles has yet to be published by a folklorist, perhaps because the art form is reconsidered too idiosyncratic, too private, the difference between jots and doodles too blurry for a taxonomy and not the domain of identifiable folk groups. In addition, the doodles in texts often remain hidden until single readers encounter them. No broad public interaction is likely, unless a library text circulates freely, which may not occur after doodles are discovered. In essence, the books become tainted, infected goods. Whereas latrinalia speaks openly and irreverently, doodles feature a different scale and audience.Doodles in texts may represent a kind of speaking from the ‘margin’s margins,’ revealing the reader-cum-writer’s idiosyncratic, self-meaningful, and stylised hieroglyphics from the ambient margins of one’s consciousness set forth in the ambient margins of the page. The original page itself is an ambient territory that allows the meaning of the text to take effect. When those liminal spaces (both between and betwixt, in which the rules of page format, design, style, and typography are abandoned) are altered by the presence of doodles, the formerly blank, surplus, and soft spaces of the page offer messages coterminous with the text, often allowing readers to speak, however haphazardly and unconsciously, with and against the triggering text. The bleached whiteness can become a crowded milieu in the hands of a reader re-scripting the ambient territory. If the book is borrowed, then the margins are also an intimate negotiation with shared or public space. The cryptic residue of the doodler now resides, waiting, for the city of eyes.Throughout history, both admired artists and Presidents regularly doodled. Famed Italian Renaissance painter Filippo Lippi avoided strenuous studying by doodling in his books (Van Cleave 44). Both sides of the American political spectrum have produced plentiful inky depictions as well: roughshod Democratic President Johnson drew flags and pagodas; former Hollywood fantasy fulfiller turned politician Republican President Reagan’s specialty was western themes, recalling tropes both from his actor period and his duration acting as President; meanwhile, former law student turned current President, Barack Obama, has sketched members of Congress and the Senate for charity auctions. These doodles are rich fodder for both psychologists and cross-discipline analysts that propose theories regarding the automatic writing and self-styled miniature pictures of civic leaders. Doodles allow graphologists to navigate and determine the internal, cognitive fabric of the maker. To critics, they exist as mere trifles and offer nothing more than an iota of insight; doodles are not uncanny offerings from the recesses of memory, like bite-sized Rorschach tests, but simply sloppy scrawls of the bored.Ambient music theory may shed some light. Timothy Morton argues that Brian Eno designed to make music that evoked “space whose quality had become minimally significant” and “deconstruct the opposition … between figure and ground.” In fact, doodles may yield the same attributes as well. After a doodle is inserted into texts, the typography loses its primacy. There is a merging of the horizons. The text of the author can conflate with the text of the reader in an uneasy dance of meaning: the page becomes an interface revealing a landscape of signs and symbols with multiple intelligences–one manufactured and condoned, the other vernacular and unsanctioned. A fixed end or beginning between the two no longer exists. The ambient space allows potential energies to hover at the edge, ready to illustrate a tension zone and occupy the page. The blank spaces keep inviting responses. An emergent discourse is always in waiting, always threatening to overspill the text’s intended meaning. In fact, the doodles may carry more weight than the intended text: the hierarchy between authorship and readership may topple.Resistant reading may take shape during these bouts. The doodle is an invasion and signals the geography of disruption, even when innocuous. It is a leveling tool. As doodlers place it alongside official discourse, they move away from positions of passivity, being mere consumers, and claim their own autonomy and agency. The space becomes co-determinant as boundaries are blurred. The destiny of the original text’s meaning is deferred. The habitus of the reader becomes embodied in the scrawl, and the next reader must negotiate and navigate the cultural capital of this new author. As such, the doodle constitutes an alternative authority and economy of meaning within the text.Recent studies indicate doodling, often regarded as behavior that announces a person’s boredom and withdrawal, is actually a very special tool to prevent memory loss. Jackie Andrade, an expert from the School of Psychology at the University of Plymouth, maintains that doodling actually “offsets the effects of selective memory blockade,” which yields a surprising result (quoted in “Doodling Gets”). Doodlers exhibit 29% more memory recall than those who passively listen, frozen in an unequal bond with the speaker/lecturer. Students that doodle actually retain more information and are likely more productive due to their active listening. They adeptly absorb information while students who stare patiently or daydream falter.Furthermore, in a 2006 paper, Andrew Kear argues that “doodling is a way in which students, consciously or not, stake a claim of personal agency and challenge some the values inherent in the education system” (2). As a teacher concerned with the engagement of students, he asked for three classes to submit their doodles. Letting them submit any two-dimensional graphic or text made during a class (even if made from body fluid), he soon discovered examples of “acts of resistance” in “student-initiated effort[s] to carve out a sense of place within the educational institution” (6). Not simply an ennui-prone teenager or a proto-surrealist trying to render some automatic writing from the fringes of cognition, a student doodling may represent contested space both in terms of the page itself and the ambience of the environment. The doodle indicates tension, and according to Kear, reflects students reclaiming “their own self-recognized voice” (6).In a widely referenced 1966 article (known as the “doodle” article) intended to describe the paragraph organisational styles of different cultures, Robert Kaplan used five doodles to investigate a writer’s thought patterns, which are rooted in cultural values. Now considered rather problematic by some critics after being adopted by educators for teacher-training materials, Kaplan’s doodles-as-models suggest, “English speakers develop their ideas in a linear, hierarchal fashion and ‘Orientals’ in a non-liner, spiral fashion…” (Severino 45). In turn, when used as pedagogical tools, these graphics, intentionally or not, may lead an “ethnocentric, assimilationist stance” (45). In this case, doodles likely shape the discourse of English as Second Language instruction. Doodles also represent a unique kind of “finger trace,” not unlike prints from the tips of a person’s fingers and snowflakes. Such symbol systems might be used for “a means of lightweight authentication,” according to Christopher Varenhorst of MIT (1). Doodles, he posits, can be used as “passdoodles"–a means by which a program can “quickly identify users.” They are singular expressions that are quirky and hard to duplicate; thus, doodles could serve as substitute methods of verifying people who desire devices that can safeguard their privacy without users having to rely on an ever-increasing number of passwords. Doodles may represent one such key. For many years, psychologists and psychiatrists have used doodles as therapeutic tools in their treatment of children that have endured hardship, ailments, and assault. They may indicate conditions, explain various symptoms and pathologies, and reveal patterns that otherwise may go unnoticed. For instance, doodles may “reflect a specific physical illness and point to family stress, accidents, difficult sibling relationships, and trauma” (Lowe 307). Lowe reports that children who create a doodle featuring their own caricature on the far side of the page, distant from an image of parent figures on the same page, may be experiencing detachment, while the portrayal of a father figure with “jagged teeth” may indicate a menace. What may be difficult to investigate in a doctor’s office conversation or clinical overview may, in fact, be gleaned from “the evaluation of a child’s spontaneous doodle” (307). So, if children are suffering physically or psychologically and unable to express themselves in a fully conscious and articulate way, doodles may reveal their “self-concept” and how they feel about their bodies; therefore, such creative and descriptive inroads are important diagnostic tools (307). Austrian born researcher Erich Guttman and his cohort Walter MacLay both pioneered art therapy in England during the mid-twentieth century. They posited doodles might offer some insight into the condition of schizophrenics. Guttman was intrigued by both the paintings associated with the Surrealist movement and the pioneering, much-debated work of Sigmund Freud too. Although Guttman mostly studied professionally trained artists who suffered from delusions and other conditions, he also collected a variety of art from patients, including those undergoing mescaline therapy, which alters a person’s consciousness. In a stroke of luck, they were able to convince a newspaper editor at the Evening Standard to provide them over 9,000 doodles that were provided by readers for a contest, each coded with the person’s name, age, and occupation. This invaluable data let the academicians compare the work of those hospitalised with the larger population. Their results, released in 1938, contain several key declarations and remain significant contributions to the field. Subsequently, Francis Reitman recounted them in his own book Psychotic Art: Doodles “release the censor of the conscious mind,” allowing a person to “relax, which to creative people was indispensable to production.”No appropriate descriptive terminology could be agreed upon.“Doodles are not communications,” for the meaning is only apparent when analysed individually.Doodles are “self-meaningful.” (37) Doodles, the authors also established, could be divided into this taxonomy: “stereotypy, ornamental details, movements, figures, faces and animals” or those “depicting scenes, medley, and mixtures” (37). The authors also noted that practitioners from the Jungian school of psychology often used “spontaneously produced drawings” that were quite “doodle-like in nature” in their own discussions (37). As a modern folklorist, I venture that doodles offer rich potential for our discipline as well. At this stage, I am offering a series of dictums, especially in regards to doodles that are commonly found adjacent to text in books and magazines, notebooks and journals, that may be expanded upon and investigated further. Doodles allow the reader to repopulate the text with ideogram-like expressions that are highly personalised, even inscrutable, like ambient sounds.Doodles re-purpose the text. The text no longer is unidirectional. The text becomes a point of convergence between writer and reader. The doodling allows for such a conversation, bilateral flow, or “talking back” to the text.Doodles reveal a secret language–informal codes that hearken back to the “lively, spontaneous, and charged with feeling” works of child art or naïve art that Victor Sanua discusses as being replaced in a child’s later years by art that is “stilted, formal, and conforming” (62).Doodling animates blank margins, the dead space of the text adjacent to the script, making such places ripe for spontaneous, fertile, and exploratory markings.Doodling reveals a democratic, participatory ethos. No text is too sacred, no narrative too inviolable. Anything can be reworked by the intimate graffiti of the reader. The authority of the book is not fixed; readers negotiate and form a second intelligence imprinted over the top of the original text, blurring modes of power.Doodles reveal liminal moments. Since the reader in unmonitored, he or she can express thoughts that may be considered marginal or taboo by the next reader. The original subject of the book itself does not restrict the reader. Thus, within the margins of the page, a brief suspension of boundaries and borders, authority and power, occurs. The reader hides in anonymity, free to reroute the meaning of the book. Doodling may convey a reader’s infantalism. Every book can become a picture book. This art can be the route returning a reader to the ambience of childhood.Doodling may constitute Illuminated/Painted Texts in reverse, commemorating the significance of the object in hitherto unexpected forms and revealing the reader’s codex. William Blake adorned his own poems by illuminating the skin/page that held his living verse; common readers may do so too, in naïve, nomadic, and primitive forms. Doodling demarcates tension zones, yielding social-historical insights into eras while offering psychological glimpses and displaying aesthetic values of readers-cum-writers.Doodling reveals margins as inter-zones, replete with psychogeography. While the typography is sanctioned, legitimate, normalised, and official discourse (“chartered” and “manacled,” to hijack lines from William Blake), the margins are a vernacular depository, a terminus, allowing readers a sense of agency and autonomy. The doodled page becomes a visible reminder and signifier: all pages are potentially “contested” spaces. Whereas graffiti often allows a writer to hide anonymously in the light in a city besieged by multiple conflicting texts, doodles allow a reader-cum-writer’s imprint to live in the cocoon of a formerly fossilised text, waiting for the light. Upon being opened, the book, now a chimera, truly breathes. Further exploration and analysis should likely consider several issues. What truly constitutes and shapes the role of agent and reader? Is the reader an agent all the time, or only when offering resistant readings through doodles? How is a doodler’s agency mediated by the author or the format of texts in forms that I have to map? Lastly, if, as I have argued, the ambient space allows potential energies to hover at the edge, ready to illustrate a tension zone and occupy the page, what occurs in the age of digital or e-books? Will these platforms signal an age of acquiescence to manufactured products or signal era of vernacular responses, somehow hitched to html code and PDF file infiltration? Will bytes totally replace type soon in the future, shaping unforeseen actions by doodlers? Attached Figures Figure One presents the intimate graffiti of my grandfather, found in the 1907 edition of his McGuffey’s Eclectic Spelling Book. The depiction is simple, even crude, revealing a figure found on the adjacent page to Lesson 248, “Of Characters Used in Punctuation,” which lists the perfunctory functions of commas, semicolons, periods, and so forth. This doodle may offset the routine, rote, and rather humdrum memorisation of such grammatical tools. The smiling figure may embody and signify joy on an otherwise machine-made bare page, a space where my grandfather illustrated his desires (to lighten a mood, to ease dissatisfaction?). Historians Joe Austin and Michael Willard examine how youth have been historically left without legitimate spaces in which to live out their autonomy outside of adult surveillance. For instance, graffiti often found on walls and trains may reflect a sad reality: young people are pushed to appropriate “nomadic, temporary, abandoned, illegal, or otherwise unwatched spaces within the landscape” (14). Indeed, book graffiti, like the graffiti found on surfaces throughout cities, may offer youth a sense of appropriation, authorship, agency, and autonomy: they take the page of the book, commit their writing or illustration to the page, discover some freedom, and feel temporarily independent even while they are young and disempowered. Figure Two depicts the doodles of experimental filmmaker Jim Fetterley (Animal Charm productions) during his tenure as a student at the Art Institute of Chicago in the early 1990s. His two doodles flank the text of “Lady Lazarus” by Sylvia Plath, regarded by most readers as an autobiographical poem that addresses her own suicide attempts. The story of Lazarus is grounded in the Biblical story of John Lazarus of Bethany, who was resurrected from the dead. The poem also alludes to the Holocaust (“Nazi Lampshades”), the folklore surrounding cats (“And like the cat I have nine times to die”), and impending omens of death (“eye pits “ … “sour breath”). The lower doodle seems to signify a motorised tank-like machine, replete with a furnace or engine compartment on top that bellows smoke. Such ominous images, saturated with potential cartoon-like violence, may link to the World War II references in the poem. Meanwhile, the upper doodle seems to be curiously insect-like, and Fetterley’s name can be found within the illustration, just like Plath’s poem is self-reflexive and addresses her own plight. Most viewers might find the image a bit more lighthearted than the poem, a caricature of something biomorphic and surreal, but not very lethal. Again, perhaps this is a counter-message to the weight of the poem, a way to balance the mood and tone, or it may well represent the larval-like apparition that haunts the very thoughts of Plath in the poem: the impending disease of her mind, as understood by the wary reader. References Austin, Joe, and Michael Willard. “Introduction: Angels of History, Demons of Culture.” Eds. Joe Austion and Michael Willard. Generations of Youth: Youth Cultures and History in Twentieth-Century America. New York: NYU Press, 1998. “Doodling Gets Its Due: Those Tiny Artworks May Aid Memory.” World Science 2 March 2009. 15 Jan. 2009 ‹http://www.world-science.net/othernews/090302_doodle›. Dundes, Alan. “Here I Sit – A Study of American Latrinalia.” Papers of the Kroeber Anthropological Society 34: 91-105. Ensminger, David. “All Bottle Up: Reinterpreting the Culturescape of Grandma Prisbey.” Adironack Review 9.3 (Fall 2008). ‹http://adirondackreview.homestead.com/ensminger2.html›. Kear, Andrew. “Drawings in the Margins: Doodling in Class an Act of Reclamation.” Graduate Student Conference. University of Toronto, 2006. ‹http://gradstudentconference.oise.utoronto.ca/documents/185/Drawing%20in%20the%20Margins.doc›. Lowe, Sheila R. The Complete Idiot’s Guide to Handwriting Analysis. New York: Alpha Books, 1999. Morton, Timothy. “‘Twinkle, Twinkle Little Star’ as an Ambient Poem; a Study of Dialectical Image; with Some Remarks on Coleridge and Wordsworth.” Romantic Circles Praxis Series (2001). 6 Jan. 2009 ‹http://www.rc.umd.edu/praxis/ecology/morton/morton.html›. Potter, Russell A. Spectacular Vernaculars: Hip Hop and the Politics of Postmodernism. Albany: State University of New York, 1995. Read, Allen Walker. Classic American Graffiti: Lexical Evidence from Folk Epigraphy in Western North America. Waukesha, Wisconsin: Maledicta Press, 1997. Reitman, Francis. Psychotic Art. London: Routledge, 1999. Sanua, Victor. “The World of Mystery and Wonder of the Schizophrenic Patient.” International Journal of Social Psychiatry 8 (1961): 62-65. Severino, Carol. “The ‘Doodles’ in Context: Qualifying Claims about Contrastive Rhetoric.” The Writing Center Journal 14.1 (Fall 1993): 44-62. Van Cleave, Claire. Master Drawings of the Italian Rennaissance. Cambridge, Mass.: Harvard UP, 2007. Varenhost, Christopher. Passdoodles: A Lightweight Authentication Method. Research Science Institute. Cambridge, Mass.: Massachusetts Institute of Technology, 2004.
APA, Harvard, Vancouver, ISO, and other styles
14

Maybury, Terry. "Home, Capital of the Region." M/C Journal 11, no. 5 (2008). http://dx.doi.org/10.5204/mcj.72.

Full text
Abstract:
There is, in our sense of place, little cognisance of what lies underground. Yet our sense of place, instinctive, unconscious, primeval, has its own underground: the secret spaces which mirror our insides; the world beneath the skin. Our roots lie beneath the ground, with the minerals and the dead. (Hughes 83) The-Home-and-Away-Game Imagine the earth-grounded, “diagrammatological” trajectory of a footballer who as one member of a team is psyching himself up before the start of a game. The siren blasts its trumpet call. The footballer bursts out of the pavilion (where this psyching up has taken place) to engage in the opening bounce or kick of the game. And then: running, leaping, limping after injury, marking, sliding, kicking, and possibly even passing out from concussion. Finally, the elation accompanying the final siren, after which hugs, handshakes and raised fists conclude the actual match on the football oval. This exit from the pavilion, the course the player takes during the game itself, and return to the pavilion, forms a combination of stasis and movement, and a return to exhausted stasis again, that every player engages with regardless of the game code. Examined from a “diagrammatological” perspective, a perspective Rowan Wilken (following in the path of Gilles Deleuze and W. J. T. Mitchell) understands as “a generative process: a ‘metaphor’ or way of thinking — diagrammatic, diagrammatological thinking — which in turn, is linked to poetic thinking” (48), this footballer’s scenario arises out of an aerial perspective that depicts the actual spatial trajectory the player takes during the course of a game. It is a diagram that is digitally encoded via a sensor on the footballer’s body, and being an electronically encoded diagram it can also make available multiple sets of data such as speed, heartbeat, blood pressure, maybe even brain-wave patterns. From this limited point of view there is only one footballer’s playing trajectory to consider; various groupings within the team, the whole team itself, and the diagrammatological depiction of its games with various other teams might also be possible. This singular imagining though is itself an actuality: as a diagram it is encoded as a graphic image by a satellite hovering around the earth with a Global Positioning System (GPS) reading the sensor attached to the footballer which then digitally encodes this diagrammatological trajectory for appraisal later by the player, coach, team and management. In one respect, this practice is another example of a willing self-surveillance critical to explaining the reflexive subject and its attribute of continuous self-improvement. According to Docker, Official Magazine of the Fremantle Football Club, this is a technique the club uses as a part of game/play assessment, a system that can provide a “running map” for each player equipped with such a tracking device during a game. As the Fremantle Club’s Strength and Conditioning Coach Ben Tarbox says of this tactic, “We’re getting a physiological profile that has started to build a really good picture of how individual players react during a game” (21). With a little extra effort (and some sizeable computer processing grunt) this two dimensional linear graphic diagram of a footballer working the football ground could also form the raw material for a three-dimensional animation, maybe a virtual reality game, even a hologram. It could also be used to sideline a non-performing player. Now try another related but different imagining: what if this diagrammatological trajectory could be enlarged a little to include the possibility that this same player’s movements could be mapped out by the idea of home-and-away games; say over the course of a season, maybe even a whole career, for instance? No doubt, a wide range of differing diagrammatological perspectives might suggest themselves. My own particular refinement of this movement/stasis on the footballer’s part suggests my own distinctive comings and goings to and from my own specific piece of home country. And in this incessantly domestic/real world reciprocity, in this diurnally repetitive leaving and coming back to home country, might it be plausible to think of “Home as Capital of the Region”? If, as Walter Benjamin suggests in the prelude to his monumental Arcades Project, “Paris — the Capital of the Nineteenth Century,” could it be that both in and through my comings and goings to and from this selfsame home country, my own burgeoning sense of regionality is constituted in every minute-by-minutiae of lived experience? Could it be that this feeling about home is manifested in my every day-to-night manoeuvre of home-and-away-and-away-and-home-making, of every singular instance of exit, play/engage, and the return home? “Home, Capital of the Region” then examines the idea that my home is that part of the country which is the still-point of eternal return, the bedrock to which I retreat after the daily grind, and the point from which I start out and do it all again the next day. It employs, firstly, this ‘diagrammatological’ perspective to illustrate the point that this stasis/movement across country can make an electronic record of my own psychic self-surveillance and actualisation in-situ. And secondly, the architectural plan of the domestic home (examined through the perspective of critical regionalism) is used as a conduit to illustrate how I am physically embedded in country. Lastly, intermingling these digressive threads is chora, Plato’s notion of embodied place and itself an ancient regional rendering of this eternal return to the beginning, the place where the essential diversity of country decisively enters the soul. Chora: Core of Regionality Kevin Lynch writes that, “Our senses are local, while our experience is regional” (10), a combination that suggests this regional emphasis on home-and-away-making might be a useful frame of reference (simultaneously spatiotemporal, both a visceral and encoded communication) for me to include as a crucial vector in my own life-long learning package. Regionality (as, variously, a sub-generic categorisation and an extension/concentration of nationality, as well as a recently re-emerged friend/antagonist to a global understanding) infuses my world of home with a grounded footing in country, one that is a site of an Eternal Return to the Beginning in the micro-world of the everyday. This is a point John Sallis discusses at length in his analysis of Plato’s Timaeus and its founding notion of regionality: chora. More extended absences away from home-base are of course possible but one’s return to home on most days and for most nights is a given of post/modern, maybe even of ancient everyday experience. Even for the continually shifting nomad, nightfall in some part of the country brings the rest and recreation necessary for the next day’s wanderings. This fundamental question of an Eternal Return to the Beginning arises as a crucial element of the method in Plato’s Timaeus, a seemingly “unstructured” mythic/scientific dialogue about the origins and structure of both the psychically and the physically implaced world. In the Timaeus, “incoherence is especially obvious in the way the natural sequence in which a narrative would usually unfold is interrupted by regressions, corrections, repetitions, and abrupt new beginnings” (Gadamer 160). Right in the middle of the Timaeus, in between its sections on the “Work of Reason” and the “Work of Necessity”, sits chora, both an actual spatial and bodily site where my being intersects with my becoming, and where my lived life criss-crosses the various arts necessary to articulating a recorded version of that life. Every home is a grounded chora-logical timespace harness guiding its occupant’s thoughts, feelings and actions. My own regionally implaced chora (an example of which is the diagrammatological trajectory already outlined above as my various everyday comings and goings, of me acting in and projecting myself into context) could in part be understood as a graphical realisation of the extent of my movements and stationary rests in my own particular timespace trajectory. The shorthand for this process is ‘embedded’. Gregory Ulmer writes of chora that, “While chorography as a term is close to choreography, it duplicates a term that already exists in the discipline of geography, thus establishing a valuable resonance for a rhetoric of invention concerned with the history of ‘place’ in relation to memory” (Heuretics 39, original italics). Chorography is the geographic discipline for the systematic study and analysis of regions. Chora, home, country and regionality thus form an important multi-dimensional zone of interplay in memorialising the game of everyday life. In light of these observations I might even go so far as to suggest that this diagrammatological trajectory (being both digital and GPS originated) is part of the increasingly electrate condition that guides the production of knowledge in any global/regional context. This last point is a contextual connection usefully examined in Alan J. Scott’s Regions and the World Economy: The Coming Shape of Global Production, Competition, and Political Order and Michael Storper’s The Regional World: Territorial Development in a Global Economy. Their analyses explicitly suggest that the symbiosis between globalisation and regionalisation has been gathering pace since at least the end of World War Two and the Bretton Woods agreement. Our emerging understanding of electracy also happens to be Gregory Ulmer’s part-remedy for shifting the ground under the intense debates surrounding il/literacy in the current era (see, in particular, Internet Invention). And, for Tony Bennett, Michael Emmison and John Frow’s analysis of “Australian Everyday Cultures” (“Media Culture and the Home” 57–86), it is within the home that our un.conscious understanding of electronic media is at its most intense, a pattern that emerges in the longer term through receiving telegrams, compiling photo albums, listening to the radio, home- and video-movies, watching the evening news on television, and logging onto the computer in the home-office, media-room or home-studio. These various generalisations (along with this diagrammatological view of my comings and goings to and from the built space of home), all point indiscriminately to a productive confusion surrounding the sedentary and nomadic opposition/conjunction. If natural spaces are constituted in nouns like oceans, forests, plains, grasslands, steppes, deserts, rivers, tidal interstices, farmland etc. (and each categorisation here relies on the others for its existence and demarcation) then built space is often seen as constituting its human sedentary equivalent. For Deleuze and Guatteri (in A Thousand Plateaus, “1227: Treatise on Nomadology — The War Machine”) these natural spaces help instigate a nomadic movement across localities and regions. From a nomadology perspective, these smooth spaces unsettle a scientific, numerical calculation, sometimes even aesthetic demarcation and order. If they are marked at all, it is by heterogenous and differential forces, energised through constantly oscillating intensities. A Thousand Plateaus is careful though not to elevate these smooth nomadic spaces over the more sedentary spaces of culture and power (372–373). Nonetheless, as Edward S. Casey warns, “In their insistence on becoming and movement, however, the authors of A Thousand Plateaus overlook the placial potential of settled dwelling — of […] ‘built places’” (309, original italics). Sedentary, settled dwelling centred on home country may have a crust of easy legibility and order about it but it also formats a locally/regionally specific nomadic quality, a point underscored above in the diagrammatological perspective. The sedentary tendency also emerges once again in relation to home in the architectural drafting of the domestic domicile. The Real Estate Revolution When Captain Cook planted the British flag in the sand at Botany Bay in 1770 and declared the country it spiked as Crown Land and henceforth will come under the ownership of an English sovereign, it was also the moment when white Australia’s current fascination with real estate was conceived. In the wake of this spiking came the intense anxiety over Native Title that surfaced in late twentieth century Australia when claims of Indigenous land grabs would repossess suburban homes. While easily dismissed as hyperbole, a rhetorical gesture intended to arouse this very anxiety, its emergence is nonetheless an indication of the potential for political and psychic unsettling at the heart of the ownership and control of built place, or ‘settled dwelling’ in the Australian context. And here it would be wise to include not just the gridded, architectural quality of home-building and home-making, but also the home as the site of the family romance, another source of unsettling as much as a peaceful calming. Spreading out from the boundaries of the home are the built spaces of fences, bridges, roads, railways, airport terminals (along with their interconnecting pathways), which of course brings us back to the communications infrastructure which have so often followed alongside the development of transport infrastructure. These and other elements represent this conglomerate of built space, possibly the most significant transformation of natural space that humanity has brought about. For the purposes of this meditation though it is the more personal aspect of built space — my home and regional embeddedness, along with their connections into the global electrosphere — that constitutes the primary concern here. For a sedentary, striated space to settle into an unchallenged existence though requires a repression of the highest order, primarily because of the home’s proximity to everyday life, of the latter’s now fading ability to sometimes leave its presuppositions well enough alone. In settled, regionally experienced space, repressions are more difficult to abstract away, they are lived with on a daily basis, which also helps to explain the extra intensity brought to their sometimes-unsettling quality. Inversely, and encased in this globalised electro-spherical ambience, home cannot merely be a place where one dwells within avoiding those presuppositions, I take them with me when I travel and they come back with me from afar. This is a point obliquely reflected in Pico Iyer’s comment that “Australians have so flexible a sense of home, perhaps, that they can make themselves at home anywhere” (185). While our sense of home may well be, according to J. Douglas Porteous, “the territorial core” of our being, when other arrangements of space and knowledge shift it must inevitably do so as well. In these shifts of spatial affiliation (aided and abetted by regionalisation, globalisation and electronic knowledge), the built place of home can no longer be considered exclusively under the illusion of an autonomous sanctuary wholly guaranteed by capitalist property relations, one of the key factors in its attraction. These shifts in the cultural, economic and psychic relation of home to country are important to a sense of local and regional implacement. The “feeling” of autonomy and security involved in home occupation and/or ownership designates a component of this implacement, a point leading to Eric Leed’s comment that, “By the sixteenth century, literacy had become one of the definitive signs — along with the possession of property and a permanent residence — of an independent social status” (53). Globalising and regionalising forces make this feeling of autonomy and security dynamic, shifting the ground of home, work-place practices and citizenship allegiances in the process. Gathering these wide-ranging forces impacting on psychic and built space together is the emergence of critical regionalism as a branch of architectonics, considered here as a theory of domestic architecture. Critical Regionality Critical regionalism emerged out of the collective thinking of Liane Lefaivre and Alexander Tzonis (Tropical Architecture; Critical Regionalism), and as these authors themselves acknowledge, was itself deeply influenced by the work of Lewis Mumford during the first part of the twentieth century when he was arguing against the authority of the international style in architecture, a style epitomised by the Bauhaus movement. It is Kenneth Frampton’s essay, “Towards a Critical Regionalism: Six Points for an Architecture of Resistance” that deliberately takes this question of critical regionalism and makes it a part of a domestic architectonic project. In many ways the ideas critical regionalism espouses can themselves be a microcosm of this concomitantly emerging global/regional polis. With public examples of built-form the power of the centre is on display by virtue of a building’s enormous size and frequently high-cultural aesthetic power. This is a fact restated again and again from the ancient world’s agora to Australia’s own political bunker — its Houses of Parliament in Canberra. While Frampton discusses a range of aspects dealing with the universal/implaced axis across his discussion, it is points five and six that deserve attention from a domestically implaced perspective. Under the sub-heading, “Culture Versus Nature: Topography, Context, Climate, Light and Tectonic Form” is where he writes that, Here again, one touches in concrete terms this fundamental opposition between universal civilization and autochthonous culture. The bulldozing of an irregular topography into a flat site is clearly a technocratic gesture which aspires to a condition of absolute placelessness, whereas the terracing of the same site to receive the stepped form of a building is an engagement in the act of “cultivating” the site. (26, original italics) The “totally flat datum” that the universalising tendency sometimes presupposes is, within the critical regionalist perspective, an erroneous assumption. The “cultivation” of a site for the design of a building illustrates the point that built space emerges out of an interaction between parallel phenomena as they contrast and/or converge in a particular set of timespace co-ordinates. These are phenomena that could include (but are not limited to) geomorphic data like soil and rock formations, seismic activity, inclination and declension; climatic considerations in the form of wind patterns, temperature variations, rainfall patterns, available light and dark, humidity and the like; the building context in relation to the cardinal points of north, south, east, and west, along with their intermediary positions. There are also architectural considerations in the form of available building materials and personnel to consider. The social, psychological and cultural requirements of the building’s prospective in-dwellers are intermingled with all these phenomena. This is not so much a question of where to place the air conditioning system but the actuality of the way the building itself is placed on its site, or indeed if that site should be built on at all. A critical regionalist building practice, then, is autochthonous to the degree that a full consideration of this wide range of in-situ interactions is taken into consideration in the development of its design plan. And given this autochthonous quality of the critical regionalist project, it also suggests that the architectural design plan itself (especially when it utilised in conjunction with CAD and virtual reality simulations), might be the better model for designing electrate-centred projects rather than writing or even the script. The proliferation of ‘McMansions’ across many Australian suburbs during the 1990s (generally, oversized domestic buildings designed in the abstract with little or no thought to the above mentioned elements, on bulldozed sites, with powerful air-conditioning systems, and no verandas or roof eves to speak of) demonstrates the continuing influence of a universal, centralising dogma in the realm of built place. As summer temperatures start to climb into the 40°C range all these air-conditioners start to hum in unison, which in turn raises the susceptibility of the supporting infrastructure to collapse under the weight of an overbearing electrical load. The McMansion is a clear example of a built form that is envisioned more so in a drafting room, a space where the architect is remote-sensing the locational specificities. In this envisioning (driven more by a direct line-of-sight idiom dominant in “flat datum” and economic considerations rather than architectural or experiential ones), the tactile is subordinated, which is the subject of Frampton’s sixth point: It is symptomatic of the priority given to sight that we find it necessary to remind ourselves that the tactile is an important dimension in the perception of built form. One has in mind a whole range of complementary sensory perceptions which are registered by the labile body: the intensity of light, darkness, heat and cold; the feeling of humidity; the aroma of material; the almost palpable presence of masonry as the body senses it own confinement; the momentum of an induced gait and the relative inertia of the body as it traverses the floor; the echoing resonance of our own footfall. (28) The point here is clear: in its wider recognition of, and the foregrounding of my body’s full range of sensate capacities in relation to both natural and built space, the critical regionalist approach to built form spreads its meaning-making capacities across a broader range of knowledge modalities. This tactility is further elaborated in more thoroughly personal ways by Margaret Morse in her illuminating essay, “Home: Smell, Taste, Posture, Gleam”. Paradoxically, this synaesthetic, syncretic approach to bodily meaning-making in a built place, regional milieu intensely concentrates the site-centred locus of everyday life, while simultaneously, the electronic knowledge that increasingly underpins it expands both my body’s and its region’s knowledge-making possibilities into a global gestalt, sometimes even a cosmological one. It is a paradoxical transformation that makes us look anew at social, cultural and political givens, even objective and empirical understandings, especially as they are articulated through national frames of reference. Domestic built space then is a kind of micro-version of the multi-function polis where work, pleasure, family, rest, public display and privacy intermingle. So in both this reduction and expansion in the constitution of domestic home life, one that increasingly represents the location of the production of knowledge, built place represents a concentration of energy that forces us to re-imagine border-making, order, and the dynamic interplay of nomadic movement and sedentary return, a point that echoes Nicolas Rothwell’s comment that “every exile has in it a homecoming” (80). Albeit, this is a knowledge-making milieu with an expanded range of modalities incorporated and expressed through a wide range of bodily intensities not simply cognitive ones. Much of the ambiguous discontent manifested in McMansion style domiciles across many Western countries might be traced to the fact that their occupants have had little or no say in the way those domiciles have been designed and/or constructed. In Heidegger’s terms, they have not thought deeply enough about “dwelling” in that building, although with the advent of the media room the question of whether a “building” securely borders both “dwelling” and “thinking” is now open to question. As anxieties over border-making at all scales intensifies, the complexities and un/sureties of natural and built space take ever greater hold of the psyche, sometimes through the advance of a “high level of critical self-consciousness”, a process Frampton describes as a “double mediation” of world culture and local conditions (21). Nearly all commentators warn of a nostalgic, romantic or a sentimental regionalism, the sum total of which is aimed at privileging the local/regional and is sometimes utilised as a means of excluding the global or universal, sometimes even the national (Berry 67). Critical regionalism is itself a mediating factor between these dispositions, working its methods and practices through my own psyche into the local, the regional, the national and the global, rejecting and/or accepting elements of these domains, as my own specific context, in its multiplicity, demands it. If the politico-economic and cultural dimensions of this global/regional world have tended to undermine the process of border-making across a range of scales, we can see in domestic forms of built place the intense residue of both their continuing importance and an increased dependency on this electro-mediated world. This is especially apparent in those domiciles whose media rooms (with their satellite dishes, telephone lines, computers, television sets, games consuls, and music stereos) are connecting them to it in virtuality if not in reality. Indeed, the thought emerges (once again keeping in mind Eric Leed’s remark on the literate-configured sense of autonomy that is further enhanced by a separate physical address and residence) that the intense importance attached to domestically orientated built place by globally/regionally orientated peoples will figure as possibly the most viable means via which this sense of autonomy will transfer to electronic forms of knowledge. If, however, this here domestic habitué turns his gaze away from the screen that transports me into this global/regional milieu and I focus my attention on the physicality of the building in which I dwell, I once again stand in the presence of another beginning. This other beginning is framed diagrammatologically by the building’s architectural plans (usually conceived in either an in-situ, autochthonous, or a universal manner), and is a graphical conception that anchors my body in country long after the architects and builders have packed up their tools and left. This is so regardless of whether a home is built, bought, rented or squatted in. Ihab Hassan writes that, “Home is not where one is pushed into the light, but where one gathers it into oneself to become light” (417), an aphorism that might be rephrased as follows: “Home is not where one is pushed into the country, but where one gathers it into oneself to become country.” For the in-and-out-and-around-and-about domestic dweller of the twenty-first century, then, home is where both regional and global forms of country decisively enter the soul via the conduits of the virtuality of digital flows and the reality of architectural footings. Acknowledgements I’m indebted to both David Fosdick and Phil Roe for alerting me to the importance to the Fremantle Dockers Football Club. The research and an original draft of this essay were carried out under the auspices of a PhD scholarship from Central Queensland University, and from whom I would also like to thank Denis Cryle and Geoff Danaher for their advice. References Benjamin, Walter. “Paris — the Capital of the Nineteenth Century.” Charles Baudelaire: A Lyric Poet in the Era of High Capitalism. Trans. Quintin Hoare. London: New Left Books, 1973. 155–176. Bennett, Tony, Michael Emmison and John Frow. Accounting for Tastes: Australian Everyday Cultures. Cambridge: Cambridge UP, 1999. Berry, Wendell. “The Regional Motive.” A Continuous Harmony: Essays Cultural and Agricultural. San Diego: Harcourt Brace. 63–70. Casey, Edward S. The Fate of Place: A Philosophical History. Berkeley: U of California P, 1997. Deleuze, Gilles and Félix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia. Trans. Brian Massumi. Minneapolis: U of Minneapolis P, 1987. Deleuze, Gilles. “The Diagram.” The Deleuze Reader. Ed. Constantin Boundas. Trans. Constantin Boundas and Jacqueline Code. New York: Columbia UP, 1993. 193–200. Frampton, Kenneth. “Towards a Critical Regionalism: Six Points for an Architecture of Resistance.” The Anti-Aesthetic: Essays on Post-Modern Culture. Ed. Hal Foster. Port Townsend: Bay Press, 1983. 16–30. Gadamer, Hans-Georg. “Idea and Reality in Plato’s Timaeus.” Dialogue and Dialectic: Eight Hermeneutical Studies on Plato. Trans. P. Christopher Smith. New Haven: Yale UP, 1980. 156–193. Hassan, Ihab. “How Australian Is It?” The Best Australian Essays. Ed. Peter Craven. Melbourne: Black Inc., 2000. 405–417. Heidegger, Martin. “Building Dwelling Thinking.” Poetry, Language, Thought. Trans. Albert Hofstadter. New York: Harper and Row, 1971. 145–161. Hughes, John. The Idea of Home: Autobiographical Essays. Sydney: Giramondo, 2004. Iyer, Pico. “Australia 1988: Five Thousand Miles from Anywhere.” Falling Off the Map: Some Lonely Places of the World. London: Jonathon Cape, 1993. 173–190. “Keeping Track.” Docker, Official Magazine of the Fremantle Football Club. Edition 3, September (2005): 21. Leed, Eric. “‘Voice’ and ‘Print’: Master Symbols in the History of Communication.” The Myths of Information: Technology and Postindustrial Culture. Ed. Kathleen Woodward. Madison, Wisconsin: Coda Press, 1980. 41–61. Lefaivre, Liane and Alexander Tzonis. “The Suppression and Rethinking of Regionalism and Tropicalism After 1945.” Tropical Architecture: Critical Regionalism in the Age of Globalization. Eds. Alexander Tzonis, Liane Lefaivre and Bruno Stagno. Chichester, West Sussex: Wiley-Academy, 2001. 14–58. Lefaivre, Liane and Alexander Tzonis. Critical Regionalism: Architecture and Identity in a Globalized World. New York: Prestel, 2003. Lynch, Kevin. Managing the Sense of a Region. Cambridge, Massachusetts: MIT P, 1976. Mitchell, W. J. T. “Diagrammatology.” Critical Inquiry 7.3 (1981): 622–633. Morse, Margaret. “Home: Smell, Taste, Posture, Gleam.” Home, Exile, Homeland: Film, Media, and the Politics of Place. Ed. Hamid Naficy. New York and London: Routledge, 1999. 63–74. Plato. Timaeus and Critias. Trans. Desmond Lee. Harmondsworth: Penguin Classics, 1973. Porteous, J. Douglas. “Home: The Territorial Core.” Geographical Review LXVI (1976): 383-390. Rothwell, Nicolas. Wings of the Kite-Hawk: A Journey into the Heart of Australia. Sydney: Pidador, 2003. Sallis, John. Chorology: On Beginning in Plato’s Timaeus. Bloomington: Indianapolis UP, 1999. Scott, Allen J. Regions and the World Economy: The Coming Shape of Global Production, Competition, and Political Order. Oxford: Oxford University Press, 1998. Storper, Michael. The Regional World: Territorial Development in a Global Economy. New York: The Guildford Press, 1997. Ulmer, Gregory L. Heuretics: The Logic of Invention. New York: John Hopkins UP, 1994. Ulmer, Gregory. Internet Invention: Literacy into Electracy. Longman: Boston, 2003. Wilken, Rowan. “Diagrammatology.” Illogic of Sense: The Gregory Ulmer Remix. Eds. Darren Tofts and Lisa Gye. Alt-X Press, 2007. 48–60. Available at http://www.altx.com/ebooks/ulmer.html. (Retrieved 12 June 2007)
APA, Harvard, Vancouver, ISO, and other styles
15

Gibson, Prue. "Machinic Interagency and Co-evolution." M/C Journal 16, no. 6 (2013). http://dx.doi.org/10.5204/mcj.719.

Full text
Abstract:
The ontological equality and material vitality of all things, and efforts to remove “the human” from its apical position in a hierarchy of being, are Object-Oriented Ontology theory (OOO) concepts. These axioms are useful in a discussion of the aesthetics of augmented robotic art, alongside speculations regarding any interagency between the human/non-human and possible co-evolutionary relationships. In addition, they help to wash out the sticky habits of conventional art writing, such as removed critique or an authoritative expert voice. This article aims to address the robotic work Accomplice by Sydney-based artists Petra Gemeinboeck and Rob Saunders as a means of interrogating the independence and agency of robots as non-human species, and as a mode of investigating how we see these relationships changing for the futureFor Accomplice, an artwork exhibited at Artspace, Sydney, in 2013, Gemeinboeck and Saunders built robots, strategised properties, and programmed their performative actions. Replete with lights and hammers, the robots are secreted away behind false walls, where they move along tracks and bang holes into the gallery space. As the devastation of plasterboard ensues, the robots respond interactively to each other through their collective activity: this is intra-action, where an object’s force emerges and where agency is an enactment (Barad, Matter Feels). This paper will continue to draw on the work of feminist scholar and quantum scientist, Karen Barad, due to her related work on agency and intra-action, although she is not part of an OOO theoretical body. Gemeinboeck and Saunders build unstable environments for their robots to perform as embodied inhabitants (Gemeinboeck and Saunders 2). Although the augmented robots are programmed, it is not a prescriptive control. Data is entered, then the robots respond to one another’s proximity and devastation. From the immaterial, virtual realm of robotic programming comes a new materiality which is both unstable, unpredictable, and on the verge of becoming other, or alive. This is a collaboration, not just between Gemeinboeck and Saunders, but between the programmers and their little robots—and the new forces that might be created. Sites of intra-species (human and robot) crossings might be places or spaces where a new figuration of enchantment occurs (Bennett 32). Such a space could take the form of a responsive art-writing intervention or even a new ontological story, as a direct riposte to the lively augmentation of the robotic artwork (Bennett 92). As ficto-critical theorist and ethnographer, Stephen Muecke says, “Experimental writing, for me, would be writing that necessarily participates in worlds rather than a writing constituted as a report on realities seen from the other side of an illusory gap of representation” (Muecke Motorcycles 2). Figure 1: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck)Writing Forces When things disappear then reappear, there is a point where force is unleashed. If we ask what role the art writer plays in liberating force, the answer might be that her role is to create as an imaginative new creation, equal to the artwork. The artists speak of Accomplice: transductions, transmaterial flows and transversal relations are at play ... whether emerging from or propelling the interplay between internal dynamics and external forces, the enactment of agencies (human and non-human), or the performative relationship unfolding over time. (Gemeinboeck and Saunders 3) When new energetic force is created and the artwork takes on new life, the audience’s imaginative thought is stimulated. This new force might cause an effect of a trans-fictional flow. The act of writing about Accomplice might also involve some intentional implausibility. For instance, whilst in the exhibition gallery space, witnessing Accomplice, I decided to write a note to one of the robots. I could see it, just visible beyond the violently hammered hole in the wall. Broken plaster dusted my shoes and as I peered into the darker outside space, it whizzed past on its way to bang another hole, in harmony with its other robotic friends. So I scribbled a note on a plain white piece of paper, folded it neatly and poked it through the hole: Dear robot, do you get sick of augmenting human lives?Do you get on well with your robotic friends?Yours sincerely, Prue. I waited a few minutes and then my very same piece of paper was thrust back through the hole. It was not folded but was crumpled up. I opened it and noticed a smudged mark in the corner. It looked like an ancient symbol, a strange elliptical script of rounded shapes, but was too small to read. An intergalactic message, a signal from an alien presence perhaps? So I borrowed a magnifying glass from the Artspace gallery attendant. It read: I love opera. Robot Two must die. This was unexpected! As I pondered the robot’s reply, I noticed the robots did indeed make strange bird-like noises to one another; their tapping was like rhythmic woodpeckers. Their hammering was a kind of operatic symphony; it was not far-fetched that these robots were appreciative of the sound patterns they made. In other words, they were responding to stimuli in the environment, and acting in response. They had agency beyond the immaterial computational programming their creators had embedded. It wasn’t difficult to suspend disbelief to allow the possibility that interaction between the robots might occur, or that one might have gone rogue. An acceptance of the possibility of inter-agency would allow the fantastical reality of a human becoming short-term pen pals with an augmented machine. Karen Barad might endorse such an unexpected intra-action act. She discourages conventional critique as, “a tool that keeps getting used out of habit” (Matter Feels). Art writing, in an era of robots and awareness of other non-human sentient life-forms can be speculative invention, have a Barad-like imaginative materiality (Matter Feels), and sense of suspended disbelief. Figure 2: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck) The Final Onto-Story Straw Gemeinboeck and Saunders say the space where their robots perform is a questionable one: “the fidelity of the space as a shared experience is thus brought into question: how can a shared virtual experience be trusted when it is constructed from such intangible and malleable stuff as streams of binary digits” (7). The answer might be that it is not to be trusted, particularly in an OOO aesthetic approach that allows divergent and contingent fictive possibilities. Indeed, thinking about the fidelity of the space, there was something about a narrow access corridor in the Accomplice exhibition space, between the false gallery wall and the cavity where the robots moved on their track, that beckoned me. I glanced over my shoulder to check that the Artspace attendant wasn’t watching and slipped behind the wall. I took a few tentative steps, not wanting to get knocked on the nose by a zooming robot. I saw that one robot had turned away from the wall and was attacking another with its hammer. By the time I arrived, the second robot (could it be Robot Two?) had been badly pummeled. Not only did Robot One attack Robot Two but I witnessed it using its extended hammer to absorb metal parts: the light and the hammer. It was adapting, like Philip K. Dick’s robots in his short story ‘Preserving Machine’ (See Gray 228-33). It was becoming more augmented. It now had two lights and two hammers and seemed to move at double speed. Figure 3: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck)My observance of this scene might be explained by Gemeinboeck/Saunders’s comment regarding Philip K. Dick-style interference and instability, which they actively apply to their work. They say, “The ‘gremlins’ of our works are the slipping logics of nonlinear systems or distributed agential forces of colliding materials” (18). An audience response is a colliding material. A fictional aside is a colliding material. A suspension of disbelief must also be considered a colliding material. This is the politics of the para-human, where regulations and policies are in their infancy. Fears of artificial intelligence seem absurd, when we consider how startled we become when the boundaries between fiction/truth become as flimsy and slippery as the boundaries between human/non-human. Art writing that resists truth complements Gemeinboeck/Saunders point that, “different agential forces not only co-evolve but perform together” (18).The DisappearanceBefore we are able to distinguish any unexpected or enchanted ontological outcomes, the robots must first appear, but for things to truly appear to us, they must first disappear. The robots disappear from view, behind the false walls. Slowly, through the enactment of an agented force (the action of their hammers upon the wall), they beat a path into the viewer’s visual reality. Their emergence signals a performative augmentation. Stronger, better, smarter, longer: these creatures are more-than-human. Yet despite the robot’s augmented technological improvement upon human ability, their being (here, meaning their independent autonomy) is under threat in a human-centred world environment. First they are threatened by the human habit of reducing them to anthropomorphic characteristics: they can be seen as cute little versions of humans. Secondly, they are threatened by human perception that they are under the control of the programmers. Both points are arguable: these robots are undoubtedly non-human, and there are unexpected and unplanned outcomes, once they are activated. These might be speculative or contestable outcomes, which are not demonstrably an epitome of truth (Bennett 161). Figure 4: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck)Gemeinboeck’s robotic creatures, with their apparent work/play and civil disobedience, appeared to exhibit human traits. An OOO approach would discourage these anthropomorphic tendencies: by seeing human qualities in inanimate objects, we are only falling back into correlational habits—where nature and culture are separate dyads and can never comprehend each other, and where humankind is mistakenly privileged over all other entities (Meillassoux 5). This only serves to inhibit any access to a reality outside the human-centred view. This kind of objectivity, where we see ourselves as nature, does no more than hold up a mirror to our inescapably human selves (Barad, Matter Feels). In an object-oriented approach the unpredictable outcomes of the robots’s performance is brought to attention. OOO proponent and digital media theorist Ian Bogost, has a background in computational media, especially video and social media games, and says, “computers are plastic and metal corpses with voodoo powers” (9). This is a non-life description, hovering in the liminal space between being and not being. Bogost’s view is that a strange world stirs within machinic devices (9). A question to ask: what’s it like to be a robot? Perhaps the answer lies somewhere between what it does and how we see it. It is difficult not to think of twentieth century philosopher Martin Heidegger’s tool analysis theory when writing of Gemeinboeck/Saunders’s work because Heidegger, and OOO scholar Graham Harman after him, uses the hammer as his paradigmatic tool. In his analysis, things are only present-at-hand (consciously perceived without utility) once they break (Harman, Heidegger Explained 63). However, Gemeinboeck and Saunders’s installation Accomplice straddles Heidegger’s dual present-at-hand and read-at-hand (the utility of the thing) because art raises the possibility that we might experience these divergent qualities of the robotic entities, simultaneously. The augmented robot, existing in its performative exhibition ecology, is the bridge between sentient life and utility. Robotic Agency In relation to the agency of robots, Ian Bogost refers to the Tableau Machine which was a non-human actor system created by researchers at Georgia Tech in 1998 (Bogost 106). It was a house fitted with cameras, screens, interfaces, and sensors. This was an experimental investigation into ambient intelligence. The researchers’s term for the computational agency was ‘alien presence,’ suggesting a life outside human comprehension. The data-collator sensed and interpreted the house and its occupants, and re-created that recorded data as abstract art, by projecting images on its own plasma screens. The implication was that the home was alive, vital, and autonomously active, in that it took on a sentient life, beyond human control. This kind of vital presence, an aliveness outside human programming, is there in the Accomplice robots. Their agency becomes materialized, as they violate the polite gallery-viewing world. Karen Barad’s concept of agency works within a relational ontology. Agency resists being granted, but rather is an enactment, and creates new possibilities (Barad, Matter Feels). Agency is entangled amongst “intra-acting human and non-human practices” (6). In Toward an Enchanted Materialism, Jane Bennett describes primordia (atoms) as “not animate with divine spirit, and yet they are quite animated - this matter is not dead at all” (81). This then is an agency that is not spiritual, nor is there any divine purpose. It is a matter of material force, a subversive action performed by robotic entities, not for any greater good, in fact, for no reason at all. This unpredictability is OOO contingency, whereby physical laws remain indifferent to whether an event occurs or not (Meillassoux 39). Figure 5: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck) A Post-Human Ethic The concept of a post-human state of being raises ethical concerns. Ethics is a human construct, a criteria of standards fixed within human social systems. How should humans respond, without moral panic, to robots that might have life and sentient power outside human control? If an OOO approach is undertaken, the implication is that all things exist equally and ethics, as fixed standards, might need to be dismantled and replaced with a more democratic set of guidelines. A flat ontology, argued for by Bogost, Levi Bryant and other OOO advocates, follows that all entities have equal potential for independent energy and agency (although OOO theorists disagree on many small technical issues). The disruption of the conventional hierarchical model of being is replaced by a flat field of equality. This might cause the effect of a more ethical, ontological ecology. Quentin Meillassoux, an influential figure in the field of Speculative Realism, from which OOO is an offshoot, finds philosophical/mathematical solutions to the problems of human subjectivity. His eschewing of Kantian divisions between object/subject and human/world, is accompanied by a removal from Kantian and Cartesian critique (Meillassoux 30). This turn from critique, and its related didactic authority and removed judgment, marks an important point in the culture of philosophy, but also in the culture of art writing. If we can escape the shackles of divisive critique, then the pleasures of narrative might be given space. Bogost endorses collapsing the hierarchical model of being and converting conventional academic writing (89). He says, “for the computers to operate at all for us first requires a wealth of interactions to take place for itself. As operators or engineers, we may be able to describe how such objects and assemblages work. But what do they “experience” (Bogost 10)? This view is complementary to an OOO view of anti-subjectivity, an awareness of things that might exist irrespective of human life, from both inside and outside the mind (Harman 143). Figure 6: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck) New Materiality In addition to her views on human/non-human agency, Karen Barad develops a parallel argument for materiality. She says, “matter feels, converses, suffers, desires, yearns and remembers.” Barad’s agential realism is predicated on an awareness of the immanence of matter, with materiality that subverts conventions of transcendence or human-centredness. She says, “On my agential realist account, all bodies, not merely human bodies, come to matter through the world’s performativity - its iterative intra-activity.” Barad sees matter, all matter, as entangled parts of phenomena that extend across time and space (Nature’s Queer Performativity 125). Barad argues against the position that acts against nature are moral crimes, which occur when the nature/culture divide is breached. She questions the individuated categorizations of ‘nature’ and ‘culture’ inherent in arguments like these (Nature’s Queer Performativity, 123-5). Likewise, in robotic and machinic aesthetics, it could be seen as an ethical breach to consider the robots as alive, sentient, and experiential. This confounds previous cultural separations, however, object-oriented theory is a reexamination of these infractions and offers an openness to discourse of different causal outcomes. Figure 7: Accomplice by Petra Gemeinboeck and Rob Saunders, Artspace, Sydney, 2013. (Photo: Petra Gemeinboeck) Co-Evolution Artists Gemeinboeck/Saunders are artists and scholarly researchers investigating new notions of co-evolution. If we ascribe human characteristics to robots, might they ascribe machinic properties to us? It is possible to argue that co-evolution is already apparent in the world. Titanium knees, artificial arteries, plastic hips, pacemakers, metallic vertebrae pins: human medicine is a step ahead. Gemeinboeck/Saunders in turn make a claim for the evolving desires of their robots (11). Could there be performative interchangeability between species: human and robot? Barad asks us not to presume what the distinctions are between human and non-human and not to make post-humanist blurrings, but to understand the materializing effects of the boundaries between humans and nonhumans (Nature’s Queer Performativity 123). Vital matter emerges from acts of reappearance, re-performance, and interspecies interaction. Ian Bogost begins his Alien Phenomenology by analysing Alan Turing’s essay, Computing Machinery and Intelligence and deduces that it is an approach inextricably linked to human understanding (Bogost 14). Bogost seeks to avoid distinctions between things or a slippage into an over-determination of systems operations, and instead he adopts an OOO view where all things are treated equally, even cheeky little robots (Bogost 17).Figure 8: Accomplice by Petra Gemeinboeck and Rob Saunders, installation view, Artspace, Sydney. (Photo: silversalt photography) Intra-Active ReappearanceIf Barad describes intra-action as enacting an agential cut or separation of object from subject, she does not mean a distinction between object and subject but instead devises an intra-active cutting of things together-apart (Nature’s Queer Performativity 124). This is useful for two reasons. First it allows confusion between inside and outside, between real and unreal, and between past and future. In other words it defies the human/world correlates, which OOO’s are actively attempting to flee. Secondly it makes sense of an idea of disappearance as being a re-appearance too. If robots, and all other species, start to disappear, from our consciousness, from reality, from life (that is, becoming extinct), this disappearance causes or enacts a new appearance (the robotic action), and this action has its own vitality and immanence. If virtuality (an aesthetic of being that grew from technology, information, and digital advancements) meant that the body was left or abandoned for an immaterial space, then robots and robotic artwork are a means of re-inhabiting the body in a re-materialized mode. This new body, electronic and robotic in nature, might be mastered by a human hand (computer programming) but its differential is its new agency which is one shared between human and non-human. Barad warns, however, against a basic inversion of humanism (Nature’s Queer Performativity 126). Co-evolution is not the removal of the human. While an OOO approach may not have achieved the impossible task of creating a reality beyond the human-centric, it is a mode of becoming cautious of an invested anthropocentric view, which robotics and diminished non-human species bring to attention. The autonomy and agency of robotic life challenges human understanding of ontological being and of how human and non-human entities relate.References Barad, Karen. "Nature’s Queer Performativity." Qui Parle 19.2 (2011): 121-158. ———. Interview. In Rick Dolphijn and Van Der Tuin. “Matter Feels, Converses, Suffers, Desires, Yearns and Remembers: Interview with Karen Barad.” New Materialism: Interviews and Cartographies. Ann Arbor: University of Michigan; Open Humanities Press, 2012. ———. "Posthumanist Performativity: Toward an Understanding of How Matter Comes to Matter." Signs: Journal of Women in Culture and Society 28.3 (2003): 801-831. Bennett, Jane. The Enchantment of Modern Life: Attachments, Crossings, and Ethics. New Jersey: Princeton University Press, 2001. Bogost, Ian. Alien Phenomenology. Minneapolis: Minnesota Press, 2012. Bryant, Levi. The Democracy of Objects. University of Michigan Publishing: Open Humanities Press, 2011. ———, N. Srnicek, and GHarman. The Speculative Turn: Continental Materialism and Realism. Melbourne: re:press, 2011. Gemeinboeck, Petra, and Rob Saunders. “Other Ways of Knowing: Embodied Investigations of the Unstable, Slippery and Incomplete.” Fibreculture Journal 18 (2011). ‹http://eighteen.fibreculturejournal.org/2011/10/09/fcj-120-other-ways-of-knowing-embodied-investigations-of-the-unstable-slippery-and-incomplete/›. Gray, Nathan. "L’object sonore undead." In A. Barikin and H. Hughes. Making Worlds: Art and Science Fiction. Melbourne: Surpllus, 2013. 228-233. Harman, Graham. The Quadruple Object. Winchester UK: Zero Books, 2011. ———. Guerilla Metaphysics: Phenomenology and the Carpentry of Things. Chicago: Open Court, 2005. ———. Heidegger Explained: From Phenomenon to Thing. Chicago: Open Court Publishing, 2007. Heidegger, Martin. Being and Time. San Francisco: Harper and Row, 1962. Meillassoux, Quentin. After Finitude: An Essay on the Necessity of Contingency. New York: Continuum, 2008. Muecke, Stephen. "The Fall: Ficto-Critical Writing." Parallax 8.4 (2002): 108-112. ———. "Motorcycles, Snails, Latour: Criticism without Judgment." Cultural Studies Review 18.1 (2012): 40-58. ———. “The Writing Laboratory: Political Ecology, Labour, Experiment.” Angelaki 14.2 (2009): 15-20. Phelan, Peggy. Unmarked: The Politics of Performance. London: Routledge, 1993.
APA, Harvard, Vancouver, ISO, and other styles
16

Potts, Graham. ""I Want to Pump You Up!" Lance Armstrong, Alex Rodriguez, and the Biopolitics of Data- and Analogue-Flesh." M/C Journal 16, no. 6 (2013). http://dx.doi.org/10.5204/mcj.726.

Full text
Abstract:
The copyrighting of digital augmentations (our data-flesh), their privatization and ownership by others from a vast distance that is simultaneously instantly telematically surmountable started simply enough. It was the initially innocuous corporatization of language and semiotics that started the deeper ontological flip, which placed the posthuman bits and parts over the posthuman that thought that it was running things. The posthumans in question, myself included, didn't help things much when, for instance, we all clicked an unthinking or unconcerned "yes" to Facebook® or Gmail®'s "terms and conditions of use" policies that gives them the real ownership and final say over those data based augments of sociality, speech, and memory. Today there is growing popular concern (or at least acknowledgement) over the surveillance of these augmentations by government, especially after the Edward Snowden NSA leaks. The same holds true for the dataveillance of data-flesh (i.e. Gmail® or Facebook® accounts) by private corporations for reasons of profit and/or at the behest of governments for reasons of "national security." While drawing a picture of this (bodily) state, of the intrusion through language of brands into our being and their coterminous policing of intelligible and iterative body boundaries and extensions, I want to address the next step in copyrighted augmentation, one that is current practice in professional sport, and part of the bourgeoning "anti-aging" industry, with rewriting of cellular structure and hormonal levels, for a price, on the open market. What I want to problematize is the contradiction between the rhetorical moralizing against upgrading the analogue-flesh, especially with respect to celebrity sports stars like Lance Armstrong and Alex Rodriquez, all the while the "anti-aging" industry does the same without censor. Indeed, it does so within the context of the contradictory social messaging and norms that our data-flesh and electric augmentations receive to constantly upgrade. I pose the question of the contradiction between the messages given to our analogue-flesh and data-flesh in order to examine the specific site of commentary on professional sports stars and their practices, but also to point to the ethical gap that exists not just for (legal) performance enhancing drugs (PED), but also to show the link to privatized and copyrighted genomic testing, the dataveillance of this information, and subsequent augmentations that may be undertaken because of the results. Copyrighted Language and Semiotics as Gateway Drug The corporatization of language and semiotics came about with an intrusion of exclusively held signs from the capitalist economy into language. This makes sense if one want to make surplus value greater: stamp a name onto something, especially a base commodity like a food product, and build up the name of that stamp, however one will, so that that name has perceived value in and of itself, and then charge as much as one can for it. Such is the story of the lack of real correlation between the price of Starbucks Coffee® and coffee as a commodity, set by Starbucks® on the basis of the cultural worth of the symbols and signs associated with it, rather than by what they pay for the labor and production costs prior to its branding. But what happens to these legally protected stamps once they start acting as more than just a sign and referent to a subsection of a specific commodity or thing? Once the stamp has worth and a life that is socially determined? What happens when these stamps get verbed, adjectived, and nouned? Naomi Klein, in the book that the New York Times referred to as a "movement bible" for the anti-globalization forces of the late 1990s said "logos, by the force of ubiquity, have become the closest thing we have to an international language, recognized and understood in many more places than English" (xxxvi). But there is an inherent built-in tension of copyrighted language and semiotics that illustrates the coterminous problems with data- and analogue-flesh augments. "We have almost two centuries' worth of brand-name history under our collective belt, coalescing to create a sort of global pop-cultural Morse code. But there is just one catch: while we may all have the code implanted in our brains, we're not really allowed to use it" (Klein 176). Companies want their "brands to be the air you breathe in - but don't dare exhale" or otherwise try to engage in a two-way dialogue that alters the intended meaning (Klein 182). Private signs power first-world and BRIC capitalism, language, and bodies. I do not have a coffee in the morning; I have Starbucks®. I do not speak on a cellular phone; I speak iPhone®. I am not using my computer right now; I am writing MacBook Air®. I do not look something up, search it, or research it; I Google® it. Klein was writing before the everyday uptake of sophisticated miniaturized and mobile computing and communication devices. With the digitalization of our senses and electronic limbs this viral invasion of language became material, effecting both our data- and analogue-flesh. The trajectory? First we used it; then we wore it as culturally and socially demarcating clothing; and finally we no longer used copyrighted speech terms: it became an always-present augmentation, an adjective to the lexicon body of language, and thereby out of democratic semiotic control. Today Twitter® is our (140 character limited) medium of speech. Skype® is our sense of sight, the way we have "real" face-to-face communication. Yelp® has extended our sense of taste and smell through restaurant reviews. The iPhone® is our sense of hearing. And OkCupid® and/or Grindr® and other sites and apps have become the skin of our sexual organs (and the site where they first meet). Today, love at first sight happens through .jpeg extensions; our first sexual experience ranked on a scale of risk determined by the type of video feed file format used: was it "protected" enough to stop its "spread"? In this sense the corporatization of language and semiotics acted as the gateway drug to corporatized digital-flesh; from use of something that is external to us to an augmentation that is part of us and indeed may be in excess of us or any notion of a singular liberal subject.Replacement of Analogue-Flesh? Arguably, this could be viewed as the coming to be of the full replacement of the fleshy analogue body by what are, or started as digital augmentations. Is this what Marshall McLuhan meant when he spoke of the "electronic exteriorization of the central nervous system" through the growing complexity of our "electric extensions"? McLuhan's work that spoke of the "global village" enabled by new technologies is usually read as a euphoric celebration of the utopic possibilities of interconnectivity. What these misreadings overlook is the darker side of his thought, where the "cultural probe" picks up the warning signals of the change to come, so that a Christian inspired project, a cultural Noah’s Ark, can be created to save the past from the future to come (Coupland). Jean Baudrillard, Paul Virilio, and Guy Debord have analyzed this replacement of the real and the changes to the relations between people—one I am arguing is branded/restricted—by offering us the terms simulacrum (Baudrillard), substitution (Virilio), and spectacle (Debord). The commonality which links Baudrillard and Virilio, but not Debord, is that the former two do not explicitly situate their critique as being within the loss of the real that they then describe. Baudrillard expresses that he can have a 'cool detachment' from his subject (Forget Foucault/Forget Baudrillard), while Virilio's is a Catholic moralist's cry lamenting the disappearance of the heterogeneous experiential dimensions in transit along the various axes of space and time. What differentiates Debord is that he had no qualms positioning his own person and his text, The Society of the Spectacle (SotS), as within its own subject matter - a critique that is limited, and acknowledged as such, by the blindness of its own inescapable horizon.This Revolt Will Be Copyrighted Yet today the analogue - at the least - performs a revolt in or possibly in excess of the spectacle that seeks its containment. How and at what site is the revolt by the analogue-flesh most viewable? Ironically, in the actions of celebrity professional sports stars and the Celebrity Class in general. Today it revolts against copyrighted data-flesh with copyrighted analogue-flesh. This is even the case when the specific site of contestation is (at least the illusion of) immortality, where the runaway digital always felt it held the trump card. A regimen of Human Growth Hormone (HGH) and other PEDs purports to do the same thing, if not better, at the cellular level, than the endless youth paraded in the unaging photo employed by the Facebook or Grindr Bodies®. But with the everyday use and popularization of drugs and enhancement supplements like HGH and related PEDs there is something more fundamental at play than the economic juggernaut that is the Body Beautiful; more than fleshy jealousy of Photoshopped® electronic skins. This drug use represents the logical extension of the ethics that drive our tech-wired lives. We are told daily to upgrade: our sexual organs (OkCupid® or Grindr®) for a better, more accurate match; our memory (Google® services) for largeness and safe portability; and our hearing and sight (iPhone® or Skype®) for increase connectivity, engaging the "real" (that we have lost). These upgrades are controlled and copyrighted, but that which grows the economy is an especially favored moral act in an age of austerity. Why should it be surprising, then, that with the economic backing of key players of Google®—kingpin of the global for-profit dataveillance racket—that for $99.95 23andMe® will send one a home DNA test kit, which once returned will be analyzed for genetic issues, with a personalized web-interface, including "featured links." Analogue-flesh fights back with willing copyrighted dataveillance of its genetic code. The test and the personalized results allow for augmentations of the Angelina Jolie type: private testing for genetic markers, a double mastectomy provided by private healthcare, followed by copyrighted replacement flesh. This is where we find the biopolitics of data- and analogue-flesh, lead forth, in an ironic turn, by the Celebrity Class, whom depend for their income on the lives of their posthuman bodies. This is a complete reversal of the course Debord charts out for them: The celebrity, the spectacular representation of a living human being, embodies this banality by embodying the image of a possible role. Being a star means specializing in the seemingly lived; the star is the object of identification with the shallow seeming life that has to compensate for the fragmented productive specializations which are actually lived. (SotS) While the electronic global village was to have left the flesh-and-blood as waste, today there is resistance by the analogue from where we would least expect it - attempts to catch up and replant itself as ontologically prior to the digital through legal medical supplementation; to make the posthuman the posthuman. We find the Celebrity Class at the forefront of the resistance, of making our posthuman bodies as controlled augmentations of a posthuman. But there is a definite contradiction as well, specifically in the press coverage of professional sports. The axiomatic ethical and moral sentiment of our age to always upgrade data-flesh and analogue-flesh is contradicted in professional sports by the recent suspensions of Lance Armstrong and Alex Rodriguez and the political and pundit critical commentary on their actions. Nancy Reagan to the Curbside: An Argument for Lance Armstrong and Alex Rodriguez's "Just Say Yes to Drugs" Campaign Probably to the complete shock of most of my family, friends, students, and former lovers who may be reading this, I actually follow sports reporting with great detail and have done so for years. That I never speak of any sports in my everyday interactions, haven't played a team or individual sport since I could speak (and thereby use my voice to inform my parents that I was refusing to participate), and even decline amateur or minor league play, like throwing a ball of any kind at a family BBQ, leaves me to, like Judith Butler, "give an account of oneself." And this accounting for my sports addiction is not incidental or insignificant with respect either to how the posthuman present can move from a state of posthumanism to one of posthumanism, nor my specific interpellation into (and excess) in either of those worlds. Recognizing that I will not overcome my addiction without admitting my problem, this paper is thus a first-step public acknowledgement: I have been seeing "Dr. C" for a period of three years, and together, through weekly appointments, we have been working through this issue of mine. (Now for the sake of avoiding the cycle of lying that often accompanies addiction I should probably add that Dr. C is a chiropractor who I see for back and nerve damage issues, and the talk therapy portion, a safe space to deal with the sports addiction, was an organic outgrowth of the original therapy structure). My data-flesh that had me wired in and sitting all the time had done havoc to the analogue-flesh. My copyrighted augments were demanding that I do something to remedy a situation where I was unable to be sitting and wired in all the time. Part of the treatment involved the insertion of many acupuncture needles in various parts of my body, and then having an electric current run through them for a sustained period of time. Ironically, as it was the wired augmentations that demanded this, due to my immobility at this time - one doesn't move with acupuncture needles deep within the body - I was forced away from my devices and into unmediated conversation with Dr. C about sports, celebrity sports stars, and the recent (argued) infractions by Armstrong and Rodriguez. Now I say "argued" because in the first place are what A-Rod and Armstrong did, or are accused of doing, the use of PEDs, HGH, and all the rest (cf. Lupica; Thompson, and Vinton) really a crime? Are they on their way, or are there real threats of jail and criminal prosecution? And in the most important sense, and despite all the rhetoric, are they really going against prevailing social norms with respect to medical enhancement? No, no, and no. What is peculiar about the "witch-hunt" of A-Rod and Armstrong - their words - is that we are undertaking it in the first place, while high-end boutique medical clinics (and internet pharmacies) offer the same treatment for analogue-flesh. Fixes for the human in posthuman; ways of keeping the human up to speed; arguably the moral equivalent, if done so with free will, of upgrading the software for ones iOS device. If the critiques of Baudrillard and Virilio are right, we seem to find nothing wrong with crippling our physical bodies and social skills by living through computers and telematic technologies, and obsess over the next upgrade that will make us (more) faster and quicker (than the other or others), while we righteously deny the same process to the flesh for those who, in Debord's description, are the most complicit in the spectacle, to the supposedly most posthuman of us - those that have become pure spectacle (Debord), pure simulation (Baudrillard), a total substitution (Virilio). But it seems that celebrities, and sports celebrities in specific haven't gone along for the ride of never-ending play of their own signifiers at the expense of doing away with the real; they were not, in Debord's words, content with "specializing in the seemingly lived"; they wanted, conversely, to specialize in the most maximally lived flesh, right down to cellular regeneration towards genetic youth, which is the strongest claim in favor of taking HGH. It looks like they were prepared to, in the case of Armstrong, engage in the "most sophisticated, professionalized and successful doping program that sport has ever seen" in the name of the flesh (BBC). But a doping program that can, for the most part, be legally obtained as treatment, and in the same city as A-Rod plays in and is now suspended for his "crimes" to boot (NY Vitality). This total incongruence between what is desired, sought, and obtained legally by members of their socioeconomic class, and many classes below as well, and is a direct outgrowth of the moral and ethical axiomatic of the day is why A-Rod and Armstrong are so bemused, indignant, and angry, if not in a state of outright denial that they did anything that was wrong, even while they admit, explicitly, that yes, they did what they are accused of doing: taking the drugs. Perhaps another way is needed to look at the unprecedentedly "harsh" and "long" sentences of punishment handed out to A-Rod and Armstrong. The posthuman governing bodies of the sports of the society of the spectacle in question realize that their spectacle machines are being pushed back at. A real threat because it goes with the grain of where the rest of us, or those that can buy in at the moment, are going. And this is where the talk therapy for my sports addiction with Dr. C falls into the story. I realized that the electrified needles were telling me that I too should put the posthuman back in control of my damaged flesh; engage in a (medically copyrighted) piece of performance philosophy and offset some of the areas of possible risk that through restricted techne 23andMe® had (arguably) found. Dr. C and I were peeved with A-Rod and Armstrong not for what they did, but what they didn't tell us. We wanted better details than half-baked admissions of moral culpability. We wanted exact details on what they'd done to keep up to their digital-flesh. Their media bodies were cultural probes, full in view, while their flesh bodies, priceless lab rats, are hidden from view (and likely to remain so due to ongoing litigation). These were, after all, big money cover-ups of (likely) the peak of posthuman science, and the lab results are now hidden behind an army of sports federations lawyers, and agents (and A-Rod's own army since he still plays); posthuman progress covered up by posthuman rules, sages, and agents of manipulation. Massive posthuman economies of spectacle, simulation, or substitution of the real putting as much force as they can bare on resurgent posthuman flesh - a celebrity flesh those economies, posthuman economies, want to see as utterly passive like Debord, but whose actions are showing unexpected posthuman alignment with the flesh. Why are the centers of posthumanist power concerned? Because once one sees that A-Rod and Armstrong did it, once one sees that others are doing the same legally without a fuss being made, then one can see that one can do the same; make flesh-and-blood keep up, or regrow and become more organically youthful, while OkCupid® or Grindr® data-flesh gets stuck with the now lagging Photoshopped® touchups. Which just adds to my desire to get "pumped up"; add a little of A-Rod and Armstrong's concoction to my own routine; and one of a long list of reasons to throw Nancy Reagan under the bus: to "just say yes to drugs." A desire that is tempered by the recognition that the current limits of intelligibility and iteration of subjects, the work of defining the bodies that matter that is now set by copyrighted language and copyrighted electric extensions is only being challenged within this society of the spectacle by an act that may give a feeling of unease for cause. This is because it is copyrighted genetic testing and its dataveillance and manipulation through copyrighted medical technology - the various branded PEDs, HGH treatments, and their providers - that is the tool through which the flesh enacts this biopolitical "rebellion."References Baudrillard, Jean. Forget Foucault/Forget Baudrillard. Trans Nicole Dufresne. Los Angeles: Semiotext(e), 2007. ————. Simulations. Trans. Paul Foss, Paul Patton and Philip Beitchman. Cambridge: Semiotext(e), 1983. BBC. "Lance Armstong: Usada Report Labels Him 'a Serial Cheat.'" BBC Online 11 Oct. 2012. 1 Dec. 2013 ‹http://www.bbc.co.uk/sport/0/cycling/19903716›. Butler, Judith. Giving an Account of Oneself. New York: Fordham University Press, 2005. Clark, Taylor. Starbucked: A Double Tall Tale of Caffeine, Commerce, and Culture. New York: Back Bay, 2008. Coupland, Douglas. Marshall McLuhan. Toronto: Penguin Books, 2009. Debord, Guy. Society of the Spectacle. Detroit: Black & Red: 1977. Klein, Naomi. No Logo: Taking Aim at the Brand Bullies. Toronto: Knopf Canada, 1999. Lupica, Mike. "Alex Rodriguez Beginning to Look a Lot like Lance Armstrong." NY Daily News. 6 Oct. 2013. 1 Dec. 2013 ‹http://www.nydailynews.com/sports/baseball/lupica-a-rod-tour-de-lance-article-1.1477544›. McLuhan, Marshall. Understanding Media: The Extensions of Man. New York: McGraw-Hill Book Company, 1964. NY Vitality. "Testosterone Treatment." NY Vitality. 1 Dec. 2013 ‹http://vitalityhrt.com/hgh.html›. Thompson, Teri, and Nathaniel Vinton. "What Does Alex Rodriguez Hope to Accomplish by Following Lance Armstrong's Legal Blueprint?" NY Daily News 5 Oct. 2013. 1 Dec. 2013 ‹http://www.nydailynews.com/sports/i-team/a-rod-hope-accomplish-lance-blueprint-article-1.1477280›. Virilio, Paul. Speed and Politics. Trans. Mark Polizzotti. New York: Semiotext(e), 1986.
APA, Harvard, Vancouver, ISO, and other styles
17

Ruch, Adam, and Steve Collins. "Zoning Laws: Facebook and Google+." M/C Journal 14, no. 5 (2011). http://dx.doi.org/10.5204/mcj.411.

Full text
Abstract:
As the single most successful social-networking Website to date, Facebook has caused a shift in both practice and perception of online socialisation, and its relationship to the offline world. While not the first online social networking service, Facebook’s user base dwarfs its nearest competitors. Mark Zuckerberg’s creation boasts more than 750 million users (Facebook). The currently ailing MySpace claimed a ceiling of 100 million users in 2006 (Cashmore). Further, the accuracy of this number has been contested due to a high proportion of fake or inactive accounts. Facebook by contrast, claims 50% of its user base logs in at least once a day (Facebook). The popular and mainstream uptake of Facebook has shifted social use of the Internet from various and fragmented niche groups towards a common hub or portal around which much everyday Internet use is centred. The implications are many, but this paper will focus on the progress what Mimi Marinucci terms the “Facebook effect” (70) and the evolution of lists as a filtering mechanism representing one’s social zones within Facebook. This is in part inspired by the launch of Google’s new social networking service Google+ which includes “circles” as a fundamental design feature for sorting contacts. Circles are an acknowledgement of the shortcomings of a single, unified friends list that defines the Facebook experience. These lists and circles are both manifestations of the same essential concept: our social lives are, in fact, divided into various zones not defined by an online/offline dichotomy, by fantasy role-play, deviant sexual practices, or other marginal or minority interests. What the lists and circles demonstrate is that even very common, mainstream people occupy different roles in everyday life, and that to be effective social tools, social networking sites must grant users control over their various identities and over who knows what about them. Even so, the very nature of computer-based social tools lead to problematic definitions of identities and relationships using discreet terms, in contrast to more fluid, performative constructions of an individual and their relations to others. Building the Monolith In 1995, Sherry Turkle wrote that “the Internet has become a significant social laboratory for experimenting with the constructions and reconstructions of self that characterize postmodern life” (180). Turkle describes the various deliberate acts of personnae creation possible online in contrast to earlier constraints placed upon the “cycling through different identities” (179). In the past, Turkle argues, “lifelong involvement with families and communities kept such cycling through under fairly stringent control” (180). In effect, Turkle was documenting the proliferation of identity games early adopters of Internet technologies played through various means. Much of what Turkle focused on were MUDs (Multi-User Dungeons) and MOOs (MUD Object Oriented), explicit play-spaces that encouraged identity-play of various kinds. Her contemporary Howard Rheingold focused on what may be described as the more “true to life” communities of the WELL (Whole Earth ‘Lectronic Link) (1–38). In particular, Rheingold explored a community established around the shared experience of parenting, especially of young children. While that community was not explicitly built on the notion of role-play, the parental identity was an important quality of community members. Unlike contemporary social media networks, these early communities were built on discreet platforms. MUDs, MOOs, Bulletin Board Systems, UseNet Groups and other early Internet communication platforms were generally hosted independently of one another, and even had to be dialled into via modem separately in some cases (such as the WELL). The Internet was a truly disparate entity in 1995. The discreetness of each community supported the cordoning off of individual roles or identities between them. Thus, an individual could quite easily be “Pete” a member of the parental WELL group and “Gorak the Destroyer,” a role-player on a fantasy MUD without the two roles ever being associated with each other. As Turkle points out, even within each MUD ample opportunity existed to play multiple characters (183–192). With only a screen name and associated description to identify an individual within the MUD environment, nothing technical existed to connect one player’s multiple identities, even within the same community. As the Internet has matured, however, the tendency has been shifting towards monolithic hubs, a notion of collecting all of “the Internet” together. From a purely technical and operational perspective, this has led to the emergence of the ISP (Internet service provider). Users can make a connection to one point, and then be connected to everything “on the Net” instead of individually dialling into servers and services one at a time as was the case in the early 1980s with companies such as Prodigy, the Source, CompuServe, and America On-Line (AOL). The early information service providers were largely walled gardens. A CompuServe user could only access information on the CompuServe network. Eventually the Internet became the network of choice and services migrated to it. Standards such as HTTP for Web page delivery and SMTP for email became established and dominate the Internet today. Technically, this has made the Internet much easier to use. The services that have developed on this more rationalised and unified platform have also tended toward monolithic, centralised architectures, despite the Internet’s apparent fundamental lack of a hierarchy. As the Internet replaced the closed networks, the wider Web of HTTP pages, forums, mailing lists and other forms of Internet communication and community thrived. Perhaps they required slightly more technological savvy than the carefully designed experience of walled-garden ISPs such as AOL, but these fora and IRC (Internet Relay Chat) rooms still provided the discreet environments within which to role-play. An individual could hold dozens of login names to as many different communities. These various niches could be simply hobby sites and forums where a user would deploy their identity as model train enthusiast, musician, or pet owner. They could also be explicitly about role-play, continuing the tradition of MUDs and MOOs into the new millennium. Pseudo- and polynymity were still very much part of the Internet experience. Even into the early parts of the so-called Web 2.0 explosion of more interactive Websites which allowed for easier dialog between site owner and viewer, a given identity would be very much tied to a single site, blog or even individual comments. There was no “single sign on” to link my thread from a music forum to the comments I made on a videogame blog to my aquarium photos at an image gallery site. Today, Facebook and Google, among others, seek to change all that. The Facebook Effect Working from a psychological background Turkle explored the multiplicity of online identities as a valuable learning, even therapeutic, experience. She assessed the experiences of individuals who were coming to terms with aspects of their own personalities, from simple shyness to exploring their sexuality. In “You Can’t Front on Facebook,” Mimi Marinucci summarizes an analysis of online behaviour by another psychologist, John Suler (67–70). Suler observed an “online disinhibition effect” characterised by users’ tendency to express themselves more openly online than offline (321). Awareness of this effect was drawn (no pun intended) into popular culture by cartoonist Mike Krahulik’s protagonist John Gabriel. Although Krahulik’s summation is straight to the point, Suler offers a more considered explanation. There are six general reasons for the online disinhibition effect: being anonymous, being invisible, the communications being out of sync, the strange sensation that a virtual interlocutor is all in the mind of the user, the general sense that the online world simply is not real and the minimisation of status and authority (321–325). Of the six, the notion of anonymity is most problematic, as briefly explored above in the case of AOL. The role of pseudonymity has been explored in more detail in Ruch, and will be considered with regard to Facebook and Google+ below. The Facebook effect, Marinucci argues, mitigates all six of these issues. Though Marinucci explains the mitigation of each factor individually, her final conclusion is the most compelling reason: “Facebook often facilitates what is best described as an integration of identities, and this integration of identities in turn functions as something of an inhibiting factor” (73). Ruch identifies this phenomenon as the “aggregation of identities” (219). Similarly, Brady Robards observes that “social network sites such as MySpace and Facebook collapse the entire array of social relationships into just one category, that of ‘Friend’” (20). Unlike earlier community sites, Ruch notes “Facebook rejects both the mythical anonymity of the Internet, but also the actual pseudo- or polynonymous potential of the technologies” (219). Essentially, Facebook works to bring the offline social world online, along with all the conventional baggage that accompanies the individual’s real-world social life. Facebook, and now Google+, present a hard, dichotomous approach to online identity: anonymous and authentic. Their socially networked individual is the “real” one, using a person’s given name, and bringing all (or as many as the sites can capture) their contacts from the offline world into the online one, regardless of context. The Facebook experience is one of “friending” everyone one has any social contact with into one homogeneous group. Not only is Facebook avoiding the multiple online identities that interested Turkle, but it is disregarding any multiplicity of identity anywhere, including any online/offline split. David Kirkpatrick reports Mark Zuckerberg’s rejection of this construction of identity is explained by his belief that “You have one identity … having two identities for yourself is an example of a lack of integrity” (199). Arguably, Zuckerberg’s calls for accountability through identity continue a perennial concern for anonymity online fuelled by “on the Internet no one knows you’re a dog” style moral panics. Over two decades ago Lindsy Van Gelder recounted the now infamous case of “Joan and Alex” (533) and Julian Dibbell recounted “a rape in cyberspace” (11). More recent anxieties concern the hacking escapades of Anonymous and LulzSec. Zuckerberg’s approach has been criticised by Christopher Poole, the founder of 4Chan—a bastion of Internet anonymity. During his keynote presentation at South by SouthWest 2011 Poole argued that Zuckerberg “equates anonymity with a lack of authenticity, almost a cowardice.” Yet in spite of these objections, Facebook has mainstream appeal. From a social constructivist perspective, this approach to identity would be satisfying the (perceived?) need for a mainstream, context-free, general social space online to cater for the hundreds of millions of people who now use the Internet. There is no specific, pre-defined reason to join Facebook in the way there is a particular reason to join a heavy metal music message board. Facebook is catering to the need to bring “real” social life online generally, with “real” in this case meaning “offline and pre-existing.” Very real risks of missing “real life” social events (engagements, new babies, party invitations etc) that were shared primarily via Facebook became salient to large groups of individuals not consciously concerned with some particular facet of identity performance. The commercial imperatives towards monolithic Internet and identity are obvious. Given that both Facebook and Google+ are in the business of facilitating the sale of advertising, their core business value is the demographic information they can sell to various companies for target advertising. Knowing a user’s individual identity and tastes is extremely important to those in the business of selling consumers what they currently want as well as predicting their future desires. The problem with this is the dawning realisation that even for the average person, role-playing is part of everyday life. We simply aren’t the same person in all contexts. None of the roles we play need to be particularly scandalous for this to be true, but we have different comfort zones with people that are fuelled by context. Suler proposes and Marinucci confirms that inhibition may be just as much part of our authentic self as the uninhibited expression experienced in more anonymous circumstances. Further, different contexts will inform what we inhibit and what we express. It is not as though there is a simple binary between two different groups and two different personal characteristics to oscillate between. The inhibited personnae one occupies at one’s grandmother’s home is a different inhibited self one plays at a job interview or in a heated discussion with faculty members at a university. One is politeness, the second professionalism, the third scholarly—yet they all restrain the individual in different ways. The Importance of Control over Circles Google+ is Google’s latest foray into the social networking arena. Its previous ventures Orkut and Google Buzz did not fare well, both were variously marred by legal issues concerning privacy, security, SPAM and hate groups. Buzz in particular fell afoul of associating Google accounts with users” real life identities, and (as noted earlier), all the baggage that comes with it. “One user blogged about how Buzz automatically added her abusive ex-boyfriend as a follower and exposed her communications with a current partner to him. Other bloggers commented that repressive governments in countries such as China or Iran could use Buzz to expose dissidents” (Novak). Google+ takes a different approach to its predecessors and its main rival, Facebook. Facebook allows for the organisation of “friends” into lists. Individuals can span more than one list. This is an exercise analogous to what Erving Goffman refers to as “audience segregation” (139). According to the site’s own statistics the average Facebook user has 130 friends, we anticipate it would be time-consuming to organise one’s friends according to real life social contexts. Yet without such organisation, Facebook overlooks the social structures and concomitant behaviours inherent in everyday life. Even broad groups offer little assistance. For example, an academic’s “Work People” list may include the Head of Department as well as numerous other lecturers with whom a workspace is shared. There are things one might share with immediate colleagues that should not be shared with the Head of Department. As Goffman states, “when audience segregation fails and an outsider happens upon a performance that was not meant for him, difficult problems in impression management arise” (139). By homogenising “friends” and social contexts users are either inhibited or run the risk of some future awkward encounters. Google+ utilises “circles” as its method for organising contacts. The graphical user interface is intuitive, facilitated by an easy drag and drop function. Use of “circles” already exists in the vocabulary used to describe our social structures. “List” by contrast reduces the subject matter to simple data. The utility of Facebook’s friends lists is hindered by usability issues—an unintuitive and convoluted process that was added to Facebook well after its launch, perhaps a reaction to privacy concerns rather than a genuine attempt to emulate social organisation. For a cogent breakdown of these technical and design problems see Augusto Sellhorn. Organising friends into lists is a function offered by Facebook, but Google+ takes a different approach: organising friends in circles is a central feature; the whole experience is centred around attempting to mirror the social relations of real life. Google’s promotional video explains the centrality of emulating “real life relationships” (Google). Effectively, Facebook and Google+ have adopted two different systemic approaches to dealing with the same issue. Facebook places the burden of organising a homogeneous mass of “friends” into lists on the user as an afterthought of connecting with another user. In contrast, Google+ builds organisation into the act of connecting. Whilst Google+’s approach is more intuitive and designed to facilitate social networking that more accurately reflects how real life social relationships are structured, it suffers from forcing direct correlation between an account and the account holder. That is, use of Google+ mandates bringing online the offline. Google+ operates a real names policy and on the weekend of 23 July 2011 suspended a number of accounts for violation of Google’s Community Standards. A suspension notice posted by Violet Blue reads: “After reviewing your profile, we determined the name you provided violates our Community Standards.” Open Source technologist Kirrily Robert polled 119 Google+ users about their experiences with the real names policy. The results posted to her on blog reveal that users desire pseudonymity, many for reasons of privacy and/or safety rather than the lack of integrity thought by Zuckerberg. boyd argues that Google’s real names policy is an abuse of power and poses danger to those users employing “nicks” for reasons including being a government employment or the victim of stalking, rape or domestic abuse. A comprehensive list of those at risk has been posted to the Geek Feminism Wiki (ironically, the Wiki utilises “Connect”, Facebook’s attempt at a single sign on solution for the Web that connects users’ movements with their Facebook profile). Facebook has a culture of real names stemming from its early adopters drawn from trusted communities, and this culture became a norm for that service (boyd). But as boyd also points out, “[r]eal names are by no means universal on Facebook.” Google+ demands real names, a demand justified by rhetoric of designing a social networking system that is more like real life. “Real”, in this case, is represented by one’s given name—irrespective of the authenticity of one’s pseudonym or the complications and dangers of using one’s given name. Conclusion There is a multiplicity of issues concerning social networks and identities, privacy and safety. This paper has outlined the challenges involved in moving real life to the online environment and the contests in trying to designate zones of social context. Where some earlier research into the social Internet has had a positive (even utopian) feel, the contemporary Internet is increasingly influenced by powerful and competing corporations. As a result, the experience of the Internet is not necessarily as flexible as Turkle or Rheingold might have envisioned. Rather than conducting identity experimentation or exercising multiple personnae, we are increasingly obligated to perform identity as it is defined by the monolithic service providers such as Facebook and Google+. This is not purely an indictment of Facebook or Google’s corporate drive, though they are obviously implicated, but has as much to do with the new social practice of “being online.” So, while there are myriad benefits to participating in this new social context, as Poole noted, the “cost of failure is really high when you’re contributing as yourself.” Areas for further exploration include the implications of Facebook positioning itself as a general-purpose user authentication tool whereby users can log into a wide array of Websites using their Facebook credentials. If Google were to take a similar action the implications would be even more convoluted, given the range of other services Google offers, from GMail to the Google Checkout payment service. While the monolithic centralisation of these services will have obvious benefits, there will be many more subtle problems which must be addressed. References Blue, Violet. “Google Plus Deleting Accounts en Masse: No Clear Answers.” zdnet.com (2011). 10 Aug. 2011 ‹http://www.zdnet.com/blog/violetblue/google-plus-deleting-accounts-en-masse-no-clear-answers/56›. boyd, danah. “Real Names Policies Are an Abuse of Power.” zephoria.org (2011). 10 Aug. 2011 ‹http://www.zephoria.org/thoughts/archives/2011/08/04/real-names.html›. Cashmore, Pete. “MySpace Hits 100 Million Accounts.” mashable.com (2006). 10 Aug. 2011 ‹http://mashable.com/2006/08/09/myspace-hits-100-million-accounts›. Dibble, Julian. My Tiny Life: Crime and Passion in a Virtual World. New York: Henry Holt & Company, 1998. Facebook. “Fact Sheet.” Facebook (2011). 10 Aug. 2011 ‹http://www.facebook.com/press/info.php?statistic›. Geek Feminism Wiki. “Who Is Harmed by a Real Names Policy?” 2011. 10 Aug. 2011 ‹http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy› Goffman, Erving. The Presentation of Self in Everyday Life. London: Penguin, 1959. Google. “The Google+ Project: Explore Circles.” Youtube.com (2011). 10 Aug. 2011 ‹http://www.youtube.com/watch?v=ocPeAdpe_A8›. Kirkpatrick, David. The Facebook Effect. New York: Simon & Schuster, 2010. Marinucci, Mimi. “You Can’t Front on Facebook.” Facebook and Philosophy. Ed. Dylan Wittkower. Chicago & La Salle, Illinois: Open Court, 2010. 65–74. Novak, Peter. “Privacy Commissioner Reviewing Google Buzz.” CBC News: Technology and Science (2010). 10 Aug. 2011 ‹http://www.cbc.ca/news/technology/story/2010/02/16/google-buzz-privacy.html›. Poole, Christopher. Keynote presentation. South by SouthWest. Texas, Austin, 2011. Robards, Brady. “Negotiating Identity and Integrity on Social Network Sites for Educators.” International Journal for Educational Integrity 6.2 (2010): 19–23. Robert, Kirrily. “Preliminary Results of My Survey of Suspended Google Accounts.” 2011. 10 Aug. 2011 ‹http://infotrope.net/2011/07/25/preliminary-results-of-my-survey-of-suspended-google-accounts/›. Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper Perennial, 1993. Ruch, Adam. “The Decline of Pseudonymity.” Posthumanity. Eds. Adam Ruch and Ewan Kirkland. Oxford: Inter-Disciplinary.net Press, 2010: 211–220. Sellhorn, Augusto. “Facebook Friend Lists Suck When Compared to Google+ Circles.” sellmic.com (2011). 10 Aug. 2011 ‹http://sellmic.com/blog/2011/07/01/facebook-friend-lists-suck-when-compared-to-googleplus-circles›. Suler, John. “The Online Disinhibition Effect.” CyberPsychology and Behavior 7 (2004): 321–326. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon & Schuster, 1995. Van Gelder, Lindsy. “The Strange Case of the Electronic Lover.” Computerization and Controversy: Value Conflicts and Social Choices Ed. Rob Kling. New York: Academic Press, 1996: 533–46.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography