To see the other types of publications on this topic, follow the link: Free E-book Make money online.

Journal articles on the topic 'Free E-book Make money online'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Free E-book Make money online.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ingaldi, Manuela, and Silvie Brožova. "Safety of Online Shopping According to Customers." System Safety: Human - Technical Facility - Environment 2, no. 1 (March 1, 2020): 73–81. http://dx.doi.org/10.2478/czoto-2020-0010.

Full text
Abstract:
AbstractCustomers are more and more deciding to use various types of services via Internet. They make very often different types of purchases. E-commerce is becoming more and more popular and developed. Unfortunately, according to customers, online shopping is not free from problems. Customers are afraid that the ordered goods will not be sent to them, will not meet their expectations, or will be destroyed during transport. An important aspect is also the payment method for this type of shopping. Customers often prefer to pay more to use the option of payment on delivery to avoid losing money if the ordered goods do not be delivered to them. The purpose of the paper is to analyze the safety of services offered via Internet. In the research the customers of different e-shops expressed their opinion on problems that may affect the safety of the offered services. Thanks to the research, it was possible to identify risk areas in accordance with the opinion of customers.
APA, Harvard, Vancouver, ISO, and other styles
2

Vozniuk, Andrii A., Andrii V. Savchenko, Tetiana Yu Tarasevych, Olexandr O. Dudorov, and Olga A. Klymenko. "Electronic Money and Payments as Means of Committing Crimes." Academic Journal of Interdisciplinary Studies 9, no. 4 (July 10, 2020): 150. http://dx.doi.org/10.36941/ajis-2020-0069.

Full text
Abstract:
The article deals with the main problems of criminal characteristics of electronic money and payments as instruments of crime. The article reveals the economic and legal nature of electronic money (e-money). The features of e-money and its relation to electronic payments are identified. It is proved that intensive development of the IT sector results in an increasing replacement of cash by cashless methods of payment, and e-money is required for making payments online. E-money is previously created in all cases where they are stored on an electronic device and are used as means of payment, therefore they significantly reduce the level of abuse against property. Criminals in the real estate leasing sector use it as a tool when they commit cybercrime - a new place that has been transformed into a powerful source using for crime. Particular attention in this article is paid to the criminal characteristics of electronic money as an instrument of crime. Electronic money has been updated to account for a significant number of offending characters, while these crimes operate in free currency from a non-supported market and move to electronic services, they are used, and may be joined by warehouse resources, which require a criminal law level. It also indicates that e-money is being received by its billing service, and then can be exploited by attackers to trick owners who have already participated in their work. Through this process, using e-money and electronic payment is almost legal and covers the concept of legality. It is disclosed that the main complexity in detecting malicious tools creates electronic money, which makes it difficult to track the traces of such crime, which uses its delays in cyber space. The author also reveals an accurate view of electronic money resources, such as what is more likely to be abused, which is an additional element of criminal execution qualification.
APA, Harvard, Vancouver, ISO, and other styles
3

Krueger, Stephanie. "STEM and Non-STEM Library Users Have Increased Their Use of E-Books." Evidence Based Library and Information Practice 12, no. 2 (June 29, 2017): 178. http://dx.doi.org/10.18438/b8dm2f.

Full text
Abstract:
A Review of: Carroll, A. J., Corlett-Rivera, K., Hackman, T., & Zou, J. (2016). E-book perceptions and use in STEM and non-STEM disciplines: A comparative follow-up study. portal: Libraries and the Academy, 16(1), 131-162. https://doi.org/10.1353/pla.2016.0002 Abstract Objective – To compile a set of usability and collection development suggestions and to examine a possible statistical correlation between visiting the physical library, online resource use, and e-book use. Design – Online questionnaire survey. Setting – Major public research university in Maryland, United States of America. Subjects – 47,209 faculty, students, and staff. Methods – This survey is a follow-up to a similar 2012 study at the same institution. Survey respondents completed 14 multiple-choice and up to 8 open-ended questions about academic e-book discovery, perception, and usage patterns for both STEM and non-STEM respondents using the Qualtrics online research platform. Seven of eight open-ended questions were conditional (i.e., dependent on answers to multiple-choice questions), thus the number of questions answered by respondents could vary. The survey was available from October 1 to November 22, 2014, and promoted across a variety of communication channels (email, library website, social media, print flyers and handouts). Incentives for completing the survey included one iPad Mini and eight U.S. $25 Amazon gift cards. Main Results – 1,911 (820 STEM and 1,091 non-STEM) self-selected students, faculty, and staff from a total campus population of 47,209 faculty, students, and staff (4.2% response rate) participated in the survey, excluding 277 additional responses representing library personnel (70) and individuals not affiliated with the institution (207). 64% of respondents indicated more e-book use than three years before, with only 21.9% of respondents noting they never use e-books for academic purposes compared to 31% in 2012. 32.5% of respondents noted daily or weekly use of e-books for scholarly pursuits, with undergraduates reporting the most frequent use: 38.6% daily/weekly use versus 37.2% for graduate students, 16.2% for faculty, and 14.2% for staff. 38% of respondents reporting daily/weekly use were from STEM disciplines; 31.3% were from non-STEM fields. Computers, not e-readers, were the primary devices used for accessing e-books: 72.5% of respondents reported using laptops or desktops to this end versus tablets, 37.9%; mobile phones, 36.7%; Kindles, 25.6%; Nooks, 5.9%; and other e-readers, 3.3%. Top “mixed device access” responses were tablet/mobile phone/computer (98 responses); mobile phone/computer (93 responses); and tablet/computer (81 responses). The top three discovery tools respondents reported using for finding e-books were commercial sites (35.9%), free websites (26.8%), and the library website (26.2%). A weak-positive Spearman’s rho rank correlation of 0.25 provides some evidence that respondents who visit the library often are likely to use online resources and e-books. 35% of respondents reported they use e-books online “most of the time,” and 67% of respondents indicated they print out e-book content for use. Responses to the question “What, if anything, would make you more likely to use e-books for academic purposes?” included easier access via the library website (48% of respondents), better functionality for highlighting/annotating (44%), reduced cost (43.2%), easier downloading (38.5%), more e-books in area of research interest (37.3%), more textbooks (37.2%), and ownership of a dedicated e-reader (35.6%). In 2012, 52% of respondents reported never having downloaded an e-book for offline use. This percentage dropped notably in this study, with only 11.5% of respondents indicating they had never downloaded for later use. Conclusion – While this study indicates both STEM and non-STEM respondents at this institution are increasingly using e-books, preferences for electronic versus print format varied according to content type and type of user (e.g., STEM or non-STEM, undergraduate or graduate, student/faculty/staff). Key recommendations for usability and collection development include: improving discovery and awareness mechanisms, purchasing some content (e.g., references works, style guides) in e-format while ensuring multiple simultaneous use, taking advantage of print plus electronic options to serve users with different format preferences, and encouraging vendors to allow digital rights management free downloading and printing.
APA, Harvard, Vancouver, ISO, and other styles
4

Reed, Kathleen. "Follow-Up Study on Free Document Delivery and Interlibrary Loan Service Demonstrates Customer Satisfaction and Generates Improvements." Evidence Based Library and Information Practice 8, no. 3 (September 13, 2013): 64. http://dx.doi.org/10.18438/b8960m.

Full text
Abstract:
Objective – Texas A&M University Libraries have delivered free documents and interlibrary loans for ten years via the Get it for me service. This study explores whether the needs of customers are being met, areas for improvement, acceptable turnaround times, why some resources are never picked up, preferred format and steps to obtaining resources, places searched before submitting a request, and whether users ever purchased resources after obtaining them through Get it for me. Design – Online questionnaire. Setting – Large academic library system located in Texas, United States. Subjects – Researchers used responses from 735 registered users of the Get it for me service (12% undergraduates, 49% graduate students, 21% faculty, 15% staff, 1% distance education, 2% other). Methods – The authors emailed all currently registered users of the Get it for me service (n=23,063) inviting them to participate in a survey. The survey ran for two weeks, with no follow-up emails sent. Main Results – The return rate of 3.18% (n=735/23,063) surpassed the participant goal to achieve a confidence level of 95%, with a confidence interval of 4%. Researchers found that 79% of respondents are satisfied with turnaround time, with 54% of respondents desiring items within three days. Expectations increased with position in the academy. Time is the significant factor in users not retrieving ordered items; items are no longer needed after deadlines pass or other related materials are found. Responses revealed that 55% of users prefer print to e-books, although 70% of participants would accept an e-book version if print is not available. Participants were evenly split between reading documents online and printing them to read offline. About one quarter of respondents bought or suggested that the library purchase an item requested via Get it for me. When participants encountered a problem, 55% of respondents would contact library staff and 45% would check the service FAQ. Of those that contacted staff, there is a 94% satisfaction rate. Overall, 95% of respondents checked the libraries’ online catalogue for availability, 83% looked in e-journal collections, and 74% checked Google or Google Scholar. Get it for me was complimented on its user-friendly interfaces and policies, and the money and time it saves its users. In terms of criticism, users requested better quality scanned documents, longer interlibrary loan times, and a PDF instead of a link when an article is found by staff. Conclusion – The author concludes that the document delivery and interlibrary loan services delivered by Get it for me are meeting the expectations of users, with 99% of respondents reporting that the Get it for me service meets or somewhat meets their needs. Areas that required improvement were identified and strategies put in place to improve service. This questionnaire can be applied to other libraries to assist them in learning about document delivery and interlibrary loan service users and their expectations.
APA, Harvard, Vancouver, ISO, and other styles
5

Permatasari, Intan, Agus Wijayanto, and Diah Kristina. "The Strengths and Weaknesses of Extensive Reading using Wattpad; Students’ Perceptions." Indonesian Journal of EFL and Linguistics 5, no. 2 (November 25, 2020): 373. http://dx.doi.org/10.21462/ijefl.v5i2.292.

Full text
Abstract:
This study aims to explore the strengths and weaknesses of extensive reading using Wattpad platform based on students’ perceptions. Extensive reading allows students to have more variation in their reading materials as they can read authentic texts from various sources that it is actually applied outside the class room for most people consider it as joyful reading. The advancement of technology over the times enables people to do many activities online, including extensive reading activity. Hence, Wattpad is believed to provide enormous free and paid reading materials that can support extensive reading for the students. To achieve the objectives, this study is in the form of case study. The data were collected through in-depth interview with the participants. The participants were two undergraduate students majoring English Education from two different universities in Indonesia. The participants were selected purposively because they were known to have been doing extensive reading activity on Wattpad for a quite long time, specifically for five years. The research findings showed several strengths of using Wattpad for extensive reading such as Wattpad gives students numerous and various sources of reading materials; extensive reading on Wattpad is a fun and enjoyable experience; extensive reading on Wattpad is more practical than using printed-books; extensive reading on Wattpad is money-saving; the reading materials on Wattpad have good quality contents; extensive reading through Wattpad improves students English’s skills unconsciously as well as the reading habit. Meanwhile, there are several weaknesses of extensive reading using Wattpad according to students such as; similarities in the reading materials sometimes make them boring to read; using the platform for a certain long time can potentially cause tired eyes; there are other distractions that can disrupt the extensive reading activity.
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Kutty. "A study of Veterinary Scholars’ Perception of MOOCs." Information and Learning Sciences 120, no. 11/12 (November 11, 2019): 743–57. http://dx.doi.org/10.1108/ils-04-2019-0031.

Full text
Abstract:
Purpose Massive open online courses (MOOCs) are a currently trending e-learning platform that presumably attract thousands of participants because of boundless participation, are open to any person to enroll, are free to begin and are delivered completely online, thus contradicting the spatial limitations of a traditional classroom. This study aims to present the findings of a study among veterinary science students examining their perceptions of MOOCs. In total, 200 participants were randomly selected for the survey, out of which 177 responded, owing to a response rate of 88.7 per cent. Majority of the respondents (93 per cent) opined MOOCs supplement other learning methods and provide lifelong opportunity. A study report established that Coursera is the largest platform by user base (82 per cent), followed by Udemy (70 per cent), and 65 per cent knowledge seekers ranted the enormous propaganda about MOOCs are not because of the technology’s inherent edifying value, but because of the incredible potentials of lower costs. The participants in this survey valued their course and overall MOOC experience pleasing. Design/methodology/approach The aim of the study is to explore veterinary students’ perception of MOOCs featuring in their subject of interest. The questionnaire was written in English because it is the teaching language for undergraduates and postgraduates in most Indian higher education institutes, including the one used as a context for this study. The online questionnaires were electronically mailed to a sample of veterinary students (undergraduate and postgraduate) with a consent form seeking their permission for participation in this study and swearing them the confidentiality of their responses. The e-mail included information about the purpose of the study as well as the URL to the survey site, demographic questions on age, gender and education. This part was followed by an important research question asking if the student had heard about the new open online educational system (MOOCs) provided in websites, including Coursera, Edx, Udacity and FutureLearn, among others. Based on respondents’ answers, they were directed to different sections. Students who knew about MOOCs were asked various mode of getting enrolled in MOOCs. If they were not enrolled in any course, the respondents were asked about the limitations to their use. Enrolled students were questioned on their perspectives and experiences with MOOCs. For students who gained certificates, were enquired for their level of satisfaction, opinions about the integration of MOOCs into the veterinary field and hindrances encountered during accessing the course. Out of a total of 200 students who initially agreed to take part, 177 responses were received, with a response rate of 88.50 per cent, with no cases of missing data. The data were stored automatically in the hosted online survey service into a separate database after the submission of the responses. The descriptive data analyses (such as average) were led using the data analysis tool provided. Findings Even though most MOOCs do not provide academic credit or result in a degree, some of the biggest beneficiaries of MOOCs are students formally enrolled in an academic program, are provided a free mode to obtain additional academic assistance that would not otherwise be available (Parke Muth, 2018)15. Correspondingly, 93 per cent of the students opined MOOCs supplement other learning methods and provide lifelong opportunity. Learning has traditionally cost both money and time. With MOOCs, it now just costs time. In total, 24 per cent of the participants have discoursed free of cost as one of the intentions to choose their course. Almost every respondent (99 per cent) was interested toward online discussion forum, and 91 per cent preferred course materials containing video and audio files were pretty beneficial, while 88 per cent felt teaching through electronic whiteboard was the most advantageous criterion in their course. The study findings indicated that Coursera is the largest platform by user base (82 per cent), followed by Udemy (70 per cent). Research limitations/implications The study considered veterinary science undergraduate (BVSc) and postgraduate (MVSc) students alone, veterinary faculties are not included for the survey. There was comparatively less participation of respondents who enrolled or successfully completed a MOOC, which makes the analysis of limitations and satisfaction less reliable. Hence, the study results cannot be generalized as a comprehensive report of veterinary science scholars’ perceptiveness. Originality/value Animal health involves household pets and their care, in addition to livestock health and protection from diseases like bovine babesiosis, bovine tuberculosis and heartwater. There are numerous MOOCs offering online, contact or blended interventions in veterinary science and animal health that afford professionals quick and easy options to obtain credentials, including courses in pharmacology and toxicology, practice management, veterinary and para-veterinary studies, veterinary tropical diseases, radiology and wildlife management. As it is necessary to gain an understanding of the veterinary students’ level of familiarity and their insight toward the MOOC concept, the study attempts to explore their knowledge through an online survey.
APA, Harvard, Vancouver, ISO, and other styles
7

Oriekhova, Svetlana, and Nataliia Lynska. "Application of cloud technologies in the system of information and communication activities of libraries." Bulletin of Mariupol State University. Series: Philosophy, culture studies, sociology 9, no. 18 (2019): 71–76. http://dx.doi.org/10.34079/2226-2849-2019-9-18-71-76.

Full text
Abstract:
The use of libraries’modern cloud technologies in information and communication activity is analyzed. It is considered the problems of cloud technologies implementation in libraries documentation and information circulation. of Advantages and disadvantages of cloud service’simplementation are revealed. Authors outlined transition prospects in the future to the cloud network and cloud technologies’use in library activity. Cloud service providers allow us to lease computing power and disk space online. Clouds are physically located in data centers - buildings that house powerful computers that are connected by a single network. Such unified computers also contain the virtual servers that are required for cloud services to work. It has been found that for libraries as social institutions that are unable to acquire and administer their own data warehouses, the use of cloud technologies is a unique opportunity to improve their work. The use of cloud technology in libraries helps to save money on acquiring a fleet of computers and licensed software. Book collections are successfully stored in large amounts on "clouds", which significantly unloads the work of local library networks, an automated library information system and its own server. Cloud services include those that are used to learn how to work with web services and standard documents. In particular, the Microsoft 365 cloud platform provides the opportunity to practice known office applications through a web browser. It includes e-mail and calendars, standard Office applications. Security is achieved through One Drive backup and two-factor authentication with face or fingerprint recognition or PIN to further protect files. Given the complexity of using security tools in cloud repositories, digital literacy plays an important role in effective communication for library users and their employees. It is resoluted that cloud services giveto library staff additional opportunities for organizing management activities. This includes, in particular, multimedia web resource services use (photo services - Picasa, Panoramio; video services – Youtubevideo, geoservices - Google maps; workflow - Slideshare, Google Docs, SkyDrive, etc.), which are free to usefor any user so we can freelystore and use image, audio and video resources. These systems can be used in management practice not only as a source of accumulation of multimedia educational web resources, but also as a system of storing library video, photo and audio archives, as well as improving the processes of information service for readers in libraries.
APA, Harvard, Vancouver, ISO, and other styles
8

Bhandari, Sudhir, Ajit Singh Shaktawat, Bhoopendra Patel, Amitabh Dube, Shivankan Kakkar, Amit Tak, Jitendra Gupta, and Govind Rankawat. "The sequel to COVID-19: the antithesis to life." Journal of Ideas in Health 3, Special1 (October 1, 2020): 205–12. http://dx.doi.org/10.47108/jidhealth.vol3.issspecial1.69.

Full text
Abstract:
The pandemic of COVID-19 has afflicted every individual and has initiated a cascade of directly or indirectly involved events in precipitating mental health issues. The human species is a wanderer and hunter-gatherer by nature, and physical social distancing and nationwide lockdown have confined an individual to physical isolation. The present review article was conceived to address psychosocial and other issues and their aetiology related to the current pandemic of COVID-19. The elderly age group has most suffered the wrath of SARS-CoV-2, and social isolation as a preventive measure may further induce mental health issues. Animal model studies have demonstrated an inappropriate interacting endogenous neurotransmitter milieu of dopamine, serotonin, glutamate, and opioids, induced by social isolation that could probably lead to observable phenomena of deviant psychosocial behavior. Conflicting and manipulated information related to COVID-19 on social media has also been recognized as a global threat. Psychological stress during the current pandemic in frontline health care workers, migrant workers, children, and adolescents is also a serious concern. Mental health issues in the current situation could also be induced by being quarantined, uncertainty in business, jobs, economy, hampered academic activities, increased screen time on social media, and domestic violence incidences. The gravity of mental health issues associated with the pandemic of COVID-19 should be identified at the earliest. Mental health organization dedicated to current and future pandemics should be established along with Government policies addressing psychological issues to prevent and treat mental health issues need to be developed. References World Health Organization (WHO) Coronavirus Disease (COVID-19) Dashboard. Available at: https://covid19.who.int/ [Accessed on 23 August 2020] Sim K, Chua HC. The psychological impact of SARS: a matter of heart and mind. CMAJ. 2004; 170:811e2. https://doi.org/10.1503/cmaj.1032003. Wu P, Fang Y, Guan Z, Fan B, Kong J, Yao Z, et al. The psychological impact of the SARS epidemic on hospital employees in China: exposure, risk perception, and altruistic acceptance of risk. Can J Psychiatr. 2009; 54:302e11. https://doi.org/10.1177/070674370905400504. Brooks SK, Webster RK, Smith LE, Woodland L, Wessely S, Greenberg N, et al. The psychological impact of quarantine and how to reduce it: rapid review of the evidence. Lancet. 2020; 395:912e20. https://doi.org/10.1016/S0140-6736(20)30460-8. Robertson E, Hershenfield K, Grace SL, Stewart DE. The psychosocial effects of being quarantined following exposure to SARS: a qualitative study of Toronto health care workers. Can J Psychiatr. 2004; 49:403e7. https://doi.org/10.1177/070674370404900612. Barbisch D, Koenig KL, Shih FY. Is there a case for quarantine? Perspectives from SARS to Ebola. Disaster Med Public Health Prep. 2015; 9:547e53. https://doi.org/10.1017/dmp.2015.38. Jeong H, Yim HW, Song YJ, Ki M, Min JA, Cho J, et al. Mental health status of people isolated due to Middle East Respiratory Syndrome. Epidemiol Health. 2016;38: e2016048. https://doi.org/10.4178/epih.e2016048. Liu X, Kakade M, Fuller CJ, Fan B, Fang Y, Kong J, et al. Depression after exposure to stressful events: lessons learned from the severe acute respiratory syndrome epidemic. Compr Psychiatr. 2012; 53:15e23. https://doi.org/10.1016/j.comppsych.2011.02.003 Chadda RK, Deb KS. Indian family systems, collectivistic society and psychotherapy. Indian J Psychiatry. 2013;55: S299‑ https://dx.doi.org/10.4103%2F0019-5545.105555. Grover S, Sahoo S, Mehra A, Avasthi A, Tripathi A, Subramanyan A, et al. Psychological impact of COVID‑19 lockdown: An online survey from India. Indian J Psychiatry. 2020; 62:354-62. https://doi.org/ 10.4103/psychiatry.IndianJPsychiatry _427_20. Hawkley LC, Cacioppo JT. Loneliness matters: a theoretical and empirical review of consequences and mechanisms. Ann Behav Med. 2010; 40: 218–27. https://dx.doi.org/10.1007%2Fs12160-010-9210-8. Chen N, Zhou M, Dong X, Qu J, Gong F, Han Y, et al. Epidemiological and clinical characteristics of 99 cases of 2019 novel coronavirus pneumonia in Wuhan, China: a descriptive study. Lancet. 2020;395(10223):507-13. https://doi.org/10.1016/S0140-6736(20)30211-7. Bhandari S, Sharma R, Singh Shaktawat A, Banerjee S, Patel B, Tak A, et al. COVID-19 related mortality profile at a tertiary care centre: a descriptive study. Scr Med. 2020;51(2):69-73. https://doi.org/10.5937/scriptamed51-27126. Baumeister RF, Leary MR. The need to belong: desire for interpersonal attachments as a fundamental human motivation. Psychol Bull. 1995; 117: 497–529. https://doi.org/10.1037/0033-2909.117.3.497. Caspi A, Harrington H, Moffitt TE, Milne BJ, Poulton R. Socially isolated children 20 years later: risk of cardiovascular disease. Arch Pediatr Adolesc Med. 2006; 160(8):805-11. https://doi.org/10.1001/archpedi.160.8.805. Eaker ED, Pinsky J, Castelli WP. Myocardial infarction and coronary death among women: psychosocial predictors from a 20-year follow-up of women in the Framingham Study. Am J Epidemiol. 1992; 135(8):854-64. https://doi.org/10.1093/oxfordjournals.aje.a116381. Luo Y, Hawkley LC, Waite LJ, Cacioppo JT. Loneliness, health, and mortality in old age: a national longitudinal study. Soc Sci Med. 2012 Mar; 74(6):907-14. https://dx.doi.org/10.1016%2Fj.socscimed.2011.11.028. Olsen RB, Olsen J, Gunner-Svensson F, Waldstrøm B. Social networks and longevity. A 14-year follow-up study among elderly in Denmark. Soc Sci Med. 1991; 33(10):1189-95. https://doi.org/10.1016/0277-9536(91)90235-5. Patterson AC, Veenstra G. Loneliness and risk of mortality: a longitudinal investigation in Alameda County, California. Soc Sci Med. 2010; 71(1):181-6. https://doi.org/10.1016/j.socscimed.2010.03.024. Savikko N, Routassalo P, Tilvis RS, Strandberg TE, Pitkalla KH. Predictors and subjective causes of loneliness in an aged population. Arch Gerontol Geriatrics. 2005; 41:3;223-33. https://doi.org/10.1016/j.archger.2005.03.002. Health Advisory for Elderly Population of India during COVID19. Available at: https://www.mohfw.gov.in/pdf/AdvisoryforElderlyPopulation.pdf [Accessed on 13 August 2020]. Dicks D, Myers R, Kling A. Uncus and amygdala lesions: effects on social behavior in the free-ranging rhesus monkey. Science. 1969; 165:69–71. https://doi.org/10.1126/science.165.3888.69. Kanai R, Bahrami B, Duchaine B, Janik A, Banissy MJ, Rees G. Brain structure links loneliness to social perception. Curr Biol. 2012; 22(20):1975-9. https://dx.doi.org/10.1016%2Fj.cub.2012.08.045. Bender AR, Daugherty A, Raz N. Vascular risk moderates associations between hippocampal subfield volumes and memory. J Cogn Neurosci. 2013; 25:1851–62. https://doi.org/10.1162/jocn_a_00435. Raz N. Diabetes: brain, mind, insulin–what is normal and do we need to know? Nat Rev Endocrinol. 2011; 7:636–7. https://doi.org/10.1038/nrendo.2011.149. Colcombe SJ, Erickson KI, Naftali R, Andrew GW, Cohen NJ, McAuley E, et al. Aerobic fitness reduces brain tissue loss in aging humans. J Gerontol A Biol Sci Med Sci. 2003; 58:176–80. https://doi.org/10.1093/gerona/58.2.m176. Maass A, Düzel S, Goerke M, Becke A, Sobieray U, Neumann K, et al. Vascular hippocampal plasticity after aerobic exercise in older adults. Mol Psychiatry. 2015; 20, 585–93. https://doi.org/10.1038/mp.2014.114. Wilson RS, Krueger KR, Arnold SE, Schneider JA, Kelly JF, Barnes LL, et al. Loneliness and Risk of Alzheimer Disease. Arch Gen Psychiatry. 2007;64(2):234–240. https://doi.org/10.1001/archpsyc.64.2.234. Kogan JH, Frankland PW, Silva AJ. Long-term memory underlying hippocampus-dependent social recognition in mice. Hippocampus. 2000;10(1):47-56. https://doi.org/10.1002/(sici)1098-1063(2000)10:1%3C47::aid-hipo5%3E3.0.co;2-6. Yorgason JT, España RA, Konstantopoulos JK, Weiner JL, Jones SR. Enduring increases in anxiety-like behavior and rapid nucleus accumbens dopamine signaling in socially isolated rats. Eur J Neurosci. 2013;37(6):1022-31. https://doi.org/10.1111/ejn.12113. Bledsoe AC, Oliver KM, Scholl JL, Forster GL. Anxiety states induced by post-weaning social isolation are mediated by CRF receptors in the dorsal raphe nucleus. Brain Res Bull. 2011;85(3-4):117-22. https://dx.doi.org/10.1016%2Fj.brainresbull.2011.03.003. Lukkes JL, Engelman GH, Zelin NS, Hale MW, Lowry CA. Post-weaning social isolation of female rats, anxiety-related behavior, and serotonergic systems. Brain Res. 2012; 1443:1-17. https://dx.doi.org/10.1016%2Fj.brainres.2012.01.005. Ago Y, Araki R, Tanaka T, Sasaga A, Nishiyama S, Takuma K, et al. Role of social encounter-induced activation of prefrontal serotonergic systems in the abnormal behaviors of isolation-reared mice. Neuropsychopharmacology. 2013; 38(8):1535-47. https://doi.org/10.1038/npp.2013.52. Veenema AH. Early life stress, the development of aggression and neuroendocrine and neurobiological correlates: what can we learn from animal models? Front Neuroendocrinol. 2009;30(4):497-518. https://doi.org/10.1016/j.yfrne.2009.03.003. Zhao X, Sun L, Jia H, Meng Q, Wu S, Li N, et al. Isolation rearing induces social and emotional function abnormalities and alters glutamate and neurodevelopment-related gene expression in rats. Prog Neuropsychopharmacol Biol Psychiatry. 2009;33(7):1173-1177. https://doi.org/10.1016/j.pnpbp.2009.06.016. Sciolino NR, Bortolato M, Eisenstein SA, Fu J, Oveisi F, Hohmann AG, et al. Social isolation and chronic handling alter endocannabinoid signaling and behavioral reactivity to context in adult rats. Neuroscience. 2010;168(2):371-86. https://dx.doi.org/10.1016%2Fj.neuroscience.2010.04.007. Ghasemi M, Phillips C, Trillo L, De Miguel Z, Das D, Salehi A. The role of NMDA receptors in the pathophysiology and treatment of mood disorders. Neurosci Biobehav Rev. 2014; 47:336-358. https://doi.org/10.1016/j.neubiorev.2014.08.017. Olivenza R, Moro MA, Lizasoain I, Lorenzo P, Fernández AP, Rodrigo J, et al. Chronic stress induces the expression of inducible nitric oxide synthase in rat brain cortex. J Neurochem. 2000;74(2):785-791. https://doi.org/10.1046/j.1471-4159.2000.740785.x. Maeng S, Zarate CA Jr, Du J, Schloesser RJ, McCammon J, Chen G, et al. Cellular mechanisms underlying the antidepressant effects of ketamine: role of alpha-amino-3-hydroxy-5-methylisoxazole-4-propionic acid receptors. Biol Psychiatry. 2008;63(4):349-352. https://doi.org/10.1016/j.biopsych.2007.05.028. Kalia LV, Kalia SK, Salter MW. NMDA receptors in clinical neurology: excitatory times ahead. Lancet Neurol. 2008;7(8):742-755. https://dx.doi.org/10.1016%2FS1474-4422(08)70165-0. Waxman EA, Lynch DR. N-methyl-D-aspartate Receptor Subtypes: Multiple Roles in Excitotoxicity and Neurological Disease. The Neuroscientist. 2005; 11(1), 37–49. https://doi.org/10.1177/1073858404269012. Hermes G, Li N, Duman C, Duman R. Post-weaning chronic social isolation produces profound behavioral dysregulation with decreases in prefrontal cortex synaptic-associated protein expression in female rats. Physiol Behav. 2011;104(2):354-9. https://dx.doi.org/10.1016%2Fj.physbeh.2010.12.019. Sestito RS, Trindade LB, de Souza RG, Kerbauy LN, Iyomasa MM, Rosa ML. Effect of isolation rearing on the expression of AMPA glutamate receptors in the hippocampal formation. J Psychopharmacol. 2011;25(12):1720-1729. https://doi.org/10.1177/0269881110385595. Toua C, Brand L, Möller M, Emsley RA, Harvey BH. The effects of sub-chronic clozapine and haloperidol administration on isolation rearing induced changes in frontal cortical N-methyl-D-aspartate and D1 receptor binding in rats. Neuroscience. 2010;165(2):492-499. https://doi.org/10.1016/j.neuroscience.2009.10.039. Alò R, Avolio E, Mele M, Storino F, Canonaco A, Carelli A et al. Excitatory/inhibitory equilibrium of the central amygdala nucleus gates anti-depressive and anxiolytic states in the hamster. Pharmacol Biochem Behav. 2014; 118:79-86. https://doi.org/10.1016/j.pbb.2014.01.007. St JP, Petkov VV. Changes in 5-HT1 receptors in different brain structures of rats with isolation syndrome. General pharmacology. 1990;21(2):223-5. https://doi.org/10.1016/0306-3623(90)90905-2. Miachon S, Rochet T, Mathian B, Barbagli B, Claustrat B. Long-term isolation of Wistar rats alters brain monoamine turnover, blood corticosterone, and ACTH. Brain Res Bull. 1993;32(6):611-614. https://doi.org/10.1016/0361-9230(93)90162-5. Van den Berg CL, Van Ree JM, Spruijt BM, Kitchen I. Effects of juvenile isolation and morphine treatment on social interactions and opioid receptors in adult rats: behavioural and autoradiographic studies. Eur J Neurosci. 1999;11(9):3023-3032. https://doi.org/10.1046/j.1460-9568.1999.00717.x. Vanderschuren LJ, Stein EA, Wiegant VM, Van Ree JM. Social play alters regional brain opioid receptor binding in juvenile rats. Brain Res. 1995;680(1-2):148-156. https://doi.org/10.1016/0006-8993(95)00256-p. Moles A, Kieffer BL, D'Amato FR. Deficit in attachment behavior in mice lacking the mu-opioid receptor gene. Science. 2004;304(5679):1983-1986. https://doi.org/10.1126/science.1095943. Panksepp J, Herman BH, Vilberg T, Bishop P, DeEskinazi FG. Endogenous opioids and social behavior. Neurosci Biobehav Rev. 1980;4(4):473-487. https://doi.org/10.1016/0149-7634(80)90036-6. Gong JP, Onaivi ES, Ishiguro H, Liu Q, Tagliaferro PA, Brusco A, et al. Cannabinoid CB2 receptors: immunohistochemical localization in rat brain. Brain Res. 2006;1071(1):10-23. https://doi.org/10.1016/j.brainres.2005.11.035. Breivogel CS, Sim-Selley LJ. Basic neuroanatomy and neuropharmacology of cannabinoids. Int Rev Psychiatry 2009; 21:2:113-121. https://doi.org/10.1080/09540260902782760. Haj-Mirzaian A, Amini-Khoei H, Haj-Mirzaian A, Amiri S, Ghesmati M, Zahir M, et al. Activation of cannabinoid receptors elicits antidepressant-like effects in a mouse model of social isolation stress. Brain Res Bull. 2017; 130:200-210. https://doi.org/10.1016/j.brainresbull.2017.01.018. Banach M, Piskorska B, Czuczwar SJ, Borowicz KK. Nitric Oxide, Epileptic Seizures, and Action of Antiepileptic Drugs. CNS & Neurological Disorders - Drug Targets 2011;10: 808. https://doi.org/10.2174/187152711798072347. Förstermann U, Sessa WC. Nitric oxide synthases: regulation and function. Eur Heart J. 2012;33(7):829-37, 837a-837d. https://dx.doi.org/10.1093%2Feurheartj%2Fehr304. Hu Y, Wu D, Luo C, Zhu L, Zhang J, Wu H, et al. Hippocampal nitric oxide contributes to sex difference in affective behaviors. PNAS. 2012, 109 (35) 14224-14229. https://doi.org/10.1073/pnas.1207461109. Khan MI, Ostadhadi S, Zolfaghari S, Mehr SE, Hassanzadeh G, Dehpour, A et al. The involvement of NMDA receptor/NO/cGMP pathway in the antidepressant like effects of baclofen in mouse force swimming test. Neuroscience Letters. 2016; 612:52-61. https://doi.org/10.1016/j.neulet.2015.12.006. Matsumoto K, Puia G, Dong E, Pinna G. GABAA receptor neurotransmission dysfunction in a mouse model of social isolation-induced stress: Possible insights into a non-serotonergic mechanism of action of SSRIs in mood and anxiety disorders. Stress. 2007; 10:1:3-12. https://doi.org/10.1080/10253890701200997. Zlatković J, Filipović D. Chronic social isolation induces NF-κB activation and upregulation of iNOS protein expression in rat prefrontal cortex. Neurochem Int. 2013;63(3):172-179. https://doi.org/10.1016/j.neuint.2013.06.002. Haj-Mirzaian A, Amiri S, Kordjazy N, Momeny M, Razmi A, Balaei MR, et al. Lithium attenuated the depressant and anxiogenic effect of juvenile social stress through mitigating the negative impact of interlukin-1β and nitric oxide on hypothalamic-pituitary-adrenal axis function. Neuroscience. 2016; 315:271-285. https://doi.org/10.1016/j.neuroscience.2015.12.024. Larson HJ. The biggest pandemic risk? Viral misinformation. Nature 2018; 562:309. https://doi.org/10.1038/d41586-018-07034-4. Zarocostas J. How to fight an infodemic. Lancet 2020; 395:676. https://doi.org/10.1016/S0140-6736(20)30461-X. World Health Organization, 2019. Ebola Virus Disease – Democratic Republic of the Congo. Geneva, Switzerland: WHO. Available at: https://www.who.int/csr/don/28-november-2019-ebola-drc/en/ [Accessed on August 8, 2020] Times of India. Covid-19: doctors gone to collect samples attacked in Indore. Available at: https://timesofindia.indiatimes.com/videos/news/covid-19-doctors-goneto- collect-samples-attacked-in-indore/videoshow/74942153.cms; 2020 [Accessed on August 8, 2020]. Withnall A. Coronavirus: why India has had to pass new law against attacks on healthcare workers. The Independent. April 23, 2020. Semple K. “Afraid to be a nurse”: health workers under attack. The New York Times. 2020 Apr 27. The Economist. Health workers become unexpected targets during COVID-19. The Economist. May 11, 2020. Turan B, Budhwani H, Fazeli PL, Browning WR, Raper JL, Mugavero MJ, et al. How does stigma affect people living with HIV? The mediating roles of internalized and anticipated HIV stigma in the effects of perceived community stigma on health and psychosocial outcomes. AIDS Behav. 2017; 21: 283–291. https://doi.org/10.1007/s10461-016-1451-5. James PB, Wardle J, Steel A, Adams J. An assessment of Ebola-related stigma and its association with informal healthcare utilisation among Ebola survivors in Sierra Leone: a cross sectional study. BMC Public Health. 2020; 20: 182. https://doi.org/10.1186/s12889-020-8279-7. Aljazeera, 2020. Iran: Over 700 Dead after Drinking Alcohol to Cure Coronavirus. Aljazeera. Available at: https://www.aljazeera.com/ news/2020/04/iran-700-dead-drinking-alcohol-cure-coronavirus200427163529629.html. (Accessed June 4, 2020) Delirrad M, Mohammadi AB, 2020. New methanol poisoning outbreaks in Iran following COVID-19 pandemic. Alcohol Alcohol. 55: 347–348. https://doi.org/10.1093/alcalc/agaa036. Hassanian-Moghaddam H, Zamani N, Kolahi A-A, McDonald R, Hovda KE. Double trouble: methanol outbreak in the wake of the COVID-19 pandemic in Iran-a cross-sectional assessment. Crit Care. 2020; 24: 402. https://doi.org/10.1186/s13054-020-03140-w. Soltaninejad K. Methanol Mass Poisoning Outbreak: A Consequence of COVID-19 Pandemic and Misleading Messages on Social Media. Int J Occup Environ Med. 2020;11(3):148-150. https://dx.doi.org/10.34172%2Fijoem.2020.1983. Islam MS, Sarkar T, Khan SH, Kamal AM, Hasan SMM, Kabir A, et al. COVID-19–Related Infodemic and Its Impact on Public Health: A Global Social Media Analysis. Am J Trop Med Hyg. 2020; 00(0):1–9. https://doi.org/10.4269/ajtmh.20-0812. Hawryluck L, Gold W, Robinson S, Pogorski S, Galea S, Styra R. SARS control and psychological effects of quarantine, Toronto, Canada. Emerg Infect Dis. 2004;10(7):1206–1212. https://dx.doi.org/10.3201%2Feid1007.030703. Lee S, Chan LYY, Chau AAM, Kwok KPS, Kleinman A. The experience of SARS-related stigma at Amoy Gardens. Soc Sci Med. 2005; 61(9): 2038-2046. https://doi.org/10.1016/j.socscimed.2005.04.010. Yoon MK Kim SY Ko HS Lee MS. System effectiveness of detection, brief intervention and refer to treatment for the people with post-traumatic emotional distress by MERS: a case report of community-based proactive intervention in South Korea. Int J Ment Health Syst. 2016; 10: 51. https://doi.org/10.1186/s13033-016-0083-5. Reynolds DL, Garay JR, Deamond SL, Moran MK, Gold W, Styra R. Understanding, compliance and psychological impact of the SARS quarantine experience. Epidemiol Infect. 2008; 136: 997-1007. https://dx.doi.org/10.1017%2FS0950268807009156. Marjanovic Z, Greenglass ER, Coffey S. The relevance of psychosocial variables and working conditions in predicting nurses' coping strategies during the SARS crisis: an online questionnaire survey. Int J Nurs Stud. 2007; 44(6): 991-998. https://doi.org/10.1016/j.ijnurstu.2006.02.012. Bai Y, Lin C-C, Lin C-Y, Chen J-Y, Chue C-M, Chou P. Survey of stress reactions among health care workers involved with the SARS outbreak. Psychiatr Serv. 2004; 55: 1055-1057. https://doi.org/10.1176/appi.ps.55.9.1055. Ministry of Health and Family Welfare. Available at: https://www.mohfw.gov.in/pdf/Guidelinesforhomequarantine.pdf [Accessed on 25 August 2020]. Ministry of Health and Family Welfare. Available at: https://www.mohfw.gov.in/pdf/RevisedguidelinesforHomeIsolationofverymildpresymptomaticCOVID19cases10May2020.pdf [Accessed on 25 August 2020]. Ministry of Health and Family Welfare. Available at: https://www.mohfw.gov.in/pdf/AdvisoryformanagingHealthcareworkersworkinginCOVIDandNonCOVIDareasofthehospital.pdf (Accessed on 25 August 2020). Ministry of Health and Family Welfare. Available at: https://www.mohfw.gov.in/pdf/RevisedguidelinesforInternationalArrivals02082020.pdf [Accessed on 25 August 2020]. Cost of the lockdown? Over 10% of GDP loss for 18 states. Available at: https://timesofindia.indiatimes.com/india/cost-of-the-lockdown-over-10-of-gdp-loss-for-18-states/articleshow/76028826.cms [Accessed on 21 August 2020]. Jorda O, Singh SR, Taylor AM. Longer-Run Economic Consequences of Pandemics. Federal Reserve Bank of San Francisco Working Paper. 2020-09. https://doi.org/10.24148/wp2020-09. Firdaus G. Mental well‑being of migrants in urban center of India: Analyzing the role of social environment. Indian J Psychiatry. 2017; 59:164‑ https://doi.org/10.4103/psychiatry.indianjpsychiatry_272_15. National Crime Record Bureau. Annual Crime in India Report. New Delhi, India: Ministry of Home Affairs; 2018. 198 migrant workers killed in road accidents during lockdown: Report. Available at: https://www.hindustantimes.com/india-news/198-migrant-workers-killed-in-road-accidents-during-lockdown-report/story-hTWzAWMYn0kyycKw1dyKqL.html [Accessed on 25 August 2020]. Qiu H, Wu J, Hong L, Luo Y, Song Q, Chen D. Clinical and epidemiological features of 36 children with coronavirus disease 2019 (COVID-19) in Zhejiang, China: an observational cohort study. Lancet Infect Dis. 2020; 20:689-96. https://doi.org/10.1016/S1473-3099(20)30198-5. Dalton L, Rapa E, Stein A. Protecting the psychological health of through effective communication about COVID-19. Lancet Child Adolesc Health. 2020;4(5):346-347. https://doi.org/10.1016/S2352-4642(20)30097-3. Centre for Disease Control. Helping Children Cope with Emergencies. Available at: https://www.cdc.gov/childrenindisasters/helping-children-cope.html [Accessed on 25 August 2020]. Liu JJ, Bao Y, Huang X, Shi J, Lu L. Mental health considerations for children quarantined because of COVID-19. Lancet Child & Adolesc Health. 2020; 4(5):347-349. https://doi.org/10.1016/S2352-4642(20)30096-1. Sprang G, Silman M. Posttraumatic Stress Disorder in Parents and Youth After Health-Related Disasters. Disaster Med Public Health Prep. 2013;7(1):105-110. https://doi.org/10.1017/dmp.2013.22. Rehman U, Shahnawaz MG, Khan NH, Kharshiing KD, Khursheed M, Gupta K, et al. Depression, Anxiety and Stress Among Indians in Times of Covid-19 Lockdown. Community Ment Health J. 2020:1-7. https://doi.org/10.1007/s10597-020-00664-x. Cao W, Fang Z, Hou, Han M, Xu X, Dong J, et al. The psychological impact of the COVID-19 epidemic on college students in China. Psychiatry Research. 2020; 287:112934. https://doi.org/10.1016/j.psychres.2020.112934. Wang C, Zhao H. The Impact of COVID-19 on Anxiety in Chinese University Students. Front Psychol. 2020; 11:1168. https://dx.doi.org/10.3389%2Ffpsyg.2020.01168. Kang L, Li Y, Hu S, Chen M, Yang C, Yang BX, et al. The mental health of medical workers in Wuhan, China dealing with the 2019 novel coronavirus. Lancet Psychiatry 2020;7(3): e14. https://doi.org/10.1016/s2215-0366(20)30047-x. Lai J, Ma S, Wang Y, Cai Z, Hu J, Wei N, et al. Factors associated with mental health outcomes among health care workers exposed to coronavirus disease 2019. JAMA Netw Open 2020;3(3): e203976. https://doi.org/10.1001/jamanetworkopen.2020.3976. Lancee WJ, Maunder RG, Goldbloom DS, Coauthors for the Impact of SARS Study. Prevalence of psychiatric disorders among Toronto hospital workers one to two years after the SARS outbreak. Psychiatr Serv. 2008;59(1):91-95. https://dx.doi.org/10.1176%2Fps.2008.59.1.91. Tam CWC, Pang EPF, Lam LCW, Chiu HFK. Severe acute respiratory syndrome (SARS) in Hongkong in 2003: Stress and psychological impact among frontline healthcare workers. Psychol Med. 2004;34 (7):1197-1204. https://doi.org/10.1017/s0033291704002247. Lee SM, Kang WS, Cho A-R, Kim T, Park JK. Psychological impact of the 2015 MERS outbreak on hospital workers and quarantined hemodialysis patients. Compr Psychiatry. 2018; 87:123-127. https://dx.doi.org/10.1016%2Fj.comppsych.2018.10.003. Koh D, Meng KL, Chia SE, Ko SM, Qian F, Ng V, et al. Risk perception and impact of severe acute respiratory syndrome (SARS) on work and personal lives of healthcare workers in Singapore: What can we learn? Med Care. 2005;43(7):676-682. https://doi.org/10.1097/01.mlr.0000167181.36730.cc. Verma S, Mythily S, Chan YH, Deslypere JP, Teo EK, Chong SA. Post-SARS psychological morbidity and stigma among general practitioners and traditional Chinese medicine practitioners in Singapore. Ann Acad Med Singap. 2004; 33(6):743e8. Yeung J, Gupta S. Doctors evicted from their homes in India as fear spreads amid coronavirus lockdown. CNN World. 2020. Available at: https://edition.cnn.com/2020/03/25/asia/india-coronavirus-doctors-discrimination-intl-hnk/index.html. [Accessed on 24 August 2020] Violence Against Women and Girls: the Shadow Pandemic. UN Women. 2020. May 3, 2020. Available at: https://www.unwomen.org/en/news/stories/2020/4/statement-ed-phumzile-violence-against-women-during-pandemic. [Accessed on 24 August 2020]. Gearhart S, Patron MP, Hammond TA, Goldberg DW, Klein A, Horney JA. The impact of natural disasters on domestic violence: an analysis of reports of simple assault in Florida (1999–2007). Violence Gend. 2018;5(2):87–92. https://doi.org/10.1089/vio.2017.0077. Sahoo S, Rani S, Parveen S, Pal Singh A, Mehra A, Chakrabarti S, et al. Self-harm and COVID-19 pandemic: An emerging concern – A report of 2 cases from India. Asian J Psychiatr 2020; 51:102104. https://dx.doi.org/10.1016%2Fj.ajp.2020.102104. Ghosh A, Khitiz MT, Pandiyan S, Roub F, Grover S. Multiple suicide attempts in an individual with opioid dependence: Unintended harm of lockdown during the COVID-19 outbreak? Indian J Psychiatry 2020; [In Press]. The Economic Times. 11 Coronavirus suspects flee from a hospital in Maharashtra. March 16 2020. Available at: https://economictimes.indiatimes.com/news/politics-and-nation/11-coronavirus-suspects-flee-from-a-hospital-in-maharashtra/videoshow/74644936.cms?from=mdr. [Accessed on 23 August 2020]. Xiang Y, Yang Y, Li W, Zhang L, Zhang Q, Cheung T, et al. Timely mental health care for the 2019 novel coronavirus outbreak is urgently needed. The Lancet Psychiatry 2020;(3):228–229. https://doi.org/10.1016/S2215-0366(20)30046-8. Van Bortel T, Basnayake A, Wurie F, Jambai M, Koroma A, Muana A, et al. Psychosocial effects of an Ebola outbreak at individual, community and international levels. Bull World Health Organ. 2016;94(3):210–214. https://dx.doi.org/10.2471%2FBLT.15.158543. Kumar A, Nayar KR. COVID 19 and its mental health consequences. Journal of Mental Health. 2020; ahead of print:1-2. https://doi.org/10.1080/09638237.2020.1757052. Gupta R, Grover S, Basu A, Krishnan V, Tripathi A, Subramanyam A, et al. Changes in sleep pattern and sleep quality during COVID-19 lockdown. Indian J Psychiatry. 2020; 62(4):370-8. https://doi.org/10.4103/psychiatry.indianjpsychiatry_523_20. Duan L, Zhu G. Psychological interventions for people affected by the COVID-19 epidemic. Lancet Psychiatry. 2020;7(4): P300-302. https://doi.org/10.1016/S2215-0366(20)30073-0. Dubey S, Biswas P, Ghosh R, Chatterjee S, Dubey MJ, Chatterjee S et al. Psychosocial impact of COVID-19. Diabetes Metab Syndr. 2020; 14(5): 779–788. https://dx.doi.org/10.1016%2Fj.dsx.2020.05.035. Wright R. The world's largest coronavirus lockdown is having a dramatic impact on pollution in India. CNN World; 2020. Available at: https://edition.cnn.com/2020/03/31/asia/coronavirus-lockdown-impact-pollution-india-intl-hnk/index.html. [Accessed on 23 August 2020] Foster O. ‘Lockdown made me Realise What’s Important’: Meet the Families Reconnecting Remotely. The Guardian; 2020. Available at: https://www.theguardian.com/keep-connected/2020/apr/23/lockdown-made-me-realise-whats-important-meet-the-families-reconnecting-remotely. (Accessed on 23 August 2020) Bilefsky D, Yeginsu C. Of ‘Covidivorces’ and ‘Coronababies’: Life During a Lockdown. N. Y. Times; 2020. Available at: https://www.nytimes.com/2020/03/27/world/coronavirus-lockdown-relationships.html [Accessed on 23 August 2020]
APA, Harvard, Vancouver, ISO, and other styles
9

"Capacity Building in Cyber Security to Make India Secure to go Cashless." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 4089–93. http://dx.doi.org/10.35940/ijrte.b1484.0982s1119.

Full text
Abstract:
Recent developments have accelerated to move in India towards a Cashless economy. The Jan Dhan Yojana (Jan Dhan Government Scheme) announced in 2014 is providing for the cost free creation of a bank account for every Indian family. Each bank account is also accompanied by a Rupay Debit card for withdrawing money deposited in the account. The currency demonetization at the end of the year 2016, with the removal of certain denomination of bank notes. The additional initiatives and service offerings are also now encouraging the use of cashless transaction via, online banking, payment cards, e-wallets, direct carrier billing and crypto currency. A study said, as India changes to a large scale economy, cyber dangers are in a new high with the amount of these incidents happening in banking methods rising in the previous five decades. The research demonstrated that demonetization has provided an impetus into e-wallet providers and cellular wallets have seen a huge growth in downloads. Additionally, cyber- risks will only grow as India will be seeing a change towards a strong economy. The kinds of cyber security events like Phishing, scanning, site intrusions and defacements, virus code and denial of service attacksmay keep growing. The joint research by Assocham and PWC stated on ATM card hackstruck on the Indian banks in October this past year, impacting approximately 3.2 million debits. The cyber strikes on Indian sites have increased almost five times before four decades.
APA, Harvard, Vancouver, ISO, and other styles
10

Young, Sherman. "Beyond the Flickering Screen: Re-situating e-books." M/C Journal 11, no. 4 (August 26, 2008). http://dx.doi.org/10.5204/mcj.61.

Full text
Abstract:
The move from analog distribution to online digital delivery is common in the contemporary mediascape. Music is in the midst of an ipod driven paradigm shift (Levy), television and movie delivery is being reconfigured (Johnson), and newspaper and magazines are confronting the reality of the world wide web and what it means for business models and ideas of journalism (Beecher). In the midst of this change, the book publishing industry remains defiant. While embracing digital production technologies, the vast majority of book content is still delivered in material form, printed and shipped the old-fashioned way—despite the efforts of many technology companies over the last decade. Even the latest efforts from corporate giants such as Sony and Amazon (who appear to have solved many of the technical hurdles of electronic reading devices) have had little visible impact. The idea of electronic books, or e-books, remains the domain of geeky early adopters (“Have”). The reasons for this are manifold, but, arguably, a broader uptake of e-books has not occurred because cultural change is much more difficult than technological change and book readers have yet to be persuaded to change their cultural habits. Electronic reading devices have been around for as long as there have been computers with screens, but serious attempts to replicate the portability, readability, and convenience of a printed book have only been with us for a decade or so. The late 1990s saw the release of a number of e-book devices. In quick succession, the likes of the Rocket e-Book, the SoftBook and the Franklin eBookman all failed to catch on. Despite this lack of market penetration, software companies began to explore the possibilities—Microsoft’s Reader software competed with a similar product from Adobe, some publishers became content providers, and a niche market of consumers began reading e-books on personal digital assistants (PDAs). That niche was sufficient for e-reading communities and shopfronts to appear, with a reasonable range of titles becoming available for purchase to feed demand that was very much driven by early adopters. But the e-book market was and remains small. For most people, books are still regarded as printed paper objects, purchased from a bookstore, borrowed from a library, or bought online from companies like Amazon.com. More recently, the introduction of e-ink technologies (EPDs) (DeJean), which allow for screens with far more book-like resolution and contrast, has provided the impetus for a new generation of e-book devices. In combination with an expanded range of titles (and deals with major publishing houses to include current best-sellers), there has been renewed interest in the idea of e-books. Those who have used the current generation of e-ink devices are generally positive about the experience. Except for some sluggishness in “turning” pages, the screens appear crisp, clear and are not as tiring to read as older displays. There are a number of devices that have embraced the new screen technologies (mobileread) but most attention has been paid to three devices in particular—mainly because their manufacturers have tried to create an ecosystem that provides content for their reading devices in much the same way that Apple’s itunes store provides content for ipods. The Sony Portable Reader (Sonystyle) was the first electronic ink device to be produced by a mainstream consumers electronics company. Sony ties the Reader to its Connect store, which allows the purchase of book titles via a computer; titles are then downloaded to the Reader in the same way that an mp3 player is loaded with music. Sony’s most prominent competition in the marketplace is Amazon’s Kindle, which does not require users to have a computer. Instead, its key feature is a constant wireless connection to Amazon’s growing library of Kindle titles. This works in conjunction with US cellphone provider Sprint to allow the purchase of books via wireless downloads wherever the Sprint network exists. The system, which Amazon calls “whispernet,” is invisible to readers and the cost is incorporated into the price of books, so Kindle users never see a bill from Sprint (“Frequently”). Both the Sony Reader and the Amazon Kindle are available only in limited markets; Kindle’s reliance on a cellphone network means that its adoption internationally is dependent on Amazon establishing a relationship with a cellphone provider in each country of release. And because both devices are linked to e-bookstores, territorial rights issues with book publishers (who trade publishing rights for particular global territories in a colonial-era mode of operation that seems to ignore the reality of global information mobility (Thompson 74–77)) contribute to the restricted availability of both the Sony and Amazon products. The other mainstream device is the iRex Iliad, which is not constrained to a particular online bookstore and thus is available internationally. Its bookstore ecosystems are local relationships—with Dymocks in Australia, Borders in the UK, and other booksellers across Europe (iRex). All three devices use EPDs and share similar specifications for the actual reading of e-books. Some might argue that the lack of a search function in the Sony and the ability to write on pages in the Iliad are quite substantive differences, but overall the devices are distinguished by their availability and the accessibility of book titles. Those who have used the devices extensively are generally positive about the experience. Amazon’s Customer Reviews are full of positive comments, and the sense from many commentators is that the systems are a viable replacement for old-fashioned printed books (Marr). Despite the good reviews—which suggest that the technology is actually now good enough to compete with printed books—the e-book devices have failed to catch on. Amazon has been hesitant to state actual sales figures, leaving it to so-called analysts to guess with the most optimistic suggesting that only 30 to 50,000 have sold since launch in late 2007 (Sridharan). By comparison, a mid-list book title (in the US) would expect to sell a similar number of copies. The sales data for the Sony Portable Reader (which has been on the market for nearly two years) and the iRex iliad are also elusive (Slocum), suggesting that they have not meaningfully changed the landscape. Tellingly, despite the new devices, the e-book industry is still tiny. Although it is growing, the latest American data show that the e-book market has wholesale revenues of around $10 million per quarter (or around $40 million per year), which is dwarfed by the $35 billion in revenues regularly earned annually in the US printed book industry ("Book"). It’s clear that despite the technological advances, e-books have yet to cross the chasm from early adopter to mainstream usage (see IPDF). The reason for this is complex; there are issues of marketing and distribution that need to be considered, as well as continuing arguments about screen technologies, appropriate publishing models, and digital rights management. It is beyond the scope of this article to do justice to those issues. Suffice to say, the book industry is affected by the same debates over content that plague other media industries (Vershbow). But, arguably, the key reason for the minimal market impact is straightforward—technological change is relatively easy, but cultural change is much more difficult. The current generation of e-book devices might be technically very close to being a viable replacement for print on paper (and the next generation of devices will no doubt be even better), but there are bigger cultural hurdles to be overcome. For most people, the social practice of reading books (du Gay et al 10) is inextricably tied with printed objects and a print culture that is not yet commonly associated with “technology” (perhaps because books, as machines for reading (Young 160), have become an invisible technology (Norman 246)). E. Annie Proulx’s dismissive suggestion that “nobody is going to sit down and read a novel on a twitchy little screen. Ever” (1994) is commonly echoed when book buyers consider the digital alternative. Those thoughts only scratch the surface of a deeply embedded cultural practice. The centuries since Gutenberg’s printing press and the vast social and cultural changes that followed positioned print culture as the dominant cultural mode until relatively recently (Eisenstein; Ong). The emerging electronic media forms of the twentieth century displaced that dominance with many arguing that the print age was moved aside by first radio and television and now computers and the Internet (McLuhan; Postman). Indeed, there is a subtext in that line of thought, one that situates electronic media forms (particularly screen-based ones) as the antithesis of print and book culture. Current e-book reading devices attempt to minimise the need for cultural change by trying to replicate a print culture within an e-print culture. For the most part, they are designed to appeal to book readers as a replacement for printed books. But it will take more than a perfect electronic facsimile of print on paper to persuade readers to disengage with a print culture that incorporates bookshops, bookclubs, writing in the margins, touching and smelling the pages and covers, admiring the typesetting, showing off their bookshelves, and visibly identifying with their collections. The frequently made technical arguments (about flashing screens and reading in the bath (Randolph)) do not address the broader apprehension about a cultural experience that many readers do not wish to leave behind. It is in that context that booklovers appear particularly resistant to any shift from print to a screen-based format. One only has to engage in a discussion about e-books (or lurk on an online forum where one is happening) to appreciate how deeply embedded print culture is (Hepworth)—book readers have a historical attachment to the printed object and it is this embedded cultural resistance that is the biggest barrier for e-books to overcome. Although e-book devices in no way resemble television, print culture is still deeply suspicious of any screen-based media and arguments are often made that the book as a physical object is critical because “different types of media function differently, and even if the content is similar the form matters quite a lot” (Weber). Of course, many in the newspaper industry would argue that long-standing cultural habits can change very rapidly and the migration of eyeballs from newsprint to the Internet is a cautionary tale (see Auckland). That specific format shift saw cultural change driven by increased convenience and a perception of decreased cost. For those already connected to the Internet, reading newspapers online represented zero marginal cost, and the range of online offerings dwarfed that of the local newsagency. The advantage of immediacy and multimedia elements, and the possibility of immediate feedback, appeared sufficient to drive many away from print towards online newspapers.For a similar shift in the e-book realm, there must be similar incentives for readers. At the moment, the only advantages on offer are weightlessness (which only appeals to frequent travellers) and convenience via constant access to a heavenly library of titles (Young 150). Amazon’s Kindle bookshop can be accessed 24/7 from anywhere there is a Sprint network coverage (Nelson). However, even this advantage is not so clear-cut—there is a meagre range of available electronic titles compared to printed offerings. For example, Amazon claims 130,000 titles are currently available for Kindle and Sony has 50,000 for its Reader, figures that are dwarfed by Amazon’s own printed book range. Importantly, there is little apparent cost advantage to e-books. The price of electronic reading devices is significant, amounting to a few hundred dollars to which must be added the cost of e-books. The actual cost of those titles is also not as attractive as it might be. In an age where much digital content often appears to be free, consumers demand a significant price advantage for purchasing online. Although some e-book titles are priced more affordably than their printed counterparts, the cost of many seems strangely high given the lack of a physical object to print and ship. For example, Amazon Kindle titles might be cheaper than the print version, but the actual difference (after discounting) is not an order of magnitude, but of degree. For example, Randy Pausch’s bestselling The Last Lecture is available for $12.07 as a paperback or $9.99 as a Kindle edition (“Last”). For casual readers, the numbers make no sense—when the price of the reading device is included, the actual cost is prohibitive for those who only buy a few titles a year. At the moment, e-books only make sense for heavy readers for whom the additional cost of the reading device will be amortised over a large number of books in a reasonably short time. (A recent article in the Wall Street Journal suggested that the break-even point for the Kindle was the purchase of 61 books (Arends).) Unfortunately for the e-book industry, not is only is that particular market relatively small, it is the one least likely to shift from the embedded habits of print culture. Arguably, should e-books eventually offer a significant cost benefit for consumers, uptake would be more dramatic. However, in his study of cellphone cultures, Gerard Goggin argues against purely fiscal motivations, suggesting that cultural change is driven by other factors—in his example, new ways of communicating, connecting, and engaging (205–211). The few market segments where electronic books have succeeded are informative. For example, the market for printed encyclopedias has essentially disappeared. Most have reinvented themselves as CD-ROMs or DVD-ROMs and are sold for a fraction of the price. Although cost is undoubtedly a factor in their market success, added features such as multimedia, searchability, and immediacy via associated websites are compelling reasons driving the purchase of electronic encyclopedias over the printed versions. The contrast with the aforementioned e-book devices is apparent with encyclopedias moving away from their historical role in print culture. Electronic encyclopedias don’t try to replicate the older print forms. Rather they represent a dramatic shift of book content into an interactive audio-visual domain. They have experimented with new formats and reconfigured content for the new media forms—the publishers in question simply left print culture behind and embraced a newly emerging computer or multimedia culture. This step into another realm of social practices also happened in the academic realm, which is now deeply embedded in computer-based delivery of research and pedagogy. Not only are scholarly journals moving online (Thompson 320–325), but so too are scholarly books. For example, at the Macquarie University Library, there has been a dramatic increase in the number of electronic books in the collection. The library purchased 895 e-books in 2005 and 68,000 in 2007. During the same period, the number of printed books purchased remained relatively stable with about 16,000 bought annually (Macquarie University Library). The reasons for the dramatic increase in e-book purchases are manifold and not primarily driven by cost considerations. Not only does the library have limited space for physical storage, but Macquarie (like most other Universities) emphasises its e-learning environment. In that context, a single e-book allows multiple, geographically dispersed, simultaneous access, which better suits the flexibility demanded of the current generation of students. Significantly, these e-books require no electronic reading device beyond a standard computer with an internet connection. Users simply search for their required reading online and read it via their web browser—the library is operating in a pedagogical culture that assumes that staff and students have ready access to the necessary resources and are happy to read large amounts of text on a screen. Again, gestures towards print culture are minimal, and the e-books in question exist in a completely different distributed electronic environment. Another interesting example is that of mobile phone novels, or “keitai” fiction, popular in Japan. These novels typically consist of a few hundred pages, each of which contains about 500 Japanese characters. They are downloaded to (and read on) cellphones for about ten dollars apiece and can sell in the millions of copies (Katayama). There are many reasons why the keitai novel has achieved such popularity compared to the e-book approaches pursued in the West. The relatively low cost of wireless data in Japan, and the ubiquity of the cellphone are probably factors. But the presence of keitai culture—a set of cultural practices surrounding the mobile phone—suggests that the mobile novel springs not from a print culture, but from somewhere else. Indeed, keitai novels are written (often on the phones themselves) in a manner that lends itself to the constraints of highly portable devices with small screens, and provides new modes of engagement and communication. Their editors attribute the success of keitai novels to how well they fit into the lifestyle of their target demographic, and how they act as community nodes around which readers and writers interact (Hani). Although some will instinctively suggest that long-form narratives are doomed with such an approach, it is worthwhile remembering that, a decade ago, few considered reading long articles using a web browser and the appropriate response to computer-based media was to rewrite material to suit the screen (Nielsen). However, without really noticing the change, the Web became mainstream and users began reading everything on their computers, including much longer pieces of text. Apart from the examples cited, the wider book trade has largely approached e-books by trying to replicate print culture, albeit with an electronic reading device. Until there is a significant cost and convenience benefit for readers, this approach is unlikely to be widely successful. As indicated above, those segments of the market where e-books have succeeded are those whose social practices are driven by different cultural motivations. It may well be that the full-frontal approach attempted to date is doomed to failure, and e-books would achieve more widespread adoption if the book trade took a different approach. The Amazon Kindle has not yet persuaded bookloving readers to abandon print for screen in sufficient numbers to mark a seachange. Indeed, it is unlikely that any device positioned specifically as a book replacement will succeed. Instead of seeking to make an e-book culture a replacement for print culture, effectively placing the reading of books in a silo separated from other day-to-day activities, it might be better to situate e-books within a mobility culture, as part of the burgeoning range of social activities revolving around a connected, convergent mobile device. Reading should be understood as an activity that doesn’t begin with a particular device, but is done with whatever device is at hand. In much the same way that other media producers make content available for a number of platforms, book publishers should explore the potential of the new mobile devices. Over 45 million smartphones were sold globally in the first three months of 2008 (“Gartner”)—somewhat more than the estimated shipments of e-book reading devices. As well as allowing a range of communications possibilities, these convergent devices are emerging as key elements in the new digital mediascape—one that allows users access to a broad range of media products via a single pocket-sized device. Each of those smartphones makes a perfectly adequate e-book reading device, and it might be useful to pursue a strategy that embeds book reading as one of the key possibilities of this growing mobility culture. The casual gaming market serves as an interesting example. While hardcore gamers cling to their games PCs and consoles, a burgeoning alternative games market has emerged, with a different demographic purchasing less technically challenging games for more informal gaming encounters. This market has slowly shifted to convergent mobile devices, exemplified by Sega’s success in selling 300,000 copies of Super Monkey Ball within 20 days of its release for Apple’s iphone (“Super”). Casual gamers do not necessarily go on to become hardcore games, but they are gamers nonetheless—and today’s casual games (like the aforementioned Super Monkey Ball) are yesterday’s hardcore games of choice. It might be the same for reading. The availability of e-books on mobile platforms may not result in more people embracing longer-form literature. But it will increase the number of people actually reading, and, just as casual gaming has attracted a female demographic (Wallace 8), the instant availability of appropriate reading material might sway some of those men who appear to be reluctant readers (McEwan). Rather than focus on printed books, and book-like reading devices, the industry should re-position e-books as an easily accessible content choice in a digitally converged media environment. This is more a cultural shift than a technological one—for publishers and readers alike. Situating e-books in such a way may alienate a segment of the bookloving community, but such readers are unlikely to respond to anything other than print on paper. Indeed, it may encourage a whole new demographic—unafraid of the flickering screen—to engage with the manifold attractions of “books.” References Arends, Brett. “Can Amazon’s Kindle Save You Money?” The Wall St Journal 24 June 2008. 25 June 2008 ‹http://online.wsj.com/article/SB121431458215899767.html? mod=rss_whats_news_technology>. Auckland, Steve. “The Future of Newspapers.” The Independent 13 Nov. 2008. 24 June 2008 ‹http://news.independent.co.uk/media/article1963543.ece>. Beecher, Eric. “War of Words.” The Monthly, June 2007: 22–26. 25 June 2008 . “Book Industry Trends 2006 Shows Publishers’ Net Revenues at $34.59 Billion for 2005.” Book Industry Study Group. 22 May 2006 ‹http://www.bisg.org/news/press.php?pressid=35>. DeJean, David, “The Future of e-paper: The Kindle is Only the Beginning.” Computerworld 6 June 2008. 12 June 2008 ‹http://www.computerworld.com/action/article .do?command=viewArticleBasic&articleId=9091118>. du Gay, Paul, Stuart Hall, Linda Janes, Hugh Mackay, and Keith Negus. Doing Cultural Studies: The Story of the Sony Walkman. Thousand Oaks: Sage, 1997. Eisenstein, Elizabeth. The Printing Press as an Agent of Change. Cambridge: Cambridge UP, 1997. “Frequently Asked Questions about Amazon Kindle.” Amazon.com. 12 June 2008 ‹http://www.amazon.com/gp/help/customer/display.html?nodeId=200127480&#whispernet>. “Gartner Says Worldwide Smartphone Sales Grew 29 Percent in First Quarter 2008.” Gartner. 6 June 2008. 20 June 2008 ‹http://www.gartner.com/it/page.jsp?id=688116>. Goggin, Gerard. Cell Phone Cultures. London: Routledge, 2006. Hani, Yoko. “Cellphone Bards Make Bestseller Lists.” Japan Times Online Sep. 2007. 20 June 2008 ‹http://search.japantimes.co.jp/cgi-bin/fl20070923x4.html>. “Have you Changed your mind on Ebook Readers?” Slashdot. 25 June 2008 ‹http://ask.slashdot.org/article.pl?sid=08/05/08/2317250>. Hepworth, David. “The Future of Reading or the Sinclair C5.” The Word 17 June 2008. 20 June 2008 ‹http://www.wordmagazine.co.uk/content/future-reading-or-sinclair-c5>. IPDF (International Digital Publishing Forum) Industry Statistics. 24 June 2008 ‹http://www.openebook.org/doc_library/industrystats.htm>. iRex Technologies Press. 12 June 2008 ‹http://www.irextechnologies.com/about/press>. Johnson, Bobbie. “Vince Cerf, AKA the Godfather of the Net, Predicts the End of TV as We Know It.” The Guardian 27 Aug. 2008. 24 June 2008 ‹http://www.guardian.co.uk/technology/2007/aug/27/news.google>. Katayama, Lisa. “Big Books Hit Japan’s Tiny Phones.” Wired Jan. 2007. 24 June 2008 ‹http://www.wired.com/culture/lifestyle/news/2007/01/72329>. “The Last Lecture.” Amazon.com. 24 June 2008 ‹http://www.amazon.com/gp/product/1401323251/ref=amb_link_3359852_2? pf_rd_m=ATVPDKIKX0DER&pf_rd_s=right-1&pf_rd_r=07NDSWAK6D4HT181CNXD &pf_rd_t=101&pf_rd_p=385880801&pf_rd_i=549028>.Levy, Steven. The Perfect Thing. London:Ebury Press, 2006. Macquarie University Library Annual Report 2007. 24 June 2008 ‹http://senate.mq.edu.au/ltagenda/0308/library_report%202007.doc>. Marr, Andrew. “Curling Up with a Good EBook.” The Guardian 11 May 2007. 23 May 2007 ‹http://technology.guardian.co.uk/news/story/0,,2077278,00.html>. McEwan, Ian. “Hello, Would you Like a Free Book?” The Guardian 20 Sep. 2005. 28 June 2008 ‹http://www.guardian.co.uk/books/2005/sep/20/fiction.features11>. McLuhan, Marshall. The Gutenberg Galaxy. Toronto: U of Toronto P, 1962. Mobileread. E-book Reader Matrix, Mobileread Wiki. 30 May 2008 ‹http://wiki.mobileread.com/wiki/E-book_Reader_Matrix>. Nelson, Sara. “Warming to Kindle.” Publishers Weekly 10 Dec. 2007. 31 Jan. 2008 ‹http://www.publishersweekly.com/article/CA6510861.htm.html>. Nielsen, Jakob. “Concise, Scannable and Objective, How to Write for the Web.” 1997. ‹20 June 2008 ‹http://www.useit.com/papers/webwriting/writing.html>. Norman, Don. The Invisible Computer: Why Good Products Can Fail. Cambridge, MA: MIT P, 1998. Ong, Walter. Orality & Literacy: The Technologizing of the Word. New York: Methuen, 1988. Postman, Neil. Amusing Ourselves to Death. New York: Penguin, 1986. Proulx, E. Annie. “Books on Top.” The New York Times 26 May 1994. 28 June 2008 ‹http://www.nytimes.com/books/99/05/23/specials/proulx-top.html>. Randolph, Eleanor. “Reading into the Future.” The New York Times 18 June 2008. 19 June 2008 ‹http://www.nytimes.com/2008/06/18/opinion/18wed3.html?>. Slocum, Mac. “The Pitfalls of Publishing’s E-Reader Guessing Game.” O’Reilly TOC. June 2006. 24 June 2008 ‹http://toc.oreilly.com/2008/06/the-pitfalls-of-publishings-er.html>. Sridharan, Vasanth. “Goldman: Amazon Sold up to 50,000 Kindles in Q1.” Silicon Alley Insider 19 May 2008. 25 June 2008 ‹http://www.alleyinsider.com/2008/5/how_many_kindles_sold_last_quarter_>. “Super Monkey Ball iPhone's Super Sales.” Edge OnLine. 24 Aug. 2008 ‹http://www.edge-online.com/news/super-monkey-ball-iphones-super-sales>. Thompson, John B. Books in the Digital Age. London: Polity, 2005. Vershbow, Ben. “Self Destructing Books.” if:book. May 2005. 4 Oct. 2006 ‹http://www.futureofthebook.org/blog/archives/2005/05/selfdestructing_books.html>. Wallace, Margaret, and Brian Robbins. 2006 Casual Games White Paper. IDGA. 24 Aug. 2008 ‹http://www.igda.org/casual/IGDA_CasualGames_Whitepaper_2006.pdf>. Weber, Jonathan. “Why Books Resist the Rise of Novel Technologies.” The Times Online 23 May 2006. 25 June 2008 ‹http://entertainment.timesonline.co.uk/tol/arts_and_entertainment/books/article724510.ece> Young, Sherman. The Book is Dead, Long Live the Book. Sydney: UNSW P, 2007.
APA, Harvard, Vancouver, ISO, and other styles
11

Davis, Lissa. "Pirate Cinema by C. Doctorow." Deakin Review of Children's Literature 2, no. 3 (December 24, 2012). http://dx.doi.org/10.20361/g2259d.

Full text
Abstract:
Doctorow, Cory. Pirate Cinema. New York, NY: Tor Teen, 2012. Print. In the near future, the Internet is not an extra, but a necessity. Without access, not only will you lose the ability to connect with friends and surf for entertainment, but you will be unable to graduate because you can’t hand in your assignments, you will lose your health benefits, and perhaps even lose your job. In Cory Doctorow’s Pirate Cinema, this disaster overtakes Trent McCauley’s family. Trent loves to make movies. Unfortunately, like many of today’s teens, he creates his content by ‘remixing’ others’ videos, images and music. In a world where copyright laws have become oppressive and corporations rule the government, Trent is seen as a thief. He is caught, and as a consequence, his family is cut off from Internet service for a year, and they suffer for his crimes. Feeling guilty and distraught Trent runs away to the streets of London. There, he hooks up with Jem Dodger (a nod to Dickens here), learns the ins and outs of street living, and discovers a vibrant and thriving underground community of artists and activists. Hooking up with the savvy and beautiful 26, Trent adopts the name Cecil B. DeVil and is soon creating movies with pirated material once again. This time, however, his videos have a purpose beyond entertainment; the downfall of the aggressive and brutal copyright laws that lead to his family’s predicament. Doctorow, a blogger and an activist for changing copyright laws, and a proponent of the Creative Commons model of intellectual property, is not subtle with his message, and presents only one side of the copyright issue. Yet, given the direction copyright law is taking in response to the changing landscape of media and the Internet, and the looming specter of a ‘Big Brother’ Internet that can find out everything about you from your digital footprint, this is a message that teens should hear. Doctorow also puts his money where his mouth is: all of his books are available for free online, including this one. One of Doctorow's strengths is his ability to draw characters that are fully realized and that pull you into their story and their cause. His book is not all heavy doom and gloom, either. Doctorow knows his teens and their language, and the book has off-beat characters, hip slang and humour. Recommended for teens who are interested in social media and justice issues. Recommended: 3 out of 4 stars Reviewer: Lissa Davis Lissa Davies is an elementary teacher-librarian in Edmonton, Ab. She is a passionate reader, and is always excited to share new books and engage readers!
APA, Harvard, Vancouver, ISO, and other styles
12

Fraim, John. "Friendly Persuasion." M/C Journal 3, no. 1 (March 1, 2000). http://dx.doi.org/10.5204/mcj.1825.

Full text
Abstract:
"If people don't trust their information, it's not much better than a Marxist-Leninist society." -- Orville Schell Dean, Graduate School of Journalism, UC Berkeley "Most people aren't very discerning. Maybe they need good financial information, but I don't think people know what good information is when you get into culture, society, and politics." -- Steven Brill,Chairman and Editor-in-chief, Brill's Content Once upon a time, not very long ago, advertisements were easy to recognise. They had simple personalities with goals not much more complicated than selling you a bar of soap or a box of cereal. And they possessed the reassuring familiarity of old friends or relatives you've known all your life. They were Pilgrims who smiled at you from Quaker Oats boxes or little tablets named "Speedy" who joyfully danced into a glass of water with the sole purpose of giving up their short life to help lessen your indigestion from overindulgence. Yes, sometimes they could be a little obnoxious but, hey, it was a predictable annoyance. And once, not very long ago, advertisements also knew their place in the landscape of popular culture, their boundaries were the ad space of magazines or the commercial time of television programs. When the ads got too annoying, you could toss the magazine aside or change the TV channel. The ease and quickness of their dispatch had the abruptness of slamming your front door in the face of an old door-to-door salesman. This all began to change around the 1950s when advertisements acquired a more complex and subtle personality and began straying outside of their familiar media neighborhoods. The social observer Vance Packard wrote a best-selling book in the late 50s called The Hidden Persuaders which identified this change in advertising's personality as coming from hanging around Professor Freud's psychoanalysis and learning his hidden, subliminal methods of trickery. Ice cubes in a glass for a liquor ad were no longer seen as simple props to help sell a brand of whiskey but were now subliminal suggestions of female anatomy. The curved fronts of automobiles were more than aesthetic streamlined design features but rather suggestive of a particular feature of the male anatomy. Forgotten by the new subliminal types of ads was the simple salesmanship preached by founders of the ad industry like David Ogilvy and John Caples. The word "sales" became a dirty word and was replaced with modern psychological buzzwords like subliminal persuasion. The Evolution of Subliminal Techniques The book Hidden Persuaders made quite a stir at the time, bringing about congressional hearings and even the introduction of legislation. Prominent motivation researchers Louis Cheskin and Ernest Dichter utilised the new ad methods and were publicly admonished as traitors to their profession. The life of the new subliminal advertising seemed short indeed. Even Vance Packard predicted its coming demise. "Eventually, say by A.D. 2000," he wrote in the preface to the paperback edition of his book, "all this depth manipulation of the psychological variety will seem amusingly old- fashioned". Yet, 40 years later, any half-awake observer of popular culture knows that things haven't exactly worked out the way Packard predicted. In fact what seems old-fashioned today is the belief that ads are those simpletons they once were before the 50s and that products are sold for features and benefits rather than for images. Even Vance Packard expresses an amazement at the evolution of advertising since the 50s, noting that today ads for watches have nothing to do with watches or that ads for shoes scarcely mention shoes. Packard remarks "it used to be the brand identified the product. In today's advertising the brand is the product". Modern advertising, he notes, has an almost total obsession with images and feelings and an almost total lack of any concrete claims about the product and why anyone should buy it. Packard admits puzzlement. "Commercials seem totally unrelated to selling any product at all". Jeff DeJoseph of the J. Walter Thompson firm underlines Packard's comments. "We are just trying to convey a sensory impression of the brand, and we're out of there". Subliminal advertising techniques have today infiltrated the heart of corporate America. As Ruth Shalit notes in her article "The Return of the Hidden Persuaders" from the 27 September 1999 issue of Salon magazine, "far from being consigned to the maverick fringe, the new psycho- persuaders of corporate America have colonized the marketing departments of mainstream conglomerates. At companies like Kraft, Coca-Cola, Proctor & Gamble and Daimler-Chrysler, the most sought-after consultants hail not from McKinsey & Company, but from brand consultancies with names like Archetype Discoveries, PsychoLogics and Semiotic Solutions". Shalit notes a growing number of CEOs have become convinced they cannot sell their brands until they first explore the "Jungian substrata of four- wheel drive; unlock the discourse codes of female power sweating; or deconstruct the sexual politics of bologna". The result, as Shalit observes, is a "charmingly retro school of brand psychoanalysis, which holds that all advertising is simply a variation on the themes of the Oedipus complex, the death instinct, or toilet training, and that the goal of effective communications should be to compensate the consumer for the fact that he was insufficiently nursed as an infant, has taken corporate America by storm". The Growing Ubiquity of Advertising Yet pervasive as the subliminal techniques of advertising have become, the emerging power of modern advertising ultimately centres around "where" it is rather than "what" it is or "how" it works. The power of modern advertising is within this growing ubiquity or "everywhereness" of advertising rather than the technology and methodology of advertising. The ultimate power of advertising will be arrived at when ads cannot be distinguished from their background environment. When this happens, the environment will become a great continuous ad. In the process, ads have wandered away from their well-known hangouts in magazines and TV shows. Like alien-infected pod-people of early science fiction movies, they have stumbled out of these familiar media playgrounds and suddenly sprouted up everywhere. The ubiquity of advertising is not being driven by corporations searching for new ways to sell products but by media searching for new ways to make money. Traditionally, media made money by selling subscriptions and advertising space. But these two key income sources are quickly drying up in the new world of online media. Journalist Mike France wisely takes notice of this change in an important article "Journalism's Online Credibility Gap" from the 11 October 1999 issue of Business Week. France notes that subscription fees have not worked because "Web surfers are used to getting content for free, and they have been reluctant to shell out any money for it". Advertising sales and their Internet incarnation in banner ads have also been a failure so far, France observes, because companies don't like paying a flat fee for online advertising since it's difficult to track the effectiveness of their marketing dollars. Instead, they only want to pay for actual sales leads, which can be easily monitored on the Web as readers' click from site to site. Faced with the above situation, media companies have gone on the prowl for new ways to make money. This search underpins the emerging ubiquity of advertising: the fact that it is increasingly appearing everywhere. In the process, traditional boundaries between advertising and other societal institutions are being overrun by these media forces on the prowl for new "territory" to exploit. That time when advertisements knew their place in the landscape of popular culture and confined themselves to just magazines or TV commercials is a fading memory. And today, as each of us is bombarded by thousands of ads each day, it is impossible to "slam" the door and keep them out of our house as we could once slam the door in the face of the old door-to-door salesmen. Of course you can find them on the matchbook cover of your favorite bar, on t-shirts sold at some roadside tourist trap or on those logo baseball caps you always pick up at trade shows. But now they have got a little more personal and stare at you over urinals in the men's room. They have even wedged themselves onto the narrow little bars at the check-out counter conveyer belts of supermarkets or onto the handles of gasoline pumps at filling stations. The list goes on and on. (No, this article is not an ad.) Advertising and Entertainment In advertising's march to ubiquity, two major boundaries have been crossed. They are crucial boundaries which greatly enhance advertising's search for the invisibility of ubiquity. Yet they are also largely invisible themselves. These are the boundaries separating advertising from entertainment and those separating advertising from journalism. The incursion of advertising into entertainment is a result of the increasing merger of business and entertainment, a phenomenon pointed out in best-selling business books like Michael Wolf's Entertainment Economy and Joseph Pine's The Experience Economy. Wolf, a consultant for Viacom, Newscorp, and other media heavy-weights, argues business is becoming synonymous with entertainment: "we have come to expect that we will be entertained all the time. Products and brands that deliver on this expectation are succeeding. Products that do not will disappear". And, in The Experience Economy, Pine notes the increasing need for businesses to provide entertaining experiences. "Those businesses that relegate themselves to the diminishing world of goods and services will be rendered irrelevant. To avoid this fate, you must learn to stage a rich, compelling experience". Yet entertainment, whether provided by businesses or the traditional entertainment industry, is increasingly weighted down with the "baggage" of advertising. In a large sense, entertainment is a form of new media that carries ads. Increasingly, this seems to be the overriding purpose of entertainment. Once, not long ago, when ads were simple and confined, entertainment was also simple and its purpose was to entertain rather than to sell. There was money enough in packed movie houses or full theme parks to make a healthy profit. But all this has changed with advertising's ubiquity. Like media corporations searching for new revenue streams, the entertainment industry has responded to flat growth by finding new ways to squeeze money out of entertainment content. Films now feature products in paid for scenes and most forms of entertainment use product tie-ins to other areas such as retail stores or fast-food restaurants. Also popular with the entertainment industry is what might be termed the "versioning" of entertainment products into various sub-species where entertainment content is transformed into other media so it can be sold more than once. A film may not make a profit on just the theatrical release but there is a good chance it doesn't matter because it stands to make a profit in video rentals. Advertising and Journalism The merger of advertising and entertainment goes a long way towards a world of ubiquitous advertising. Yet the merger of advertising and journalism is the real "promised land" in the evolution of ubiquitous advertising. This fundamental shift in the way news media make money provides the final frontier to be conquered by advertising, a final "promised land" for advertising. As Mike France observes in Business Week, this merger "could potentially change the way they cover the news. The more the press gets in the business of hawking products, the harder it will be to criticize those goods -- and the companies making them". Of course, there is that persistent myth, perpetuated by news organisations that they attempt to preserve editorial independence by keeping the institutions they cover and their advertisers at arm's length. But this is proving more and more difficult, particularly for online media. Observers like France have pointed out a number of reasons for this. One is the growth of ads in news media that look more like editorial content than ads. While long-standing ethical rules bar magazines and newspapers from printing advertisements that look like editorial copy, these rules become fuzzy for many online publications. Another reason making it difficult to separate advertising from journalism is the growing merger and consolidation of media corporations. Fewer and fewer corporations control more and more entertainment, news and ultimately advertising. It becomes difficult for a journalist to criticise a product when it has a connection to the large media conglomerate the journalist works for. Traditionally, it has been rare for media corporations to make direct investments in the corporations they cover. However, as Mike France notes, CNBC crossed this line when it acquired a stake in Archipelago in September 1999. CNBC, which runs a business-news Website, acquired a 12.4% stake in Archipelago Holdings, an electronic communications network for trading stock. Long-term plans are likely to include allowing visitors to cnbc.com to link directly to Archipelago. That means CNBC could be in the awkward position of both providing coverage of online trading and profiting from it. France adds that other business news outlets, such as Dow Jones (DJ), Reuters, and Bloomberg, already have indirect ties to their own electronic stock-trading networks. And, in news organisations, a popular method of cutting down on the expense of paying journalists for content is the growing practice of accepting advertiser written content or "sponsored edit" stories. The confusion to readers violates the spirit of a long-standing American Society of Magazine Editors (ASME) rule prohibiting advertisements with "an editorial appearance". But as France notes, this practice is thriving online. This change happens in ever so subtle ways. "A bit of puffery inserted here," notes France, "a negative adjective deleted there -- it doesn't take a lot to turn a review or story about, say, smart phones, into something approaching highbrow ad copy". He offers an example in forbes.com whose Microsoft ads could easily be mistaken for staff-written articles. Media critic James Fallows points out that consumers have been swift to discipline sites that are caught acting unethically and using "sponsored edits". He notes that when it was revealed that amazon.com was taking fees of up to $10,000 for books that it labelled as "destined for greatness", its customers were outraged, and the company quickly agreed to disclose future promotional payments. Unfortunately, though, the lesson episodes like these teach online companies like Amazon centres around more effective ways to be less "revealing" rather than abstention from the practice of "sponsored edits". France reminds us that journalism is built on trust. In the age of the Internet, though, trust is quickly becoming an elusive quality. He writes "as magazines, newspapers, radio stations, and television networks rush to colonize the Internet, the Great Wall between content and commerce is beginning to erode". In the end, he ponders whether there is an irrevocable conflict between e-commerce and ethical journalism. When you can't trust journalists to be ethical, just who can you trust? Transaction Fees & Affiliate Programs - Advertising's Final Promised Land? The engine driving the growing ubiquity of advertising, though, is not the increasing merger of advertising with other industries (like entertainment and journalism) but rather a new business model of online commerce and Internet technology called transaction fees. This emerging and potentially dominant Internet e-commerce technology provides for the ability to track transactions electronically on Websites and to garner transaction fees. Through these fees, many media Websites take a percentage of payment through online product sales. In effect, a media site becomes one pervasive direct mail ad for every product mentioned on its site. This of course puts them in a much closer economic partnership with advertisers than is the case with traditional fixed-rate ads where there is little connection between product sales and the advertising media carrying them. Transaction fees are the new online version of direct marketing, the emerging Internet technology for their application is one of the great economic driving forces of the entire Internet commerce apparatus. The promise of transaction fees is that a number of people, besides product manufacturers and advertisers, might gain a percentage of profit from selling products via hypertext links. Once upon a time, the manufacturer of a product was the one that gained (or lost) from marketing it. Now, however, there is the possibility that journalists, news organisations and entertainment companies might also gain from marketing via transaction fees. The spread of transaction fees outside media into the general population provides an even greater boost to the growing ubiquity of advertising. This is done through the handmaiden of media transaction fees: "affiliate programs" for the general populace. Through the growing magic of Internet technology, it becomes possible for all of us to earn money through affiliate program links to products and transaction fee percentages in the sale of these products. Given this scenario, it is not surprising that advertisers are most likely to increasingly pressure media Websites to support themselves with e-commerce transaction fees. Charles Li, Senior Analyst for New Media at Forrester Research, estimates that by the year 2003, media sites will receive $25 billion in revenue from transaction fees, compared with $17 billion from ads and $5 billion from subscriptions. The possibility is great that all media will become like great direct response advertisements taking a transaction fee percentage for anything sold on their sites. And there is the more dangerous possibility that all of us will become the new "promised land" for a ubiquitous advertising. All of us will have some cut in selling somebody else's product. When this happens and there is a direct economic incentive for all of us to say nice things about products, what is the need and importance of subliminal techniques and methods creating advertising based on images which try to trick us into buying things? A Society Without Critics? It is for these reasons that criticism and straight news are becoming an increasingly endangered species. Everyone has to eat but what happens when one can no longer make meal money by criticising current culture? Cultural critics become a dying breed. There is no money in criticism because it is based around disconnection rather than connection to products. No links to products or Websites are involved here. Critics are becoming lonely icebergs floating in the middle of a cyber-sea of transaction fees, watching everyone else (except themselves) make money on transaction fees. The subliminal focus of the current consultancies is little more than a repackaging of an old theme discovered long ago by Vance Packard. But the growing "everywhereness" and "everyoneness" of modern advertising through transaction fees may mark the beginning of a revolutionary new era. Everyone might become their own "brand", a point well made in Tim Peters's article "A Brand Called You". Media critic James Fallows is somewhat optimistic that there still may remain "niche" markets for truthful information and honest cultural criticism. He suggests that surely people looking for mortgages, voting for a politician, or trying to decide what movie to see will continue to need unbiased information to help them make decisions. But one must ask what happens when a number of people have some "affiliate" relationship with suggesting particular movies, politicians or mortgages? Orville Schell, dean of the Graduate School of Journalism at the University of California at Berkeley, has summarised this growing ubiquity of advertising in a rather simple and elegant manner saying "at a certain point, people won't be able to differentiate between what's trustworthy and what isn't". Over the long run, this loss of credibility could have a corrosive effect on society in general -- especially given the media's importance as a political, cultural, and economic watchdog. Schell warns, "if people don't trust their information, it's not much better than a Marxist-Leninist society". Yet, will we be able to realise this simple fact when we all become types of Marxists and Leninists? Still, there is the great challenge to America to learn how to utilise transaction fees in a democratic manner. In effect, a combination of the technological promise of the new economy with that old promise, and perhaps even myth, of a democratic America. America stands on the verge of a great threshold and challenge in the growing ubiquity of advertising. In a way, as with most great opportunities or threats, this challenge centres on a peculiar paradox. On the one hand, there is the promise of the emerging Internet business model and its centre around the technology of transaction fees. At the same time, there is the threat posed by transaction fees to America's democratic society in the early years of the new millennium. Yes, once upon a time, not very long ago, advertisements were easy to recognise and also knew their place in the landscape of popular culture. Their greatest, yet silent, evolution (especially in the age of the Internet) has really been in their spread into all areas of culture rather than in methods of trickery and deceit. Now, it is more difficult to slam that front door in the face of that old door-to-door salesman. Or toss that magazine and its ad aside, or switch off commercials on television. We have become that door-to-door salesman, that magazine ad, that television commercial. The current cultural landscape takes on some of the characteristics of the theme of that old science fiction movie The Invasion of the Body Snatchers. A current advertising campaign from RJ Reynolds has a humorous take on the current zeitgeist fad of alien abduction with copy reading "if aliens are smart enough to travel through space then why do they keep abducting the dumbest people on earth?" One might add that when Americans allow advertising to travel through all our space, perhaps we all become the dumbest people on earth, abducted by a new alien culture so far away from a simplistic nostalgia of yesterday. (Please press below for your links to a world of fantastic products which can make a new you.) References Brill, Steven. Quoted by Mike France in "Journalism's Online Credibility Gap." Business Week 11 Oct. 1999. France, Mike. "Journalism's Online Credibility Gap." Business Week 11 Oct. 1999. <http://www.businessweek.com/1999/99_41/b3650163.htm>. Packard, Vance. The Hidden Persuaders. Out of Print, 1957. Pine, Joseph, and James Gilmore. The Experience Economy. Harvard Business School P, 1999. Shalit, Ruth. "The Return of the Hidden Persuaders." Salon Magazine 27 Sep. 1999. <http://www.salon.com/media/col/shal/1999/09/27/persuaders/index.php>. Schell, Orville. Quoted by Mike France in "Journalism's Online Credibility Gap." Business Week 11 Oct. 1999. Wolf, Michael. Entertainment Economy. Times Books, 1999. Citation reference for this article MLA style: John Fraim. "Friendly Persuasion: The Growing Ubiquity of Advertising, or What Happens When Everyone Becomes an Ad?." M/C: A Journal of Media and Culture 3.1 (2000). [your date of access] <http://www.uq.edu.au/mc/0003/ads.php>. Chicago style: John Fraim, "Friendly Persuasion: The Growing Ubiquity of Advertising, or What Happens When Everyone Becomes an Ad?," M/C: A Journal of Media and Culture 3, no. 1 (2000), <http://www.uq.edu.au/mc/0003/ads.php> ([your date of access]). APA style: John Fraim. (2000) Friendly Persuasion: The Growing Ubiquity of Advertising, or What Happens When Everyone Becomes an Ad?. M/C: A Journal of Media and Culture 3(1). <http://www.uq.edu.au/mc/0003/ads.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
13

Kozak, Nadine Irène. "Building Community, Breaking Barriers: Little Free Libraries and Local Action in the United States." M/C Journal 20, no. 2 (April 26, 2017). http://dx.doi.org/10.5204/mcj.1220.

Full text
Abstract:
Image 1: A Little Free Library. Image credit: Nadine Kozak.IntroductionLittle Free Libraries give people a reason to stop and exchange things they love: books. It seemed like a really good way to build a sense of community.Dannette Lank, Little Free Library steward, Whitefish Bay, Wisconsin, 2013 (Rumage)Against a backdrop of stagnant literacy rates and enduring perceptions of urban decay and the decline of communities in cities (NCES, “Average Literacy”; NCES, “Average Prose”; Putnam 25; Skogan 8), legions of Little Free Libraries (LFLs) have sprung up across the United States between 2009 and the present. LFLs are small, often homemade structures housing books and other physical media for passersby to choose a book to take or leave a book to share with others. People have installed the structures in front of homes, schools, libraries, churches, fire and police stations, community gardens, and in public parks. There are currently 50,000 LFLs around the world, most of which are in the continental United States (Aldrich, “Big”). LFLs encompass building in multiple senses of the term; LFLs are literally tiny buildings to house books and people use the structures for building neighbourhood social capital. The organisation behind the movement cites “building community” as one of its three core missions (Little Free Library). Rowan Moore, theorising humans’ reasons for building, argues desire and emotion are central (16). The LFL movement provides evidence for this claim: stewards erect LFLs based on hope for increased literacy and a desire to build community through their altruistic actions. This article investigates how LFLs build urban community and explores barriers to the endeavour, specifically municipal building and right of way ordinances used in attempts to eradicate the structures. It also examines local responses to these municipal actions and potential challenges to traditional public libraries brought about by LFLs, primarily the decrease of visits to public libraries and the use of LFLs to argue for defunding of publicly provided library services. The work argues that LFLs build community in some places but may threaten other community services. This article employs qualitative content analysis of 261 stewards’ comments about their registered LFLs on the organisation’s website drawn from the two largest cities in a Midwestern state and an interview with an LFL steward in a village in the same state to analyse how LFLs build community. The two cities, located in the state where the LFL movement began, provide a cross section of innovators, early adopters, and late adopters of the book exchanges, determined by their registered charter numbers. Press coverage and municipal documents from six cities across the US gathered through a snowball sample provide data about municipal challenges to LFLs. Blog posts penned by practising librarians furnish some opinions about the movement. This research, while not a representative sample, identifies common themes and issues around LFLs and provides a basis for future research.The act of building and curating an LFL is a representation of shared beliefs about literacy, community, and altruism. Establishing an LFL is an act of civic participation. As Nico Carpentier notes, while some civic participation is macro, carried out at the level of the nation, other participation is micro, conducted in “the spheres of school, family, workplace, church, and community” (17). Ruth H. Landman investigates voluntary activities in the city, including community gardening, and community bakeries, and argues that the people associated with these projects find themselves in a “denser web of relations” than previously (2). Gretchen M. Herrmann argues that neighbourhood garage sales, although fleeting events, build an enduring sense of community amongst participants (189). Ray Oldenburg contends that people create associational webs in what he calls “great good places”; third spaces separate from home and work (20-21). Little Free Libraries and Community BuildingEmotion plays a central role in the decision to become an LFL steward, the person who establishes and maintains the LFL. People recount their desire to build a sense of community and share their love of reading with neighbours (Charter 4684; Charter 8212; Charter 9437; Charter 9705; Charter 16561). One steward in the study reported, “I love books and I want to be able to help foster that love in our neighbourhood as well” (Charter 4369). Image 2: A Little Free Library, bench, water fountain, and dog’s water bowl for passersby to enjoy. Image credit: Nadine Kozak.Relationships and emotional ties are central to some people’s decisions to have an LFL. The LFL website catalogues many instances of memorial LFLs, tributes to librarians, teachers, and avid readers. Indeed, the first Little Free Library, built by Todd Bol in 2009, was a tribute to his late mother, a teacher who loved reading (“Our History”). In the two city study area, ten LFLs are memorials, allowing bereaved families to pass on a loved one’s penchant for sharing books and reading (Charter 1235; Charter 1309; Charter 4604; Charter 6219; Charter 6542; Charter 6954; Charter 10326; Charter 16734; Charter 24481; Charter 30369). In some cases, urban neighbours come together to build, erect, and stock LFLs. One steward wrote: “Those of us who live in this friendly neighborhood collaborated to design[,] build and paint a bungalow themed library” to match the houses in the neighbourhood (Charter 2532). Another noted: “Our neighbor across the street is a skilled woodworker, and offered to build the library for us if we would install it in our yard and maintain it. What a deal!” (Charter 18677). Community organisations also install and maintain LFLs, including 21 in the study population (e.g. Charter 31822; Charter 27155).Stewards report increased communication with neighbours due to their LFLs. A steward noted: “We celebrated the library’s launch on a Saturday morning with neighbors of all ages. We love sitting on our front porch and catching up with the people who stop to check out the books” (Charter 9673). Another exclaimed:within 24 hours, before I had time to paint it, my Little Free Library took on a life of its own. All of a sudden there were lots of books in it and people stopping by. I wondered where these books came from as I had not put any in there. Little kids in the neighborhood are all excited about it and I have met neighbors that I had never seen before. This is going to be fun! (Charter 15981)LFLs build community through social interaction and collaboration. This occurs when neighbours come together to build, install, and fill the structures. The structures also open avenues for conversation between neighbours who had no connection previously. Like Herrmann’s neighbourhood garage sales, LFLs create and maintain social ties between neighbours and link them by the books they share. Additionally, when neighbours gather and communicate at the LFL structure, they create a transitory third space for “informal public life”, where people can casually interact at a nearby location (Oldenburg 14, 288).Building Barriers, Creating CommunityThe erection of an LFL in an urban neighbourhood is not, however, always a welcome sight. The news analysis found that LFLs most often come to the attention of municipal authorities via citizen complaints, which lead to investigations and enforcement of ordinances. In Kansas, a neighbour called an LFL an “eyesore” and an “illegal detached structure” (Tapper). In Wisconsin, well-meaning future stewards contacted their village authorities to ask about rules, inadvertently setting off a six-month ban on LFLs (Stingl; Rumage). Resulting from complaints and inquiries, municipalities regulated, and in one case banned, LFLs, thus building barriers to citizens’ desires to foster community and share books with neighbours.Municipal governments use two major areas of established code to remove or prohibit LFLs: ordinances banning unapproved structures in residents’ yards and those concerned with obstructions to right of ways when stewards locate the LFLs between the public sidewalk and street.In the first instance, municipal ordinances prohibit either front yard or detached structures. Controversies over these ordinances and LFLs erupted in Whitefish Bay, Wisconsin, in 2012; Leawood, Kansas, in 2014; Shreveport, Louisiana, in 2015; and Dallas, Texas, in 2015. The Village of Whitefish Bay banned LFLs due to an ordinance prohibiting “front yard structures,” including mailboxes (Sanburn; Stingl). In Leawood, the city council argued that an LFL, owned by a nine-year-old boy, violated an ordinance that forbade the construction of any detached structures without city council permission. In Shreveport, the stewards of an LFL received a cease and desist letter from city council for having an “accessory structure” in the front yard (LaCasse; Burris) and Dallas officials knocked on a steward’s front door, informing her of a similar breach (Kellogg).In the second instance, some urban municipalities argued that LFLs are obstructions that block right of ways. In Lincoln, Nebraska, the public works director noted that the city “uses the area between the sidewalk and the street for snow storage in the winter, light poles, mailboxes, things like that.” The director continued: “And I imagine these little libraries are meant to congregate people like a water cooler, but we don’t want people hanging around near the road by the curb” (Heady). Both Lincoln in 2014 and Los Angeles (LA), California, in 2015, cited LFLs for obstructions. In Lincoln, the city notified the Southminster United Methodist Church that their LFL, located between the public sidewalk and street, violated a municipal ordinance (Sanburn). In LA, the Bureau of Street Services notified actor Peter Cook that his LFL, situated in the right of way, was an “obstruction” that Cook had to remove or the city would levy a fine (Moss). The city agreed at a hearing to consider a “revocable permit” for Cook’s LFL, but later denied its issuance (Condes).Stewards who found themselves in violation of municipal ordinances were able to harness emotion and build outrage over limits to individuals’ ability to erect LFLs. In Kansas, the stewards created a Facebook page, Spencer’s Little Free Library, which received over 31,000 likes and messages of support. One comment left on the page reads: “The public outcry will force those lame city officials to change their minds about it. Leave it to the stupid government to rain on everybody’s parade” (“Good”). Children’s author Daniel Handler sent a letter to the nine-year-old steward, writing as Lemony Snicket, “fighting against librarians is immoral and useless in the face of brave and noble readers such as yourself” (Spencer’s). Indeed, the young steward gave a successful speech to city hall arguing that the body should allow the structures because “‘lots of people in the neighborhood used the library and the books were always changing. I think it’s good for Leawood’” (Bauman). Other local LFL supporters also attended council and spoke in favour of the structures (Harper). In LA, Cook’s neighbours started a petition that gathered over 100 signatures, where people left comments including, “No to bullies!” (Lopez). Additionally, neighbours gathered to discuss the issue (Dana). In Shreveport, neighbours left stacks of books in their front yards, without a structure housing them due to the code banning accessory structures. One noted, “I’m basically telling the [Metropolitan Planning Commission] to go sod off” (Friedersdorf; Moss). LFL proponents reacted with frustration and anger at the perceived over-reach of the government toward harmless LFLs. In addition to the actions of neighbours and supporters, the national and local press commented on the municipal constraints. The LFL movement has benefitted from a significant amount of positive press in its formative years, a press willing to publicise and criticise municipal actions to thwart LFL development. Stewards’ struggles against municipal bureaucracies building barriers to LFLs makes prime fodder for the news media. Herbert J. Gans argues an enduring value in American news is “the preservation of the freedom of the individual against the encroachments of nation and society” (50). The juxtaposition of well-meaning LFL stewards against municipal councils and committees provided a compelling opportunity to illustrate this value.National media outlets, including Time (Sanburn), Christian Science Monitor (LaCasse), and The Atlantic, drew attention to the issue. Writing in The Atlantic, Conor Friedersdorf critically noted:I wish I was writing this to merely extol this trend [of community building via LFLs]. Alas, a subset of Americans are determined to regulate every last aspect of community life. Due to selection bias, they are overrepresented among local politicians and bureaucrats. And so they have power, despite their small-mindedness, inflexibility, and lack of common sense so extreme that they’ve taken to cracking down on Little Free Libraries, of all things. (Friedersdorf, n.p.)Other columnists mirrored this sentiment. Writing in the LA Times, one commentator sarcastically wrote that city officials were “cracking down on one of the country’s biggest problems: small community libraries where residents share books” (Schaub). Journalists argued this was government overreach on non-issues rather than tackling larger community problems, such as income inequality, homelessness, and aging infrastructure (Solomon; Schaub). The protests and negative press coverage led to, in the case of the municipalities with front yard and detached structure ordinances, détente between stewards and councils as the latter passed amendments permitting and regulating LFLs. Whitefish Bay, Leawood, and Shreveport amended ordinances to allow for LFLs, but also to regulate them (Everson; Topil; Siegel). Ordinances about LFLs restricted their number on city blocks, placement on private property, size and height, as well as required registration with the municipality in some cases. Lincoln officials allowed the church to relocate the LFL from the right of way to church property and waived the $500 fine for the obstruction violation (Sanburn). In addition to the amendments, the protests also led to civic participation and community building including presentations to city council, a petition, and symbolic acts of defiance. Through this protest, neighbours create communities—networks of people working toward a common goal. This aspect of community building around LFLs was unintentional but it brought people together nevertheless.Building a Challenge to Traditional Libraries?LFL marketing and communication staff member Margaret Aldrich suggests in The Little Free Library Book that LFLs are successful because they are “gratifyingly doable” projects that can be accomplished by an individual (16). It is this ease of building, erecting, and maintaining LFLs that builds concern as their proliferation could challenge aspects of library service, such as public funding and patron visits. Some professional librarians are in favour of the LFLs and are stewards themselves (Charter 121; Charter 2608; Charter 9702; Charter 41074; Rumage). Others envision great opportunities for collaboration between traditional libraries and LFLs, including the library publicising LFLs and encouraging their construction as well as using LFLs to serve areas without, or far from, a public library (Svehla; Shumaker). While lauding efforts to build community, some professional librarians question the nomenclature used by the movement. They argue the phrase Little Free Libraries is inaccurate as libraries are much more than random collections of books. Instead, critics contend, the LFL structures are closer to book swaps and exchanges than actual libraries, which offer a range of services such as Internet access, digital materials, community meeting spaces, and workshops and programming on a variety of topics (American Library Association; Annoyed Librarian). One university reference and instruction librarian worries about “the general public’s perception and lumping together of little free libraries and actual ‘real’ public libraries” (Hardenbrook). By way of illustration, he imagines someone asking, “‘why do we need our tax money to go to something that can be done for FREE?’” (Hardenbrook). Librarians holding this perspective fear the movement might add to a trend of neoliberalism, limiting or ending public funding for libraries, as politicians believe that the localised, individual solutions can replace publicly funded library services. This is a trend toward what James Ferguson calls “responsibilized” citizens, those “deployed to produce governmentalized results that do not depend on direct state intervention” (172). In other countries, this shift has already begun. In the United Kingdom (UK), governments are devolving formerly public services onto community groups and volunteers. Lindsay Findlay-King, Geoff Nichols, Deborah Forbes, and Gordon Macfadyen trace the impacts of the 2012 Localism Act in the UK, which caused “sport and library asset transfers” (12) to community and volunteer groups who were then responsible for service provision and, potentially, facility maintenance as well. Rather than being in charge of a “doable” LFL, community groups and volunteers become the operators of much larger facilities. Recent efforts in the US to privatise library services as governments attempt to cut budgets and streamline services (Streitfeld) ground this fear. Image 3: “Take a Book, Share a Book,” a Little Free Library motto. Image credit: Nadine Kozak. LFLs might have real consequences for public libraries. Another potential unintended consequence of the LFLs is decreasing visits to public libraries, which could provide officials seeking to defund them with evidence that they are no longer relevant or necessary. One LFL steward and avid reader remarked that she had not used her local public library since 2014 because “I was using the Little Free Libraries” (Steward). Academics and librarians must conduct more research to determine what impact, if any, LFLs are having on visits to traditional public libraries. ConclusionLittle Free Libraries across the United States, and increasingly in other countries, have generated discussion, promoted collaboration between neighbours, and led to sharing. In other words, they have built communities. This was the intended consequence of the LFL movement. There, however, has also been unplanned community building in response to municipal threats to the structures due to right of way, safety, and planning ordinances. The more threatening concern is not the municipal ordinances used to block LFL development, but rather the trend of privatisation of publicly provided services. While people are celebrating the community built by the LFLs, caution must be exercised lest central institutions of the public and community, traditional public libraries, be lost. Academics and communities ought to consider not just impact on their local community at the street level, but also wider structural concerns so that communities can foster many “great good places”—the Little Free Libraries and traditional public libraries as well.ReferencesAldrich, Margaret. “Big Milestone for Little Free Library: 50,000 Libraries Worldwide.” Little Free Library. Little Free Library Organization. 4 Nov. 2016. 25 Feb. 2017 <https://littlefreelibrary.org/big-milestone-for-little-free-library-50000-libraries-worldwide/>.Aldrich, Margaret. The Little Free Library Book: Take a Book, Return a Book. Minneapolis, MN: Coffee House Press, 2015.Annoyed Librarian. “How to Protect Little Free Libraries.” Library Journal Blog 9 Jul. 2015. 26 Mar. 2017 <http://lj.libraryjournal.com/blogs/annoyedlibrarian/2015/07/09/how-to-protect-little-free-libraries/>.American Library Association. “Public Library Use.” State of America’s Libraries: A Report from the American Library Association (2015). 25 Feb. 2017 <http://www.ala.org/tools/libfactsheets/alalibraryfactsheet06>.Bauman, Caroline. “‘Little Free Libraries’ Legal in Leawood Thanks to 9-year-old Spencer Collins.” The Kansas City Star 7 Jul. 2014. 25 Feb. 2017 <http://www.kansascity.com/news/politics-government/article687562.html>.Burris, Alexandria. “First Amendment Issues Surface in Little Free Library Case.” Shreveport Times 5 Feb. 2015. 25 Feb. 2017 <http://www.shreveporttimes.com/story/news/local/2015/02/05/expert-use-zoning-law-clashes-first-amendment/22922371/>.Carpentier, Nico. Media and Participation: A Site of Ideological-Democratic Struggle. Bristol: Intellect, 2011.Charter 121. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 1235. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 1309. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 2532. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 2608. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 4369. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 4604. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 4684. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 6219. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 6542. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 6954. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 8212. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 9437. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 9673. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 9702. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 9705. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 10326. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 15981. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 16561. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 16734. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 18677. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 24481. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 27155. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 30369. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 31822. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Charter 41074. “The World Map.” Little Free Library (2017). 26 Mar. 2017 <https://littlefreelibrary.org/ourmap/>.Condes, Yvonne. “Save the Little Library!” MomsLA 10 Aug. 2015. 25 Feb. 2017 <http://momsla.com/save-the-micro-library/>.Dana. “The Tenn-Mann Library Controversy, Part 3.” Read with Dana (30 Jan. 2015). 25 Feb. 2017 <https://readwithdana.wordpress.com/2015/01/30/the-tenn-mann-library-controversy-part-three/>.Everson, Jeff. “An Ordinance to Amend and Reenact Chapter 106 of the Shreveport Code of Ordinances Relative to Outdoor Book Exchange Boxes, and Otherwise Providing with Respect Thereto.” City of Shreveport, Louisiana 9 Oct. 2015. 25 Feb. 2017 <http://ftpcontent4.worldnow.com/ksla/pdf/LFLordinance.pdf>.Ferguson, James. “The Uses of Neoliberalism.” Antipode 41.S1 (2009): 166-84.Findlay-King, Lindsay, Geoff Nichols, Deborah Forbes, and Gordon Macfadyen. “Localism and the Big Society: The Asset Transfer of Leisure Centres and Libraries—Fighting Closures or Empowering Communities.” Leisure Studies (2017): 1-13.Friedersdorf, Conor. “The Danger of Being Neighborly without a Permit.” The Atlantic 20 Feb. 2015. 25 Feb. 2017 <https://www.theatlantic.com/national/archive/2015/02/little-free-library-crackdown/385531/>.Gans, Herbert J. Deciding What’s News: A Study of CBS Evening News, NBC Nightly News, Newsweek, and Time. Evanston, IL: Northwestern University Press, 2004.“Good Luck Spencer.” Spencer’s Little Free Library Facebook Page 25 Jun. 2014. 26 Mar. 2017 <https://www.facebook.com/Spencerslittlefreelibrary/photos/pcb.527531327376433/527531260709773/?type=3>.Hardenbrook, Joe. “A Little Rant on Little Free Libraries (AKA Probably an Unpopular Post).” Mr. Library Dude (9 Apr. 2014). 25 Feb. 2017 <https://mrlibrarydude.wordpress.com/2014/04/09/a-little-rant-on-little-free-libraries-aka-probably-an-unpopular-post/>.Harper, Deb. “Minutes.” The Leawood City Council 7 Jul. 2014. <http://www.leawood.org/pdf/cc/min/07-07-14.pdf>. Heady, Chris. “City Wants Church to Move Little Library.” Lincoln Journal Star 9 Jul. 2014. 25 Feb. 2017 <http://journalstar.com/news/local/city-wants-church-to-move-little-library/article_7753901a-42cd-5b52-9674-fc54a4d51f47.html>. Herrmann, Gretchen M. “Garage Sales Make Good Neighbors: Building Community through Neighborhood Sales.” Human Organization 62.2 (2006): 181-191.Kellogg, Carolyn. “Officials Threaten to Destroy a Little Free Library in Texas.” Los Angeles Times (1 Oct. 2015). 25 Feb. 2017 <http://www.latimes.com/books/jacketcopy/la-et-jc-little-free-library-texas-20150930-story.html>.LaCasse, Alexander. “Why Are Some Cities Cracking Down on Little Free Libraries.” Christian Science Monitor (5 Feb. 2015). 25 Feb. 2017 <http://www.csmonitor.com/Books/chapter-and-verse/2015/0205/Why-are-some-cities-cracking-down-on-little-free-libraries>.Landman, Ruth H. Creating the Community in the City: Cooperatives and Community Gardens in Washington, DC Westport, CT: Bergin & Garvey, 1993. Little Free Library. Little Free Library Organization (2017). 25 Feb. 2017 <https://littlefreelibrary.org/>.Lopez, Steve. “Actor’s Curbside Libraries Is a Smash—for Most People.” LA Times 3 Feb. 2015. 25 Feb. 2017 <http://www.latimes.com/local/california/la-me-0204-lopez-library-20150204-column.html>.Moore, Rowan. Why We Build: Power and Desire in Architecture. New York: Harper Design, 2013.Moss, Laura. “City Zoning Laws Target Little Free Libraries.” Mother Nature Network 25 Aug. 2015. 25 Feb. 2017 <http://www.mnn.com/lifestyle/arts-culture/stories/city-zoning-laws-target-little-free-libraries>.National Center for Education Statistics (NCES). Average Literacy and Numeracy Scale Scores of 25- to 65-Year Olds, by Sex, Age Group, Highest Level of Educational Attainment, and Country of Other Education System: 2012, table 604.10. 25 Feb. 2017 <https://nces.ed.gov/programs/digest/d15/tables/dt15_604.10.asp?current=yes>.National Center for Education Statistics (NCES). Average Prose, Document, and Quantitative Literacy Scores of Adults: 1992 and 2003. National Assessment of Adult Literacy. 25 Feb. 2017 <https://nces.ed.gov/naal/kf_demographics.asp>.Oldenburg, Ray. The Great Good Place: Cafés, Coffee Shops, Bookstores, Bars, Hair Salons, and Other Hangouts at the Heart of a Community. New York: Marlowe & Company, 1999.“Our History.” Little Free Library. Little Free Library Organization (2017). 25 Feb. 2017 <https://littlefreelibrary.org/ourhistory/>.Putnam, Robert D. Bowling Alone: The Collapse and Revival of American Community. New York: Simon & Schuster, 2001.Rumage, Jeff. “Little Free Libraries Now Allowed in Whitefish Bay.” Whitefish Bay Patch (8 May 2013). 25 Feb. 2017 <http://patch.com/wisconsin/whitefishbay/little-free-libraries-now-allowed-in-whitefish-bay>.Sanburn, Josh. “What Do Kansas and Nebraska Have against Small Libraries?” Time 10 Jul. 2014. 25 Feb. 2017 <http://time.com/2970649/tiny-libraries-violating-city-ordinances/>.Schaub, Michael. “Little Free Libraries on the Wrong Side of the Law.” LA Times 4 Feb. 2015. 25 Feb. 2017 <http://www.latimes.com/books/jacketcopy/la-et-jc-little-free-libraries-on-the-wrong-side-of-the-law-20150204-story.html>.Shumaker, David. “Public Libraries, Little Free Libraries, and Embedded Librarians.” The Embedded Librarian (28 April 2014) 26 Mar. 2017 <https://embeddedlibrarian.com/2014/04/28/public-libraries-little-free-libraries-and-embedded-librarians/>.Siegel, Julie. “An Ordinance to Amend Section 16.13 of the Municipal Code with Regard to Exempt Certain Little Free Libraries from Front Yard Setback Requirements.” Village of Whitefish Bay, Wisconsin (5 Aug. 2013).Skogan, Wesley G. Police and Community in Chicago: A Tale of Three Cities. New York: Oxford University Press, 2006.Solomon, Dan. “Dallas Is Regulating ‘Little Free Libraries’ for Some Reason.” Texas Monthly (14 Sept. 2016). 25 Feb. 2017 <http://www.texasmonthly.com/the-daily-post/dallas-regulating-little-free-libraries-reason/>.“Spencer’s Little Free Library.” Facebook 15 Jul. 2014. 25 Feb. 2017 <https://www.facebook.com/Spencerslittlefreelibrary/photos/pcb.527531327376433/527531260709773/?type=3>.Steward, M. Personal Interview. 7 Feb. 2017.Stingl, Jim. “Village Slaps Endnote on Little Libraries.” Milwaukee Journal Sentinel 11 Nov. 2012: 1B, 7B.Streitfeld, David. “Anger as a Private Company Takes over Libraries.” The New York Times (26 Sept. 2010). 25 Feb. 2017 <http://www.nytimes.com/2010/09/27/business/27libraries.html>.Svehla, Louise. “Little Free Libraries—The Possibilities Are Endless.” Public Libraries Online (8 Mar. 2013). 25 Feb. 2017 <http://publiclibrariesonline.org/2013/03/little-free-libraries-the-possibilities-are-endless/>.Tapper, Jake. “Boy Fights Council to Save His Library.” CNN 4 Jul. 2014. 25 Feb. 2017 <http://thelead.blogs.cnn.com/2014/07/04/boy-fights-to-save-his-library/>.Topil, Greg. “Little Free Libraries in Lincoln.” City of Lincoln, Nebraska (n.d.). 25 Feb. 2017 <http://lincoln.ne.gov/City/pworks/engine/row/little-library.htm>.
APA, Harvard, Vancouver, ISO, and other styles
14

Barbrook, Richard. "(originally published in December 1998)." First Monday, December 5, 2005. http://dx.doi.org/10.5210/fm.v0i0.1517.

Full text
Abstract:
This paper is included in the First Monday Special Issue #3: Internet banking, e-money, and Internet gift economies, published in December 2005. Special Issue editor Mark A. Fox asked authors to submit additional comments regarding their articles. How has the hi-tech gift economy evolved since 1998, when the paper was written? This article was a product of its time. When I originally wrote The Hi-Tech Gift Economy, the Net was still a novelty for most people even in the developed world. Nearly 8 years later, using this technology is no longer something special. This means that it is impossible to understand my article without remembering the bizarre moment in the late-1990s when so many pundits believed that the Net had almost magical powers. Led by Wired, dotcom boosters were claiming that the Net was creating the free market only found up to then in neo-classical economics textbooks. Inspired by post-modernist gurus, new media activists were convinced that humanity would soon liberate itself from corporate control by escaping into cyberspace. What intrigued me at the time was how these devotees of irreconcilable ideologies shared a common faith in McLuhan-style technological determinism. The Net – not people – was the subject of history. This demiurge promised the final victory of one – and only one - method of organizing labor: the commodity or the gift. When I was writing this article, my goal was to attack these almost totalitarian ideologies. The sharing of information over the Net disproved the neo-liberal fantasies of Wired. The leading role of capitalist businesses within the open source movement was incompatible with the anarcho-communist utopia. I wanted to argue that the choice wasn’t the commodity or the gift. On the Net, the same piece of information could exist both as a commodity and a gift. Nowadays, this conclusion is hardly controversial. My ideological opponents have long ago left the theoretical battlefield. We won’t hear their arguments again until the next wave of innovation within the information technologies creates the conditions for another revival of McLuhanist prophecy. In the meantime, it is common sense to describe the Net’s economy as a mixed economy. Information is shared and sold. Copyright is protected and broken. Capitalists benefit from one advance and lose out from another. Users get for free what they used to pay for and pay for what they used to get for free. In 2005, the dotcom commodity economy and the hi-tech gift economy are – at one and the same time – in opposition and in symbiosis with each other. What are some current examples of the hi-tech gift economy in action? Over the past decade, the hi-tech gift economy has moved from the fringes into the mainstream. When I was writing The Hi-Tech Gift Economy, the open source movement was the iconic example of non-commercial production over the Net. In the intervening period, blogging has become the public face of this new way of working. What was once the preserve of a small minority is now a mass phenomenon. Crucially, just like their techie predecessors, the participants in this enlarged hi-tech gift economy don’t have to think about the political implications of their method of working together. Free market fanatics can happily give away their blog-making labor without realizing they’ve become cyber-communists! This ideological inconsistency has hidden the social impact of the hi-tech gift economy. Allowing people to download your photos for free from Flickr doesn’t seem very radical. Putting up your latest tunes on-line can’t really be a threat to the music moguls. Making your own website doesn’t look like attack on the media corporations. Yet, when large numbers of people are engaged in these activities, commercial self-interest is checked by social altruism within the mixed economy of the Net. Before buying information, every sensible person checks whether you can download it for free. What are the impediments and what are the driving forces of the hi-tech gift economy? Is it possible to distinguish between the two? Long ago, Karl Marx pointed out that socialists had been forced to define their own political position to counter attacks by their liberal and conservative critics. It seems to me that we could make a similar observation today about the two sides in the copyright debate. During the past few decades, American and European politicians have steadily increased and extended the legal privileges of the media corporations. Entranced by the neo-liberal version of the McLuhanist prophecy, they’re convinced that the knowledge economy will be built around the buying and selling of intellectual property – and the state must punish anyone who threatens this new paradigm. In the digital Panopticon, Big Brother will spying on you to make sure that you don’t have any illegally copied files on your hard drive. Since the mid-1960s, the ideological appeal of the post-industrial future has protected the interests of the copyright owners. According to neo-liberal pundits, the global marketplace is founded upon the North exchanging its information commodities for the South’s manufactured goods. Economic prosperity now depends upon the World Trade Organisation imposing copyright protection as a universal obligation. Ironically, by proclaiming their global ambitions, the media and software corporations have exposed the weakness of their economic position. Across the developing world, governments know that copyright laws are unenforceable. Only the rich can afford to pay Northern prices in the South. If piracy can no longer be tolerated, alternatives must be found. In Brazil, the ministry of culture is promoting open source software as not just a more affordable product, but also an opportunity to create local employment. At the international level, they’re advocating the replacement of rigid copyright protection with flexible copyleft licenses. Inspired by this good example, other governments in the South are launching their own open source initiatives. In the developing world, participating within the hi-tech gift economy is a necessity not a hobby. During the last year, the American movie and music industries have forced the leading file-sharing services to limit unauthorized copying by their users. But, as soon as one threat is seen off, another arises. In 2005, over three-quarters of online music is still distributed for free. By forcing the issue, the owners of intellectual property have proved that the hard-line definition of copyright is as anachronistic in the North as in the South. Up-and-coming bands long ago learnt that giving away tunes attracts punters to their gigs and – in due course – sells their music. Yet, in contrast with the South, few politicians in the developed world have accepted the copyright laws need updating for this new dispensation. But, eventually, legislation must match social reality. The dotcom commodity economy can’t displace the hi-tech gift economy. Miscegenation is the epitome of the Net. During the Sixties, the New Left created a new form of radical politics: anarcho-communism. Above all, the Situationists and similar groups believed that the tribal gift economy proved that individuals could successfully live together without needing either the state or the market. From May 1968 to the late Nineties, this utopian vision of anarcho-communism has inspired community media and DIY culture activists. Within the universities, the gift economy already was the primary method of socialising labour. From its earliest days, the technical structure and social mores of the Net has ignored intellectual property. Although the system has expanded far beyond the university, the self-interest of Net users perpetuates this hi-tech gift economy. As an everyday activity, users circulate free information as e-mail, on listservs, in newsgroups, within on-line conferences and through Web sites. As shown by the Apache and Linux programs, the hi-tech gift economy is even at the forefront of software development. Contrary to the purist vision of the New Left, anarcho-communism on the Net can only exist in a compromised form. Money-commodity and gift relations are not just in conflict with each other, but also co-exist in symbiosis. The 'New Economy' of cyberspace is an advanced form of social democracy.
APA, Harvard, Vancouver, ISO, and other styles
15

McAvan, Em. "“Boulevard of Broken Songs”." M/C Journal 9, no. 6 (December 1, 2006). http://dx.doi.org/10.5204/mcj.2680.

Full text
Abstract:
Ever since the spread of cheap sampling technology in the 1980s, popular music has incorporated direct quotations from other songs. This trend reached its zenith in the “mash-up,” that genre of popular music which has emerged in the last 5 or 6 years. Most famously, DJ Dangermouse distributed his “Grey Album,” a concept that mashed together the a Capella vocals from Jay-Z’s Black Album with the music from the Beatles’ White Album. Distribution of the project was swiftly met with a Cease and Desist order from the Beatles’ label EMI, leading to the Grey Tuesday online protest in which many websites distributed the album for free in the name of free expression. As the name suggests, “mash-ups,” sometimes also called bootlegs, mash together two or more already released songs. This use of the term ‘bootlegs’ should not to be confused with bootleg recordings of albums or concerts, which are merely illegal copies sold for profit. Both mash-ups and bootlegs are new pieces of art, almost always unable to be bought from stores. In their most basic form, mash-ups take the vocal from one song and the instrumental from another—what bootleggers call an A+B. This has taken ever more elaborate forms, for instance, San Francisco’s DJ Earworm’s “Stairway to Bootleg Heaven” mashes together Dolly Parton, the Beatles, Art of Noise, Pat Benatar, the Eurythmics, and Laurie Anderson. By now, the history of mash-ups and illegal sampling in general has been well covered by many journalists (See, for instance, Sasha Frere Jones and Pete Rojas). The question, then, is not so much what mash-ups are so much as what they do. Many theories of consumer reception have often reductively posited a passive audience impelled by little more than the desire to consume. When it comes to popular culture in modernity, Frankfurt School theorist Theodor Adorno, both in his own writing and with Horkheimer, made the hugely influential argument that the only cultural work it can do is in the service of hegemonic capitalism. Adorno argued, “the entire practice of the culture industry transfers the profit motive naked onto cultural forms” (232). Painting his argument in rather stark terms, Adorno said that “the categorical imperative of the culture industry no longer has anything in common with freedom. It proclaims: you shall … conform to that which exists anyway” (236). As philosopher Jane Bennett points out, Adorno and Horkheimer construct a passive audience consuming the derivative, repetitious pleasures of mass culture, under the thrall of the fetishised commodity “as if it was alive” (Bennett 123). Horkheimer and Adorno’s influential work denies the “possibility of an affective response to commodities able to challenge the socioeconomic system that generates it” (Bennett 121). Adorno damns the modern culture industries, but in an interesting way he also elevates their power, for his theory privileges the producer of the text, not its consumer. The question presents itself, therefore, what happens when subjects are both consumers and producers? The makers of mash-ups are clearly both. Arguably, mash-ups are a fannish re-appropriation in the manner that Henry Jenkins uses to describe slash fan-fiction in Textual Poachers (Jenkins). Like slash writers, mash-up artists take a common popular culture (music in this case) and appropriate it for their own desires and creative impulses. Rather than a purely passive audience, mash-ups show there exists at least a segment of an engaged audience, able to deconstruct and rework popular culture. Jenkins argues that “fandom celebrates not exceptional texts but exceptional readings” (284), a facet clearly exemplified in mash-ups use of not only the rock canon but “disposable” pop and chart R&B. What makes a mash-up interesting is not that it uses quality critically-approved materials, but that it re-works its materials into new contexts. Bootlegs as a whole can embody the “dissonant possibilities” of the commodity (Bennett 127)—as disruption of the normative reading of songs, as a critique of postmodern capitalism, as an affirmation of consumption, as a critique of the pop auteur cult that privileges certain acts as “art” and not others, as frivolous party music, and more. Most obviously, of course, mash-ups illuminate Fredric Jameson’s thesis that postmodern art is an art of pastiche (Jameson). Mash-ups often take disparate elements, songs from different genres, and make songs that shouldn’t belong together somehow work. Freelance Hellraiser’s classic “Stroke of Genius” bootleg took then band du jour The Strokes and overlayed pop muppet Christina Aguilera’s “Genie in A Bottle” vocals into a surprisingly soulful new song, showing in the process that the gap between “manufactured” pop artist and “authentic” rock artist may not be as far as some would imagine. Alternatively, artists can mash together songs that are basically the same, pointedly noting their lack of originality—for instance, the mash-up from which this article takes its name, San Francisco bootlegger Party Ben’s “Boulevard of Broken Songs,” which takes Green Day’s recent “Boulevard of Broken Dreams” and shows its uncanny similarity to Oasis’s “Wonderwall,” as well as other songs by Travis, Coldplay and Aerosmith. Like any commodity, mash-ups are in some ways implicated in a hegemonic capitalist economy. They are an object to be consumed, and are reliant on the consumption of other texts. In a practical sense for its makers, making mash-ups requires the software to make music, often the Sony-owned ACID program, whose loop based lay-out lends itself to the use of sampled materials. Given their general immersion in technology, it is questionable whether bootleggers necessarily purchase these programs, given the availability of “cracked” software on peer-to-peer downloading programs and Bit-Torrent. Similarly, making mash-ups might require the purchase of CDs or mp3s, although again this is far from certain, given the easy accessibility of “illegal” mp3s downloadable on the internet (but of course that requires the money for an internet connection, as does the hosting of mp3s on individual mash-up sites). Compared to the money needed to “legitimately” release songs, though, mash-ups are a relatively inexpensive way to create “new” music. Most mash-up artists post their work with a disclaimer with words to the effect of “I don’t own these songs, I will take these songs down if asked by the copyright owners, don’t sue me.” Songs are usually available to download for free, and the selling of mash-up CDs on E-bay is highly frowned-upon. While this is partly an attempt to avoid being sued by copyright holders, it also suggests an opting-out of a capitalistic system—art for art’s sake. The most obvious critique of capitalism occurs in the form of the “cut-up,” which sees songs or speeches sampled and reassembled to form different meanings. This may be political, for example, the cut-up by RX that re-assembled George W Bush’s speeches into U2’s anti-war song “Sunday Bloody Sunday.” Australian readers may remember the satirical Pauline Pantsdown single “I Don’t Like It” which re-arranged right-wing One Nation politician Pauline Hanson’s voice into nonsensical sayings about shopping trolleys and discos. Like the slash that Jenkins applauds, this may also take the form of a rupture of the heteronormative surface of most pop music. One good example is Bristol mash-up artist Andrew Herring’s “Blue Cheese mix” which cut together Avril Lavigne’s “Sk8r Boi” into a homoerotic love song (“He was a boy/he was a boy/can I make it anymore obvious?”), over the top of such queer-friendly songs as Sylvester’s “You Make Me Feel Mighty Real” and Placebo’s “Nancy Boy.” This is not to suggest that queer sexuality is outside of a capitalistic economy, but rather that queer re-readings take popular music culture into new contexts less frequently taken by the largely heteronormative music industry. But while some mash-up culture exhibits a decidedly anti-capitalist out-look, a few mash-up artists have made the leap from bootlegger to major-label sanctioned artist. The press coverage for the aforementioned Dangermouse got him a production gig with the Gorillaz and the leverage to release his much-hyped Gnarls Barkley project with Cee-Lo (of course, it rather helped that he already had a record deal with rapper Gemini). Richard X’s bootlegs landed him a number one UK single when the Sugababes re-recorded his “Freak Like Me” mash-up, and a number of mash-ups have been licensed by the labels of the original artists and released officially (French bootleggers Loo & Placido’s “Horny Like A Dandy,” English bootleggers Phil & Dog’s “Dr Pressure”). Particularly in the first flush of the mash-up hype in the UK in 2001, there has been the potential at least for a few bootleggers to break into the music industry. Thus, one should not consider mash-ups as an unambiguous refusal of late capitalism, for many bootleggers would like nothing better than to become part of the system from which they currently pilfer. However, given the nature of the medium, its commercial co-option is far from assured, since the clearance fees for many bootlegs render them un-releasable. In their re-appropriations of popular music culture, though, mash-ups embody the contradictions inherent in late capitalism—fun and serious, nihilist and political, anti-capitalist and marked by hyper-consumption. Immersed in pop culture, but not quite of it, the liminal place of mash-ups on the edge of the culture should continue to make them of interest to critics of media culture. References Adorno, Theodor W. “Culture Industry Reconsidered.” In The Adorno Reader. Ed. Brian O’Connor. Oxford: Blackwell, 2000. 230-239. Bennett, Jane. The Enchantment of Modern Life. Princeton: Princeton UP, 2001. Jameson, Fredric. Postmodernism, or, the Cultural Logic of Late Capitalism. London: Verso, 1991. Jenkins, Henry. Textual Poachers: Television Fans & Participatory Culture. New York: Routledge, 1992. Jones, Sasha Frere. “1 + 1 + 1 = 1: The New Math of Mash-Ups.” The New Yorker 10 Jan. 2005. 22 Sep. 2006 http://www.newyorker.com/critics/music/?050110crmu_music>. Rojas, Pete. “Bootleg Culture.” Salon 1 Aug. 2002. 22 Sep. 2006 http://dir.salon.com/story/tech/feature/2002/08/01/bootlegs/index.html?pn=1>. Citation reference for this article MLA Style McAvan, Em. "“Boulevard of Broken Songs”: Mash-ups as Textual Re-appropriation of Popular Music Culture." M/C Journal 9.6 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0612/02-mcavan.php>. APA Style McAvan, E. (Dec. 2006) "“Boulevard of Broken Songs”: Mash-ups as Textual Re-appropriation of Popular Music Culture," M/C Journal, 9(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0612/02-mcavan.php>.
APA, Harvard, Vancouver, ISO, and other styles
16

Leisten, Susanna, and Rachel Cobcroft. "Copy." M/C Journal 8, no. 3 (July 1, 2005). http://dx.doi.org/10.5204/mcj.2351.

Full text
Abstract:
Rip, mix, share, and sue. Has ‘copy’ become a dirty word? The invitation to artists, activists, consumers and critics to engage in the debate surrounding the creative processes of ‘copy’ has been insightful, if not inciting sampling/reproduction/reflection itself: It clearly questions whether ‘copy’ deserves the negative connotations that it currently summonses. It has confronted the divide between the original and its replica, and questioned notions of authenticity and the essence of identity. It has found that ‘open source’ is an opportunity to capitalise on creativity, and that reuse is resplendently productive. Cultural expression and social exchange are seen to rest upon the acts of copying which are brought to our attention in this edition. As this issue illustrates, the word ‘copy’ has numerous interpretations, applications, and angles, yet an overriding wealth of debate currently outweighs all others; and that surrounds the tumultuous issue of ‘protecting’ copyright in the digital age. Since its conception in the 17th century, copyright law has faced an increasing challenge in achieving its original aims; namely, to strike a balance between creators’ and consumers’ rights in allowing concurrent attribution and access to works. Recent dramatic technological advancements affecting reproduction and distribution of copies, particularly pertaining to the Internet, have fundamentally changed and challenged the content environment. When copyright laws were first conceived, copying and distributing creative works was difficult. Now these activities are virtually free, and practically pervasive; in the digital age, the difficulty lies in their control. Yet because the primarily Western copyright regime relies on providing rights holders with the ability to control their works, copyright industries are working on strategies to garner greater control. Heading this list of strategies are technological content protection mechanisms, consumer education, and lawsuits against individual copyright infringers. Peer-to-peer (P2P) networks are being exploited and sabotaged simultaneously by entities within the Creative Industries, in an attempt to learn from and eliminate the free ‘competition’. Perceiving the mismatch of legal sanction and access to enabling technologies, critics revile the increasing restriction on consumers and creativity. The music industry, in particular, is experimenting with new business models to confine consumers’ rights to enjoy a growing bank of online music. Technical protection mechanisms, within the ambit of Digital Rights Management (DRM), are increasingly applied to enforce these licensing restrictions, providing ‘speed bumps’ for access to content (Digital Connections Council of the Committee for Economic Development 50). Given that these mechanisms can only temporarily allow a limited level of control over access to and usage of content, however, both IP and contract law are essential to the prevention and deterrence of infringement. While production and distribution corporations agitate about online ‘piracy’, an increasing population of consumers are unsympathetic, knowing that very little of the music industry revenue ends up in the pockets of artists, and knowing very little of the complex law surrounding copyright. Over the past few hundred years the content distribution business has become particularly wealthy, and it is primarily this link of the content chain from creator to consumer that is tending towards redundancy in the digital networked world: those who once resided in the middle of the content chain will no longer be required. When individuals and collectives create something they are proud of, they want the world to experience and talk about it, if not ‘rip, mix, mash, and share’ it. The need to create and communicate has always been part of human makeup. Infants learn rapidly during their first few years primarily by observing and emulating the behaviour of adults. But as children progress, and begin creating what they perceive to be their unique contribution, they naturally want to claim and display it as their own; hence the importance of attribution and moral rights to this debate. Clearly, society benefits in many ways from this drive to create, innovate, communicate, learn and share contributions. One need only cite Sir Isaac Newton, who is attributed as having said, ‘If I have seen further, it is by standing on the shoulders of giants.’ Academics and scientists worldwide have long collaborated by sharing and building on one another’s work, a fact acknowledged by the Science Commons initiative (http://www.sciencecommons.org/) to provide open access to academic research and development. Such has been inspired by the vision of Lawrence Lessig, as espoused in The Future of Ideas: The Fate of the Commons in a Connected World. Appropriation of bits and pieces (‘samples’) of another’s work, along with appropriate attribution, has always been acceptable until recently. This legal tension is explored by authors Frederick Wasser, in his article ‘When Did They Copyright the World Without Us Noticing?’, and Francis Raven, in ‘Copyright and Public Goods: An Argument for Thin Copyright Protection’. Wasser explores the recent agitation against the legislated copyright extension in the United States to 95 years from publication (or 120 years from creation, whichever is shorter) from an original 14, accompanied by the changing logic of copyright, which has further upset the balance between protection and fair use, between consumer and creator, and ultimately invests power in the intermediary. Raven argues for ‘thin’ copyright protection, having the intention to protect the incentive for producers to create while also defending the public’s right to a rich intellectual realm in the public domain. Current conflict surrounding music sampling illustrates that our evolution towards a regime of restrictive licensing of digital works, largely driven by copyright owners and content distributors, has made the use of bits and pieces of existing music difficult, if not impossible. In this issue’s feature article ‘Good Copy/Bad Copy’, Steve Collins examines the value of ‘copy’ where musical creativity and copyright law intersect. The recontextualisation and reshaping of music with regard to cover versions and sampling brings into relief the disparity in current legal and licensing provisions. When creativity is stifled by copyright, the original intention of the law is lost. Collins argues that creators are now subject to the control of an oppressive monopoly, which clearly should be addressed if innovative cultural expression is to thrive. The issue’s second article, ‘The Affect of Selection in Digital Sound Art’ by author and sound artist Owen Chapman, aka ‘Opositive’, explores the interplay and influence between the ‘raw and the remixed’, where subjective control over sound production is questioned. Transformation of sound hovers between an organic and intentional process, and creates affective influence: we are ultimately entreated to listen and learn, as sampling selection goes gestalt. Moving from the aural domain to the written, the significance of textual reuse and self-referentiality is introduced by Kirsten Seale in her academic exploration of reuse in the works of Iain Sinclair. Sinclair, in Dining on Stones (or, the Middle Ground), is seen to have subverted the postmodernist obscuration/denial of authorial control through the reintroduction of an assured self-sampling technique. Also in contemplating the written creative process, after significant exposure to the ever-more-evident proclivities of students to cut and paste from Websites, Dr. Gauti Sigthorsson asserts that plagiarism is merely symptomatic of the dominant sampling culture. Rather than looming as a crisis, Sigthorsson sees this increasing appropriation as a ‘teachable moment’, illustrating the delights of the open source process. Issues of identity and authenticity are explored in ‘Digital Doppelgängers’ by Lisa Bode, and ‘Slipping and Sliding: blind optimism, greed and the effect of fakes on our cultural understanding’ by art fraud and forensic expert Robyn Sloggett. In introducing the doppelgänger of Indo-European folklore and literature as the protagonist’s sinister double, Bode goes on to explore the digital manifestation: the image which challenges the integrity of the actor and his/her reflection, where original identity may be beyond the actor’s control. In copy’s final article ‘Slipping and Sliding’ by Sloggett, the determination of artistic authenticity is explored. Identity is seen to be predicated on authenticity: but does this necessarily hold? In reflecting on the notions of ‘copy’ explored in this issue, it is clear that civilisation has progressed by building on past successes and failures. A better, richer future can be possible if we continue to do exactly this. Instead, rights holders are striving to maintain control, using clumsy methods that effectively alter traditional user rights (or perceived rights) and practices. Imagine instead if all creative content were virtually free and easily accessible to all; where it would not longer be an infringement to make and share copies for non-commercial reasons. Is it possible to engineer an alternative incentive (to copyright) for creativity to flourish? This is, after all, the underlying goal behind copyright law. Copyright law provides a creator with a temporary monopoly over the sale and distribution of their work. Infringing copyright law is consequently depriving creators of this mechanism to make money, obtain notoriety and thus their very motivation to create. This goal to provide creative incentive is fundamentally important for society, intellectually and culturally, but alternative means to achieve it are worthy of exploration. A familiar alternative option to help generate creativity is to apply a special tax (levy) on all goods and services that enable viewing, listening, reading, publishing, copying, and downloading of digital content. The revenue pool this generates is then available for distribution amongst content creators, thereby creating a financial incentive. In over 40 countries, primarily European, partial variations of such a levy system are currently used to compensate copyright owners whilst allowing consumers a certain degree of free private copying. Professor William Fisher, Hale and Dorr Professor of Intellectual Property Law at Harvard University, and Director of the Berkman Centre for Internet and Society, proposes as much in his book outlining a government-administered compensation scheme, encompassing free online access to music and movies: Promises to Keep: Technology, Law and the Future of Entertainment. As we are left to contemplate copyrights and ‘copywrongs’ (Vaidhyanathan), we may reflect that the ‘promotion of the progress of science and the useful arts’, as per Harper v. Row (471 U.S.), rests with the (some say draconian) directions determined by legislation. Measures contained in instruments such as the Digital Millennium Copyright Act (DMCA), continue to diminish, if not desecrate, the public domain. Moreover, as the full impact of the Free Trade Agreement (FTA) with the United States looms for the Australian audience, in the adoption of the extension of the copyright term to the criminalisation of IP infringement, we realise that the establishment of economically viable and legal alternatives to the adopted regime is paramount. (Moore) We are also left to lament the recent decision in MGM vs. Grokster, where the US Supreme Court has ruled unanimously against the file-sharing service providers Grokster and Streamcast Networks (developers of Morpheus), serving as an illustration of ongoing uncertainty surrounding P2P networks and technologies, and lack of certainty of any court decisions regarding such matters. In the future, as we log into Longhorn (http://msdn.microsoft.com/longhorn/), we will wonder where our right to enjoy began to disappear. Electronic Frontier Foundation’s (http://www.eff.org/) cry to ‘Defend Freedom in the Digital World’ gains increasing resonance. In presenting ‘copy’ to you, we invite you cut, paste, innovate, create, and be entertained, to share, and share alike, while you still can. References Digital Connections Council of the Committee for Economic Development (CED). Promoting Innovation and Economic Growth: The Special Problem of Digital Intellectual Property, 2004. http://www.ced.org/docs/report/report_dcc.pdf>. Fisher, William. Promises to Keep: Technology, Law, and the Future of Entertainment. Palo Alto CA: Stanford UP, 2004. Lessig, Lawrence. The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random House, 2001. Moore, Christopher. “Creative Choices: Changes to Australian Copyright Law and the Future of the Public Domain.” Media International Australia 114 (2005): 71-82. Vaidhyanathan, Siva. Copyrights and Copywrongs: The Rise of Intellectual Property and How It Threatens Creativity. New York: New York UP, 2003. Citation reference for this article MLA Style Leisten, Susanna, and Rachel Cobcroft. "Copy." M/C Journal 8.3 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0507/01-editorial.php>. APA Style Leisten, S., and R. Cobcroft. (Jul. 2005) "Copy," M/C Journal, 8(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0507/01-editorial.php>.
APA, Harvard, Vancouver, ISO, and other styles
17

Bruns, Axel. "The Fiction of Copyright." M/C Journal 2, no. 1 (February 1, 1999). http://dx.doi.org/10.5204/mcj.1737.

Full text
Abstract:
It is the same spectacle all over the Western world: whenever delegates gather to discuss the development and consequences of new media technologies, a handful of people among them will stand out from the crowd, and somehow seem not quite to fit in with the remaining assortment of techno-evangelists, Internet ethnographers, multimedia project leaders, and online culture critics. At some point in the proceedings, they'll get to the podium and hold a talk on their ideas for the future of copyright protection and intellectual property (IP) rights in the information age; when they are finished, the reactions of the audience typically range from mild "what was that all about?" amusement to sheer "they haven't got a clue" disbelief. Spare a thought for copyright lawyers; they're valiantly fighting a losing battle. Ever since the digitalisation and networking of our interpersonal and mass media made information transmission and duplication effortless and instantaneous, they've been trying to come up with ways to uphold and enforce concepts of copyright which are fundamentally linked to information as bound to physical objects (artifacts, books, CDs, etc.), as Barlow has demonstrated so clearly in "Selling Wine without Bottles". He writes that "copyright worked well because, Gutenberg notwithstanding, it was hard to make a book. ... Books had material surfaces to which one could attach copyright notices, publisher's marques, and price tags". If you could control the physical media which were used to transmit information (paper, books, audio and video tapes, as well as radio and TV sets, or access to cable systems), you could control who made copies when and where, and at what price. This only worked as long as the technology to make copies was similarly scarce, though: as soon as most people learnt to write, or as faxes and photocopiers became cheaper, the only real copyright protection books had was the effort that would have to be spent to copy them. With technology continuously advancing (perhaps even at accellerating pace), copyright is soon becoming a legal fiction that is losing its link to reality. Indeed, we are now at a point where we have the opportunity -- the necessity, even -- to shift the fictional paradigm, to replace the industrial-age fiction of protective individual copyright with an information-age fiction of widespread intellectual cooperation. As it becomes ever easier to bypass and ignore copyright rules, and as copyright thus becomes ever more illusionary, this new fiction will correspondingly come ever closer to being realised. To Protect and to ... Lose Today, the lawyers' (and their corporate employers') favourite weapon in their fight against electronic copyright piracy are increasingly elaborate protection mechanisms -- hidden electronic signatures to mark intellectual property, electronic keys to unlock copyrighted products only for legitimate users (and sometimes only for a fixed amount of time or after certain licence payments), encryption of sensitive information, or of entire products to prevent electronic duplication. While the encryption of information exchanges between individuals has been proven to be a useful deterrent against all but the most determined of hackers, it's interesting to note that practically no electronic copyright protection mechanism of mass market products has ever been seen to work. However good and elaborate the protection efforts, it seems that as long as there is a sufficient number of interested consumers unwilling to pay for legitimate access, copy protections will be cracked eventually: the rampant software piracy is the best example. On the other hand, where copy protections become too elaborate and cumbersome, they end up killing the product they are meant to protect: this is currently happening in the case of some of the pay-per-view or limited-plays protection schemes forced upon the U.S. market for Digital Versatile Discs (DVDs). The eventual failure of such mechanisms isn't a particularly recent observation, even. When broadcast radio was first introduced in Australia in 1923, it was proposed that programme content should be protected (and stations financed) by fixing radio receivers to a particular station's frequency -- by buying such a 'sealed set' receiver you would in effect subscribe to a station and acquire the right to receive the content it provided. Never known as uninventive, those Australians who this overprotectiveness didn't completely put off buying a receiver (radio was far from being a proven mass medium at the time, after all) did of course soon break the seal, and learnt to adjust the frequency to try out different stations -- or they built their own radios from scratch. The 'sealed set' scheme was abandoned after only nine months. Even with the development of copy protection schemes since the 1920s, a full (or at least sufficiently comprehensive) protection of intellectual property seems as unattainable a fiction as it was then. Protection and copying technology are never far apart in development anyway, but even more fundamentally, the protected products are eventually meant to be used, after all. No matter how elaborately protected a CD, a video, or a computer programme is, it will still have to be converted into sound waves, image information, or executable code, and at that level copying will still remain possible. In the absence of workable copy protection, however, copies will be made in large amounts -- even more so since information is now being spread and multiplied around the globe virtually at the speed of light. Against this tide of copies, any attempts to use legislation to at least force the payment of royalties from illegitimate users are also becoming increasingly futile. While there may be a few highly publicised court cases, the multitude of small transgressions will remain unanswered. This in turn undermines the equality before the law that is a basic human right: increasingly, the few that are punished will be able to argue that, if "everybody does it", to single them out is highly unfair. At the same time, corporate efforts to uphold the law may be counterproductive: as Barlow writes, "against the swift tide of custom, the Software Publishers' current practice of hanging a few visible scapegoats is so obviously capricious as to only further diminish respect for the law". Quite simply, their legal costs may not be justified by the results anymore. Abandoning Copyright Law If copyright has become a fiction, however -- one that is still, despite all evidence, posited as reality by the legal system --, and if the makeup of today's electronic media, particularly the Internet, allow that fiction to be widely ignored and circumvented in daily practice -- despite all corporate legal efforts --, how is this disparity between law and reality to be solved? Barlow offers a clear answer: "whenever there is such profound divergence between the law and social practice, it is not society that adapts". He goes on to state that it may well be that when the current system of intellectual property law has collapsed, as seems inevitable, that no new legal structure will arise in its place. But something will happen. After all, people do business. When a currency becomes meaningless, business is done in barter. When societies develop outside the law, they develop their own unwritten codes, practices, and ethical systems. While technology may undo law, technology offers methods for restoring creative rights. When William Gibson invented the term 'cyberspace', he described it as a "consensual hallucination" (67). As the removal of copyright to the realm of the fictional has been driven largely by the Internet and its 'freedom of information' ethics, perhaps it is apt to speak of a new approach to intellectual property (or, with Barlow, to 'creative rights') as one of consensual, collaborative use of such property. This approach is far from being fully realised yet, and must so for now remain fiction, too, but it is no mere utopian vision -- in various places, attempts are made to put into place consensual schemes of dealing with intellectual property. They also represent a move from IP hoarding to IP use. Raymond speaks of the schemes competing here as the 'cathedral' and the 'bazaar' system. In the cathedral system, knowledge is tightly controlled, and only the finished product, "carefully crafted by individual wizards or small bands of mages working in splendid isolation" (1), is ever released. This corresponds to traditional copyright approaches, where company secrets are hoarded and locked away (sometimes only in order to keep competitors from using them), and breaches punished severely. The bazaar system, on the other hand, includes the entire community of producers and users early on in the creative process, up to the point of removing the producer/user dichotomy altogether: "no quiet, reverent cathedral-building here -- rather, ... a great babbling bazaar of differing agendas and approaches ... out of which a coherent and stable system could seemingly emerge only by a succession of miracles", as Raymond admits (1). The Linux 'Miracle' Raymond writes about one such bazaar-system project which provides impressive proof that the approach can work, however: the highly acclaimed Unix-based operating system Linux. Instigated and organised by Finnish programmer Linus Torvalds, this enthusiast-driven, Internet-based development project has achieved more in less than a decade than what many corporate developers (Microsoft being the obvious example) can do in thrice that time, and with little financial incentive or institutional support at that. As Raymond describes, "the Linux world behaves in many respects like a free market or an ecology, a collection of selfish agents attempting to maximise utility which in the process produces a self-correcting spontaneous order more elaborate and efficient than any amount of central planning could achieve" (10). Thus, while there is no doubt that individual participants will eventually always also be driven by selfish reasons, there is collaboration towards the achievement of communal goals, and a consensus about what those goals are: "while coding remains an essentially solitary activity, the really great hacks come from harnessing the attention and brainpower of entire communities. The developer who uses only his or her own brain in a closed project is going to fall behind the developer who knows how to create an open, evolutionary context in which bug-spotting and improvements get done by hundreds of people" (Raymond 10). It is obvious that such collaborative projects need a structure that allows for the immediate participation of a large community, and so in the same way that the Internet has been instrumental in dismantling traditional copyright systems, it is also a driving factor in making these new approaches possible: "Linux was the first project to make a conscious and successful effort to use the entire world as its talent pool. I don't think it's a coincidence that the gestation period of Linux coincided with the birth of the World Wide Web, and that Linux left its infancy during the same period in 1993-1994 that saw the takeoff of the ISP industry and the explosion of mainstream interest in the Internet. Linus was the first person who learned how to play by the new rules that pervasive Internet made possible" (Raymond 10). While some previous collaborative efforts exist (such as shareware schemes, which have existed ever since the advent of programmable home computers), their comparatively limited successes underline the importance of a suitable communication medium. The success of Linux has now begun to affect corporate structures, too: informational material for the Mozilla project, in fact, makes direct reference to the Linux experience. On the Net, Mozilla is as big as it gets -- instituted to continue development of Netscape Communicator-based Web browsers following Netscape's publication of the Communicator source code, it poses a serious threat to Microsoft's push (the legality of which is currently under investigation in the U.S.) to increase marketshare for its Internet Explorer browser. Much like Linux, Mozilla will be a collaborative effort: "we intend to delegate authority over the various modules to the people most qualified to make decisions about them. We intend to operate as a meritocracy: the more good code you contribute, the more responsibility you will be given. We believe that to be the only way to continue to remain relevant, and to do the greatest good for the greatest number" ("Who Is Mozilla.org?"), with the Netscape corporation only one among that number, and a contributor amongst many. Netscape itself intends to release browsers based on the Mozilla source code, with some individual proprietary additions and the benefits corporate structures allow (printed manuals, helplines, and the like), but -- so it seems -- it is giving up its unlimited hold over the course of development of the browser. Such actions afford an almost prophetic quality to Barlow's observation that "familiarity is an important asset in the world of information. It may often be the case that the best thing you can do to raise the demand for your product is to give it away". The use of examples from the computer world should not be seen to mean that the consensual, collaborative use of intellectual property suggested here is limited only to software -- it is, however, no surprise that a computer-based medium would first be put to use to support computer-based development projects. Producers and artists from other fields can profit from networking with their peers and clients just as much: artists can stay in touch with their audience and one another, working on collaborative projects such as the brilliant Djam Karet CD Collaborator (see Taylor's review in Gibraltar), professional interest groups can exchange information about the latest developments in their field as well as link with the users of their products to find out about their needs or problems, and the use of the Net as a medium of communication for academic researchers was one of its first applications, of course. In many such cases, consensual collaboration would even speed up the development process and help iron out remaining glitches, beating the efforts of traditional institutions with their severely guarded intellectual property rights. As Raymond sees it, for example, "no commercial developer can match the pool of talent the Linux community can bring to bear on a problem", and so "perhaps in the end the free-software culture will triumph not because cooperation is morally right or software 'hoarding' is morally wrong ... , but simply because the commercial world cannot win an evolutionary arms race with free-software communities that can put orders of magnitude more skilled time into a problem" (10). Realising the Fiction There remains the problem that even the members of such development communities must make a living somehow -- a need to which their efforts in the community not only don't contribute, but the pursuit of which even limits the time available for the community efforts. The apparent impossibility of reconciling these two goals has made the consensual collaborative approach appear little more than a utopian fiction so far, individual successes like Linux or (potentially) Mozilla notwithstanding. However, there are ways of making money from the communal work even if due to the abolition of copyright laws mere royalty payments are impossible -- as the example of Netscape's relation to the Mozilla project shows, the added benefits that corporate support can bring will still seem worth paying for, for many users. Similarly, while music and artwork may be freely available on the Net, many music fans will still prefer to get the entire CD package from a store rather than having to burn the CD and print the booklet themselves. The changes to producer/user relations suggested here do have severe implications for corporate and legal structures, however, and that is the central reason why particularly the major corporate intellectual property holders (or, hoarders) and their armies of lawyers are engaged in such a fierce defensive battle. Needless to say, the changeover from the still-powerful fiction of enforcible intellectual property copyrights to the new vision of open, consensual collaboration that gives credit for individual contributions, but has no concept of an exclusive ownership of ideas, will not take place overnight. Intellectual property will continue to be guarded, trade secrets will keep being kept, for some time yet, but -- just as is the case with the established practice of patenting particular ideas just so competitors can't use them, but without ever putting them to use in one's own work -- eventually such efforts will prove to be self-defeating. Shutting one's creative talents off in a quiet cathedral will come to be seen as less productive than engaging in the creative cooperation occuring in the global bazaar, and solitary directives of central executives will be replaced by consensual decisions of the community of producers and users. As Raymond points out, "this is not to say that individual vision and brilliance will no longer matter; rather, ... the cutting edge ... will belong to people who start from individual vision and brilliance, then amplify it through the effective construction of voluntary communities of interest" (10). Such communal approaches may to some seem much like communism, but this, too, is a misconception. In fact, in this new system there is much more exchange, much more give and take going on than in the traditional process of an exchange of money for product between user and producer -- only the currency has changed. "This explains much of the collective 'volunteer' work which fills the archives, newsgroups, and databases of the Internet. Its denizens are not working for 'nothing,' as is widely believed. Rather they are getting paid in something besides money. It is an economy which consists almost entirely of information" (Barlow). And with the removal of the many barriers to the free flow of information and obstacles to scientific and artistic development that traditional copyright has created, the progress of human endeavour itself is likely to be sped up. In the end, then, it all comes down to what fictions we choose to believe or reject. In the light of recent developments, and considering the evidence that suggests the viability, even superiority of alternative approaches, it is becoming increasingly hard to believe that traditional copyright can, and much less, should be sustained. Other than the few major copyright holders, few stand to gain from upholding these rights. On the other hand, were we to lift copyright restrictions and use the ideas and information thus made available freely in a cooperative, consensual, and most of all productive way, we all might profit. As various projects have shown, that fiction is already in the process of being realised. References Barlow, John Perry. "Selling Wine without Bottles: The Economy of Mind on the Global Net." 1993. 26 Jan. 1999 <www.eff.org/pub/Publications/John_Perry_Barlow/HTML/idea_economy_article.php>. Gibson, William. Neuromancer. London: HarperCollins, 1984. Raymond, Eric S. "The Cathedral and the Bazaar." 1998. 26 Jan. 1999 <http://www.redhat.com/redhat/cathedral-bazaar/cathedral-bazaar.php>. Taylor, Mike. "Djam Karet, Jeff Greinke, Tim Song Jones, Nick Peck, Kit Watkins." Gibraltar 5.12 (22 Apr. 1995). 10 Feb. 1999 <http://www.progrock.net/gibraltar/issues/Vol5.Iss12.htm>. "Who Is Mozilla.org?" Mozilla.org Website. 1998. 26 Jan. 1999 <http://www.mozilla.org/about.php>. Citation reference for this article MLA style: Axel Bruns. "The Fiction of Copyright: Towards a Consensual Use of Intellectual Property." M/C: A Journal of Media and Culture 2.1 (1999). [your date of access] <http://www.uq.edu.au/mc/9902/copy.php>. Chicago style: Axel Bruns, "The Fiction of Copyright: Towards a Consensual Use of Intellectual Property," M/C: A Journal of Media and Culture 2, no. 1 (1999), <http://www.uq.edu.au/mc/9902/copy.php> ([your date of access]). APA style: Axel Bruns. (1999) The fiction of copyright: towards a consensual use of intellectual property. M/C: A Journal of Media and Culture 2(1). <http://www.uq.edu.au/mc/9902/copy.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
18

Leaver, Tama. "The Social Media Contradiction: Data Mining and Digital Death." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.625.

Full text
Abstract:
Introduction Many social media tools and services are free to use. This fact often leads users to the mistaken presumption that the associated data generated whilst utilising these tools and services is without value. Users often focus on the social and presumed ephemeral nature of communication – imagining something that happens but then has no further record or value, akin to a telephone call – while corporations behind these tools tend to focus on the media side, the lasting value of these traces which can be combined, mined and analysed for new insight and revenue generation. This paper seeks to explore this social media contradiction in two ways. Firstly, a cursory examination of Google and Facebook will demonstrate how data mining and analysis are core practices for these corporate giants, central to their functioning, development and expansion. Yet the public rhetoric of these companies is not about the exchange of personal information for services, but rather the more utopian notions of organising the world’s information, or bringing everyone together through sharing. The second section of this paper examines some of the core ramifications of death in terms of social media, asking what happens when a user suddenly exists only as recorded media fragments, at least in digital terms. Death, at first glance, renders users (or post-users) without agency or, implicitly, value to companies which data-mine ongoing social practices. Yet the emergence of digital legacy management highlights the value of the data generated using social media, a value which persists even after death. The question of a digital estate thus illustrates the cumulative value of social media as media, even on an individual level. The ways Facebook and Google approach digital death are examined, demonstrating policies which enshrine the agency and rights of living users, but become far less coherent posthumously. Finally, along with digital legacy management, I will examine the potential for posthumous digital legacies which may, in some macabre ways, actually reanimate some aspects of a deceased user’s presence, such as the Lives On service which touts the slogan “when your heart stops beating, you'll keep tweeting”. Cumulatively, mapping digital legacy management by large online corporations, and the affordances of more focussed services dealing with digital death, illustrates the value of data generated by social media users, and the continued importance of the data even beyond the grave. Google While Google is universally synonymous with search, and is the world’s dominant search engine, it is less widely understood that one of the core elements keeping Google’s search results relevant is a complex operation mining user data. Different tools in Google’s array of services mine data in different ways (Zimmer, “Gaze”). Gmail, for example, uses algorithms to analyse an individual’s email in order to display the most relevant related advertising. This form of data mining is comparatively well known, with most Gmail users knowingly and willingly accepting more personalised advertising in order to use Google’s email service. However, the majority of people using Google’s search engine are unaware that search, too, is increasingly driven by the tracking, analysis and refining of results on the basis of user activity (Zimmer, “Externalities”). As Alexander Halavais (160–180) quite rightly argues, recent focus on the idea of social search – the deeper integration of social network information in gauging search results – is oxymoronic; all search, at least for Google, is driven by deep analysis of personal and aggregated social data. Indeed, the success of Google’s mining of user data has led to concerns that often invisible processes of customisation and personalisation will mean that the supposedly independent or objective algorithms producing Google’s search results will actually yield a different result for every person. As Siva Vaidhyanathan laments: “as users in a diverse array of countries train Google’s algorithms to respond to specialized queries with localised results, each place in the world will have a different list of what is important, true, or ‘relevant’ in response to any query” (138). Personalisation and customisation are not inherently problematic, and frequently do enhance the relevance of search results, but the main objection raised by critics is not Google’s data mining, but the lack of transparency in the way data are recorded, stored and utilised. Eli Pariser, for example, laments the development of a ubiquitous “filter bubble” wherein all search results are personalised and subjective but are hidden behind the rhetoric of computer-driven algorithmic objectivity (Pariser). While data mining informs and drives many of Google’s tools and services, the cumulative value of these captured fragments of information is best demonstrated by the new service Google Now. Google Now is a mobile app which delivers an ongoing stream of search results but without the need for user input. Google Now extrapolates the rhythms of a person’s life, their interests and their routines in order to algorithmically determine what information will be needed next, and automatically displays it on a user’s mobile device. Clearly Google Now is an extremely valuable and clever tool, and the more information a user shares, the better the ongoing customised results will be, demonstrating the direct exchange value of personal data: total personalisation requires total transparency. Each individual user will need to judge whether they wish to share with Google the considerable amount of personal information needed to make Google Now work. The pressing ethical question that remains is whether Google will ensure that users are sufficiently aware of the amount of data and personal privacy they are exchanging in order to utilise such a service. Facebook Facebook began as a closed network, open only to students at American universities, but has transformed over time to a much wider and more open network, with over a billion registered users. Facebook has continually reinvented their interface, protocols and design, often altering both privacy policies and users’ experience of privacy, and often meeting significant and vocal resistance in the process (boyd). The data mining performed by social networking service Facebook is also extensive, although primarily aimed at refining the way that targeted advertising appears on the platform. In 2007 Facebook partnered with various retail loyalty services and combined these records with Facebook’s user data. This information was used to power Facebook’s Beacon service, which added details of users’ retail history to their Facebook news feed (for example, “Tama just purchased a HTC One”). The impact of all of these seemingly unrelated purchases turning up in many people’s feeds suddenly revealed the complex surveillance, data mining and sharing of these data that was taking place (Doyle and Fraser). However, as Beacon was turned on, without consultation, for all Facebook users, there was a sizable backlash that meant that Facebook had to initially switch the service to opt-in, and then discontinue it altogether. While Beacon has been long since erased, it is notable that in early 2013 Facebook announced that they have strengthened partnerships with data mining and profiling companies, including Datalogix, Epsilon, Acxiom, and BlueKai, which harness customer information from a range of loyalty cards, to further refine the targeting ability offered to advertisers using Facebook (Hof). Facebook’s data mining, surveillance and integration across companies is thus still going on, but no longer directly visible to Facebook users, except in terms of the targeted advertisements which appear on the service. Facebook is also a platform, providing a scaffolding and gateway to many other tools and services. In order to use social games such as Zynga’s Farmville, Facebook users agree to allow Zynga to access their profile information, and use Facebook to authenticate their identity. Zynga has been unashamedly at the forefront of user analytics and data mining, attempting to algorithmically determine the best way to make virtual goods within their games attractive enough for users to pay for them with real money. Indeed, during a conference presentation, Zynga Vice President Ken Rudin stated outright that Zynga is “an analytics company masquerading as a games company” (Rudin). I would contend that this masquerade succeeds, as few Farmville players are likely to consider how their every choice and activity is being algorithmically scrutinised in order to determine what virtual goods they might actually buy. As an instance of what is widely being called ‘big data’, the data miing operations of Facebook, Zynga and similar services lead to a range of ethical questions (boyd and Crawford). While users may have ostensibly agreed to this data mining after clicking on Facebook’s Terms of Use agreement, the fact that almost no one reads these agreements when signing up for a service is the Internet’s worst kept secret. Similarly, the extension of these terms when Facebook operates as a platform for other applications is a far from transparent process. While examining the recording of user data leads to questions of privacy and surveillance, it is important to note that many users are often aware of the exchange to which they have agreed. Anders Albrechtslund deploys the term ‘social surveillance’ to usefully emphasise the knowing, playful and at times subversive approach some users take to the surveillance and data mining practices of online service providers. Similarly, E.J. Westlake notes that performances of self online are often not only knowing but deliberately false or misleading with the aim of exploiting the ways online activities are tracked. However, even users well aware of Facebook’s data mining on the site itself may be less informed about the social networking company’s mining of offsite activity. The introduction of ‘like’ buttons on many other Websites extends Facebook’s reach considerably. The various social plugins and ‘like’ buttons expand both active recording of user activity (where the like button is actually clicked) and passive data mining (since a cookie is installed or updated regardless of whether a button is actually pressed) (Gerlitz and Helmond). Indeed, because cookies – tiny packets of data exchanged and updated invisibly in browsers – assign each user a unique identifier, Facebook can either combine these data with an existing user’s profile or create profiles about non-users. If that person even joins Facebook, their account is connected with the existing, data-mined record of their Web activities (Roosendaal). As with Google, the significant issue here is not users knowingly sharing their data with Facebook, but the often complete lack of transparency in terms of the ways Facebook extracts and mines user data, both on Facebook itself and increasingly across applications using Facebook as a platform and across the Web through social plugins. Google after Death While data mining is clearly a core element in the operation of Facebook and Google, the ability to scrutinise the activities of users depends on those users being active; when someone dies, the question of the value and ownership of their digital assets becomes complicated, as does the way companies manage posthumous user information. For Google, the Gmail account of a deceased person becomes inactive; the stored email still takes up space on Google’s servers, but with no one using the account, no advertising is displayed and thus Google can earn no revenue from the account. However, the process of accessing the Gmail account of a deceased relative is an incredibly laborious one. In order to even begin the process, Google asks that someone physically mails a series of documents including a photocopy of a government-issued ID, the death certificate of the deceased person, evidence of an email the requester received from the deceased, along with other personal information. After Google have received and verified this information, they state that they might proceed to a second stage where further documents are required. Moreover, if at any stage Google decide that they cannot proceed in releasing a deceased relative’s Gmail account, they will not reveal their rationale. As their support documentation states: “because of our concerns for user privacy, if we determine that we cannot provide the Gmail content, we will not be able to share further details about the account or discuss our decision” (Google, “Accessing”). Thus, Google appears to enshrine the rights and privacy of individual users, even posthumously; the ownership or transfer of individual digital assets after death is neither a given, nor enshrined in Google’s policies. Yet, ironically, the economic value of that email to Google is likely zero, but the value of the email history of a loved one or business partner may be of substantial financial and emotional value, probably more so than when that person was alive. For those left behind, the value of email accounts as media, as a lasting record of social communication, is heightened. The question of how Google manages posthumous user data has been further complicated by the company’s March 2012 rationalisation of over seventy separate privacy policies for various tools and services they operate under the umbrella of a single privacy policy accessed using a single unified Google account. While this move was ostensibly to make privacy more understandable and transparent at Google, it had other impacts. For example, one of the side effects of a singular privacy policy and single Google identity is that deleting one of a recently deceased person’s services may inadvertently delete them all. Given that Google’s services include Gmail, YouTube and Picasa, this means that deleting an email account inadvertently erases all of the Google-hosted videos and photographs that individual posted during their lifetime. As Google warns, for example: “if you delete the Google Account to which your YouTube account is linked, you will delete both the Google Account AND your YouTube account, including all videos and account data” (Google, “What Happens”). A relative having gained access to a deceased person’s Gmail might sensibly delete the email account once the desired information is exported. However, it seems less likely that this executor would realise that in doing so all of the private and public videos that person had posted on YouTube would also permanently disappear. While material possessions can be carefully dispersed to specific individuals following the instructions in someone’s will, such affordances are not yet available for Google users. While it is entirely understandable that the ramification of policy changes are aimed at living users, as more and more online users pass away, the question of their digital assets becomes increasingly important. Google, for example, might allow a deceased person’s executor to elect which of their Google services should be kept online (perhaps their YouTube videos), which traces can be exported (perhaps their email), and which services can be deleted. At present, the lack of fine-grained controls over a user’s digital estate at Google makes this almost impossible. While it violates Google’s policies to transfer ownership of an account to another person, if someone does leave their passwords behind, this provides their loved ones with the best options in managing their digital legacy with Google. When someone dies and their online legacy is a collection of media fragments, the value of those media is far more apparent to the loved ones left behind rather than the companies housing those media. Facebook Memorialisation In response to users complaining that Facebook was suggesting they reconnect with deceased friends who had left Facebook profiles behind, in 2009 the company instituted an official policy of turning the Facebook profiles of departed users into memorial pages (Kelly). Technically, loved ones can choose between memorialisation and erasing an account altogether, but memorialisation is the default. This entails setting the account so that no one can log into it, and that no new friends (connections) can be made. Existing friends can access the page in line with the user’s final privacy settings, meaning that most friends will be able to post on the memorialised profile to remember that person in various ways (Facebook). Memorialised profiles (now Timelines, after Facebook’s redesign) thus become potential mourning spaces for existing connections. Since memorialised pages cannot make new connections, public memorial pages are increasingly popular on Facebook, frequently set up after a high-profile death, often involving young people, accidents or murder. Recent studies suggest that both of these Facebook spaces are allowing new online forms of mourning to emerge (Marwick and Ellison; Carroll and Landry; Kern, Forman, and Gil-Egui), although public pages have the downside of potentially inappropriate commentary and outright trolling (Phillips). Given Facebook has over a billion registered users, estimates already suggest that the platform houses 30 million profiles of deceased people, and this number will, of course, continue to grow (Kaleem). For Facebook, while posthumous users do not generate data themselves, the fact that they were part of a network means that their connections may interact with a memorialised account, or memorial page, and this activity, like all Facebook activities, allows the platform to display advertising and further track user interactions. However, at present Facebook’s options – to memorialise or delete accounts of deceased people – are fairly blunt. Once Facebook is aware that a user has died, no one is allowed to edit that person’s Facebook account or Timeline, so Facebook literally offers an all (memorialisation) or nothing (deletion) option. Given that Facebook is essentially a platform for performing identities, it seems a little short-sighted that executors cannot clean up or otherwise edit the final, lasting profile of a deceased Facebook user. As social networking services and social media become more ingrained in contemporary mourning practices, it may be that Facebook will allow more fine-grained control, positioning a digital executor also as a posthumous curator, making the final decision about what does and does not get kept in the memorialisation process. Since Facebook is continually mining user activity, the popularity of mourning as an activity on Facebook will likely mean that more attention is paid to the question of digital legacies. While the user themselves can no longer be social, the social practices of mourning, and the recording of a user as a media entity highlights the fact that social media can be about interactions which in significant ways include deceased users. Digital Legacy Services While the largest online corporations have fairly blunt tools for addressing digital death, there are a number of new tools and niche services emerging in this area which are attempting to offer nuanced control over digital legacies. Legacy Locker, for example, offers to store the passwords to all of a user’s online services and accounts, from Facebook to Paypal, and to store important documents and other digital material. Users designate beneficiaries who will receive this information after the account holder passes away, and this is confirmed by preselected “verifiers” who can attest to the account holder’s death. Death Switch similarly provides the ability to store and send information to users after the account holder dies, but tests whether someone is alive by sending verification emails; fail to respond to several prompts and Death Switch will determine a user has died, or is incapacitated, and executes the user’s final instructions. Perpetu goes a step further and offers the same tools as Legacy Locker but also automates existing options from social media services, allowing users to specify, for example, that their Facebook, Twitter or Gmail data should be downloaded and this archive should be sent to a designated recipient when the Perpetu user dies. These tools attempt to provide a more complex array of choices in terms of managing a user’s digital legacy, providing similar choices to those currently available when addressing material possessions in a formal will. At a broader level, the growing demand for these services attests to the ongoing value of online accounts and social media traces after a user’s death. Bequeathing passwords may not strictly follow the Terms of Use of the online services in question, but it is extremely hard to track or intervene when a user has the legitimate password, even if used by someone else. More to the point, this finely-grained legacy management allows far more flexibility in the utilisation and curation of digital assets posthumously. In the process of signing up for one of these services, or digital legacy management more broadly, the ongoing value and longevity of social media traces becomes more obvious to both the user planning their estate and those who ultimately have to manage it. The Social Media Afterlife The value of social media beyond the grave is also evident in the range of services which allow users to communicate in some fashion after they have passed away. Dead Social, for example, allows users to schedule posthumous social media activity, including the posting of tweets, sending of email, Facebook messages, or the release of online photos and videos. The service relies on a trusted executor confirming someone’s death, and after that releases these final messages effectively from beyond the grave. If I Die is a similar service, which also has an integrated Facebook application which ensures a user’s final message is directly displayed on their Timeline. In a bizarre promotional campaign around a service called If I Die First, the company is promising that the first user of the service to pass away will have their posthumous message delivered to a huge online audience, via popular blogs and mainstream press coverage. While this is not likely to appeal to everyone, the notion of a popular posthumous performance of self further complicates that question of what social media can mean after death. Illustrating the value of social media legacies in a quite different but equally powerful way, the Lives On service purports to algorithmically learn how a person uses Twitter while they are live, and then continue to tweet in their name after death. Internet critic Evgeny Morozov argues that Lives On is part of a Silicon Valley ideology of ‘solutionism’ which casts every facet of society as a problem in need of a digital solution (Morozov). In this instance, Lives On provides some semblance of a solution to the problem of death. While far from defeating death, the very fact that it might be possible to produce any meaningful approximation of a living person’s social media after they die is powerful testimony to the value of data mining and the importance of recognising that value. While Lives On is an experimental service in its infancy, it is worth wondering what sort of posthumous approximation might be built using the robust data profiles held by Facebook or Google. If Google Now can extrapolate what a user wants to see without any additional input, how hard would it be to retool this service to post what a user would have wanted after their death? Could there, in effect, be a Google After(life)? Conclusion Users of social media services have differing levels of awareness regarding the exchange they are agreeing to when signing up for services provided by Google or Facebook, and often value the social affordances without necessarily considering the ongoing media they are creating. Online corporations, by contrast, recognise and harness the informatic traces users generate through complex data mining and analysis. However, the death of a social media user provides a moment of rupture which highlights the significant value of the media traces a user leaves behind. More to the point, the value of these media becomes most evident to those left behind precisely because that individual can no longer be social. While beginning to address the issue of posthumous user data, Google and Facebook both have very blunt tools; Google might offer executors access while Facebook provides the option of locking a deceased user’s account as a memorial or removing it altogether. Neither of these responses do justice to the value that these media traces hold for the living, but emerging digital legacy management tools are increasingly providing a richer set of options for digital executors. While the differences between material and digital assets provoke an array of legal, spiritual and moral issues, digital traces nevertheless clearly hold significant and demonstrable value. For social media users, the death of someone they know is often the moment where the media side of social media – their lasting, infinitely replicable nature – becomes more important, more visible, and casts the value of the social media accounts of the living in a new light. For the larger online corporations and service providers, the inevitable increase in deceased users will likely provoke more fine-grained controls and responses to the question of digital legacies and posthumous profiles. It is likely, too, that the increase in online social practices of mourning will open new spaces and arenas for those same corporate giants to analyse and data-mine. References Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/article/view/2142/1949›. boyd, danah. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence 14.1 (2008): 13–20. ———, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662–679. Carroll, Brian, and Katie Landry. “Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn.” Bulletin of Science, Technology & Society 30.5 (2010): 341–349. Doyle, Warwick, and Matthew Fraser. “Facebook, Surveillance and Power.” Facebook and Philosophy: What’s on Your Mind? Ed. D.E. Wittkower. Chicago, IL: Open Court, 2010. 215–230. Facebook. “Deactivating, Deleting & Memorializing Accounts.” Facebook Help Center. 2013. 7 Mar. 2013 ‹http://www.facebook.com/help/359046244166395/›. Gerlitz, Carolin, and Anne Helmond. “The Like Economy: Social Buttons and the Data-intensive Web.” New Media & Society (2013). Google. “Accessing a Deceased Person’s Mail.” 25 Jan. 2013. 21 Apr. 2013 ‹https://support.google.com/mail/answer/14300?hl=en›. ———. “What Happens to YouTube If I Delete My Google Account or Google+?” 8 Jan. 2013. 21 Apr. 2013 ‹http://support.google.com/youtube/bin/answer.py?hl=en&answer=69961&rd=1›. Halavais, Alexander. Search Engine Society. Polity, 2008. Hof, Robert. “Facebook Makes It Easier to Target Ads Based on Your Shopping History.” Forbes 27 Feb. 2013. 1 Mar. 2013 ‹http://www.forbes.com/sites/roberthof/2013/02/27/facebook-makes-it-easier-to-target-ads-based-on-your-shopping-history/›. Kaleem, Jaweed. “Death on Facebook Now Common as ‘Dead Profiles’ Create Vast Virtual Cemetery.” Huffington Post. 7 Dec. 2012. 7 Mar. 2013 ‹http://www.huffingtonpost.com/2012/12/07/death-facebook-dead-profiles_n_2245397.html›. Kelly, Max. “Memories of Friends Departed Endure on Facebook.” The Facebook Blog. 27 Oct. 2009. 7 Mar. 2013 ‹http://www.facebook.com/blog/blog.php?post=163091042130›. Kern, Rebecca, Abbe E. Forman, and Gisela Gil-Egui. “R.I.P.: Remain in Perpetuity. Facebook Memorial Pages.” Telematics and Informatics 30.1 (2012): 2–10. Marwick, Alice, and Nicole B. Ellison. “‘There Isn’t Wifi in Heaven!’ Negotiating Visibility on Facebook Memorial Pages.” Journal of Broadcasting & Electronic Media 56.3 (2012): 378–400. Morozov, Evgeny. “The Perils of Perfection.” The New York Times 2 Mar. 2013. 4 Mar. 2013 ‹http://www.nytimes.com/2013/03/03/opinion/sunday/the-perils-of-perfection.html?pagewanted=all&_r=0›. Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. London: Viking, 2011. Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16.12 (2011). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/3168›. Roosendaal, Arnold. “We Are All Connected to Facebook … by Facebook!” European Data Protection: In Good Health? Ed. Serge Gutwirth et al. Dordrecht: Springer, 2012. 3–19. Rudin, Ken. “Actionable Analytics at Zynga: Leveraging Big Data to Make Online Games More Fun and Social.” San Diego, CA, 2010. Vaidhyanathan, Siva. The Googlization of Everything. 1st ed. Berkeley: University of California Press, 2011. Westlake, E.J. “Friend Me If You Facebook: Generation Y and Performative Surveillance.” TDR: The Drama Review 52.4 (2008): 21–40. Zimmer, Michael. “The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/2136/1944›. ———. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” Web Search. Eds. Amanda Spink & Michael Zimmer. Berlin: Springer, 2008. 77–99.
APA, Harvard, Vancouver, ISO, and other styles
19

McGuire, Mark. "Ordered Communities." M/C Journal 7, no. 6 (January 1, 2005). http://dx.doi.org/10.5204/mcj.2474.

Full text
Abstract:
A rhetoric of freedom characterises much of the literature dealing with online communities: freedom from fixed identity and appearance, from the confines of geographic space, and from control. The prevailing view, a combination of futurism and utopianism, is that the lack of order in cyberspace enables the creation of social spaces that will enhance personal freedom and advance the common good. Sherry Turkle argues that computer-mediated communication allows us to create a new form of community, in which identity is multiple and fluid (15-17). Marcos Novak celebrates the possibilities of a dematerialized, ethereal virtual architecture in which the relationships between abstract elements are in a constant state of flux (250). John Perry Barlow employs the frontier metaphor to frame cyberspace as an unmapped, ungoverned territory in which a romantic and a peculiarly American form of individualism can be enjoyed by rough and ready pioneers (“Crime” 460). In his 1993 account as an active participant in The WELL (Whole Earth ‘Lectronic Link), one of the earliest efforts to construct a social space online, Howard Rheingold celebrates the freedom to create a “new kind of culture” and an “authentic community” in the “electronic frontier.” He worries, however, that the freedom enjoyed by early homesteaders may be short lived, because “big power and big money” might soon find ways to control the Internet, just as they have come to dominate and direct other communications media. “The Net,” he states, “is still out of control in fundamental ways, but it might not stay that way for long” (Virtual Community 2-5). The uses of order and disorder Some theorists have identified disorder as a necessary condition for the development of healthy communities. In The Uses of Disorder (1970), Richard Sennett argues that “the freedom to accept and to live with disorder” is integral to our search for community (xviii). In his 1989 study of social space, Ray Oldenburg maintains that public hangouts, which constitute the heart of vibrant communities, support sociability best when activities are unplanned, unorganized, and unrestricted (33). He claims that without the constraints of preplanned control we will be more in control of ourselves and more aware of one another (198). More recently, Charles Landry suggests that “structured instability” and “controlled disruption,” resulting from competition, conflict, crisis, and debate, make cities less comfortable but more exciting. Further, he argues that “endemic structural disorder” requiring ongoing adjustments can generate healthy creative activity and stimulate continual innovation (156-58). Kevin Robins, too, believes that any viable social system must be prepared to accept a level of uncertainty, disorder, and fear. He observes, however, that techno-communities are “driven by the compulsion to neutralize,” and they therefore exclude these possibilities in favour of order and security (90-91). Indeed, order and security are the dominant characteristics that less idealistic observers have identified with cyberspace. Alexander Galloway explains how, despite its potential as a liberating development, the Internet is based on technologies of control. This control is exercised at the code level through technical protocols, such as TCP/IP, DNS, and HTM, that determine disconnections as well as connections (Galloway). Lawrence Lessig suggests that in our examination of the ownership, regulation, and governance of the virtual commons, we must take into account three distinct layers. As well as the “logical” or “code” layer that Galloway foregrounds, we should also consider the “physical” layer, consisting of the computers and wires that carry Internet communications, and the “content” layer, which includes everything that we see and hear over the network. In principle, each of these layers could be free and unorganized, or privately owned and controlled (Lessig 23). Dan Schiller documents the increasing privatization of the Net and argues that corporate cyberspace extends the reach of the market, enabling it to penetrate into areas that have previously been considered to be part of the public domain. For Schiller, the Internet now serves as the main production and control mechanism of a global market system (xiv). Checking into Habbo Hotel Habbo Hotel is an example of a highly ordered and controlled online social space that uses community and game metaphors to suggest something much more open and playful. Designed to attract the teenage market, this graphically intensive cartoon-like hotel is like an interactive Legoland, in which participants assemble a toy-like “Habbo” character and chat, play games, and construct personal environments. The first Habbo Hotel opened its doors in the United Kingdom in 2000, and, by September 2004, localized sites were based in a dozen countries, including Canada, the Unites States, Finland, Japan, Switzerland and Spain, with further expansion planned. At that time, there were more than seventeen million registered Habbo characters worldwide with 2.3 million unique visitors each month (“Strong Growth”). The hotel contains thousands of private rooms and twenty-two public spaces, including a welcome lounge, three lobbies, cinema, game hall, café, pub, and an extensive hallway. Anyone can go to the Room-O-Matic and instantly create a free guest room. However, there are a limited number of layouts to choose from and the furnishings, which must be purchased, have be chosen from a catalog of fixed offerings. All rooms are located on one of five floors, which categorize them according to use (parties, games, models, mazes, and trading). Paradoxically, the so-called public spaces are more restricted and less public than the private guest quarters. The limited capacity of the rooms means that all of the public spaces are full most of the time. Priority is given to paying Habbo Club members and others are denied entry or are unceremoniously ejected from a room when it becomes full. Most visitors never make it into the front lobby. This rigid and restricted construction is far from Novak’s vision of a “liquid architecture” without barriers, that morphs in response to the constantly changing desires of individual inhabitants (Novak 250). Before entering the virtual hotel, individuals must first create a Lego-like avatar. Users choose a unique name for their Habbo (no foul language is allowed) and construct their online persona from a limited selection and colour of body parts. One of two different wardrobes is available, depending on whether “Boy” or “Girl” is chosen. The gender of every Habbo is easily recognizable and the restricted wardrobe results in remarkably similar looking young characters. The lack of differentiation encourages participants to treat other Habbos as generic “Boys” or “Girls” and it encourages limited and predictable conversations that fit the stereotype of male-female interactions in most chat sites. Contrary to Turkle’s contention that computer mediated communication technologies expose the fallacy of a single, fixed, identity, and free participants to experiment with alternative selves (15-17), Habbo characters are permitted just one unchangeable name, and are capable of only limited visual transformations. A fixed link between each Habbo character and its registered user (information that is not available to other participants) allows the hotel management to track members through the site and monitor their behavior. Habbo movements are limited to walking, waving, dancing and drinking virtual alcohol-free beverages. Movement between spaces is accomplished by entering a teleport booth, or by selecting a location by name from the hotel Navigator. Habbos cannot jump, fly or walk through objects or other Habbos. They have no special powers and only a limited ability to interact with objects in their environment. They cannot be hurt or otherwise affected by anything in their surroundings, including other Habbos. The emphasis is on safety and avoidance of conflict. Text chat in Habbo Hotel is limited to one sixty-one-character line, which appears above the Habbo, floats upward, and quickly disappears off the top of the screen. Text must be typed in real time while reading on-going conversations and it is not possible to archive a chat sessions or view past exchanges. There is no way of posting a message on a public board. Using the Habbo Console, shorter messages can also be exchanged between Habbos who may be occupying different rooms. The only other narratives available on the site are in the form of official news and promotions. Before checking into the hotel, Habbos can stop to read Habbo Today, which promotes current offers and activities, and HabboHood Happenings, which offers safety tips, information about membership benefits, jobs (paid in furniture), contest winners, and polls. According to Rheingold, a virtual community can form online when enough people participate in meaningful public discussions over an extended period of time and develop “webs of personal relationships” (Virtual Community 5). By restricting communication to short, fleeting messages between individual Habbos, the hotel frustrates efforts by members to engage in significant dialogue and create a viable social group. Although “community” is an important part of the Habbo Hotel brand, it is unlikely to be a substantial part of the actual experience. The virtual hotel is promoted as a safe, non-threatening environment suitable for the teenagers is designed to attract. Parents’ concerns about the dangers of an unregulated chat space provide the hotel management with a justification for creating a highly controlled social space. The hotel is patrolled twenty-four hours a day by professional moderators backed-up by a team of 180 volunteer “Hobbas,” or guides, who can issue warnings to misbehaving Habbos, or temporarily ban them from the site. All text keyed in by Habbos passes through an automated “Bobba Filter” that removes swearing, racist words, explicit sexual comments and “anything that goes against the “Habbo Way” (“Bad Language”). Stick to the rules and you’ll have fun, Habbos are told, “break them and you’ll get yourself banned” (“Habbo Way”). In Big Brother fashion, messages are displayed throughought the hotel advising members to “Stay safe, read the Habbohood Watch,” “Never give out your details!” and “Obey the Habbo way and you’ll be OK.” This miniature surveillance society contradicts Barlow’s observation that cyberspace serves as “a perfect breeding ground for both outlaws and new ideas about liberty” (“Crime” 460). In his manifesto declaring the independence of cyberspace from government control, he maintains that the state has no authority in the electronic “global social space,” where, he asserts, “[w]e are forming our own Social Contract” based on the Golden Rule (“Declaration”). However, Habbo Hotel shows how the rule of the marketplace, which values profits more than social practices, can limit the freedoms of online civil society just as effectively as the most draconian government regulation. Place your order Far from permitting the “controlled disruption” advocated by Landry, the hotel management ensures that nothing is allowed to disrupt their control over the participants. Without conflict and debate, there are few triggers for creative activity in the site, which is designed to encourage consumption, not community. Timo Soininen, the managing director of the company that designed the hotel, states that, because teenagers like to showcase their own personal style, “self-expression is the key to our whole concept.” However, since it isn’t possible to create a Habbo from scratch, or to import clothing or other objects from outside the site, the only way for members to effectively express themselves is by decorating and furnishing their room with items purchased from the Habbo Catalogue. “You see, this,” admits Soininen, “is where our revenue model kicks in” (Shalit). Real-world products and services are also marketed through ads and promotions that are integrated into chat, news, and games. The result, according to Habbo Ltd, is “the ideal vehicle for third party brands to reach this highly desired 12-18 year-old market in a cost-effective and creative manner” (“Habbo Company Profile”). Habbo Hotel is a good example of what Herbert Schiller describes as the corporate capture of sites of public expression. He notes that, when put at the service of growing corporate power, new technologies “provide the instrumentation for organizing and channeling expression” (5-6). In an afterword to a revised edition of The Virtual Community, published in 2000, Rheingold reports on the sale of the WELL to a privately owned corporation, and its decline as a lively social space when order was imposed from the top down. Although he believes that there is a place for commercial virtual communities on the Net, he acknowledges that as economic forces become more entrenched, “more controls will be instituted because there is more at stake.” While remaining hopeful that activists can leverage the power of many-to-many communications for the public good, he wonders what will happen when “the decentralized network infrastructure and freewheeling network economy collides with the continuing growth of mammoth, global, communication empires” (Virtual Community Rev. 375-7). Although the company that built Habbo Hotel is far from achieving global empire status, their project illustrates how the dominant ethos of privatization and the increasing emphasis on consumption results in gated virtual communities that are highly ordered, restricted, and controlled. The popularity of the hotel reflects the desire of millions of Habbos to express their identities and ideas in a playful environment that they are free to create and manipulate. However, they soon find that the rules are stacked against them. Restricted design options, severe communication limitations, and fixed architectural constraints mean that the only freedom left is the freedom to choose from a narrow range of provided options. In private cyberspaces like Habbo Hotel, the logic of the market rules out unrestrained many-to-many communications in favour of controlled commercial relationships. The liberating potential of the Internet that was recognized by Rheingold and others has been diminished as the forces of globalized commerce impose their order on the electronic frontier. References “Bad Language.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/badlanguage/>. Barlow, John Perry. “Crime and Puzzlement.” High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Ed. Peter Ludlow. Cambridge, Mass.: MIT P, 1996. 459-86. ———. “A Declaration of the Independence of Cyberspace.” 8 Feb. 1996. 3 July 2004 http://www.eff.org/~barlow/Declaration-Final.html>. Galloway, Alexander R. Protocol: How Control Exists after Decentralization. Cambridge, Mass.: MIT P, 2004. “Habbo Company Profile.” Habbo Hotel. 2002. Habbo Ltd. 20 Jan. 2003 http://www.habbogroup.com>. “The Habbo Way.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/habboway/>. Landry, Charles. The Creative City: A Toolkit for Urban Innovators. London: Earthscan, 2000. Lessig, Lawrence. The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random, 2001. Novak, Marcos. “Liquid Architecture in Cyberspace.” Cyberspace: First Steps. Ed. Michael Benedikt. Cambridge, Mass.: MIT P, 1991. 225-54. Oldenburg, Ray. The Great Good Place: Cafés, Coffee Shops, Community Centers, Beauty Parlors, General Stores, Bars, Hangouts and How They Get You through the Day. New York: Paragon, 1989. Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper, 1993. ———. The Virtual Community: Homesteading on the Electronic Frontier. Rev. ed. Cambridge, Mass.: MIT P, 2000. Robins, Kevin. “Cyberspace and the World We Live In.” The Cybercultures Reader. Eds. David Bell and Barbara M. Kennedy. London: Routledge, 2000. 77-95. Schiller, Dan. Digital Capitalism: Networking the Global Market System. Cambridge, Mass.: MIT P, 1999. Schiller, Herbert I. Culture Inc.: The Corporate Takeover of Public Expression. New York: Oxford UP, 1991. Sennett, Richard. The Uses of Disorder: Personal Identity & City Life. New York: Vintage, 1970. Shalit, Ruth. “Welcome to the Habbo Hotel.” mpulse Magazine. Mar. 2002. Hewlett-Packard. 1 Apr. 2004 http://www.cooltown.com/cooltown/mpulse/0302-habbo.asp>. “Strong Growth in Sulake’s Revenues and Profit – Habbo Hotel Online Game Will Launch in the US in September.” 3 Sept. 2004. Sulake. Sulake Corp. 9 Jan. 2005 http://www.sulake.com/>. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon, 1997. Citation reference for this article MLA Style McGuire, Mark. "Ordered Communities." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/06-mcguire.php>. APA Style McGuire, M. (Jan. 2005) "Ordered Communities," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/06-mcguire.php>.
APA, Harvard, Vancouver, ISO, and other styles
20

Burns, Alex, and Axel Bruns. ""Share" Editorial." M/C Journal 6, no. 2 (April 1, 2003). http://dx.doi.org/10.5204/mcj.2151.

Full text
Abstract:
Does the arrival of the network society mean we are now a culture of collectors, a society of sharers? We mused about these questions while assembling this M/C Journal issue, which has its genesis in a past event of ‘shared’ confusion. Alex Burns booked into Axel Bruns’s hotel room at the 1998 National Young Writer’s Festival (NYWF) in Newcastle. This ‘identity theft’ soon extended to discussion panels and sessions, where some audience members wondered if the NYWF program had typographical errors. We planned, over café latte at Haddon’s Café, to do a co-session at next year’s festival. By then the ‘identity theft’ had spread to online media. We both shared some common interests: the music of Robert Fripp and King Crimson, underground electronica and experimental turntablism, the Internet sites Slashdot and MediaChannel.org, and the creative possibilities of Open Publishing. “If you’re going to use a pseudonym,” a prominent publisher wrote to Alex Burns in 2001, “you could have created a better one than Axel Bruns.” We haven’t yet done our doppelgänger double-act at NYWF but this online collaboration is a beginning. What became clear during the editorial process was that some people and communities were better at sharing than others. Is sharing the answer or the problem: does it open new possibilities for a better, fairer future, or does it destroy existing structures to leave nothing but an uncontrollable mess? The feature article by Graham Meikle elaborates on several themes explored in his insightful book Future Active: Media Activism and the Internet (New York: Routledge, London: Pluto Press, 2002). Meikle’s study of the influential IndyMedia network dissects three ‘compelling founder’s stories’: the Sydney-based Active software team, the tradition of alternative media, and the frenetic energy of ‘DiY culture’. Meikle remarks that each of these ur-myths “highlights an emphasis on access and participation; each stresses new avenues and methods for new people to create news; each shifts the boundary of who gets to speak.” As the IndyMedia movement goes truly global, its autonomous teams are confronting how to be an international brand for Open Publishing, underpinned by a viable Open Source platform. IndyMedia’s encounter with the Founder’s Trap may have its roots in paradigms of intellectual property. What drives Open Source platforms like IndyMedia and Linux, Tom Graves proposes, are collaborative synergies and ‘win-win’ outcomes on a vast and unpredictable scale. Graves outlines how projects like Lawrence Lessig’s Creative Commons and the Free Software Foundation’s ‘GNU Public License’ challenge the Western paradigm of property rights. He believes that Open Source platforms are “a more equitable and sustainable means to manage the tangible and intangible resources of this world we share.” The ‘clash’ between the Western paradigm of property rights and emerging Open Source platforms became manifest in the 1990s through a series of file-sharing wars. Andy Deck surveys how the ‘browser war’ between Microsoft and Netscape escalated into a long-running Department of Justice anti-trust lawsuit. The Motion Picture Association of America targeted DVD hackers, Napster’s attempt to make the ‘Digital Jukebox in the Sky’ a reality was soon derailed by malicious lawsuits, and Time-Warner CEO Gerald Levin depicted pre-merger broadband as ‘the final battleground’ for global media. Whilst Linux and Mozilla hold out promise for a more altruistic future, Deck contemplates, with a reference to George Orwell’s Homage to Catalonia (1938), that Internet producers “must conform to the distribution technologies and content formats favoured by the entertainment and marketing sectors, or else resign themselves to occupying the margins of media activity.” File-sharing, as an innovative way of sharing access to new media, has had social repercussions. Marjorie Kibby reports that “global music sales fell from $41.5 billion in 1995 to $38.5 billion in 1999.” Peer-to-Peer networks like KaZaA, Grokster and Morpheus have surged in consumer popularity while commercial music file subscription services have largely fallen by the wayside. File-sharing has forever changed the norms of music consumption, Kibby argues: it offers consumers “cheap or free, flexibility of formats, immediacy, breadth of choice, connections with artists and other fans, and access to related commodities.” The fragmentation of Australian families into new diversities has co-evolved with the proliferation of digital media. Donell Holloway suggests that the arrival of pay television in Australia has resurrected the ‘house and hearth’ tradition of 1940s radio broadcasts. Internet-based media and games shifted the access of media to individual bedrooms, and changed their spatial and temporal natures. However pay television’s artificial limit of one television set per household reinstated the living room as a family space. It remains to be seen whether or not this ‘bounded’ control will revive family battles, dominance hierarchies and power games. This issue closes with a series of reflections on how the September 11 terrorist attacks transfixed our collective gaze: the ‘sharing’ of media connects to shared responses to media coverage. For Tara Brabazon the intrusive media coverage of September 11 had its precursor in how Great Britain’s media documented the Welsh mining disaster at Aberfan on 20 October 1966. “In the stark grey iconography of September 11,” Brabazon writes, “there was an odd photocopy of Aberfan, but in the negative.” By capturing the death and grief at Aberfan, Brabazon observes, the cameras mounted a scathing critique of industrialisation and the searing legacy of preventable accidents. This verité coverage forces the audience to actively engage with the trauma unfolding on the television screen, and to connect with their own emotions. Or at least that was the promise never explored, because the “Welsh working class community seemed out of time and space in 1960s Britain,” and because political pundits quickly harnessed the disaster for their own electioneering purposes. In the early 1990s a series of ‘humanitarian’ interventions and televised conflicts popularized the ‘CNN Effect’ in media studies circles as a model of how captivated audiences and global media vectors could influence government policies. However the U.S. Government, echoing the coverage of Aberfan, used the ‘CNN Effect’ for counterintelligence and consensus-making purposes. Alex Burns reviews three books on how media coverage of the September 11 carnage re-mapped our ‘virtual geographies’ with disturbing consequences, and how editors and news values were instrumental in this process. U.S. President George W. Bush’s post-September 11 speeches used ‘shared’ meanings and symbols, news values morphed into the language of strategic geography, and risk reportage obliterated the ideal of journalistic objectivity. The deployment of ‘embedded’ journalists during the Second Gulf War (March-April 2003) is the latest development of this unfolding trend. September 11 imagery also revitalized the Holocaust aesthetic and portrayal of J.G. Ballard-style ‘institutionalised disaster areas’. Royce Smith examines why, in the aftermath of the terrorist attacks, macabre photo-manipulations of the last moments became the latest Internet urban legend. Drawing upon the theoretical contributions of Jean Baudrillard, Roland Barthes and others, Smith suggests that these photo-manipulations were a kitsch form of post-traumatic visualisation for some viewers. Others seized on Associated Press wire photos, whose visuals suggested the ‘face of Satan’ in the smoke of the World Trade Center (WTC) ruins, as moral explanations of disruptive events. Imagery of people jumping from the WTC’s North Tower, mostly censored in North America’s press, restored the humanness of the catastrophe and the reality of the viewer’s own mortality. The discovery of surviving artwork in the WTC ruins, notably Rodin’s The Thinker and Fritz Koenig’s The Sphere, have prompted art scholars to resurrect this ‘dead art’ as a memorial to September 11’s victims. Perhaps art has always best outlined the contradictions that are inherent in the sharing of cultural artefacts. Art is part of our, of humanity’s, shared cultural heritage, and is celebrated as speaking to the most fundamental of human qualities, connecting us regardless of the markers of individual identity that may divide us – yet art is also itself dividing us along lines of skill and talent, on the side of art production, and of tastes and interests, on the side of art consumption. Though perhaps intending to share the artist’s vision, some art also commands exorbitant sums of money which buy the privilege of not having to share that vision with others, or (in the case of museums and galleries) to set the parameters – and entry fees – for that sharing. Digital networks have long been promoted as providing the environment for unlimited sharing of art and other content, and for shared, collaborative approaches to the production of that content. It is no surprise that the Internet features prominently in almost all of the articles in this ‘share’ issue of M/C Journal. It has disrupted the existing systems of exchange, but how the pieces will fall remains to be seen. For now, we share with you these reports from the many nodes of the network society – no doubt, more connections will continue to emerge. Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Burns, Alex and Bruns, Axel. ""Share" Editorial" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0304/01-editorial.php>. APA Style Burns, A. & Bruns, A. (2003, Apr 23). "Share" Editorial. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0304/01-editorial.php>
APA, Harvard, Vancouver, ISO, and other styles
21

Bowles, Kate. "Academia 1.0: Slow Food in a Fast Food Culture? (A Reply to John Hartley)." M/C Journal 12, no. 3 (July 15, 2009). http://dx.doi.org/10.5204/mcj.169.

Full text
Abstract:
"You could think of our kind of scholarship," he said, "as something like 'slow food' in a fast-food culture."— Ivan Kreilkamp, co-editor of Victorian Studies(Chronicle of Higher Education, March 2009) John Hartley’s entertaining and polemical defense of a disappearing art form (the print copy journal designed to be ripped eagerly from its envelope and read from cover to cover like a good book) came my way via the usual slightly disconcerting M/C Journal overture: I believe that your research interests and background make you a potential expert reviewer of the manuscript, "LAMENT FOR A LOST RUNNING ORDER? OBSOLESCENCE AND ACADEMIC JOURNALS," which has been submitted to the '' [sic] issue of M/C Journal. The submission's extract is inserted below, and I hope that you will consider undertaking this important task for us. Automated e-mails like these keep strange company, with reminders about overdue library items and passwords about to expire. Inevitably their tone calls to mind the generic flattery of the internet scam that announces foreign business opportunities or an unexpectedly large windfall from a deceased relative. At face value, this e-mail confirms John Hartley’s suspicions about the personalised craft of journal curation. Journal editing, he implies, is going the way of drywalling and smithying—by the time we realise these ancient and time-intensive skills have been lost, it’ll be too late. The usual culprit is to the fore—the internet—and the risk presented by obsolescence is very significant. At stake is the whole rich and messy infrastructure of academic professional identity: scholarly communication, goodwill, rank, trust, service to peers, collegiality, and knowledge itself. As a time-poor reader of journals both online and in print I warmed to this argument, and enjoyed reading about the particularities of journal editing: the cultivation and refinement of a specialised academic skill set involving typefaces, cover photographs and running order. Journal editors are our creative directors. Authors think selfishly and not always consistently about content, position and opportunity, but it’s the longer term commitment of editors to taking care of their particular shingle in the colourful and crowded bazaar of scholarly publishing, that keeps the market functioning in a way that also works for inspectors and administrators. Thinking of all the print journals I’ve opened and shut and put on shelves (sometimes still in their wrappers) and got down again, and photocopied, and forgotten about, I realised that I do retain a dim sense of their look and shape, and that in practical ways this often helps me remember what was in them. Nevertheless, even having been through the process he describes, whereby “you have to log on to some website and follow prompts in order to contribute both papers and the assessment of papers; interactions with editors are minimal,” I came to the conclusion that he had underestimated the human in the practice of refereeing. I wasn’t sure made me an expert reviewer for this piece, except perhaps that in undertaking the review itself I was practising a kind of expertise that entitled me to reflect on what I was doing. So as a way of wrestling with the self-referentiality of the process of providing an anonymous report on an article whose criticism of blind refereeing I shared, I commented on the corporeality and collegiality of the practice: I knew who I was writing about (and to), and I was conscious of both disagreeing and wondering how to avoid giving offence. I was also cold in my office, and wondering about a coffee. “I suspect the cyborg reviewer is (like most cyborgs) a slightly romantic, or at least rhetorical, fantasy,” I added, a bit defensively. “Indeed, the author admits to practising editorship via a form of human intersubjectivity that involves email, so the mere fact that the communication in some cases is via a website doesn’t seem to render the human obsolete.” The cyborg reviewer wasn’t the only thing bothering me about the underlying assumptions concerning electronic scholarly publishing, however. The idea that the electronic disaggregation of content threatens the obsolescence of the print journal and its editor is a little disingenuous. Keyword searches do grab articles independently of issues, it’s true, but it’s a stretch to claim that this functionality is what’s turning diligent front-to-back readers and library flaneurs into the kinds of online mercenaries we mean when we say “users”. Quite the opposite: journal searches are highly seductive invitations to linger and explore. Setting out from the starting point of a single article, readers can now follow a citation trail, or chase up other articles by the same author or on similar topics, all the while keeping in plain sight the running order that was designed by the editors as an apt framework for the piece when it first appeared. Journal publishers have the keenest investment in nurturing the distinctive brand of each of their titles, and as a result the journal name is never far from view. Even the cover photo and layout is now likely to be there somewhere, and to crop up often as readers retrace their steps and set out again in another direction. So to propose that online access makes the syntactical form of a journal issue irrelevant to readers is to underestimate both the erotics of syntax, and the capacity of online readers to cope with a whole new libidinous economy of searching characterised by multiple syntactical options. And if readers are no longer sequestered within the pages of an individual hard copy journal—there really is a temptation to mention serial monogamy here—their freedom to operate more playfully only draws attention to the structural horizontalities of the academic public sphere, which is surely the basis of our most durable claims to profess expertise. Precisely because we are hyperlinked together across institutions and disciplines, we can justly argue that we are perpetually peer-reviewing each other, in a fairly disinterested fashion, and no longer exclusively in the kinds of locally parochial clusters that have defined (and isolated) the Australian academy. So although disaggregation irritates journal editors, a more credible risk to their craft comes from the disintermediation of scholarly communication that is one of the web’s key affordances. The shift towards user generated content, collaboratively generated, openly accessible and instantly shareable across many platforms, does make traditional scholarly publishing, with its laborious insistence on double blind refereeing, look a bit retro. How can this kind of thing not become obsolete given how long it takes for new ideas to make their way into print, what with all that courtly call and response between referees, editors and authors, and the time consumed in arranging layout and running order and cover photos? Now that the hegemons who propped up the gold standard journals are blogging and podcasting their ideas, sharing their bookmarks, and letting us know what they’re doing by the hour on Twitter, with presumably no loss of quality to their intellectual presence, what kind of premium or scarcity value can we place on the content they used to submit to print and online journals? So it seems to me that the blogging hegemon is at least as much of a problem for the traditional editor as the time challenged browser hoping for a quick hit in a keyword search. But there are much more complicated reasons why the journal format itself is not at risk, even from www.henryjenkins.org. Indeed, new “traditional” journals are being proposed and launched all the time. The mere award of an A* for the International Journal of Cultural Studies in the Australian journal rankings (Australian Research Council) confirms that journals are persistently evaluated in their own right, that the brand of the aggregating instrument still outranks the bits and pieces of disaggregated content, and that the relative standing of different journals depends precisely on the quantification of difficulty in meeting the standards (or matching the celebrity status) of their editors, editorial boards and peer reviewing panels. There’s very little indication in this process that either editors or reviewers are facing obsolescence; too many careers still depend on their continued willingness to stand in the way of the internet’s capacity to let anyone have a go at presenting ideas and research in the public domain. As the many inputs to the ERA exercise endlessly, and perhaps a bit tediously, confirmed, it’s the reputation of editors and their editorial practices that signals the exclusivity of scholarly publishing: in the era of wikis and blogs, an A* journal is one club that’s not open to all. Academia 1.0 is resilient for all these straightforward reasons. Not only in Australia, tenure and promotion depend on it. As a result, since the mid 1990s, editors, publishers, librarians and other stakeholders in scholarly communication have been keeping a wary eye on the pace and direction of change to either its routines or its standards. Their consistent attention has been on the proposition the risk comes from something loosely defined as “digital”. But as King, Tenopir and Clark point out in their study of journal readership in the sciences, the relevance of journal content itself has been extensively disputed and investigated across the disciplines since the 1960s. Despite the predictions of many authors in the 1990s that electronic publishing and pre-publishing would challenge the professional supremacy of the print journal, it seems just as likely that the simple convenience of filesharing has made more vetted academic material available, more easily, to more readers. As they note in a waspish foonote, even the author of one of the most frequently cited predictions that scholarly journals were on the way out had to modify his views, “perhaps due to the fact that his famous 1996 [sic] article "Tragic Loss or Good Riddance? The Impending Demise of Traditional Scholarly Journals" has had thousands of hits or downloads on his server alone.” (King et al,; see also Odlyzko, " Tragic Loss" and "Rapid Evolution"). In other words, all sides now seem to agree that “digital” has proved to be both opportunity and threat to scholarly publication. Odlyzko’s prediction of the disappearance of the print journal and its complex apparatus of self-perpetuation was certainly premature in 1996. So is John Hartley right that it’s time to ask the question again? Earlier this year, the Chronicle of Higher Education’s article “Humanities Journals Confront Identity Crisis”, which covered much of the same ground, generated brisk online discussion among journal editors in the humanities (Howard; see also the EDITOR-L listserv archive). The article summarised the views of a number of editors of “traditional” journals, and offset these with the views of a group representing the Council of Editors of Learned Journals, canvassing the possibility that scholarly publishing could catch up to the opportunities that we tend to shorthand as “web 2.0”. The short-lived CELJ blog discussion led by Jo Guldi in February 2009 proposed four principles we might expect to shape the future of scholarly publishing in the humanities: technical interoperability, which is pretty uncontroversial; the expansion of scholarly curation to a role in managing and making sense of “the noise of the web”; diversification of content types and platforms; and a more inclusive approach to the contribution of non-academic experts. (Guldi et al.) Far from ceding the inexorability of their own obsolescence, the four authors of this blog (each of them journal editors) have re-imagined the craft of editing, and have drafted an amibitious but also quite achievable manifesto for the renovation of scholarly communication. This is focused on developing a new and more confident role for the academy in the next phase of the development of the knowledge-building capacity of the web. Rather than confining themselves to being accessed only by their professional peers (and students) via university libraries in hardcopy or via institutional electronic subscription, scholars should be at the forefront of the way knowledge is managed and developed in the online public sphere. This would mean developing metrics that worked as well for delicious and diigo as they do for journal rankings; and it would mean a more upfront contribution to quality assurance and benchmarking of information available on the web, including information generated from outside the academy. This resonates with John Hartley’s endorsement of wiki-style open refereeing, which as an idea contains a substantial backwards nod to Ginsparg’s system of pre-publication of the early 1990s (see Ginsparg). It also suggests a more sophisticated understanding of scholarly collaboration than the current assumption that this consists exclusively of a shift to multiply-authored content, the benefit of which has tended to divide scholars in the humanities (Young). But it was not as a reviewer or an author that this article really engaged me in thinking about the question of human obsolescence. Recently I’ve been studying the fragmentation, outsourcing and automation of work processes in the fast food industry or, as it calls itself, the Quick Service Restaurant trade. I was drawn into this study by thinking about the complex reorganisation of time and communication brought about by the partial technologisation of the McDonalds drive-thru in Australia. Now that drive-thru orders are taken through a driveway speaker, the order window (and its operator) have been rendered obsolete, and this now permanently closed window is usually stacked high with cardboard boxes. Although the QSR industry in the US has experimented with outsourcing ordering to call centres at other locations (“May I take your order?”), in Australia the task itself has simply been added to the demands of customer engagement at the paying window, with the slightly odd result that the highest goal of customer service at this point is to be able to deal simultaneously with two customers at two different stages of the drive-thru process—the one who is ordering three Happy Meals and a coffee via your headset, and the one who is sitting in front of you holding out money—without offending or confusing either. This formal approval of a shift from undivided customer attention to the time-efficiency of multitasking is a small but important reorientation of everyday service culture, making one teenager redundant and doubling the demands placed on the other. The management of quick service restaurant workers and their productivity offers us a new perspective on the pressures we are experiencing in the academic labour market. Like many of my colleagues, I have been watching with a degree of ambivalence the way in which the national drive to quantify excellence in research in Australia has resulted in some shallow-end thinking about how to measure what it is that scholars do, and how to demonstrate that we are doing it competitively. Our productivity is shepherded by the constant recalibration of our workload, conceived as a bundle of discrete and measurable tasks, by anxious institutions trying to stay ahead in the national game of musical chairs, which only offers a limited number of seats at the research table—while still keeping half an eye on their enterprise bargaining obligations. Or, as the Quick Service Restaurant sector puts it: Operational margins are narrowing. While you need to increase the quality, speed and accuracy of service, the reality is that you also need to control labor costs. If you reduce unnecessary labor costs and improve workforce productivity, the likelihood of expanding your margins increases. Noncompliance can cost you. (Kronos) In their haste to increase quality, speed and accuracy of academic work, while lowering labor costs and fending off the economic risk of noncompliance, our institutions have systematically overlooked the need to develop meaningful ways to accommodate the significant scholarly work of reading, an activity that takes real time, and that in its nature is radically incompatible with the kinds of multitasking we are all increasingly using to manage the demands placed on us. Without a measure of reading, we fall back on the exceptionally inadequate proxy of citation. As King et al. point out, citation typically skews towards a small number of articles, and the effect of using this as a measure of reading is to suggest that the majority of articles are never read at all. Their long-term studies of what scientists read, and why, have been driven by the need to challenge this myth, and they have demonstrated that while journals might not be unwrapped and read with quite the Christmas-morning eagerness that John Hartley describes, their content is eventually read more than once, and often more than once by the same person. Both electronic scholarly publishing, and digital redistribution of material original published in print, have greatly assisted traditional journals in acquiring something like the pass-on value of popular magazines in dentists’ waiting rooms. But for all this to work, academics have to be given time to sit and read, and as it would be absurd to try to itemise and remunerate this labour specifically, then this time needs to be built into the normative workload for anyone who is expected to engage in any of the complex tasks involved in the collaborative production of knowledge. With that in mind, I concluded my review on what I hoped was a constructive note of solidarity. “What’s really under pressure here—forms of collegiality, altruism and imaginative contributions to a more outward-facing type of scholarship—is not at risk from search engines, it seems to me. What is being pressured into obsolescence, risking subscriptions to journals as much as purchases of books, is the craft and professional value placed on reading. This pressure is not coming from the internet, but from all the other bureaucratic rationalities described in this paper, that for the time being do still value journals selectively above other kinds of public contribution, but fail to appreciate the labour required to make them appear in any form, and completely overlook the labour required to absorb their contents and respond.” For obvious reasons, my warm thanks are due to John Hartley and to the two editors of this M/C Journal issue for their very unexpected invitation to expand on my original referee’s report.References Australian Research Council. “The Excellence in Research for Australia (ERA) Initiative: Journal Lists.” 2009. 3 July 2009 ‹http://www.arc.gov.au/era/era_journal_list.htm›. Ginsparg, Paul. “Can Peer Review be Better Focused?” 2003. 1 July 2009 ‹http://people.ccmr.cornell.edu/~ginsparg/blurb/pg02pr.html›. Guldi, Jo, Michael Widner, Bonnie Wheeler, and Jana Argersinger. The Council of Editors of Learned Journals Blog. 2009. 1 July 2009 ‹http://thecelj.blogspot.com›. Howard, Jennifer. “Humanities Journals Confront Identity Crisis.” The Chronicle of Higher Education 27 Mar. 2009. 1 July 2009 ‹http://chronicle.com/free/v55/i29/29a00102.htm›. King, Donald, Carol Tenopir, and Michael Clarke. "Measuring Total Reading of Journal Articles." D-Lib Magazine 12.10 (2006). 1 July 2009 ‹http://www.dlib.org/dlib/october06/king/10king.html›. Kronos Incorporated. “How Can You Reduce Your Labor Costs without Sacrificing Speed of Service?” (2009). 1 July 2009 ‹http://www.qsrweb.com/white_paper.php?id=1738&download=1›.“May I Take Your Order? Local McDonald's Outsources to a Call Center.” Billings Gazette, Montana, 5 July 2006. SharedXpertise Forum. 1 July 2009 ‹http://www.sharedxpertise.org/file/3433/mcdonalds-outsourcing-to-call-center.html›.Odlyzko, Andrew. “The Rapid Evolution of Scholarly Publishing.” Learned Publishing 15.1 (2002): 7-19. ———. “Tragic Loss or Good Riddance? The Impending Demise of Traditional Scholarly Journals.” International Journal of Human-Computer Studies 42 (1995): 71-122. Young, Jeffrey. “Digital Humanities Scholars Collaborate More on Journal Articles than 'Traditional' Researchers.” The Chronicle of Higher Education 27 April 2009. 1 July 2009 ‹http://chronicle.com/wiredcampus/article/3736/digital-humanities-scholars-collaborate-more-on-journal-articles-than-on-traditional-researchers›.
APA, Harvard, Vancouver, ISO, and other styles
22

Wagman, Ira. "Wasteaminute.com: Notes on Office Work and Digital Distraction." M/C Journal 13, no. 4 (August 18, 2010). http://dx.doi.org/10.5204/mcj.243.

Full text
Abstract:
For those seeking a diversion from the drudgery of work there are a number of websites offering to take you away. Consider the case of wasteaminute.com. On the site there is everything from flash video games, soft-core pornography and animated nudity, to puzzles and parlour games like poker. In addition, the site offers links to video clips grouped in categories such as “funny,” “accidents,” or “strange.” With its bright yellow bubble letters and elementary design, wasteaminute will never win any Webby awards. It is also unlikely to be part of a lucrative initial public offering for its owner, a web marketing company based in Lexington, Kentucky. The internet ratings company Alexa gives wasteaminute a ranking of 5,880,401 when it comes to the most popular sites online over the last three months, quite some way behind sites like Wikipedia, Facebook, and Windows Live.Wasteaminute is not unique. There exists a group of websites, a micro-genre of sorts, that go out of their way to offer momentary escape from the more serious work at hand, with a similar menu of offerings. These include sites with names such as ishouldbeworking.com, i-am-bored.com, boredatwork.com, and drivenbyboredom.com. These web destinations represent only the most overtly named time-wasting opportunities. Video sharing sites like YouTube or France’s DailyMotion, personalised home pages like iGoogle, and the range of applications available on mobile devices offer similar opportunities for escape. Wasteaminute inspired me to think about the relationship between digital media technologies and waste. In one sense, the site’s offerings remind us of the Internet’s capacity to re-purpose old media forms from earlier phases in the digital revolution, like the retro video game PacMan, or from aspects of print culture, like crosswords (Bolter and Grusin; Straw). For my purposes, though, wasteaminute permits the opportunity to meditate, albeit briefly, on the ways media facilitate wasting time at work, particularly for those working in white- and no-collar work environments. In contemporary work environments work activity and wasteful activity exist on the same platform. With a click of a mouse or a keyboard shortcut, work and diversion can be easily interchanged on the screen, an experience of computing I know intimately from first-hand experience. The blurring of lines between work and waste has accompanied the extension of the ‘working day,’ a concept once tethered to the standardised work-week associated with modernity. Now people working in a range of professions take work out of the office and find themselves working in cafes, on public transportation, and at times once reserved for leisure, like weekends (Basso). In response to the indeterminate nature of when and where we are at work, the mainstream media routinely report about the wasteful use of computer technology for non-work purposes. Stories such as a recent one in the Washington Post which claimed that increased employee use of social media sites like Facebook and Twitter led to decreased productivity at work have become quite common in traditional media outlets (Casciato). Media technologies have always offered the prospect of making office work more efficient or the means for management to exercise control over employees. However, those same technologies have also served as the platforms on which one can engage in dilatory acts, stealing time from behind the boss’s back. I suggest stealing time at work may well be a “tactic,” in the sense used by Michel de Certeau, as a means to resist the rules and regulations that structure work and the working life. However, I also consider it to be a tactic in a different sense: websites and other digital applications offer users the means to take time back, in the form of ‘quick hits,’ providing immediate visual or narrative pleasures, or through interfaces which make the time-wasting look like work (Wagman). Reading sites like wasteaminute as examples of ‘office entertainment,’ reminds us of the importance of workers as audiences for web content. An analysis of a few case studies also reveals how the forms of address of these sites themselves recognise and capitalise on an understanding of the rhythms of the working day, as well as those elements of contemporary office culture characterised by interruption, monotony and surveillance. Work, Media, Waste A mass of literature documents the transformations of work brought on by industrialisation and urbanisation. A recent biography of Franz Kafka outlines the rigors imposed upon the writer while working as an insurance agent: his first contract stipulated that “no employee has the right to keep any objects other than those belonging to the office under lock in the desk and files assigned for its use” (Murray 66). Siegfried Kracauer’s collection of writings on salaried workers in Germany in the 1930s argues that mass entertainment offers distractions that inhibit social change. Such restrictions and inducements are exemplary of the attempts to make work succumb to managerial regimes which are intended to maximise productivity and minimise waste, and to establish a division between ‘company time’ and ‘free time’. One does not have to be an industrial sociologist to know the efforts of Frederick W. Taylor, and the disciplines of “scientific management” in the early twentieth century which were based on the idea of making work more efficient, or of the workplace sociology scholarship from the 1950s that drew attention to the ways that office work can be monotonous or de-personalising (Friedmann; Mills; Whyte). Historian JoAnne Yates has documented the ways those transformations, and what she calls an accompanying “philosophy of system and efficiency,” have been made possible through information and communication technologies, from the typewriter to carbon paper (107). Yates evokes the work of James Carey in identifying these developments, for example, the locating of workers in orderly locations such as offices, as spatial in nature. The changing meaning of work, particularly white-collar or bureaucratic labour in an age of precarious employment and neo-liberal economic regimes, and aggressive administrative “auditing technologies,” has subjected employees to more strenuous regimes of surveillance to ensure employee compliance and to protect against waste of company resources (Power). As Andrew Ross notes, after a deep period of self-criticism over the drudgery of work in North American settings in the 1960s, the subsequent years saw a re-thinking of the meaning of work, one that gradually traded greater work flexibility and self-management for more assertive forms of workplace control (9). As Ross notes, this too has changed, an after-effect of “the shareholder revolution,” which forced companies to deliver short-term profitability to its investors at any social cost. With so much at stake, Ross explains, the freedom of employees assumed a lower priority within corporate cultures, and “the introduction of information technologies in the workplace of the new capitalism resulted in the intensified surveillance of employees” (12). Others, like Dale Bradley, have drawn attention to the ways that the design of the office itself has always concerned itself with the bureaucratic and disciplinary control of bodies in space (77). The move away from physical workspaces such as ‘the pen’ to the cubicle and now from the cubicle to the virtual office is for Bradley a move from “construction” to “connection.” This spatial shift in the way in which control over employees is exercised is symbolic of the liquid forms in which bodies are now “integrated with flows of money, culture, knowledge, and power” in the post-industrial global economies of the twenty-first century. As Christena Nippert-Eng points out, receiving office space was seen as a marker of trust, since it provided employees with a sense of privacy to carry out affairs—both of a professional or of a personal matter—out of earshot of others. Privacy means a lot of things, she points out, including “a relative lack of accountability for our immediate whereabouts and actions” (163). Yet those same modalities of control which characterise communication technologies in workspaces may also serve as the platforms for people to waste time while working. In other words, wasteful practices utilize the same technology that is used to regulate and manage time spent in the workplace. The telephone has permitted efficient communication between units in an office building or between the office and outside, but ‘personal business’ can also be conducted on the same line. Radio stations offer ‘easy listening’ formats, providing unobtrusive music so as not to disturb work settings. However, they can easily be tuned to other stations for breaking news, live sports events, or other matters having to do with the outside world. Photocopiers and fax machines facilitate the reproduction and dissemination of communication regardless of whether it is it work or non-work related. The same, of course, is true for computerised applications. Companies may encourage their employees to use Facebook or Twitter to reach out to potential clients or customers, but those same applications may be used for personal social networking as well. Since the activities of work and play can now be found on the same platform, employers routinely remind their employees that their surfing activities, along with their e-mails and company documents, will be recorded on the company server, itself subject to auditing and review whenever the company sees fit. Employees must be careful to practice image management, in order to ensure that contradictory evidence does not appear online when they call in sick to the office. Over time the dynamics of e-mail and Internet etiquette have changed in response to such developments. Those most aware of the distractive and professionally destructive features of downloading a funny or comedic e-mail attachment have come to adopt the acronym “NSFW” (Not Safe for Work). Even those of us who don’t worry about those things are well aware that the cache and “history” function of web browsers threaten to reveal the extent to which our time online is spent in unproductive ways. Many companies and public institutions, for example libraries, have taken things one step further by filtering out access to websites that may be peripheral to the primary work at hand.At the same time contemporary workplace settings have sought to mix both work and play, or better yet to use play in the service of work, to make “work” more enjoyable for its workers. Professional development seminars, team-building exercises, company softball games, or group outings are examples intended to build morale and loyalty to the company among workers. Some companies offer their employees access to gyms, to game rooms, and to big screen TVs, in return for long and arduous—indeed, punishing—hours of time at the office (Dyer-Witheford and Sherman; Ross). In this manner, acts of not working are reconfigured as a form of work, or at least as a productive experience for the company at large. Such perks are offered with an assumption of personal self-discipline, a feature of what Nippert-Eng characterises as the “discretionary workplace” (154). Of course, this also comes with an expectation that workers will stay close to the office, and to their work. As Sarah Sharma recently argued in this journal, such thinking is part of the way that late capitalism constructs “innovative ways to control people’s time and regulate their movement in space.” At the same time, however, there are plenty of moments of gentle resistance, in which the same machines of control and depersonalisation can be customised, and where individual expressions find their own platforms. A photo essay by Anna McCarthy in the Journal of Visual Culture records the inspirational messages and other personalised objects with which workers adorn their computers and work stations. McCarthy’s photographs represent the way people express themselves in relation to their work, making it a “place where workplace politics and power relations play out, often quite visibly” (McCarthy 214). Screen SecretsIf McCarthy’s photo essay illustrates the overt ways in which people bring personal expression or gentle resistance to anodyne workplaces, there are also a series of other ‘screen acts’ that create opportunities to waste time in ways that are disguised as work. During the Olympics and US college basketball playoffs, both American broadcast networks CBS and NBC offered a “boss button,” a graphic link that a user could immediately click “if the boss was coming by” that transformed the screen to something was associated with the culture of work, such as a spreadsheet. Other purveyors of networked time-wasting make use of the spreadsheet to mask distraction. The website cantyouseeimbored turns a spreadsheet into a game of “Breakout!” while other sites, like Spreadtweet, convert your Twitter updates into the form of a spreadsheet. Such boss buttons and screen interfaces that mimic work are the presentday avatars of the “panic button,” a graphic image found at the bottom of websites back in the days of Web 1.0. A click of the panic button transported users away from an offending website and towards something more legitimate, like Yahoo! Even if it is unlikely that boss keys actually convince one’s superiors that one is really working—clicking to a spreadsheet only makes sense for a worker who might be expected to be working on those kinds of documents—they are an index of how notions of personal space and privacy play out in the digitalised workplace. David Kiely, an employee at an Australian investment bank, experienced this first hand when he opened an e-mail attachment sent to him by his co-workers featuring a scantily-clad model (Cuneo and Barrett). Unfortunately for Kiely, at the time he opened the attachment his computer screen was visible in the background of a network television interview with another of the bank’s employees. Kiely’s inauspicious click (which made his the subject of an investigation by his employees) continues to circulate on the Internet, and it spawned a number of articles highlighting the precarious nature of work in a digitalised environment where what might seem to be private can suddenly become very public, and thus able to be disseminated without restraint. At the same time, the public appetite for Kiely’s story indicates that not working at work, and using the Internet to do it, represents a mode of media consumption that is familiar to many of us, even if it is only the servers on the company computer that can account for how much time we spend doing it. Community attitudes towards time spent unproductively online reminds us that waste carries with it a range of negative signifiers. We talk about wasting time in terms of theft, “stealing time,” or even more dramatically as “killing time.” The popular construction of television as the “boob tube” distinguishes it from more ‘productive’ activities, like spending time with family, or exercise, or involvement in one’s community. The message is simple: life is too short to be “wasted” on such ephemera. If this kind of language is less familiar in the digital age, the discourse of ‘distraction’ is more prevalent. Yet, instead of judging distraction a negative symptom of the digital age, perhaps we should reinterpret wasting time as the worker’s attempt to assert some agency in an increasingly controlled workplace. ReferencesBasso, Pietro. Modern Times, Ancient Hours: Working Lives in the Twenty-First Century. London: Verso, 2003. Bolter, Jay David, and Richard Grusin. Remediation: Understanding New Media. Cambridge: MIT Press, 2000.Bradley, Dale. “Dimensions Vary: Technology, Space, and Power in the 20th Century Office”. Topia 11 (2004): 67-82.Casciato, Paul. “Facebook and Other Social Media Cost UK Billions”. Washington Post, 5 Aug. 2010. 11 Aug. 2010 ‹http://www.washingtonpost.com/wp-dyn/content/article/2010/08/05/AR2010080503951.html›.Cuneo, Clementine, and David Barrett. “Was Banker Set Up Over Saucy Miranda”. The Daily Telegraph 4 Feb. 2010. 21 May 2010 ‹http://www.dailytelegraph.com.au/entertainment/sydney-confidential/was-banker-set-up-over-saucy-miranda/story-e6frewz0-1225826576571›.De Certeau, Michel. The Practice of Everyday Life. Vol. 1. Berkeley: U of California P. 1988.Dyer-Witheford, Nick, and Zena Sharman. "The Political Economy of Canada's Video and Computer Game Industry”. Canadian Journal of Communication 30.2 (2005). 1 May 2010 ‹http://www.cjc-online.ca/index.php/journal/article/view/1575/1728›.Friedmann, Georges. Industrial Society. Glencoe, Ill.: Free Press, 1955.Kracauer, Siegfried. The Salaried Masses. London: Verso, 1998.McCarthy, Anna. Ambient Television. Durham: Duke UP, 2001. ———. “Geekospheres: Visual Culture and Material Culture at Work”. Journal of Visual Culture 3 (2004): 213-21.Mills, C. Wright. White Collar. Oxford: Oxford UP, 1951. Murray, Nicholas. Kafka: A Biography. New Haven: Yale UP, 2004.Newman, Michael. “Ze Frank and the Poetics of Web Video”. First Monday 13.5 (2008). 1 Aug. 2010 ‹http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2102/1962›.Nippert-Eng, Christena. Home and Work: Negotiating Boundaries through Everyday Life. Chicago: U. of Chicago P, 1996.Power, Michael. The Audit Society. Oxford: Oxford UP, 1997. Ross, Andrew. No Collar: The Humane Workplace and Its Hidden Costs. Philadelphia: Temple UP, 2004. Sharma, Sarah. “The Great American Staycation and the Risk of Stillness”. M/C Journal 12.1 (2009). 11 May 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/122›. Straw, Will. “Embedded Memories”. Residual Media Ed. Charles Acland. U. of Minnesota P., 2007. 3-15.Whyte, William. The Organisation Man. New York: Simon and Schuster, 1957. Wagman, Ira. “Log On, Goof Off, Look Up: Facebook and the Rhythms of Canadian Internet Use”. How Canadians Communicate III: Contexts for Popular Culture. Eds. Bart Beaty, Derek, Gloria Filax Briton, and Rebecca Sullivan. Athabasca: Athabasca UP 2009. 55-77. ‹http://www2.carleton.ca/jc/ccms/wp-content/ccms-files/02_Beaty_et_al-How_Canadians_Communicate.pdf›Yates, JoAnne. “Business Use of Information Technology during the Industrial Age”. A Nation Transformed by Information. Eds. Alfred D. Chandler & James W. Cortada. Oxford: Oxford UP., 2000. 107-36.
APA, Harvard, Vancouver, ISO, and other styles
23

Meese, James. "“It Belongs to the Internet”: Animal Images, Attribution Norms and the Politics of Amateur Media Production." M/C Journal 17, no. 2 (February 24, 2014). http://dx.doi.org/10.5204/mcj.782.

Full text
Abstract:
Cute pictures of animals feature as an inoffensive and adorable background to the contemporary online experience with cute content regularly shared on social media platforms. Indeed the demand for cuteness is so strong in the current cultural milieu that some animals become recognisable animal celebrities in the process (Hepola). However, despite the existence of this professionalisation in some sections of the cute economy, amateurs produce the majority of cute content that circulates online. This is largely because one of the central contributors to this steady stream of cute animal pictures is the subforum Aww, hosted on the online community Reddit. Aww is wholly dedicated to pictures of cute things and allows users to directly submit cute content directly to the site. Aww is one of the default subforums that new Reddit users are automatically subscribed to and is immensely popular, featuring over 4.2 million dedicated subscribers as well as untold casual visits. The section is self-described as: “Things that make you go AWW! -- like puppies, and bunnies, and so on...Feel free to post pictures, videos and stories of cute things” ("The cutest things on the internet!"). Users upload cute animal photos that they have taken and wait for the Reddit community to vote on their favourite pictures. The voting mechanism helps users to acknowledge their favourite posts, with the most popular featured on the front page of Aww (for a detailed critique of this process see van der Nagel 2013). The user-generated model of the site means that instead of visitors being confronted with a formally curated selection of cute animal photos, Aww offers a constantly changing mixture of amateur, semi-pro and professional content. Aww - and Reddit more generally - stand as an emblematic example of participatory culture (Jenkins 2006), with users playing an active role in the production and curation of online content. However, given the commercial nature of many user-generated content sites, this amateur media activity is becoming increasingly subject to intellectual property claims and conflicts (see Burgess; Kennedy). Across the internet there are growing tensions between website operators and amateur producers. As Jenny Kennedy (132) notes, while these platforms promote a public rhetoric of “sharing”, these corporate narratives “downplay their economic power” and imply “that they do not control the practices contained within their sites”. Subsequently, the expectations of users regarding how content is managed and organised can differ substantially from the corporate goals of social media companies. This paper contributes to the growing body of literature interested in the politics of amateur media production (see Hunter and Lastowka; Benkler; Burgess; Kennedy) by exploring the emergence of attribution norms and informal enforcement measures in and around the Aww online community. In contrast to professional content creators, amateurs often have fewer resources on hand to protect their copyrighted work and are also challenged by a pervasive online rhetoric that suggests that popular content essentially “belongs to the Internet” (Douglas). A number of communities on Reddit have questioned the company’s handling of amateur content with users suggesting that Reddit actively seeks to de-contextualise original content and not attribute original creators. By examining how amateur creators and online communities regulate content online, I interrogate the power relations that exist between social media platforms and users and explore how the corporate rhetoric of participatory culture interacts with the legal framework of copyright law. This article also contributes to existing legal scholarship on communities of practice and norms-based intellectual property systems. This literature has explored how social norms effectively regulate the protection of, among other things, recipes (Fauchart and Von Hippel), fashion design (Raustiala and Sprigman) and stand-up comedy routines (Oliar and Sprigman), in situations where copyright law does not function as an effective regulatory mechanism. Often these norms are in line with copyright law protections, but in other cases they diverge from these legal principles. In this paper I suggest that particular sections of Reddit function in a similar way, with their own set of self-governing norms, and that these norms largely align with the philosophical aims of copyright law. The paper begins by outlining a series of recent debates that have occurred between amateur media creators and Reddit, before exploring how norms are regulated on Reddit subforums Aww and Karma Court. I then offer some brief conclusions on the value of paying attention to how social norms structure forms of “sharing” (see Kennedy) and provide a useful way for amateur media producers to protect their content without going through formal legal processes. Introducing Reddit and the Confused Politics of Amateur Content Reddit is a social news site, a vibrant community and one of the most popular websites online. It stands as the most visible iteration of a long-standing tradition of user-generated and managed news, one that goes back to websites like Slashdot, which operated in the mid to late-90s. Founded in 2005 Reddit was launched after only one funding round of venture capital, receiving $100k in seed funding from Y Combinatory (Miller). Despite some early rivalry between Reddit and competitor site Digg, Reddit had enough potential to be purchased by Condé Nast for an estimated $20 million (Carr). Reddit’s audience numbers have grown exponentially in the last few years, with the site currently receiving over 5 billion page views and 114 million unique visitors per month (“About Reddit”). It has also changed focus significantly in the last few years with the site now “as much about posting interesting or funny pictures as it is about news” (Sepponen). Reddit hosts a number of individual subforums (called subreddits), which focus on a particular topic and function essentially like online bulletin boards. The front-page of Reddit showcases the most popular content from across the whole website, and user-generated content features heavily here. Amateur media cannot spread without the structural support of social media platforms, but this support is qualified in particular ways. Reddit stands as a paradigmatic case. Users on Reddit are “incentivized to submit direct links to images, because viewers can get to them more easily” (Douglas) and the website encourages amateur creators to use a preferred content server – Imgur – to host images. The Imgur service provides a direct public link to an image – even bypassing the Reddit discussion page – and with its free hosting and limited ads it has become a popular service and is used by most Reddit users (Slater-Robins). For the majority of Reddit users this is an unproblematic partnership. Imgur is free, effective and fast. However, a vocal minority of Reddit users and amateur creators claim that the partnership between Reddit and Imgur has created the equivalent of an online ghetto (Douglas).As Nick Douglas explains, when using services like Imgur there is no requirement to either provide an external link to a creators website or to attribute the creator, limiting the ability for an amateur creator to gain exposure. It also bypasses existing revenue streams that may have been set up by creators, including ad-supported websites or online stores offering merchandise. As a result creators have little opportunity to benefit either economically or reputationally from this system. This occurs to such an extent that “there are actually warnings against submitting your own [original] work” to particular subforums on Reddit (Douglas). For example, some forum moderators require submissions to either “link directly to a specific image file or to a website with minimal ads” (“Reddit Pics”). It is in this context, that the posting of original content without attribution is not actively policed. There are a number of complaints circulating within the Reddit community about these practices (see “Ok, look people. I know you heart Imgur, but webcomics? Just link to the freaking site”; “The problem with reddit”). Many creators have directly protested against this aspect of Reddit’s structural organisation. Blogger Benjamin Grelle (a.k.a The Frogman) and writer Chris Menning are two notable examples. Grelle’s protest was witty and dramatic. He wrote a blog post featuring a picture of an email he sent to Imgur offering the company a choice: send him a huge novelty check for $10,000 or alternatively, add a proper attribution system that allows artists, photographers and content creators to properly credit their work. Grelle estimates that his work generated around $20,000 in ad revenue for Imgur; however the structure of Reddit and Imgur meant he earned little income from the “viral” success of his content. Grelle claimed he was happy for his work to be shared, but attribution meant that it was more likely a fan would follow the link to his website and provide him with some financial recompense for his work. Unsurprisingly, Grelle didn’t receive a paycheck and so in response has developed a unique way to gain exposure. He has started to insert himself into his work, “[s]o when you see a stolen Frogman piece, you still see Ben Grelle’s face” (Douglas). Chris Menning posted a blog about being banned from Reddit, hoping to bring to light some of the inequalities that persist around Reddit’s current structure. He began by noting that he had received a significant amount of traffic from them in the past. He had responded in kind by looking to create original content for particular subforums, knowing what a particular community would enjoy. However, his habit of providing the link to his own website along with the content he posted saw him get labelled as a spammer and banned by administrators. Menning chose not to fight the ban:It seems that the only way I could avoid [getting banned] is if I were to relinquish any rights to my original content and post it exclusively to Imgur. In effect, reddit punishes the creation of original content, and rewards content theft (Menning). Instead he decided to quit Reddit, claiming that Reddit’s approach would carry long-term consequences as the platform provided little incentive for creators to produce wholly original content. It is worth noting that neither Menning nor Grelle turned to legal avenues in order to gain financial restitution. Considering the nature of the practices they were complaining about, compensation in the form of an injunction or damages would have certainly been possible. In Benjamin’s case, a user had combined a number of his copyrighted works into one image and posted the image to Imgur without attribution --this infringed Grelle’s copyright in his work as well as his moral right to be attributed as the creator of the work. However, the public comments of both creators suggest that despite the possibility of legal success, their issue was not so much to do with their individual cases but rather the broader structural issues at play within Reddit. While they might gain individually from a successful legal challenge, over the long term Reddit would continue to be a fraught place for amateur and semi-professional content creators. Certain parts of the Reddit community appear to be sympathetic to these issues, and the complaints of dissenting users like Menning and Grelle have received active support from some users and moderators on the site. This has led to changes in the way content is being posted and managed on Aww, and has also driven the emergence of a satirical user-run court entitled Karma Court. In these spaces moderators and members establish community norms, regularly police the correct attribution of works and challenge the de-contextualisation of content overtly encouraged by Reddit, Imgur and other subforums. In the following section I will examine both Aww and Karma Court in order to explore how these norms are established and negotiated by both moderators and users alike. reddit.com/r/aww: The Online Hub of Cute Animal Pictures As we have seen, the design of Reddit and Imgur creates a number of problems for amateur creators who wish to protect their intellectual property. To address these shortcomings, the Aww community has created its own informal regulatory systems. Volunteer moderators play a crucial role: they establish informal codes of conduct for the Aww community and enforce various rules about how the site should be used. One of these rules relates to attribution. Users are asked to to “post original content whenever possible or attribute original content creators” ("The cutest things on the internet!"). Due to the volunteer nature of the work and the size of the Aww sub-reddit, moderator enforcement is haphazard. Consequently, responsibility falls on the wider user community to self-police. Despite its informal nature, this process manages to facilitate a fairly consistent standard of attribution. In this way it functions as an informal method of intellectual property protection. It is worth noting however that this commitment to original content is not solely due to the moral character of Aww users. A significant motivation is the distribution of karma points amongst Reddit users. Karma, which represents your good standing within the Reddit community, can be earned through user likes and votes – these push the most popular content to the front page of each subforum. Thus karma stands as a numerical representation of a user’s value to Reddit. This ostensibly democratic system has the paradoxical effect of fuelling intellectual property violations on the site. Users often repost other users’ jpegs, animated gifs, and other content, in order to reap the social and cultural capital that comes with posting a popular picture. In some cases they claim authorship of the content; in other cases they simply re-post content that they feel “belongs to the internet” (Douglas). Some content is so popular or pervasive online (this content that is often described as “viral”) that users feel there is little reason or need to attribute content. This helps to explain the persistence of ownership and attribution conflicts on Reddit. In the eyes of some users and moderators the management of these rights and the correct distribution of karma are seen to be vital to the long-term functioning of site. The karma system offers a numerical representation of each contributor’s value. Re-posting already successful content and claiming it as your own challenges the proper functioning of the karma system and potentially ‘inhibits the innovative potential of contributions (Richterich). On Aww the re-posting of original content is viewed as a taboo act that breaches these norms. The poster is seen to have engaged in deceptive conduct in order to gain karma for their user profile. In addition there is a strong ethic that runs through these comment threads that the original creator deserves attribution. There is a presumption that this attribution is vital in order to increasing the possible marketability of the posted content and to recognise and courage creators within the community. This sort of community-driven regulation contrasts with the aforementioned site design of Reddit and Imgur, which frustrates effective authorship attribution practices. Aww users, in contrast, have shown a willingness to defend what they see as the intellectual property rights of content creators.A series of recent examples outline how this process works in practice. User “moonlikeme123” posted a picture of a cat with its hands on the steering wheel of a car. The picture was entitled “we don’t need to ask for directions, Helen”. During the same day, three separate users had identified the picture as a repost, with one noting that the same picture was already on the front page of Aww. “moonlikeme123” received no karma points for the picture. In a second example, the user “nibblur” posted a photo of a kitten “hunting” a toy mouse. Within a day, one enterprising user had identified the original photographer – “torode”, an amateur photographer – and linked to his Reddit profile (see fig. 2) ("ferocious cat hunting its prey: aww."). One further example: on 15 July 2013 “Cuzacelmare” posted a picture of two dogs comforting each other – an image which had originally been posted by “lauface”. Again, users were quick to point out the lack of attribution and the attempt to claim someone else’s content as their own (“Comforting her sister during a storm: aww). It is worth noting that some Reddit users consider attributing content to be entirely without benefit. Some deride karma as “meaningless” and suggest that as a significant amount of content online is regularly reposted elsewhere, there is little harm done in re-posting what is essentially amateur content destined to be lost in the bowels of the internet. For example, the comments that follow Cuzacelmare’s reflect an ambivalence about reposting, suggesting that users weigh up the benefits of exposure gained by the re-posting against the lack of attribution granted and the increasingly decontextualized nature of the photo itself:Why does everyone get so bitchy about reposts. Not everyone is on ALL the time or has been on Rreddit since it was created. I mean if you've seen it already ignore it. It's just picture you aren't forced to click the link. [sic] (“Comforting her sister during a storm: aww”)We're arguing semantics, but any content that gets attention can benefit the creator, whether it's reddit or Youtube (“Comforting her sister during a storm: aww”) Such discussions are common on comment threads following re-posts by other users. They underline the conflicted status of this ephemeral media and the underlying frictions that are part of these processes. These discussions underline the fact that on Reddit the “sharing” (Kennedy) and “spreading” (Jenkins et al.) of content is not seen as an unquestioned positive but rather as a contestable structural feature that needs to be constantly negotiated and discussed. These informal methods of identification, post-hoc attribution and criticism in comment threads have been the long-standing method used to redress questions of attribution and ownership of content on Reddit. However in recent times, Reddit users have turned to satirical methods of formal adjudication for particularly egregious cases. A sub-reddit, Karma Court, now functions as an informal tribunal in which punishment is meted out for “the abuse of karma and general contemptible actions heretofore identified as wrongdoing” (“Constitution and F.A.Q of the Karma Court”). Due to its double function as both an adjudicator and satire of users overly-invested in online debates, there is no limit to the possible “crimes” a user may be charged with. The following charges are only presented as guidelines and speak to common negative experiences on online: (1). Douchebaggery - When one is being a douche.(2). Defamation - Tarnishing another redditor's [user’s] username.(3). Public Indecency - When a user flexes his or her 'e-peen' with the intent to shame other users.(4). OhShit.exe - Intentional reposting that results in reddit Gold.(5). GrandTheft.jpg - Reposting while claiming credit for the post.(6). Obstruction of Justice - Impeding or interfering with an investigation, such as submitting false screenshots, deleting evidence, or providing false evidence to the court.(7). Other - Literally anything else you want. We like creative names for charges.(“Constitution and F.A.Q of the Karma Court”) In Karma Court, legal representation can be sourced from a list of attorneys and judges, populated by users who volunteer to help adjudicate the case. They are required to have been a Reddit member for over six months. The only punishment is a public shaming. Interestingly Karma Court has developed a fair reposting clause that attempts to manage the complex debates around reposting and attribution. Under the non-binding satirical clause, users are able to repost content if it has not featured on the front page of a sub-reddit for seven or more days, if the re-poster acknowledges in the title or description that they are re-posting or if the original poster has less than 30,000 link karma (which means that the original poster has not substantially contributed to the Reddit community). If a re-poster does not adhere by these rules and claims a re-post as their own original content (or “OC”), they can be charged with “grandtheft.jpg” and brought to trial by another Reddit user. As one of the most popular subforums, a number of cases have emerged from Aww. The aforementioned re-poster “Cuzacelmare” (“I am bringing /U/ Cuzacelmare to trial …”) was “charged” through this process and served with a summons after denying “cute and innocent animals of that subreddit of their much deserved karma”. Similar cases to do with re-posting without attribution on Aww involve “FreshCorio” (“Reddit vs. U/FreshCorio …”) and “ninjacollin” (“People of Reddit vs. /U/ ninjacollin”) who were also brought to karma court. In each case prosecutors were adamant that false authorship claims needed to be punished. With these mock trials run by volunteers it takes time for arguments to be heard and judgment to occur; however “ninjacollin” expedited the legal process by offering a full confession. As a new user, “ninjacollin” was reprimanded severely for his actions and the users on Karma Court underlined the consequences of not identifying original content creators when re-posting content. Ownership and Attribution: Amateur Media, Distribution and Law The practices outlined above offer a number of alternate ways to think about amateur media and how it is distributed. An increasingly complex picture of content attribution and circulation emerges once we take into account the structural operation of Reddit, the intellectual property norms of users, and the various formal and informal systems of regulation that are appearing on the site. Such practices require users to negotiate complex questions of ownership between each other and in relation to corporate bodies. These negotiations often lead to informal agreements around a set of norms to regulate the spread of content within a particular community, suggesting that the lack of a formal legal process in these debates does not mean that there is an absence of regulation. As noted throughout this paper, the spread of online content often involves progressive de-contextualisation. Website design features often support this process in the hopes of encouraging content to spread in a fashion amenable to their corporate goals. Considering this tendency for content to be decontextualized online, the presence of attribution norms on subforums like Aww is significant. Instead of remixing, spreading and re-purposing content indiscriminately, users retain a concept of ownership and attribution that tracks closely to the basic principles of copyright law. Rather than users radically redefining concepts of attribution and ownership, as prefigured in some of the more utopian accounts of participatory media, the dominant norms of the Reddit community extend a discourse of copyright and ownership. As well as providing a greater level of detail to contemporary debates around amateur media and its viral or spreadable nature (Burgess; Jenkins; Jenkins et al), this analysis offers some lessons for copyright law. The emergence of norms in particular Reddit subforums which govern the use of copyrighted content and the use of a mock court structure suggests that online communities have the capacity to engage in forms of redress for amateur creators. These organic forms of copyright management operate adjacent to formal legal structures of copyright law. However, they are more accessible and practical for amateur creators, who do not always have the money to hire lawyers, especially when the market value of their content might be negligible. The informal regulatory systems outlined above may not operate perfectly but they reveal communities who are willing to engage foundational conversations around the importance of attribution and ownership. Following the existing literature (Fauchart and Von Hippel; Raustiala and Sprigman; Schultz; Oliar and Sprigman), I suggest that these online social norms provide a useful form of alternative protection for amateur creators. Acknowledgements Thanks to Ramon Lobato and Emily van der Nagel for comments and productive discussions around these issues. I am also grateful to the two anonymous peer reviewers for their assistance in developing this argument. References “About Reddit.” Reddit, 2014. 29 Apr. 2014 ‹http://www.reddit.com/about/›. Benkler, Yochai. The Wealth of Networks: How Social Production Transforms Markets and Freedom. New Haven: Yale University Press, 2006. Burgess, Jean. “YouTube and the Formalisation of Amateur Media.” Amateur Media: Social, Cultural and Legal Perspectives. In Dan Hunter, Ramon Lobato, Megan Richardson, and Julian Thomas, eds. Oxford: Routledge, 2012. Carr, Nicholas. “Left Alone by Its Owner, Reddit Soars.” The New York Times: Business, 2 Sep. 2012. “Comforting Her Sister during a Storm: aww.” reddit: the front page of the internet, 15 July 2013. “Constitution and F.A.Q of the Karma Court.” reddit: the front page of the internet, 2014. Douglas, Nick. “Everything on the Internet Gets Stolen: Here’s How You Should Feel about That.” Slacktory, 8 Sep. 2009. Fauchart, Emmanual, and Eric von Hippel. “Norms-Based Intellectual Property Systems: The Case of French Chefs.” Organization Science 19.2 (2008): 187 - 201 "Ferocious Cat Hunting Its Prey: aww." reddit: the front page of the internet, 4 April 2013. 29 Apr. 2014 ‹http://www.rreddit.com/r/aww/comments/1bobcp/ferocious_cat_hunting_its_prey/›. Hepola, Sarah. “The Internet is Made of Kittens.” Salon.com, 11 Feb. 2009. 29 Apr. 2014 ‹http://www.salon.com/2009/02/10/cat_internet/›. Hunter, Dan, and Greg Lastowka. “Amateur-to-Amateur.” William & Mary Law Review 46 (2004): 951 - 1030. “I Am Bringing /U/ Cuzacelmare to Trial on the Basis of Being One of the Biggest _______ I’ve Ever Seen, by Reposting Cute Animal Pictures to /R/Awww. Feels.Jpg.” reddit: the front page of the internet, 21 March 2013. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York University Press, 2006. Jenkins, Henry, Sam Ford, and Joshua Green. Spreadable Media: Creating Value and Meaning in a Networked Culture. New York: New York University Press, 2013. Menning, Chris. "So I Got Banned from Reddit" Modern Primate, 23 Aug. 2012. Miller, Keery. “How Y Combinator Helped Shape Reddit.” Bloomberg Businessweek, 26 Sep. 2007. 29 Apr. 2014 ‹http://www.businessweek.com/stories/2007-09-26/how-y-combinator-helped-shape-redditbusinessweek-business-news-stock-market-and-financial-advice›. “Ok, Look People. I Know You Heart Imgur, But Webcomics? Just Link to the Freaking Site.” reddit: the front page of the internet, 22 Aug. 2011. Oliar, Dotan, and Christopher Sprigman. “There’s No Free Laugh (Anymore): The Emergence of Intellectual Property Norms and the Transformation of Stand-Up Comedy.” Virginia Law Review 94.8 (2009): 1787 – 1867. “People of reddit vs. /U/Ninjacollin for Grandtheft.jpg.” reddit: the front page of the internet, 30 Jan. 2013. Raustiala, Kal, and Christopher Sprigman. “The Piracy Paradox: Innovation and Intellectual Property in Fashion Design”. Virginia Law Review 92.8 (2006): 1687-1777. “Reddit v. U/FreshCorio. User Uploads Popular Repost Picture of R/AWW and Claims It Is His Sister’s Cat. Falsely Claims It Is His Cakeday for Good Measure.” reddit: the front page of the internet, 12 Apr. 2013. 29 Apr. 2014 ‹http://www.reddit.com/r/KarmaCourt/comments/1c7vxz/reddit_vs_ufreshcorio_user_uploads_popular_repost/›. “Reddit Pics.” reddit: the front page of the internet, 2014. 29 Apr. 2014 ‹http://www.reddit.com/r/pics/›. Richterich, Annika. “’Karma, Precious Karma!’ Karmawhoring on Reddit and the Front Page’s Econometrisation.” Journal of Peer Production 4 (2014). 29 Apr. 2014 ‹http://peerproduction.net/issues/issue-4-value-and-currency/peer-reviewed-articles/karma-precious-karma/›. Schultz, Mark. “Fear and Norms and Rock & Roll: What Jambands Can Teach Us about Persuading People to Obey Copyright Law.” Berkley Technology Law Journal 21.2 (2006): 651 – 728. Sepponen, Bemmu. “Why Redditors Gave Imgur a Chance.” Social Media Today, 20 July 2011. Slater-Robins, Max. “From Rags to Riches: The Story of Imgur.” Neowin, 21 Apr. 2013. "The Cutest Things on the Internet!" reddit: the front page of the internet, n.d. “The Problem with reddit.” reddit: the front page of the internet, 23 Aug. 2012. 29 Apr. 2014 ‹http://www.rreddit.com/r/technology/comments/ypbe2/the_problem_with_rreddit/›. Van der Nagel, Emily. “Faceless Bodies: Negotiating Technological and Cultural Codes on reddit gonewild.” Scan: Journal of Media Arts Culture 10.2 (2013). "We Don’t Need to Ask for Directions, Helen: aww." reddit: the front page of the internet, 30 June 2013. 29 Apr. 2014 ‹http://www.rreddit.com/r/aww/comments/1heut6/we_dont_need_to_ask_for_directions_helen/›.
APA, Harvard, Vancouver, ISO, and other styles
24

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
25

Humphreys, Lee, and Thomas Barker. "Modernity and the Mobile Phone." M/C Journal 10, no. 1 (March 1, 2007). http://dx.doi.org/10.5204/mcj.2602.

Full text
Abstract:
Introduction As the country with the fifth largest population in the world, Indonesia is a massive potential market for mobile technology adoption and development. Despite an annual per capita income of only $1,280 USD (World Bank), there are 63 million mobile phone users in Indonesia (Suhartono, sec. 1.7) and it is predicted to reach 80 million in 2007 (Jakarta Post 1). Mobile phones are not only a symbol of Indonesian modernity (Barendregt 5), but like other communication technology can become a platform through which to explore socio-political issues (Winner 28). In this article we explore the role mobile phone technology in contemporary forms of social, intimate, and sexual relationships in Indonesia. We argue that new forms of expression and relations are facilitated by the particular features of mobile technology. We discuss two cases from contemporary Indonesia: a mobile dating service (BEDD) and mobile phone pornography. For each case study, we first discuss the socio-political background in Indonesia, then describe the technological affordances of the mobile phone which facilitate dating and pornography, and finally give examples of how the mobile phone is effecting change in dating and pornographic practices. This study is placed at a time when social relations, intimacy, and sexuality in Indonesia have become central public issues. Since the end of the New Order whilst many people have embraced the new freedoms of reformasi and democratization, there is also a high degree of social anxiety, tension and uncertainty (Juliastuti 139-40). These social changes and desires have played out in the formations of new and exciting modes of creativity, solidarity, and sociality (Heryanto and Hadiz 262) and equally violence, terror and criminality (Heryanto and Hadiz 256). The diverse and plural nature of Indonesian society is alive with a myriad of people and activities, and it is into this diverse social body that the mobile phone has become a central and prominent feature of interaction. The focus of our study is dating and pornography as mediated by the mobile phone; however, we do not suggest that these are new experiences in Indonesia. Rather over the last decade social, intimate, and sexual relationships have all been undergoing change and their motivations can be traced to a variety of sources including the factors of globalization, democratization and modernization. Throughout Asia “new media have become a crucial site for constituting new Asian sexual identities and communities” (Berry, Martin, and Yue 13) as people are connecting through new communication technologies. In this article we suggest that mobile phone technology opens new possibilities and introduces new channels, dynamics, and intensities of social interaction. Mobile phones are particularly powerful communication tools because of their mobility, accessibility, and convergence (Ling 16-19; Ito 14-15; Katz and Aakhus 303). These characteristics of mobile phones do not in and of themselves bring about any particular changes in dating and pornography, but they may facilitate changes already underway (Barendegt 7-9; Barker 9). Mobile Dating Background The majority of Indonesians in the 1960s and 1970s had arranged marriages (Smith-Hefner 443). Education reform during the 70s and 80s encouraged more women to attain an education which in turn led to the delaying of marriage and the changing of courtship practices (Smith-Hefner 450). “Compared to previous generations, [younger Indonesians] are freer to mix with the opposite sex and to choose their own marriage,” (Utomo 225). Modern courtship in Java is characterized by “self-initiated romance” and dating (Smith-Hefner 451). Mobile technology is beginning to play a role in initiating romance between young Indonesians. Technology One mobile matching or dating service available in Indonesia is called BEDD (www.bedd.com). BEDD is a free software for mobile phones in which users fill out a profile about themselves and can meet BEDD members who are within 20-30 feet using a Bluetooth connection on their mobile devices. BEDD members’ phones automatically exchange profile information so that users can easily meet new people who match their profile requests. BEDD calls itself mobile social networking community; “BEDD is a new Bluetooth enabled mobile social medium that allows people to meet, interact and communicate in a new way by letting their mobile phones do all the work as they go throughout their day.” As part of a larger project on mobile social networking (Humphreys 6), a field study was conducted of BEDD users in Jakarta, Indonesia and Singapore (where BEDD is based) in early 2006. In-depth interviews and open-ended user surveys were conducted with users, BEDD’s CEO and strategic partners in order to understand the social uses and effects BEDD. The majority of BEDD members (which topped 100,000 in January 2006) are in Indonesia thanks to a partnership with Nokia where BEDD came pre-installed on several phone models. In management interviews, both BEDD and Nokia explained that they partnered because both companies want to help “build community”. They felt that Bluetooth technology such as BEDD could be used to help youth meet new people and keep in touch with old friends. Examples One of BEDD’s functions is to help lower barriers to social interaction in public spaces. By sharing profile information and allowing for free text messaging, BEDD can facilitate conversations between BEDD members. According to users, mediating the initial conversation also helps to alleviate social anxiety, which often accompanies meeting new people. While social mingling and hanging out between Jakarta teenagers is a relatively common practice, one user said that BEDD provides a new and fun way to meet and flirt. In a society that must balance between an “idealized morality” and an increasingly sexualized popular culture (Utomo 226), BEDD provides a modern mode of self-initiated matchmaking. While BEDD was originally intended to aid in the matchmaking process of dating, it has been appropriated into everyday life in Indonesia because of its interpretive flexibility (Pinch & Bjiker 27). Though BEDD is certainly used to meet “beautiful girls” (according to one Indonesian male user), it is also commonly used to text message old friends. One member said he uses BEDD to text his friends in class when the lecture gets boring. BEDD appears to be a helpful modern communication tool when people are physically proximate but cannot easily talk to one another. BEDD can become a covert way to exchange messages with people nearby for free. Another potential explanation for BEDD’s increasing popularity is its ability to allow users to have private conversations in public space. Bennett notes that courtship in private spaces is seen as dangerous because it may lead to sexual impropriety (154). Dating and courtship in public spaces are seen as safer, particularly for conserving the reputation young Indonesian women. Therefore Bluetooth connections via mobile technologies can be a tool to make private social connections between young men and women “safer”. Bluetooth communication via mobile phones has also become prevalent in more conservative Muslim societies (Sullivan, par. 7; Braude, par. 3). There are, however, safety concerns about meeting strangers in public spaces. When asked, “What advice would you give a first time BEDD user?” one respondent answered, “harus bisa mnilai seseorang krn itu sangat penting, kita mnilai seseorang bukan cuma dari luarnya” (translated: be careful in evaluating (new) people, and don’t ever judge the book by its cover”). Nevertheless, only one person participating in this study mentioned this concern. To some degree meeting someone in a public may be safer than meeting someone in an online environment. Not only are there other people around in public spaces to physically observe, but co-location means there may be some accountability for how BEDD members present themselves. The development and adoption of matchmaking services such as BEDD suggests that the role of the mobile phone in Indonesia is not just to communicate with friends and family but to act as a modern social networking tool as well. For young Indonesians BEDD can facilitate the transfer of social information so as to encourage the development of new social ties. That said, there is still debate about exactly whom BEDD is connecting and for what purposes. On one hand, BEDD could help build community in Indonesia. One the other hand, because of its privacy it could become a tool for more promiscuous activities (Bennett 154-5). There are user profiles to suggest that people are using BEDD for both purposes. For example, note what four young women in Jakarta wrote in the BEDD profiles: Personal Description Looking For I am a good prayer, recite the holy book, love saving (money), love cycling… and a bit narcist. Meaning of life Ordinary gurl, good student, single, Owen lover, and the rest is up to you to judge. Phrenz ?! Peace?! Wondeful life! I am talkative, have no patience but so sweet. I am so girly, narcist, shy and love cute guys. Check my fs (Friendster) account if you’re so curious. Well, I am just an ordinary girl tho. Anybody who wants to know me. A boy friend would be welcomed. Play Station addict—can’t live without it! I am a rebel, love rock, love hiphop, naughty, if you want proof dial 081********* phrenz n cute guyz As these profiles suggest, the technology can be used to send different kinds of messages. The mobile phone and the BEDD software merely facilitate the process of social exchange, but what Indonesians use it for is up to them. Thus BEDD and the mobile phone become tools through which Indonesians can explore their identities. BEDD can be used in a variety of social and communicative contexts to allow users to explore their modern, social freedoms. Mobile Pornography Background Mobile phone pornography builds on a long tradition of pornography and sexually explicit material in Indonesia through the use of a new technology for an old art and product. Indonesia has a rich sexual history with a documented and prevalent sex industry (Suryakusuma 115). Lesmana suggests that the country has a tenuous pornographic industry prone to censorship and nationalist politics intent on its destruction. Since the end of the New Order and opening of press freedoms there has been a proliferation in published material including a mushrooming of tabloids, men’s magazines such as FHM, Maxim and Playboy, which are often regarded as pornographic. This is attributed to the decline of the power of the bureaucracy and government and the new role of capital in the formation of culture (Chua 16). There is a parallel pornography industry, however, that is more amateur, local, and homemade (Barker 6). It is into this range of material that mobile phone pornography falls. Amongst the myriad forms of pornography and sexually explicit material available in Indonesia, the mobile phone in recent years has emerged as a new platform for production, distribution, and consumption. This section will not deal with the ethics of representation nor engage with the debate about definitions and the rights and wrongs of pornography. Instead what will be shown is how the mobile phone can be and has been used as an instrument/medium for the production and consumption of pornography within contemporary social relationships. Technology There are several technological features of the mobile phone that make pornography possible. As has already been noted the mobile phone has had a large adoption rate in Indonesia, and increasingly these phones come equipped with cameras and the ability to send data via MMS and Bluetooth. Coupled with the mobility of the phone, the convergence of technology in the mobile phone makes it possible for pornography to be produced and consumed in a different way than what has been possible before. It is only recently that the mobile phone has been marketed as a video camera with the release of the Nokia N90; however, quality and recording time are severely limited. Still, the mobile phone is a convenient and at-hand tool for the production and consumption of individually made, local, and non-professional pieces of porn, sex and sexuality. It is impossible to know how many such films are in circulation. A number of websites that offer these films for downloads host between 50 and 100 clips in .3gp file format, with probably more in actual circulation. At the very least, this is a tenfold increase in number compared to the recent emergence of non-professional VCD films (Barker 3). This must in part be attributed to the advantages that the mobile phone has over standard video cameras including cost, mobility, convergence, and the absence of intervening data processing and disc production. Examples There are various examples of mobile pornography in Indonesia. These range from the pornographic text message sent between lovers to the mobile phone video of explicit sexual acts (Barendregt 14-5). The mobile phone affords privacy for the production and exchange of pornographic messages and media. Because mobile devices are individually owned, however, pornographic material found on mobile phones can be directly tied to the individual owners. For example, police in Kotabaru inspected the phones of high school students in search of pornographic materials and arrested those individuals on whose phones it was found (Barendregt 18). Mobile phone pornography became a national political issue in 2006 when an explicit one-minute clip of a singer and an Indonesian politician became public. Videoed in 2004, the clip shows Maria Eva, a 27 year-old dangdut singer (see Browne, 25-6) and Yahya Zaini, a married 42 year-old who was head of religious affairs for the Golkar political party. Their three-year affair ended in 2005, but the film did not become public until 2006. It spread like wildfire between phones and across the internet, however, and put an otherwise secret relationship into the limelight. These types of affairs and relationships were common knowledge to people through gossip, exposes such as Jakarta Undercover (Emka 93-108) and stories in tabloids; yet this culture of adultery and prostitution continued and remained anonymous because of bureaucratic control of evidence and information (Suryakusuma 115). In this case, however, the filming of Maria Eva once public proves the identities of those involved and their infidelity. As a result of the scandal it was further revealed that Maria Eva had been forced by Yayha Zaini and his wife to have an abortion, deepening the moral crisis. Yahya Zaini later resigned as his party’s head of Religious Affairs (Asmarani, sec. 1-2), due to what was called the country’s “first real sex scandal” (Naughton, par. 2). As these examples show, there are definite risks and consequences involved in the production of mobile pornography. Even messages/media that are meant to be shared between two consenting individuals can eventually make their way into the public mobile realm and have serious consequences for those involved. Mobile video and photography does, however, represent a potential new check on the Indonesian bureaucratic elite which has not been previously available by other means such as a watchdog media. “The role of the press as a control mechanism is practically nonexistent [in Jakarta], which in effect protects corruption, nepotism, financial manipulation, social injustice, and repression, as well as the murky sexual life of the bureaucratic power elite,” (Suryakusuma 117). Thus while originally a mobile video may have been created for personal pleasure, through its mass dissemination via new media it can become a means of sousveillance (Mann, Nolan and Wellman 332-3) whereby the control of surveillance is flipped to reveal the often hidden abuses of power by officials. Whilst the debates over pornography in Indonesia tend to focus on the moral aspects of it, the broader social impacts of technology on relationships are often ignored. Issues related to power relations or even media as cultural expression are often disregarded as moral judgments cast a heavy shadow over discussions of locally produced Indonesian mobile pornography. It is possible to move beyond the moral critique of pornographic media to explore the social significance of its proliferation as a cultural product. Conclusion In these two case studies we have tried to show how the mobile phone in Indonesia has become a mode of interaction but also a platform through which to explore other current issues and debates related to dating, sexuality and media. Since 1998 and the fall of the New Order, Indonesia has been struggling with blending old and new, a desire of change and nostalgia for past, and popular desire for a “New Indonesia” (Heryanto, sec. Post-1998). Cultural products within Indonesia have played an important role in exploring these issues. The mobile phone in Indonesia is not just a technology, but also a product in and through which these desires are played out. Changes in dating and pornography practices have been occurring in Indonesia for some time. As people use mobile technology to produce, communicate, and consume, the device becomes intricately related to identity struggle and cultural production within Indonesia. It is important to keep in mind, however, that while mobile technology adoption within Indonesia is growing, it is still limited to a particular subset of the population. As has been previously observed (Barendregt 3), it is wealthier, young people in urban areas who are most intensely involved in mobile technology. As handset prices decrease and availability in rural areas increases, however, no longer will mobile technology be so demographically confined in Indonesia. The convergent technology of the mobile phone opens many possibilities for creative adoption and usage. As a communication device it allows for the creation, sharing, and viewing of messages. Therefore, the technology itself facilitates social connections and networking. As demonstrated in the cases of dating and pornography, the mobile phone is both a tool for meeting new people and disseminating sexual messages/media because it is a networked technology. The mobile phone is not fundamentally changing dating and pornography practices, but it is accelerating social and cultural trends already underway in Indonesia by facilitating the exchange and dissemination of messages and media. As these case studies show, what kinds of messages Indonesians choose to create and share are up to them. The same device can be used for relatively innocuous behavior as well as more controversial behavior. With increased adoption in Indonesia, the mobile will continue to be a lens through which to further explore modern socio-political issues. References Asmarani, Devi. “Indonesia: Top Golkar Official Quits over Sex Video.” The Straits Times 6 Dec. 2006. Barendregt, Bart. “Between M-Governance and Mobile Anarchies: Pornoaksi and the Fear of New Media in Present Day Indonesia.” European Association of Social Anthropologists Media Anthropology Network e-Seminar Series, 2006. Barker, Thomas. “VCD Pornography of Indonesia.” Asian Studies Association of Australia, Wollongong, 2006. BEDD Press Release. “World’s First Mobile Communities Software Is Bringing People Together in Singapore.” 8 June 2004. Bennett, Linda Rae. Women, Islam and Modernity: Single Women, Sexuality and Reproductive Health in Contemporary Indonesia. London: Routledge Curzon, 2005. Berry, Chris, Fran Martin, and Audrey Yue, eds. Mobile Cultures: New Media in Queer Asia. Durham, NC: Duke UP, 2003. Braude, Joseph. “How Bluetooth Helps Young Kuwaitis Get It On.” The New Republic Online 14 Sep. 2006. Browne, Susan. “The Gender Implications of Dangdut Kampungan: Indonesian ‘Low Class’ Popular Music.”* *Working Paper 109, Centre of Southeast Asian Studies, Monash University. 2000. Chua, Beng-Huat. “Consuming Asians: Ideas and Issues.” Consumption in Asia: Lifestyles and Identities. Ed. Beng-Huat Chua. London: Routledge, 2003. 1-34. Emka, Moammar. Jakarta Undercover: Sex n’ the City. Yogyakarta: Galang Press, 2002. Heryanto, Ariel. “New Media and Pop Cultures in(ter) Asia.” Soft Power and Spheres of Influence in South and Southeast Asia. National University of Singapore, 2006. Heryanto, Ariel, and Vedi Hadiz. “Post-Authoritarian Indonesia: A Comparative Southeast Asian Perspective.” Critical Asian Studies 37.2 (2005): 251-75. Humphreys, Lee. “Mobile Devices and Social Networking.” Mobile Pre-Conference at the International Communication Association. Erfurt, Germany, 2006. Ito, Mizuko. “Introduction: Personal, Portable, Pedestrian.” Personal, Portable, Pedestrian: Mobile Phones in Japanese Life. Eds. Mizuko Ito, Diasuke Okabe, and Misa Matsuda. Cambridge, MA: MIT Press, 2005. 1-16. JakartaPost.com. “Cell-Phone Users May Reach 80m This Year.” 6 Jan. 2006. http://www.thejakartapost.com/detailheadlines.asp? fileid=20070106.@02&irec=1>. Juliastuti, Nuraini. “Whatever I Want: Media and Youth in Indonesia before and after 1998.” Inter-Asia Cultural Studies 7 (2006): 1. Katz, James E., and Mark Aakhus, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. New York: Cambridge UP, 2002. Lesmana, Tjipta. Pornografi dalam Media Massa. Jakarta: Puspa Swara, 1994. Ling, Richard. The Mobile Connection: The Cell Phone’s Impact on Society. San Francisco, CA: Morgan Kaufmann, 2004. Mann, Steve, Jason Nolan, and Barry Wellman. “Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments.” Surveillance and Society 1.3 (2003): 331-55. Naughton, Philippe. “Video Sex Scandal Claims Indonesian MP.” The Times Online 8 Dec. 2006. Pinch, Trevor J., and Wiebe E. Bijker. “The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other.” The Social Construction of Technological Systems: New Direction in the Sociology and History of Technology. Eds. W. E. Bijker, T. P. Hughes and T.J. Pinch. Cambridge, MA: MIT Press, 1987. 17-51. Smith-Hefner, Nancy J. “The New Muslim Romance: Changing Patterns of Courtship and Marriage among Educated Javanese Youth.” Journal of Southeast Asian Studies 36.3 (2005): 441-59. Suhartono, Harry. “Mobile Penetration to Drive Market Leader’s Profit Gain.” Reuters News 27 Oct. 2006. Sullivan, Kevin. “Saudi Youth Use Cellphone Savvy to Outwit the Sentries of Romance.” The Washington Post 6 Aug. 2006: A01. Suryakusuma, Julia. “The State and Sexuality in New Order Indonesia.” Fantasizing the Feminine in Indonesia. Ed. Laurie J. Sears. Durham, NC: Duke UP, 1996. 92-119. Utomo, Iwu Dwisetyani. “Sexual Values and Early Experiences among Young People in Jakarta: Youth, Courtship and Sexuality.” Coming of Age in South and Southeast Asia. Eds. Lenore Manderson and Pranee Liamputtong. Surey: Curzon, 2002. 207-27. Winner, Langdon. “Do Artifacts Have Politics?” Social Shaping of Technology. 2nd ed. Eds. Donald MacKenzie and Judy Wajcman. Buckingham, UK: Open UP, 2002. 28-40. World Bank. 2004 Indonesia Data & Statistics. 4 Jan. 2006. http://web.worldbank.org/WBSITE/EXTERNAL/COUNTRIES/ EASTASIAPACIFICEXT/INDONESIAEXTN/0,,menuPK:287097~pagePK: 141132~piPK:141109~theSitePK:226309,00.html>. Citation reference for this article MLA Style Humphreys, Lee, and Thomas Barker. "Modernity and the Mobile Phone: Exploring Tensions about Dating and Sex in Indonesia." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/06-humphreys-barker.php>. APA Style Humphreys, L., and T. Barker. (Mar. 2007) "Modernity and the Mobile Phone: Exploring Tensions about Dating and Sex in Indonesia," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/06-humphreys-barker.php>.
APA, Harvard, Vancouver, ISO, and other styles
26

Wark, McKenzie. "Toywars." M/C Journal 6, no. 3 (June 1, 2003). http://dx.doi.org/10.5204/mcj.2179.

Full text
Abstract:
I first came across etoy in Linz, Austria in 1995. They turned up at Ars Electronica with their shaved heads, in their matching orange bomber jackets. They were not invited. The next year they would not have to crash the party. In 1996 they were awarded Arts Electronica’s prestigious Golden Nica for web art, and were on their way to fame and bitterness – the just rewards for their art of self-regard. As founding member Agent.ZAI says: “All of us were extremely greedy – for excitement, for drugs, for success.” (Wishart & Boschler: 16) The etoy story starts on the fringes of the squatters’ movement in Zurich. Disenchanted with the hard left rhetorics that permeate the movement in the 1980s, a small group look for another way of existing within a commodified world, without the fantasy of an ‘outside’ from which to critique it. What Antonio Negri and friends call the ‘real subsumption’ of life under the rule of commodification is something etoy grasps intuitively. The group would draw on a number of sources: David Bowie, the Sex Pistols, the Manchester rave scene, European Amiga art, rumors of the historic avant gardes from Dada to Fluxus. They came together in 1994, at a meeting in the Swiss resort town of Weggis on Lake Lucerne. While the staging of the founding meeting looks like a rerun of the origins of the Situationist International, the wording of the invitation might suggest the founding of a pop music boy band: “fun, money and the new world?” One of the – many – stories about the origins of the name Dada has it being chosen at random from a bilingual dictionary. The name etoy, in an update on that procedure, was spat out by a computer program designed to make four letter words at random. Ironically, both Dada and etoy, so casually chosen, would inspire furious struggles over the ownership of these chancey 4-bit words. The group decided to make money by servicing the growing rave scene. Being based in Vienna and Zurich, the group needed a way to communicate, and chose to use the internet. This was a far from obvious thing to do in 1994. Connections were slow and unreliable. Sometimes it was easier to tape a hard drive full of clubland graphics to the underside of a seat on the express train from Zurich to Vienna and simply email instructions to meet the train and retrieve it. The web was a primitive instrument in 1995 when etoy built its first website. They launched it with a party called etoy.FASTLANE, an optimistic title when the web was anything but. Coco, a transsexual model and tabloid sensation, sang a Japanese song while suspended in the air. She brought media interest, and was anointed etoy’s lifestyle angel. As Wishart and Bochsler write, “it was as if the Seven Dwarfs had discovered their Snow White.” (Wishart & Boschler: 33) The launch didn’t lead to much in the way of a music deal or television exposure. The old media were not so keen to validate the etoy dream of lifting themselves into fame and fortune by their bootstraps. And so etoy decided to be stars of the new media. The slogan was suitably revised: “etoy: the pop star is the pilot is the coder is the designer is the architect is the manager is the system is etoy.” (Wishart & Boschler: 34) The etoy boys were more than net.artists, they were artists of the brand. The brand was achieving a new prominence in the mid-90s. (Klein: 35) This was a time when capitalism was hollowing itself out in the overdeveloped world, shedding parts of its manufacturing base. Control of the circuits of commodification would rest less on the ownership of the means of production and more on maintaining a monopoly on the flows of information. The leading edge of the ruling class was becoming self-consciously vectoral. It controlled the flow of information about what to produce – the details of design, the underlying patents. It controlled the flows of information about what is produced – the brands and logos, the slogans and images. The capitalist class is supplanted by a vectoral class, controlling the commodity circuit through the vectors of information. (Wark) The genius of etoy was to grasp the aesthetic dimension of this new stage of commodification. The etoy boys styled themselves not so much as a parody of corporate branding and management groupthink, but as logical extension of it. They adopted matching uniforms and called themselves agents. In the dada-punk-hiphop tradition, they launched themselves on the world as brand new, self-created, self-named subjects: Agents Zai, Brainhard, Gramazio, Kubli, Esposto, Udatny and Goldstein. The etoy.com website was registered in 1995 with Network Solutions for a $100 fee. The homepage for this etoy.TANKSYSTEM was designed like a flow chart. As Gramazio says: “We wanted to create an environment with surreal content, to build a parallel world and put the content of this world into tanks.” (Wishart & Boschler: 51) One tank was a cybermotel, with Coco the first guest. Another tank showed you your IP number, with a big-brother eye looking on. A supermarket tank offered sunglasses and laughing gas for sale, but which may or may not be delivered. The underground tank included hardcore photos of a sensationalist kind. A picture of the Federal Building in Oklamoma City after the bombing was captioned in deadpan post-situ style “such work needs a lot of training.” (Wishart & Boschler: 52) The etoy agents were by now thoroughly invested in the etoy brand and the constellation of images they had built around it, on their website. Their slogan became “etoy: leaving reality behind.” (Wishart & Boschler: 53) They were not the first artists fascinated by commodification. It was Warhol who said “good art is good business.”(Warhol ) But etoy reversed the equation: good business is good art. And good business, in this vectoral age, is in its most desirable form an essentially conceptual matter of creating a brand at the center of a constellation of signifiers. Late in 1995, etoy held another group meeting, at the Zurich youth center Dynamo. The problem was that while they had build a hardcore website, nobody was visiting it. Agents Gooldstein and Udatny thought that there might be a way of using the new search engines to steer visitors to the site. Zai and Brainhard helped secure a place at the Vienna Academy of Applied Arts where Udatny could use the computer lab to implement this idea. Udatny’s first step was to create a program that would go out and gather email addresses from the web. These addresses would form the lists for the early examples of art-spam that etoy would perpetrate. Udatny’s second idea was a bit more interesting. He worked out how to get the etoy.TANKSYSTEM page listed in search engines. Most search engines ranked pages by the frequency of the search term in the pages it had indexed, so etoy.TANKSYSTEM would contain pages of selected keywords. Porn sites were also discovering this method of creating free publicity. The difference was that etoy chose a very carefully curated list of 350 search terms, including: art, bondage, cyberspace, Doom, Elvis, Fidel, genx, heroin, internet, jungle and Kant. Users of search engines who searched for these terms would find dummy pages listed prominently in their search results that directed them, unsuspectingly, to etoy.com. They called this project Digital Hijack. To give the project a slightly political aura, the pages the user was directed to contained an appeal for the release of convicted hacker Kevin Mitnick. This was the project that won them a Golden Nica statuette at Ars Electronica in 1996, which Gramazio allegedly lost the same night playing roulette. It would also, briefly, require that they explain themselves to the police. Digital Hijack also led to the first splits in the group, under the intense pressure of organizing it on a notionally collective basis, but with the zealous Agent Zai acting as de facto leader. When Udatny was expelled, Zai and Brainhard even repossessed his Toshiba laptop, bought with etoy funds. As Udatny recalls, “It was the lowest point in my life ever. There was nothing left; I could not rely on etoy any more. I did not even have clothes, apart from the etoy uniform.” (Wishart & Boschler: 104) Here the etoy story repeats a common theme from the history of the avant gardes as forms of collective subjectivity. After Digital Hijack, etoy went into a bit of a slump. It’s something of a problem for a group so dependent on recognition from the other of the media, that without a buzz around them, etoy would tend to collapse in on itself like a fading supernova. Zai spend the early part of 1997 working up a series of management documents, in which he appeared as the group’s managing director. Zai employed the current management theory rhetoric of employee ‘empowerment’ while centralizing control. Like any other corporate-Trotskyite, his line was that “We have to get used to reworking the company structure constantly.” (Wishart & Boschler: 132) The plan was for each member of etoy to register the etoy trademark in a different territory, linking identity to information via ownership. As Zai wrote “If another company uses our name in a grand way, I’ll probably shoot myself. And that would not be cool.” (Wishart & Boschler:: 132) As it turned out, another company was interested – the company that would become eToys.com. Zai received an email offering “a reasonable sum” for the etoy.com domain name. Zai was not amused. “Damned Americans, they think they can take our hunting grounds for a handful of glass pearls….”. (Wishart & Boschler: 133) On an invitation from Suzy Meszoly of C3, the etoy boys traveled to Budapest to work on “protected by etoy”, a work exploring internet security. They spent most of their time – and C3’s grant money – producing a glossy corporate brochure. The folder sported a blurb from Bjork: “etoy: immature priests from another world” – which was of course completely fabricated. When Artothek, the official art collection of the Austrian Chancellor, approached etoy wanting to buy work, the group had to confront the problem of how to actually turn their brand into a product. The idea was always that the brand was the product, but this doesn’t quite resolve the question of how to produce the kind of unique artifacts that the art world requires. Certainly the old Conceptual Art strategy of selling ‘documentation’ would not do. The solution was as brilliant as it was simple – to sell etoy shares. The ‘works’ would be ‘share certificates’ – unique objects, whose only value, on the face of it, would be that they referred back to the value of the brand. The inspiration, according to Wishart & Boschsler, was David Bowie, ‘the man who sold the world’, who had announced the first rock and roll bond on the London financial markets, backed by future earnings of his back catalogue and publishing rights. Gramazio would end up presenting Chancellor Viktor Klima with the first ‘shares’ at a press conference. “It was a great start for the project”, he said, “A real hack.” (Wishart & Boschler: 142) For this vectoral age, etoy would create the perfect vectoral art. Zai and Brainhard took off next for Pasadena, where they got the idea of reverse-engineering the online etoy.TANKSYSTEM by building an actual tank in an orange shipping container, which would become etoy.TANK 17. This premiered at the San Francisco gallery Blasthaus in June 1998. Instant stars in the small world of San Francisco art, the group began once again to disintegrate. Brainhard and Esposito resigned. Back in Europe in late 1998, Zai was preparing to graduate from the Vienna Academy of Applied Arts. His final project would recapitulate the life and death of etoy. It would exist from here on only as an online archive, a digital mausoleum. As Kubli says “there was no possibility to earn our living with etoy.” (Wishart & Boschler: 192) Zai emailed eToys.com and asked them if them if they would like to place a banner ad on etoy.com, to redirect any errant web traffic. Lawyers for eToys.com offered etoy $30,000 for the etoy.com domain name, which the remaining members of etoy – Zai, Gramazio, Kubli – refused. The offer went up to $100,000, which they also refused. Through their lawyer Peter Wild they demanded $750,000. In September 1999, while etoy were making a business presentation as their contribution to Ars Electronica, eToys.com lodged a complaint against etoy in the Los Angeles Superior Court. The company hired Bruce Wessel, of the heavyweight LA law firm Irell & Manella, who specialized in trademark, copyright and other intellectual property litigation. The complaint Wessel drafted alleged that etoy had infringed and diluted the eToys trademark, were practicing unfair competition and had committed “intentional interference with prospective economic damage.” (Wishart & Boschler: 199) Wessel demanded an injunction that would oblige etoy to cease using its trademark and take down its etoy.com website. The complaint also sought to prevent etoy from selling shares, and demanded punitive damages. Displaying the aggressive lawyering for which he was so handsomely paid, Wessel invoked the California Unfair Competition Act, which was meant to protect citizens from fraudulent business scams. Meant as a piece of consumer protection legislation, its sweeping scope made it available for inventive suits such as Wessel’s against etoy. Wessel was able to use pretty much everything from the archive etoy built against it. As Wishart and Bochsler write, “The court papers were like a delicately curated catalogue of its practices.” (Wishart & Boschler: 199) And indeed, legal documents in copyright and trademark cases may be the most perfect literature of the vectoral age. The Unfair Competition claim was probably aimed at getting the suit heard in a Californian rather than a Federal court in which intellectual property issues were less frequently litigated. The central aim of the eToys suit was the trademark infringement, but on that head their claims were not all that strong. According to the 1946 Lanham Act, similar trademarks do not infringe upon each other if there they are for different kinds of business or in different geographical areas. The Act also says that the right to own a trademark depends on its use. So while etoy had not registered their trademark and eToys had, etoy were actually up and running before eToys, and could base their trademark claim on this fact. The eToys case rested on a somewhat selective reading of the facts. Wessel claimed that etoy was not using its trademark in the US when eToys was registered in 1997. Wessel did not dispute the fact that etoy existed in Europe prior to that time. He asserted that owning the etoy.com domain name was not sufficient to establish a right to the trademark. If the intention of the suit was to bully etoy into giving in, it had quite the opposite effect. It pissed them off. “They felt again like the teenage punks they had once been”, as Wishart & Bochsler put it. Their art imploded in on itself for lack of attention, but called upon by another, it flourished. Wessel and eToys.com unintentionally triggered a dialectic that worked in quite the opposite way to what they intended. The more pressure they put on etoy, the more valued – and valuable – they felt etoy to be. Conceptual business, like conceptual art, is about nothing but the management of signs within the constraints of given institutional forms of market. That this conflict was about nothing made it a conflict about everything. It was a perfectly vectoral struggle. Zai and Gramazio flew to the US to fire up enthusiasm for their cause. They asked Wolfgang Staehle of The Thing to register the domain toywar.com, as a space for anti-eToys activities at some remove from etoy.com, and as a safe haven should eToys prevail with their injunction in having etoy.com taken down. The etoy defense was handled by Marcia Ballard in New York and Robert Freimuth in Los Angeles. In their defense, they argued that etoy had existed since 1994, had registered its globally accessible domain in 1995, and won an international art prize in 1996. To counter a claim by eToys that they had a prior trademark claim because they had bought a trademark from another company that went back to 1990, Ballard and Freimuth argued that this particular trademark only applied to the importation of toys from the previous owner’s New York base and thus had no relevance. They capped their argument by charging that eToys had not shown that its customers were really confused by the existence of etoy. With Christmas looming, eToys wanted a quick settlement, so they offered Zurich-based etoy lawyer Peter Wild $160,000 in shares and cash for the etoy domain. Kubli was prepared to negotiate, but Zai and Gramazio wanted to gamble – and raise the stakes. As Zai recalls: “We did not want to be just the victims; that would have been cheap. We wanted to be giants too.” (Wishart & Boschler: 207) They refused the offer. The case was heard in November 1999 before Judge Rafeedie in the Federal Court. Freimuth, for etoy, argued that federal Court was the right place for what was essentially a trademark matter. Robert Kleiger, for eToys, countered that it should stay where it was because of the claims under the California Unfair Competition act. Judge Rafeedie took little time in agreeing with the eToys lawyer. Wessel’s strategy paid off and eToys won the first skirmish. The first round of a quite different kind of conflict opened when etoy sent out their first ‘toywar’ mass mailing, drawing the attention of the net.art, activism and theory crowd to these events. This drew a report from Felix Stalder in Telepolis: “Fences are going up everywhere, molding what once seemed infinite space into an overcrowded and tightly controlled strip mall.” (Stalder ) The positive feedback from the net only emboldened etoy. For the Los Angeles court, lawyers for etoy filed papers arguing that the sale of ‘shares’ in etoy was not really a stock offering. “The etoy.com website is not about commerce per se, it is about artist and social protest”, they argued. (Wishart & Boschler: 209) They were obliged, in other words, to assert a difference that the art itself had intended to blur in order to escape eToy’s claims under the Unfair Competition Act. Moreover, etoy argued that there was no evidence of a victim. Nobody was claiming to have been fooled by etoy into buying something under false pretences. Ironically enough, art would turn out in hindsight to be a more straightforward transaction here, involving less simulation or dissimulation, than investing in a dot.com. Perhaps we have reached the age when art makes more, not less, claim than business to the rhetorical figure of ‘reality’. Having defended what appeared to be the vulnerable point under the Unfair Competition law, etoy went on the attack. It was the failure of eToys to do a proper search for other trademarks that created the problem in the first place. Meanwhile, in Federal Court, lawyers for etoy launched a counter-suit that reversed the claims against them made by eToys on the trademark question. While the suits and counter suits flew, eToys.com upped their offer to settle to a package of cash and shares worth $400,000. This rather puzzled the etoy lawyers. Those choosing to sue don’t usually try at the same time to settle. Lawyer Peter Wild advised his clients to take the money, but the parallel tactics of eToys.com only encouraged them to dig in their heels. “We felt that this was a tremendous final project for etoy”, says Gramazio. As Zai says, “eToys was our ideal enemy – we were its worst enemy.” (Wishart & Boschler: 210) Zai reported the offer to the net in another mass mail. Most people advised them to take the money, including Doug Rushkoff and Heath Bunting. Paul Garrin counseled fighting on. The etoy agents offered to settle for $750,000. The case came to court in late November 1999 before Judge Shook. The Judge accepted the plausibility of the eToys version of the facts on the trademark issue, which included the purchase of a registered trademark from another company that went back to 1990. He issued an injunction on their behalf, and added in his statement that he was worried about “the great danger of children being exposed to profane and hardcore pornographic issues on the computer.” (Wishart & Boschler: 222) The injunction was all eToys needed to get Network Solutions to shut down the etoy.com domain. Zai sent out a press release in early December, which percolated through Slashdot, rhizome, nettime (Staehle) and many other networks, and catalyzed the net community into action. A debate of sorts started on investor websites such as fool.com. The eToys stock price started to slide, and etoy ‘warriors’ felt free to take the credit for it. The story made the New York Times on 9th December, Washington Post on the 10th, Wired News on the 11th. Network Solutions finally removed the etoy.com domain on the 10th December. Zai responded with a press release: “this is robbery of digital territory, American imperialism, corporate destruction and bulldozing in the way of the 19th century.” (Wishart & Boschler: 237) RTMark set up a campaign fund for toywar, managed by Survival Research Laboratories’ Mark Pauline. The RTMark press release promised a “new internet ‘game’ designed to destroy eToys.com.” (Wishart & Boschler: 239) The RTMark press release grabbed the attention of the Associated Press newswire. The eToys.com share price actually rose on December 13th. Goldman Sachs’ e-commerce analyst Anthony Noto argued that the previous declines in the Etoys share price made it a good buy. Goldman Sachs was the lead underwriter of the eToys IPO. Noto’s writings may have been nothing more than the usual ‘IPOetry’ of the time, but the crash of the internet bubble was some months away yet. The RTMark campaign was called ‘The Twelve Days of Christmas’. It used the Floodnet technique that Ricardo Dominguez used in support of the Zapatistas. As Dominguez said, “this hysterical power-play perfectly demonstrates the intensions of the new net elite; to turn the World Wide Web into their own private home-shopping network.” (Wishart & Boschler: 242) The Floodnet attack may have slowed the eToys.com server down a bit, but it was robust and didn’t crash. Ironically, it ran on open source software. Dominguez claims that the ‘Twelve Days’ campaign, which relied on individuals manually launching Floodnet from their own computers, was not designed to destroy the eToys site, but to make a protest felt. “We had a single-bullet script that could have taken down eToys – a tactical nuke, if you will. But we felt this script did not represent the presence of a global group of people gathered to bear witness to a wrong.” (Wishart & Boschler: 245) While the eToys engineers did what they could to keep the site going, eToys also approached universities and businesses whose systems were being used to host Floodnet attacks. The Thing, which hosted Dominguez’s eToys Floodnet site was taken offline by The Thing’s ISP, Verio. After taking down the Floodnet scripts, The Thing was back up, restoring service to the 200 odd websites that The Thing hosted besides the offending Floodnet site. About 200 people gathered on December 20th at a demonstration against eToys outside the Museum of Modern Art. Among the crowd were Santas bearing signs that said ‘Coal for eToys’. The rally, inside the Museum, was led by the Reverend Billy of the Church of Stop Shopping: “We are drowning in a sea of identical details”, he said. (Wishart & Boschler: 249-250) Meanwhile etoy worked on the Toywar Platform, an online agitpop theater spectacle, in which participants could act as soldiers in the toywar. This would take some time to complete – ironically the dispute threatened to end before this last etoy artwork was ready, giving etoy further incentives to keep the dispute alive. The etoy agents had a new lawyer, Chris Truax, who was attracted to the case by the publicity it was generating. Through Truax, etoy offered to sell the etoy domain and trademark for $3.7 million. This may sound like an insane sum, but to put it in perspective, the business.com site changed hands for $7.5 million around this time. On December 29th, Wessel signaled that eToys was prepared to compromise. The problem was, the Toywar Platform was not quite ready, so etoy did what it could to drag out the negotiations. The site went live just before the scheduled court hearings, January 10th 2000. “TOYWAR.com is a place where all servers and all involved people melt and build a living system. In our eyes it is the best way to express and document what’s going on at the moment: people start to about new ways to fight for their ideas, their lifestyle, contemporary culture and power relations.” (Wishart & Boschler: 263) Meanwhile, in a California courtroom, Truax demanded that Network Solutions restore the etoy domain, that eToys pay the etoy legal expenses, and that the case be dropped without prejudice. No settlement was reached. Negotiations dragged on for another two weeks, with the etoy agents’ attention somewhat divided between two horizons – art and law. The dispute was settled on 25th January. Both parties dismissed their complaints without prejudice. The eToys company would pay the etoy artists $40,000 for legal costs, and contact Network Solutions to reinstate the etoy domain. “It was a pleasure doing business with one of the biggest e-commerce giants in the world” ran the etoy press release. (Wishart & Boschler: 265) That would make a charming end to the story. But what goes around comes around. Brainhard, still pissed off with Zai after leaving the group in San Francisco, filed for the etoy trademark in Austria. After that the internal etoy wranglings just gets boring. But it was fun while it lasted. What etoy grasped intuitively was the nexus between the internet as a cultural space and the transformation of the commodity economy in a yet-more abstract direction – its becoming-vectoral. They zeroed in on the heart of the new era of conceptual business – the brand. As Wittgenstein says of language, what gives words meaning is other words, so too for brands. What gives brands meaning is other brands. There is a syntax for brands as there is for words. What etoy discovered is how to insert a new brand into that syntax. The place of eToys as a brand depended on their business competition with other brands – with Toys ‘R’ Us, for example. For etoy, the syntax they discovered for relating their brand to another one was a legal opposition. What made etoy interesting was their lack of moral posturing. Their abandonment of leftist rhetorics opened them up to exploring the territory where media and business meet, but it also made them vulnerable to being consumed by the very dialectic that created the possibility of staging etoy in the first place. By abandoning obsolete political strategies, they discovered a media tactic, which collapsed for want of a new strategy, for the new vectoral terrain on which we find ourselves. Works Cited Negri, Antonio. Time for Revolution. Continuum, London, 2003. Warhol, Andy. From A to B and Back Again. Picador, New York, 1984. Stalder, Felix. ‘Fences in Cyberspace: Recent events in the battle over domain names’. 19 Jun 2003. <http://felix.openflows.org/html/fences.php>. Wark, McKenzie. ‘A Hacker Manifesto [version 4.0]’ 19 Jun 2003. http://subsol.c3.hu/subsol_2/contributors0/warktext.html. Klein, Naomi. No Logo. Harper Collins, London, 2000. Wishart, Adam & Regula Bochsler. Leaving Reality Behind: etoy vs eToys.com & Other Battles to Control Cyberspace Ecco Books, 2003. Staehle, Wolfgang. ‘<nettime> etoy.com shut down by US court.’ 19 Jun 2003. http://amsterdam.nettime.org/Lists-Archives/nettime-l-9912/msg00005.html Links http://amsterdam.nettime.org/Lists-Archives/nettime-l-9912/msg00005.htm http://felix.openflows.org/html/fences.html http://subsol.c3.hu/subsol_2/contributors0/warktext.html Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Wark, McKenzie. "Toywars" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0306/02-toywars.php>. APA Style Wark, M. (2003, Jun 19). Toywars. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0306/02-toywars.php>
APA, Harvard, Vancouver, ISO, and other styles
27

Rodan, Debbie, and Jane Mummery. "Animals Australia and the Challenges of Vegan Stereotyping." M/C Journal 22, no. 2 (April 24, 2019). http://dx.doi.org/10.5204/mcj.1510.

Full text
Abstract:
Introduction Negative stereotyping of alternative diets such as veganism and other plant-based diets has been common in Australia, conventionally a meat-eating culture (OECD qtd. in Ting). Indeed, meat consumption in Australia is sanctioned by the ubiquity of advertising linking meat-eating to health, vitality and nation-building, and public challenges to such plant-based diets as veganism. In addition, state, commercial enterprises, and various community groups overtly resist challenges to Australian meat-eating norms and to the intensive animal husbandry practices that underpin it. Hence activists, who may contest not simply this norm but many of the customary industry practices that comprise Australia’s meat production, have been accused of promoting a vegan agenda and even of undermining the “Australian way of life”.If veganism meansa philosophy and way of living which seeks to exclude—as far as is possible and practicable—all forms of exploitation of, and cruelty to, animals for food, clothing or any other purpose; and by extension, promotes the development and use of animal-free alternatives for the benefit of humans, animals and the environment. In dietary terms it denotes the practice of dispensing with all products derived wholly or partly from animals. (Vegan Society)then our interest in this article lies in how a stereotyped label of veganism (and other associated attributes) is being used across Australian public spheres to challenge the work of animal activists as they call out factory farming for entrenched animal cruelty. This is carried out in three main parts. First, following an outline of our research approach, we examine the processes of stereotyping and the key dimensions of vegan stereotyping. Second, in the main part of the article, we reveal how opponents to such animal activist organisations as Animals Australia attempt to undermine activist calls for change by framing them as promoting an un-Australian vegan agenda. Finally, we consider how, despite such framing, that organisation is generating productive public debate around animal welfare, and, further, facilitating the creation of new activist identifications and identities.Research ApproachData collection involved searching for articles where Animals Australia and animal activism were yoked with veg*n (vegan and vegetarian), across the period May 2011 to 2016 (discussion peaked between May and June 2013). This period was of interest because it exposed a flare point with public discord being expressed between communities—namely between rural and urban consumers, farmers and animal activists, Coles Supermarkets (identified by The Australian Government the Treasury as one of two major supermarkets holding over 65% share of Australian food retail market) and their producers—and a consequent voicing of disquiet around Australian identity. We used purposive sampling (Waller, Farquharson, and Dempsey 67) to identify relevant materials as we knew in advance the case was “information-rich” (Patton 181) and would provide insightful information about a “troublesome” phenomenon (Emmel 6). Materials were collected from online news articles (30) and readers’ comments (167), online magazines (2) and websites (2) and readers’ comments (3), news items (Factiva 13), Australian Broadcasting Commission television (1) and radio (1), public blogs (2), and Facebook pages from involved organisations, specifically Australia’s National Farmers’ Federation (NFF, 155 posts) and Coles Supermarkets (29 posts). Many of these materials were explicitly responsive to a) Animals Australia’s Make It Possible campaign against Australian factory farming (launched and highly debated during this period), and b) Coles Supermarket’s short-lived partnership with Animals Australia in 2013. We utilised content analysis so as to make visible the most prominent and consistent stereotypes utilised in these various materials during the identified period. The approach allowed us to code and categorise materials so as to determine trends and patterns of words used, their relationships, and key structures and ways of speaking (Weerakkody). In addition, discourse analysis (Gee) was used in order to identify and track “language-in-use” so as to make visible the stereotyping deployed during the public reception of both the campaign and Animals Australia’s associated partnership with Coles. These methods enabled a “nuanced approach” (Coleman and Moss 12) with which to spot putdowns, innuendos, and stereotypical attitudes.Vegan StereotypingStereotypes creep into everyday language and are circulated and amplified through mainstream media, speeches by public figures, and social media. Stereotypes maintain their force through being reused and repurposed, making them difficult to eradicate due to their “cumulative effects” and influence (Harris and Sanborn 38; Inzlicht, Tullett, Legault, and Kang; Pickering). Over time stereotypes can become the lens through which we view “the world and social reality” (Harris and Sanborn 38; Inzlicht et al.). In summation, stereotyping:reduces identity categories to particular sets of deeds, attributes and attitudes (Whitley and Kite);informs individuals’ “cognitive investments” (Blum 267) by associating certain characteristics with particular groups;comprises symbolic and connotative codes that carry sets of traits, deeds, or beliefs (Cover; Rosello), and;becomes increasingly persuasive through regulating language and image use as well as identity categories (Cover; Pickering; Rosello).Not only is the “iterative force” (Rosello 35) of such associative stereotyping compounded due to its dissemination across digital media sites such as Facebook, YouTube, websites, and online news, but attempts to denounce it tend to increase its “persuasive power” (29). Indeed, stereotypes seem to refuse “to die” (23), remaining rooted in social and cultural memory (Whitley and Kite 10).As such, despite the fact that there is increasing interest in Australia and elsewhere in new food norms and plant-based diets (see, e.g., KPMG), as well as in vegan lifestyle options (Wright), studies still show that vegans remain a negatively stereotyped group. Previous studies have suggested that vegans mark a “symbolic threat” to Western, conventionally meat-eating cultures (MacInnis and Hodson 722; Stephens Griffin; Cole and Morgan). One key UK study of national newspapers, for instance, showed vegans continuing to be discredited in multiple ways as: 1) “self-evidently ridiculous”; 2) “ascetics”; 3) having a lifestyle difficult and impossible to maintain; 4) “faddist”; 5) “oversensitive”; and 6) “hostile extremists” (Cole and Morgan 140–47).For many Australians, veganism also appears anathema to their preferred culture and lifestyle of meat-eating. For instance, the NFF, Meat & Livestock Australia (MLA), and other farming bodies continue to frame veganism as marking an extreme form of lifestyle, as anti-farming and un-Australian. Such perspectives are also circulated through online rural news and readers’ comments, as will be discussed later in the article. Such representations are further exemplified by the MLA’s (Lamb, Australia Day, Celebrate Australia) Australia Day lamb advertising campaigns (Bembridge; Canning). For multiple consecutive years, the campaign presented vegans (and vegetarians) as being self-evidently ridiculous and faddish, representing them as mentally unhinged and fringe dwellers. Such stereotyping not only invokes “affective reactions” (Whitley and Kite 8)—including feelings of disgust towards individuals living such lifestyles or holding such values—but operates as “political baits” (Rosello 18) to shore-up or challenge certain social or political positions.Although such advertisements are arguably satirical, their repeated screening towards and on Australia Day highlights deeply held views about the normalcy of animal agriculture and meat-eating, “homogenizing” (Blum 276; Pickering) both meat-eaters and non-meat-eaters alike. Cultural stereotyping of this kind amplifies “social” as well as political schisms (Blum 276), and arguably discourages consumers—whether meat-eaters or non-meat-eaters—from advocating together around shared goals such as animal welfare and food safety. Additionally, given the rise of new food practices in Australia—including flexitarian, reducetarian, pescatarian, kangatarian (a niche form of ethical eating), vegivores, semi-vegetarian, vegetarian, veganism—alongside broader commitments to ethical consumption, such stereotyping suggests that consumers’ actual values and preferences are being disregarded in order to shore-up the normalcy of meat-eating.Animals Australia and the (So-Called) Vegan Agenda of Animal ActivismGiven these points, it is no surprise that there is a tacit belief in Australia that anyone labelled an animal activist must also be vegan. Within this context, we have chosen to primarily focus on the attitudes towards the campaigning work of Animals Australia—a not-for-profit organisation representing some 30 member groups and over 2 million individual supporters (Animals Australia, “Who Is”)—as this organisation has been charged as promoting a vegan agenda. Along with the RSPCA and Voiceless, Animals Australia represents one of the largest animal protection organisations within Australia (Chen). Its mission is to:Investigate, expose and raise community awareness of animal cruelty;Provide animals with the strongest representation possible to Government and other decision-makers;Educate, inspire, empower and enlist the support of the community to prevent and prohibit animal cruelty;Strengthen the animal protection movement. (Animals Australia, “Who Is”)In delivery of this mission, the organisation curates public rallies and protests, makes government and industry submissions, and utilises corporate outreach. Campaigning engages the Web, multiple forms of print and broadcast media, and social media.With regards to Animals Australia’s campaigns regarding factory farming—including the Make It Possible campaign (see fig. 1), launched in 2013 and key to the period we are investigating—the main message is that: the animals kept in these barren and constrictive conditions are “no different to our pets at home”; they are “highly intelligent creatures who feel pain, and who will respond to kindness and affection – if given the chance”; they are “someone, not something” (see the Make It Possible transcript). Campaigns deliberately strive to engender feelings of empathy and produce affect in viewers (see, e.g., van Gurp). Specifically they strive to produce mainstream recognition of the cruelties entrenched in factory farming practices and build community outrage against these practices so as to initiate industry change. Campaigns thus expressly challenge Australians to no longer support factory farmed animal products, and to identify with what we have elsewhere called everyday activist positions (Rodan and Mummery, “Animal Welfare”; “Make It Possible”). They do not, however, explicitly endorse a vegan position. Figure 1: Make It Possible (Animals Australia, campaign poster)Nonetheless, as has been noted, a common counter-tactic used within Australia by the industries targeted by such campaigns, has been to use well-known negative stereotypes to discredit not only the charges of systemic animal cruelty but the associated organisations. In our analysis, we found four prominent interconnected stereotypes utilised in both digital and print media to discredit the animal welfare objectives of Animals Australia. Together these cast the organisation as: 1) anti-meat-eating; 2) anti-farming; 3) promoting a vegan agenda; and 4) hostile extremists. These stereotypes are examined below.Anti-Meat-EatingThe most common stereotype attributed to Animals Australia from its campaigning is of being anti-meat-eating. This charge, with its associations with veganism, is clearly problematic for industries that facilitate meat-eating and within a culture that normalises meat-eating, as the following example expresses:They’re [Animals Australia] all about stopping things. They want to stop factory farming – whatever factory farming is – or they want to stop live exports. And in fact they’re not necessarily about: how do I improve animal welfare in the pig industry? Or how do I improve animal welfare in the live export industry? Because ultimately they are about a meat-free future world and we’re about a meat producing industry, so there’s not a lot of overlap, really between what we’re doing. (Andrew Spencer, Australian Pork Ltd., qtd. in Clark)Respondents engaging this stereotype also express their “outrage at Coles” (McCarthy) and Animals Australia for “pedalling [sic]” a pro-vegan agenda (Nash), their sense that Animals Australia is operating with ulterior motives (Flint) and criminal intent (Brown). They see cultural refocus as unnecessary and “an exercise in futility” (Harris).Anti-FarmingTo be anti-farming in Australia is generally considered to be un-Australian, with Glasgow suggesting that any criticism of “farming practices” in Australian society can be “interpreted as an attack on the moral integrity of farmers, amounting to cultural blasphemy” (200). Given its objectives, it is unsurprising that Animals Australia has been stereotyped as being “anti-farming”, a phrase additionally often used in conjunction with the charge of veganism. Although this comprises a misreading of veganism—given its focus on challenging animal exploitation in farming rather than entailing opposition to all farming—the NFF accused Animals Australia of being “blatantly anti-farming and proveganism” (Linegar qtd. in Nason) and as wanting “to see animal agriculture phased out” (National Farmers’ Federation). As expressed in more detail:One of the main factors for VFF and other farmers being offended is because of AA’s opinion and stand on ALL farming. AA wants all farming banned and us all become vegans. Is it any wonder a lot of people were upset? Add to that the proceeds going to AA which may have been used for their next criminal activity washed against the grain. If people want to stand against factory farming they have the opportunity not to purchase them. Surely not buying a product will have a far greater impact on factory farmed produce. Maybe the money could have been given to farmers? (Hunter)Such stereotyping reveals how strongly normalised animal agriculture is in Australia, as well as a tendency on the part of respondents to reframe the challenge of animal cruelty in some farming practices into a position supposedly challenging all farming practices.Promoting a Vegan AgendaAs is already clear, Animals Australia is often reproached for promoting a vegan agenda, which, it is further suggested, it keeps hidden from the Australian public. This viewpoint was evident in two key examples: a) the Australian public and organisations such as the NFF are presented as being “defenceless” against the “myopic vitriol of the vegan abolitionists” (Jonas); and b) Animals Australia is accused of accepting “loans from liberation groups” and being “supported by an army of animal rights lawyers” to promote a “hard core” veganism message (Bourke).Nobody likes to see any animals hurt, but pushing a vegan agenda and pushing bad attitudes by group members is not helping any animals and just serves to slow any progress both sides are trying to resolve. (V.c. Deb Ford)Along with undermining farmers’ “legitimate business” (Jooste), veganism was also considered to undermine Australia’s rural communities (Park qtd. in Malone).Hostile ExtremistsThe final stereotype linking veganism with Animals Australia was of hostile extremism (cf. Cole and Morgan). This means, for users, being inimical to Australian national values but, also, being akin to terrorists who engage in criminal activities antagonistic to Australia’s democratic society and economic livelihood (see, e.g., Greer; ABC News). It is the broad symbolic threat that “extremism” invokes that makes this stereotype particularly “infectious” (Rosello 19).The latest tag team attacks on our pork industry saw AL giving crash courses in how to become a career criminal for the severely impressionable, after attacks on the RSPCA against the teachings of Peter Singer and trying to bully the RSPCA into vegan functions menu. (Cattle Advocate)The “extremists” want that extended to dairy products, as well. The fact that this will cause the total annihilation of practically all animals, wild and domestic, doesn’t bother them in the least. (Brown)What is interesting about these last two dimensions of stereotyping is their displacement of violence. That is, rather than responding to the charge of animal cruelty, violence and extremism is attributed to those making the charge.Stereotypes and Symbolic Boundary ShiftingWhat is evident throughout these instances is how stereotyping as a “cognitive mechanism” is being used to build boundaries (Cherry 460): in the first instance, between “us” (the meat-eating majority) and “them” (the vegan minority aka animal activists); and secondly between human interest and livestock. This point is that animals may hold instrumental value and receive some protection through such, but any more stringent arguments for their protection at the expense of perceived human interests tend to be seen as wrong-headed (Sorenson; Munro).These boundaries are deeply entrenched in Western culture (Wimmer). They are also deeply problematic in the context of animal activism because they fragment publics, promote restrictive identities, and close down public debate (Lamont and Molnár). Boundary entrenching is clearly evident in the stereotyping work carried out by industry stakeholders where meat-eating and practices of industrialised animal agriculture are valorised and normalised. Challenging Australia’s meat production practices—irrespective of the reason given—is framed and belittled as entailing a vegan agenda, and further as contributing to the demise of farming and rural communities in Australia.More broadly, industry stakeholders are explicitly targeting the activist work by such organisations as Animals Australia as undermining the ‘Australian way of life’. In their reading, there is an irreconcilable boundary between human and animal interests and between an activist minority which is vegan, unreasonable, extremist and hostile to farming and the meat-eating majority which is representative of the Australian community and sustains the Australian economy. As discussed so far, such stereotyping and boundary making—even in their inaccuracies—can be pernicious in the way they entrench identities and divisions, and close the possibility for public debate.Rather than directly contesting the presuppositions and inaccuracies of such stereotyping, however, Animals Australia can be read as cultivating a process of symbolic boundary shifting. That is, rather than responding by simply underlining its own moderate position of challenging only intensive animal agriculture for systemic animal cruelty, Animals Australia uses its campaigns to develop “boundary blurring and crossing” tactics (Cherry 451, 459), specifically to dismantle and shift the symbolic boundaries conventionally in place between humans and non-human animals in the first instance, and between those non-human animals used for companionship and those used for food in the second (see fig. 2). Figure 2: That Ain’t No Way to Treat a Lady (Animals Australia, campaign image on back of taxi)Indeed, the symbolic boundaries between humans and animals left unquestioned in the preceding stereotyping are being profoundly shaken by Animals Australia with campaigns such as Make It Possible making morally relevant likenesses between humans and animals highly visible to mainstream Australians. Namely, the organisation works to interpellate viewers to exercise their own capacities for emotional identification and moral imagination, to identify with animals’ experiences and lives, and to act upon that identification to demand change.So, rather than reactively striving to refute the aforementioned stereotypes, organisations such as Animals Australia are modelling and facilitating symbolic boundary shifting by building broad, emotionally motivated, pathways through which Australians are being encouraged to refocus their own assumptions, practices and identities regarding animal experience, welfare and animal-human relations. Indeed the organisation has explicitly framed itself as speaking on behalf of not only animals but all caring Australians, suggesting thereby the possibility of a reframing of Australian national identity. Although such a tactic does not directly contest this negative stereotyping—direct contestation being, as noted, ineffective given the perniciousness of stereotyping—such work nonetheless dismantles the oppositional charge of such stereotyping in calling for all Australians to proudly be a little bit anti-meat-eating (when that meat is from factory farmed animals), a little bit anti-factory farming, a little bit pro-veg*n, and a little bit proud to consider themselves as caring about animal welfare.For Animals Australia, in other words, appealing to Australians to care about animal welfare and to act in support of that care, not only defuses the stereotypes targeting them but encourages the work of symbolic boundary shifting that is really at the heart of this dispute. Further research into the reception of the debate would give a sense of the extent to which such an approach is making a difference.ReferencesABC News. “Animal Rights Activists ‘Akin to Terrorists’, Says NSW Minister Katrina Hodgkinson.” ABC News 18 Jul. 2013. 21 Feb. 2019 <http://www.abc.net.au/news/2013-07-18/animal-rights-activists-27terrorists272c-says-nsw-minister/4828556>.Animals Australia. “Who Is Animals Australia?” 20 Feb. 2019 <http://www.animalsaustralia.org/about>.———. Make It Possible. Video and transcript. 21 Oct. 2012. 20 Feb. 2019 <http://www.youtube.com/watch?v=fM6V6lq_p0o>.The Australian Government the Treasury. Independent Review of the Food and Grocery Code of Conduct: Final Report. Commonwealth of Australia, 2018. 1 Apr. 2019 <https://treasury.gov.au/sites/default/files/2019-03/Independent-review-of-the-Food-and-Grocery-Code-of-Conduct-Final-Report.pdf>.Bembridge, Courtney. “Australia Day Lamb Ad, Starring Lee Lin Chin, Attracts Dozens of Complaints from Vegans.” ABC News 20 Jan. 2016. 21 Feb. 2019 <http://www.abc.net.au/news/2016-01-11/vegans-lodge-complaints-over-lamb-ad/7081706>.Blum, Lawrence. “Stereotypes and Stereotyping: A Moral Analysis.” Philosophical Papers 33.3 (2004): 251–89.Bourke, John. “Coles Undermines Our Way of Life.” Weekly Times Now 5 Jun. 2013. 19 Jun. 2013 <http://www.weeklytimesnow.com.au/article/2013/06/05/572335_opinion-news.html>.Brown, Frank. “Letter to the Editor.” Northern Miner 9 Dec. 2014. 18 Nov. 2017 <http://www.newscorpaustralia.com/brand/northern-miner>.Canning, Simon. “MLA’s Australia Day Vegan Flaming Lamb Ad Cleared by Advertising Watchdog.” Mumbrella News 19 Jan. 2016. 18 Nov. 2017 <https://mumbrella.com.au/mlas-australia-day-vegan-flaming-lamb-ad-cleared-by-advertising-watchdog-340779>.Cattle Advocate. “Coles Bags a Boost for NFF.” Farm Weekly 3 Jul. 2013. 20 Feb. 2018 <http://www.farmweekly.com.au/news/agriculture/agribusiness/general-news/coles-bags-a-boost-for-nff/2660179.aspx>.Chen, Peter John. Animal Welfare in Australia: Politics and Policy. Sydney: U of Sydney Press, 2016.Cherry, Elizabeth. “Shifting Symbolic Boundaries: Cultural Strategies of the Animal Rights Movement.” Sociological Forum 25.3 (2010): 450–75.Clark, Chris. “Animals Australia under the Microscope.” ABC Landline 16 Jun. 2013. 24 Jun. 2013 <http://www.abc.net.au/landline/ content/2013/s3782456.htm>.Cole, Matthew, and Karen Morgan. “Vegaphobia: Derogatory Discourses of Veganism and the Reproduction of Speciesism in UK National Newspapers.” The British Journal of Sociology 62.1 (2011): 134–53.Coleman, Stephen, and Giles Moss. “Under Construction: The Field of Online Deliberation Research.” Journal of Information Technology and Politics 9.1 (2012): 1–15.Cover, Rob. “Digital Difference: Theorizing Frameworks of Bodies, Representation and Stereotypes in Digital Games.” Asia Pacific Media Educator 26.1 (2016): 4–16.Emmel, Nick. “Purposeful Sampling.” Sampling and Choosing Cases in Qualitative Research: A Realist Approach. London: Sage Publications, 2013. 2–12. 28 Feb. 2019 <http://dx.doi.org.ezproxy.ecu.edu.au/10.4135/9781473913882>.Flint, Nicole. “The ABC Continues to Broadcast Animals Australia Footage while Failing to Probe the Group’s Motivations.” The Advertiser 28 Oct. 2014. 18 Nov. 2017 <http://www.adelaidenow.com.au/>.Gee, James Paul. An Introduction to Discourse Analysis: Theory and Method. 3rd ed. New York: Routledge, 2010.Glasgow, David. “The Law of the Jungle: Advocating for Animals in Australia.” Deakin Law Review 13.1 (2008): 181–210.Greer, Anna. “‘Akin to Terrorism’: The War on Animal Activists.” Overland 9 Aug. 2013. 21 Feb. 2019 <https://overland.org.au/2013/08/akin-to-terrorism-the-war-on-animal-activists/>Harris, Janeen. “Coles Are the Piggy in the Middle of Animal Welfare Confrontation.” The Conversation 13 Jun. 2013. 21 Feb. 2019 <https://theconversation.com/coles-are-the-piggy-in-the-middle-of-animal-welfare-confrontation-15078>.Harris, Richard Jackson, and Fred W. Sanborn. A Cognitive Psychology of Mass Communication. 6th ed. New York: Routledge, 2014.Hunter, Jim. “Animals Australia Bags Hot Property.” Weekly Times Now 10 Jun. 2013. 19 Jun. 2013 <http://tools.weeklytimesnow.com.au/yoursay/comment_all.php>.Inzlicht, Michael, Alexa M. Tullett, Lisa Legault, and Sonia K Kang. “Lingering Effects: Stereotype Threat Hurts More than You Think.” Social Issues and Policy Review 5.1 (2011): 227–56.Jonas, Tammi. “Coles & Animals Australia: Unlikely Bedfellows?” Blog post. 6 Jun. 2013. 24 Jun. 2013 <http://www.tammijonas.com/2013/06/06/coles-animals-australia-unlikely-bedfellows/>.Jooste, James. “Animals Australia Ready to Launch New Advertisements Calling for Ban on Live Exports, after Complaints about Previous Campaign Dismissed.” ABC News 16 Feb. 2016. 21 Feb. 2019 <http://www.abc.net.au/news/rural/2016-02-15/live-export-animals-australia-advertising-complaint-dismissed/7168534>.KPMG. Talking 2030: Growing Agriculture into a $100 Billion Industry. KPMG, 2018. 21 Feb. 2019 <https://docs.wixstatic.com/ugd/f0cfd1_26dbb49eea91458d8b1606a0006ec20e.pdf>.Lamont, Michèle, and Virág Molnár. “The Study of Boundaries in the Social Sciences.” Annual Review of Sociology 28 (2002): 167–95.MacInnis, Cara C., and Gordon Hodson. “It Ain’t Easy Eating Greens: Evidence of Bias towards Vegetarians and Vegans from Both Source and Target.” Group Process and Intergroup Relations 20.6 (2017): 721–44.Malone, Paul. “Farmers Face Changing World.” The Canberra Times 9 Jun. 2013. 22 Nov. 2013 <https://www.canberratimes.com.au/>.McCarthy, John. “Farmers Angered by Coles Campaign.” The Courier-Mail 4 Jun. 2013. 24 Jun. 2013 <http://www.couriermail.com.au/>.Meat and Livestock Australia (MLA). Australia Day Lamb 2016: Commence Operation Boomerang. Video. 9 Jan. 2016. 8 Nov. 2017 <https://www.youtube.com/watch?v=7i15OPuFvmA>.———. Celebrate Australia with a Lamb BBQ. Video. 11 Jan. 2017. 8 Nov. 2017 <https://www.youtube.com/watch?v=LX__i-zeaWs>.———. “Lamb Campaigns.” No date. 8 Nov. 2017 <https://www.mla.com.au/marketing-beef-and-lamb/domestic-marketing/lamb-campaigns/>.Munro, Lyle. “Animals, ‘Nature’ and Human Interests.” Controversies in Environmental Sociology. Ed. Rob White. Cambridge: Cambridge UP, 2004. 61–76.Nash, Fiona. “Nationals Senator Congratulating Animals Australia’s Damaging …. .” The Nationals for Regional Australia 6 Jun. 2013. 21 Jun. 2013 <http://nationals.org.au/>.Nason, James. “Coles Bagged over Animals Australia Campaign.” Beef Central. 4 Jun. 2013. 22 Nov. 2013 <http://www.beefcentral.com/news/coles-bagged-over-animals-australia-campaign/>.National Farmers’ Federation. Facebook post. 30 May 2013. 26 Nov. 2013 <http://www.facebook.com/NationalFarmers>.Patton, Michael Quinn. Qualitative Research and Evaluation Methods. 2nd ed. London: Sage, 1990. Pickering, Michael. Stereotyping: The Politics of Representation. Basingstoke: Palgrave, 2001.Rodan, Debbie, and Jane Mummery. “The ‘Make It Possible’ Multi-Media Campaign: Generating a New ‘Everyday’ in Animal Welfare.” Media International Australia, 153 (2014): 78–87.———. “Doing Animal Welfare Activism Everyday: Questions of Identity.” Continuum: Journal of Media & Cultural Studies 30.4 (2016): 381–96.Rosello, Mireille. Declining the Stereotype: Ethnicity and Representation in French Culture. Hanover: U of New England, 1998.Sorenson John. “Constructing Terrorists: Propaganda about Animal Rights.” Critical Studies on Terrorism 2.2 (2009): 237-56.Stephens Griffin, Nathan. Understanding Veganism: Biography and Identity. Cham: Springer International, 2017.Ting, Inga. “Australia is the Meat-Eating Capital of the World.” The Sydney Morning Herald 27 Oct. 2015. 20 Feb. 2019 <http://www.smh.com.au/national/health/australia-is-the-meateating-capital-of-the-world-20151027-gkjhp4.html>.V.c. Deb Ford. “National Farmers Federation.” Facebook post. 30 May 2013. 26 Nov. 2013 <http://www.facebook.com/NationalFarmers>.Van Gurp, Marc. “Factory Farming the Musical.” Osocio 4 Nov. 2012. 21 Feb. 2019 <https://osocio.org/message/factory-farming-the-musical/>.Vegan Society. “History.” 20 Feb. 2019 <https://www.vegansociety.com/about-us/history>.Waller, Vivienne, Karen Farquharson, and Deborah Dempsey. Qualitative Social Research: Contemporary Methods for the Digital Age. London: Sage, 2016Weerakkody, Niranjala. Research Methods for Media and Communication. South Melbourne: Oxford UP, 2009.Whitley, Bernard E., and Mary E. Kite. The Psychology of Prejudice and Discrimination. Belmont: Thomson Wadsworth, 2006.Wimmer, Andreas. “The Making and Unmaking of Ethnic Boundaries: A Multilevel Process Theory.” American Journal of Sociology 113.4 (2008): 970–1022.Wright, Laura. The Vegan Studies Project: Food, Animals, and Gender in the Age of Terror. Georgia: U of Georgia Press, 2015.
APA, Harvard, Vancouver, ISO, and other styles
28

Coleman, Biella, and Mako Hill. "How Free Became Open and Everything Else under the Sun." M/C Journal 7, no. 3 (July 1, 2004). http://dx.doi.org/10.5204/mcj.2352.

Full text
Abstract:
Introduction While Free Software Foundation founder Richard Stallman argues that Free Software is not Open Source, he is only half right—or only speaking about the question of motivation (the half that matters to him). The definition of Open Source, as enshrined in the Open Source Definition (OSD) is a nearly verbatim copy of the Debian Free Software Guidelines (DFSG). Both the OSD and DFSG are practical articulations of Stallman’s Free Software Definition (FSD). Open Source, with a different political and philosophical basis, can only exist because the FSD is broad enough to allow for its translation into other terms yet defined enough to allow for a directed and robust social movement. As much as Stallman might want to deemphasize Open Source, he would never change the broadly defined definition of freedom that made its existence possible. This level of translatability within the domain of Free and Opens Source Software (FOSS) is echoed in the accessibly of its philosophies and technologies to groups from across the political spectrum. Recalibrating the broad meaning of freedom outlined in the FSD to align with their own philosophies and politics, these groups perceive FOSS as a model of openness and collaboration particularly well suited to meet their own goals. In this process of re-adoption and translation, FOSS has become the corporate poster child for capitalist technology giants like IBM, the technological and philosophical weapon of anti-corporate activists, and a practical template for a nascent movement to create an intellectual “Commons” to balance the power of capital. In these cases and others, FOSS’s broadly defined philosophy—given legal form in licenses—has acted as a pivotal point of inspiration for a diverse (and contradictory) set of alternative intellectual property instruments now available for other forms of creative work. Iconic Tactics As a site of technological practice, FOSS is not unique in its ability to take multiple lives and meanings. For example, Gyan Prakash (1999) in Another Reason_ _describes the way that many of the principles and practices of early twentieth century techno-science were translated, in ways similar to FOSS, during India’s colonial era. British colonizers who built bridges, trains, and hospitals pointed to their technological prowess as both a symbol of a superior scientific rationality and justification for their undemocratic presence in the subcontinent. Prakash describes the way that a cadre of Indian nationalists re-visioned the practice and philosophical approach to techno-science to justify and direct their anti-colonial national liberation movement. Techno-science, which was an instrument for colonialism and an icon for idea of progress, was nonetheless re-valued and redirected toward “another reason,” thus acting as a “tactic” productive of other social and political practices. We call this dynamic iconic tactic. FOSS has been deployed as an iconic tactic in a wide range of projects. FOSS philosophy simply states that it is the right of every user to use, modify, and distribute computer software for any purpose. The right to use, distribute, modify and redistribute derivative versions, the so called “four freedoms,” are based in and representative of an extreme form of anti-discrimination resistant to categorization into the typical “left, center and right” tripartite political schema. This element of non-discrimination, coupled with the broad nature of FOSS’s philosophical foundation, enables the easy adoption of FOSS technologies and facilitates its translatability. FOSS’s broadly defined freedom acts as an important starting point and one conceptual hinge useful in understanding the promiscuous circulation of FOSS as a set of technologies, signs, methodologies and philosophies. Also helpful is an analysis of the way in which this philosophical and legal form is animated and redirected in historically particular, and at times divergent, ways through the use of FOSS technologies and licensing schemes. It is to three contrasting examples of such transmutations that we now turn to. Translation in FOSS With over USD 81 billion in yearly revenue deriving in no small part from the companies vast patent and copyright holdings, IBM is an example of global capitalism whose bedrock is intellectual property. With a development methodology that IBM recognizes as more agile and profitable than proprietary models in many situations, IBM was quick to embrace FOSS. Hiring a cadre of FOSS developers to work in-house on FOSS software, IBM launched the first nationwide advertising campaign promoting the FOSS operating system GNU/Linux. In their first campaign, they highlighted the ideas of openness and freedom in ways that, unsurprisingly, reinforced their corporate goals. Featuring the recognizable Linux mascot Tux the penguin and a message of “Peace, Love, and Linux,” IBM connected using and buying FOSS-based enterprise solutions with 1960’s counter-cultural ideals of sharing, empowerment, and openness. IBM’s engagement with FOSS is representative of a much larger corporate movement to translate FOSS principles into a neoliberal language of market agility, consumer choice, and an “improved bottom line.” While their position, as the recent SCO and IBM court cases over Linux have demonstrated, is not uniformly shared in the corporate world, IBM is a highly visible example of a larger corporate push toward Free Software as the basis of a service-based business model. While the money behind IBM’s advertising machine makes their take on FOSS particularly visible, they hold no monopoly on the interpretation of FOSS’s meaning and importance. This is evidenced by the extensive use of FOSS as an iconic tactic by leftist activists around the world. Also bearing a three letter acronym, the Independent Media Centers (IMC) are a socio-political project whose mission and spirit are completely contrary to the goals of a large corporation like IBM. Indymedia is a worldwide collective of loosely affiliated grassroots online media websites and non-virtual spaces that allow activists to directly make, move, and “become” the media. IMCs are an important and integrated part of the anti-corporate and counter-globalization movement. In their work, IMC activists have aligned FOSS philosophy with their goals and visions for openness, media-reform, and large-scale socio-political justice. Like IBM, IMCs use existing FOSS software and create their own tools. IMC software, is, by charter, FOSS. As a volunteer organization with limited economic resources, FOSS has been crucial in its technology-heavy operations. Beyond use for pragmatic reasons, there is widespread support and admiration for FOSS, which is often identified as a revolutionary example of mutual aid, structural openness and the power of collaboration. The following quotes from the IMC’s online-meeting where the decision to formally adopt FOSS was made exemplify activist’s understandings of how FOSS can be used as a tool to further their political aspirations. xxxx: I assume it is safe to say that we are making this choice in order to try to choose the thing which has the least chance of benefiting any corporation, or any other form of hoarding in any way xxxx: There is a wonderful pool of very well-developed free software out there. Earlier, someone said that IMC is a revolutionary project, and free software is a revolutionary tool for it. I stan[d] very firmly behind using free software first These activists—and others in the IMC and anti-corporate, anti-capitalist, and counter-globalization movements—find inspiration in FOSS as proof of the possibility of successful alternatives to capitalist forms of production. In recent years, a political position—with a centrist political philosophy distinct from both capitalists like IBM and anti-capitalists like the IMC—has emerged with FOSS as its primary point of philosophical justification. This group is constituted by a growing number of North American and European scholars who have employed the metaphor of a “Commons” to argue for legally protected resources and knowledge for common use by all. The commons endeavor is one example of a larger “liberal” critique of the neoliberal face of “socially destructive unfettered capitalism” which is seen as a threat to democracy (Soros 2001). The information commons movement, largely spearheaded by Lawrence Lessig (1999; 2001; Creative Commons) and David Bollier (2002; Public Knowledge), explicitly points to FOSS as its inspiration. Within the Commons movement, FOSS has been tactically held up as proof that Commons are achievable and as a model of the process through which they can be created; the Creative Commons organization, a key institution within the Commons movement, has adopted FOSS-style licensing to foster and protect other other kinds of non-technical knowledge. Conclusion These three cases, which don’t exhaust the examples of translation, demonstrate how FOSS functions as an iconic tactic for a range of projects, which is not the simple result of the lexical ambiguity of the words free or open. The ability of FOSS to act as an “engine of translation” is one of the most compelling political aspects of FOSS and an important starting point in the assessment of the variable ways in which FOSS has been used as a set of technologies and an icon for openness—one we feel is often overlooked or obscured in popular and scholarly accounts on the broader implications of FOSS. The terms openness and freedom are often the key categories by which advocates, activists, journalists, and scholars approach the social and political implications of FOSS. While some accounts attribute a type of radical political intention to the domain of FOSS, others critique FOSS as indicative of late-capitalism’s drive to create and exploit free labor (Terranova 2000). Some problematically collapse the efforts of Lessig and Creative Commons with those of FOSS (Boyton 2004) obscuring some of the important differences between the goals and licenses of the groups. Certainly, the way in which FOSS is translated also shifts the ways that FOSS developers understand their own actions and motivations. However, commentators often interpret isolated cases of this process of inspiration, adoption, and re-valuation as indicative of the whole. In this early stage of research into FOSS, it behooves us to be wary of wholesale pronouncements on the social, political, and economic nature of FOSS. We should instead remain mindful of the range of socio-historical processes by which FOSS has enabled a diversity of ideas and practices of opennesses. We should be open to the idea that an analysis of the interplay between FOSS philosophy and practices as it travels through multiple social, economic and political terrains may reveal more than (first) meets the eye. About the Authors Biella Coleman is a cultural anthropologist from the University of Chicago currently writing her dissertation on the ethical dynamics and political implications of the Free and Open Source movement. She spent nearly three years doing research on the Debian project and studying hacker and technology activism in the Bay Area. Her next project draws from this research to investigate the use of expressive and human rights among psychiatric survivors as a political vector to make claims against forced treatment and to halt the global exportation of an American model of psychiatry. email: egcolema@uchicago.edu and biella@healthhacker.org Benjamin "Mako" Hill is a Free and Open Source Software developer and advocate. He is a director of Software in the Public Interest and a member of the Debian project—by most accounts the single largest Free Software project. In addition to volunteer and professional Free Software work, Hill writes and speaks extensively on issues of free software, intellectual property, collaboration, and technology. email: mako@bork.hampshire.edu Works Cited Boynton, Robert. ”The Tyranny of Copyright.”New York Times Magazine http://www.nytimes.com/2004/01/25/magazine/25COPYRIGHT.html Bollier, David. Silent Theft: the Private Plunder of our Common Wealth. New York: Routledge, 2002. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. .The Future of ideas. New York: Random House, 2001. Prakash, Gyan. Another Reason: Science and the Imagination of Modern India. Princeton, NJ: Princeton University Press, 1999. Soros, George. Open Society: Reforming Global Capitalism. New York: Public Affairs, 2000. Terranova, Tiziana. “Free Labor: Producing Culture for the Global Economy.” Social Text. (18): 2: 33-57, 2000. Warner, Michael. Publics and Counterpublics. New York: Zone Books, 2002. Weblinks: http://www.gnu.org/philosophy/free-sw.html http://www.debian.org/social_contract.html#guidelines, http://www.opensource.org/docs/definition.php http://www.slweekly.com/editorial/2004/feat_2004-01-22.cfm http://www.indymedia.org http://creativecommons.org/ http://www.publicknowledge.org/ Citation reference for this article MLA Style Coleman, Biella & Hill, Mako. "How Free Became Open and Everything Else Under the Sun" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0406/02_Coleman-Hill.php>. APA Style Coleman, B. & Hill, M. (2004, Jul1). How Free Became Open and Everything Else Under the Sun. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0406/02_Coleman-Hill.php>
APA, Harvard, Vancouver, ISO, and other styles
29

Moll, Ellen. "What’s in a Nym? Gender, Race, Pseudonymity, and the Imagining of the Online Persona." M/C Journal 17, no. 3 (June 11, 2014). http://dx.doi.org/10.5204/mcj.816.

Full text
Abstract:
The Internet has long been a venue for individuals to craft their online personas on their own terms, and many have embraced the opportunity to take on a persona that is not associated with a legally recognised name. The rise of social networking has continued to spur proliferation of online personas, but often in ways that intensify corporate mediation of these personas. Debates about online pseudonymity exemplify these tensions, especially when social media corporations attempt to implement “real name policies” that require users to use one, legally recognised name in their online interactions. These debates, however, have broader stakes: they are negotiations over who has the right to control the individual presentation of self, and thus part of a larger conversation about information control and the future of Internet culture. While there was some coverage of these debates in traditional news media, blogs were a key site for examining how real name policies affect oppressed or marginalised groups. To explore these issues, this essay analyses the rhetoric of feminist and anti-racist blog posts that argue for protecting online pseudonymity practices. In general, these sites construct pseudonymity as a technology of resistance and as a vital tool in ensuring that the Internet remains (or becomes) a democratising force. The essay will first provide an overview of the issue and of blog posts about real name policies and gender and/or race, which were selected by the depth and interest of their commentary, and found by search engine or Twitter hashtag using search terms such as “pseudonymity” and “real name policy.” The essay will then explore how these blog posts theorise how real name policies contribute to the broader move toward a surveillance society. Through these arguments, these bloggers reveal that various online communities have vastly different ways of understanding what it means to construct an online persona, and that these varied understandings in turn shape how communities inscribe value (or danger) in pseudonymous Internet practices. Feminist and Anti-Racist Blogger Responses to Real Name Policies While online pseudonymity has long been hotly debated, the conversation intensified following moves by Google-plus to implement “real name policies” in July 2011. Officially these real name policies were intended to improve the experience of users by making it easy to be found online and ensuring that online conversations remained civil. Critics of real name policies often object to the term “real name” and its implication that a pseudonym is a “fake” name. Moreover, proponents of pseudonymity tend to distinguish between pseudonymity and anonymity; a pseudonym is a public persona with relationships, a reputation to uphold, and often years of use. A pseudonym is thus not a way of escaping the responsibilities of having one’s online actions associated with one’s public persona—it is quite the opposite. Nevertheless, defenders of pseudonymity generally argue that both pseudonymity and anonymity must be permitted. Supporters argue that real name policies will enhance the experience of users, and particularly that they will help stop the widespread incivility of many internet comments, on the presumption that using one’s real name will ensure accountability for one’s behavior online. On the other side, many bloggers have argued that the use of real names will not solve these problems and will instead be a threat to the safety and privacy of users, as well as stymieing debate about important or controversial issues. Moreover, many of these bloggers theorise about gender, politics, technology, and identity in ways that resonate well with broader feminist and critical race theory, as well as current conversations about technology and surveillance society. Feminist and other defenses of pseudonymity have used a variety of tactics. One has been to portray pseudonymity as a standard part of Internet culture, and legal names or “wallet names” as an arbitrary way of governing production of public personas. Underlying this framing of pseudonymity as a fundamental part of Internet culture is a long tradition of defining the Internet as a free, open, and democratic space. Internet enthusiasts have long described and prescribed an Internet in which anyone is free to explore and exchange ideas without the ordinary limits imposed by the flesh world, arguing that the Internet encourages more open debate, decentralises networks of knowledge, allows users to try on new identities, and challenges the rigidity of categories and hierarchies that shape knowledge and conversations in the non-virtual world (Rheingold, Plant). Traditionally, pseudonymity and anonymity have been key ways for users to pursue these ends. Thus, the ability to create one or more online personas has, in this conversation, a direct relationship to questions of democracy and about whose practices count as legitimate or valuable in the online world. Additionally, many feminist bloggers frame real name policies as an attempt at corporate control; these policies thus are symbolic to some bloggers of the shift from what they imagine was once a free and open Internet to a corporate-controlled, highly commercialised realm. s.e. smith, for example, writes that “This is what the nymwars are about; a collision between capitalism and the rest of us, where identities are bargaining chips and tools,” with “nym” being the term for the name and persona that one employs online (“The Google+ Nymwars”). Pseudonymity is thus understood by these bloggers as a necessary practice in a democratic Internet, in which one has the right to define one’s own persona online, rather than allowing one’s persona to be defined by a corporation. This framing of pseudonymity as a normalised and valuable part of Internet communication also seems to be an attempt to pre-empt the question of why someone needs a pseudonym if they are not doing anything wrong, but many of the arguments in favor of pseudonyms in fact address this question directly by producing long lists, such as those at geekfeminism and techdirt. In particular, feminist and anti-racist arguments for protecting pseudonymity emphasise that this practice is especially important for women and other marginalised groups, especially since using a real name may expose them to harassment, discrimination, or social consequences. Women who discuss feminism, for example, are sometimes subject to death and rape threats (Hess; Sarkeesian; s.e. smith “On Blogging, Threats, and Silence”). While many feminist bloggers choose to use their real names anyway, most still suggest that pseudonymity must remain a choice anywhere where one seeks to have conversations about issues of import. Moreover, these arguments are a reversal of the claim that real name requirements will stop harassment—while real name policies are purportedly instated to protect the safety of online conversations, many bloggers, pseudonymous and otherwise, suggest that real name policies make women and minorities of all kinds less safe, both online and off-line, and have other negative effects on these groups as well. For instance, Elusis writes that: For minorities, often their name and reputation doesn’t just affect them, it affects their family, and it affects other members of their minority group. Stories of not just outing but of harassment, abuse, and death threats that escalated to the point of being taken seriously by law enforcement (which takes rather a lot). […] Men who get in arguments with other people online don’t get threatened with rape on a regular basis. Unsurprisingly, trans people get abused in this way too. People of color get driven from online spaces** for daring to speak out. (Hyperlinks in original) Likewise, Sarah Stokely writes: As a woman who’s written about feminism online and received anonymous hatemail and death threats for doing so, I would like to preserve my right to post under a pseudonym to keep myself safe in the real world and if I choose, so I’m not identified as a woman online in places where it might not be safe to do so. […] I don’t believe that getting rid of anonymity online will stop bad behaviour like the abuse and death threats I’ve received. I do think that getting rid of anonymity and pseudonymity online will make it easier for people like myself to become targets of abuse and potentially put us in danger. Note that these comments suggest that simply being a woman or member of any kind of minority may make one a target of harassment. Also notice that these comments tend to frame real name policies as an expression of the privileged—real name policies only appear innocuous because of the assumption that the experiences of financially privileged English-speaking white men are universal, and that knowledge of the experiences of marginalised groups is not necessary to design safe and effective policies for consumers of technology. According to feminist blogger critiques of real name policies, it is this privilege that assumes that those using pseudonyms are the “Others” that decent people must be protected from, instead of examining the possibility that those using the pseudonyms might be the ones in danger. A quotation from Geek Feminism, a site whose lengthy discussions of pseudonymity are often cited by bloggers, further illustrates the centrality of privilege to this debate: the writer notes that a proponents of real name policies has dismissed critique by saying, “Don’t say anything in a comment thread that you wouldn’t say in person,” and Geek Feminism responds, “but that sounds like the voice of someone who’s never received abuse or harassment in person” (“Hacker News and Pseudonymity”). The many bloggers who critique the privilege they find responsible for real name policies suggest that beneath conflicts over pseudonymity and accountability online is not the question of how the online world relates to the flesh world, but instead a fundamental disagreement about the nature of accountability and free expression in the flesh world. In this light, attempts to make the online world mimic the accountabilities and social norms of the offline world operate under the assumption that oppression and abuse are not the norm in the flesh world, and that it is Internet technology and Internet culture that has made conversations uncivil or unsafe, and that these should be converted to be more like the flesh world. In this set of assumptions, the flesh world is characterised by respectful and safe interactions, categories of identity are natural as opposed to something that society imposes on individuals, and the existing ways of holding people accountable for their words and actions is very effective at protecting people. Clearly, however, it takes a degree of privilege to characterise the flesh world this way. Thus, the pseudonymity debate is largely about deeper-seated questions on the nature of identity and power in online and offline settings, while appearing to be about the differences between the real world and the online world. Other bloggers have also countered the assumption that real name policies make the Internet safer, often by pointing out that sites that have mandated the use of real names still see a great deal of harassment. s.e. smith, for instance, argues, “If Google really cares about safety, it needs strong, effective, and enforceable site policies. It needs to create a culture of safety, because, well, if your website’s full of assholes, it’s your fault. Real names policies don’t work. Good site policies and the cultivation of a culture of mutual respect do” (“The Google+ Nymwars,” hyperlinks in original). Pseudonyms allow users to participate in important debates online while maintaining a public persona that allows for continued conversations and interactions, which is vital for sustained activism. In this light, policies that take away users’ abilities to control or shape their online personas may force users to choose silence for their own safety. Individual control over online personas is thus both a safety issue and a free speech issue; in direct contradiction to claims that real name policies make users safer and more able to participate in civil discussions. Other pro-pseudonymity bloggers also celebrate the way that a “robust culture of pseudonymity” focuses discussion on ideas rather than the privilege of the speaker, “which, I often think, is why authoritarians and those with authoritarian tendencies hate it” (Paolucci). boyd notes that: the issue of reputation must be turned on its head when thinking about marginalised people. Folks point to the issue of people using pseudonyms to obscure their identity and, in theory, ‘protect’ their reputation. The assumption baked into this is that the observer is qualified to actually assess someone’s reputation. All too often, and especially with marginalised people, the observer takes someone out of context and judges them inappropriately. boyd is one of many bloggers who note that if one’s name is coded as white, Anglo, and male, using one’s real name may often enhance one’s credibility and authority, but if one’s name is coded otherwise, a pseudonym may be helpful; again, assuming that the white male experience is universal allows one to assume that using a real name is a harmless request. In general, these bloggers’ tactics all serve to denaturalise the assumption that a real name is the normal, desirable, and traditional mode of presenting one’s persona, and highlight the ways that real name policies claim to reflect universal concerns but primarily reflect wealthy white men’s experiences with online personas. Information, Power, and Control over Online Personas Additionally, defenders of pseudonymity associate real name policies with the move to a surveillance society, with particular emphasis on corporate surveillance of consumer behavior, also known as the “personal information economy.” Many feminist blogger discussions of pseudonymity note that while real name policies are purportedly intended for safety and protection, they actually allow corporations to amass huge swaths of data about individuals and to keep nearly all the online activities of one person attached to their name. For example blogger much_a_luck writes that: This is exactly the source of trying to pin down who users ‘really’ are. The advertising economy is super-creepy to me, everybody trying to make money by telling people about something someone else is doing, as efficiently as possible. Maybe I'm naive, but I feel like the internet's advertising-driven economy, with it’s [sic] ability to track and target activity, has just blown this whole sector completely out of control. (Paolucci) And indeed the practice of gathering and storing as much information as possible, simply on the chance that an institution might one day use this information, is becoming a more common fear, whether with regard to corporate data mining or recent news stories about privacy and government surveillance. In the larger conversation about surveillance, in fact, it is often the case that while one side argues that information gathering makes everyone safer, an opposition will claim that such measures actually make people vulnerable to abuses of this information. Blogger Space_dinosaur_blue has called real name policies a “security placebo” that claims to stop harassment while actually doing nothing but invading privacy (comment to Paolucci). s.e. smith has argued: What this is really about, of course, is capitalism. […] For the owners of […] sites like Google+ and Facebook, there’s also a big potential to make a profit through the direct commodification of user identities. […] The standards that Google+ sets revolve around the purchase, sale, and exchange of identity, a multibillion dollar industry worldwide. This is what people should be talking about. (“The Google+ Nymwars”) Clearly, the pseudonymity debate resonates in many ways with broader discussions of surveillance, corporate and otherwise. First, scholars have often noted that surveillances practices tend to be more harmful to those in marginalised or oppressed groups, and feminist arguments for pseudonymity reinforce this finding. Additionally, many defenders of pseudonymity point out the dissembling found in companies’ claims that real name policies are there to protect the safety of users and create a civil and decent space for people to interact while actually using the data for marketing research purposes. Framing pseudonymity as anti-social, uncivil, and dangerous, assumes a criminality so to speak, or at the very least, an illegitimacy, on the part of pseudonym users. The rhetorical move here is worth noting: implicitly suggesting that a real name is an inherent part of civility and safety is also suggesting that you have an ethical obligation to those who would compile information about you. In other words, the rules of civility demand that you participate in the corporatisation and commodification of your identity and personal information. Shaping an online persona—or multiple personas—is not an act of creativity or political resistance or freedom; it is assumed to be an act of aggression toward others. We see here a new form of the “good citizenship” argument that characterises the surveillance society. In debates about national security, for instance, acceptance of extensive surveillance of all citizens is framed as a contribution to national security. Here, however, it is not national security but corporate interests that have been inserted as the epitome of the “common good.” In this framework, an anti-corporate approach to personal information appears to be anti-social and even unethical. Commodification of identity is not only the norm but also an obligation of citizenship. Furthermore, as scholars of surveillance have noted (Gilliom and Monahan for instance), social networking creates an environment in which most individuals are participating in creating a surveillance society simply through the level of documentation they voluntarily provide. Again, more and more, willing participation in surveillance practices—making it easy to be surveilled—is becoming part of one’s civic duty. Thus, the debate over pseudonymity is also a debate about the extent to which corporations can expect compliance to the increasingly normalised demands of a surveillance society. And so, for all of these reasons, debates over pseudonymity reveal a host of complex and multi-layered tensions about technology’s influence on the construction of personas, and how these personas are shaped by encroaching forms of surveillance and the marketing of identities. Proponents of pseudonymity use numerous strategies to challenge, subvert, or reconceptualise privileged assumptions about the complex relationships among names, personas, and identities. In doing so, they contribute to an important shift, from the classic question of “What’s in a name?” to “Who wants to know, and why?” References boyd, danah. “‘Real Names’ Policies Are an Abuse of Power.” Zephoria 4 Aug. 2011. 18 Oct. 2013 ‹http://www.zephoria.org/thoughts/archives/2011/08/04/real-names.html›. Coffeeandink. “RaceFail: Once More, with Misdirection.” Coffeeandink 2 Mar. 2009. 18 Oct. 2013 ‹http://coffeeandink.livejournal.com/901816.html›. Elusis. “Don’t Try to Teach Your Internet Grandmother to Suck Eggs: On Anonymity/Pseudonymity.” Elusis 5 Mar. 2009. 18 Oct. 2013 ‹http://elusis.livejournal.com/1891498.html›. Geek Feminism. “Hacker News and Pseudonymity.” Geek Feminism Wiki n.d. 15 Jan. 2014 ‹http://geekfeminism.org/2010/06/10/hacker-news-and-pseudonymity/›. Gilliom, John, and Torin Monahan. SuperVision: An Introduction to the Surveillance Society. Chicago: University of Chicago Press, 2012. Hess, Amanda. “Why Women Aren’t Welcome on the Internet.” Pacific Standard 6 Jan. 2014. 15 Apr. 2014 ‹http://www.psmag.com/navigation/health-and-behavior/women-arent-welcome-internet-72170/›. Masnick, Mike. “What’s in a Name: The Importance of Pseudonymity and the Dangers of Requiring ‘Real Names.’” TechDirt 5 Aug. 2011. 29 Apr. 2014 ‹https://www.techdirt.com/articles/20110805/14103715409/whats-name-importance-pseudonymity-dangers-requiring-real-names.shtml›. Paolucci, Denise. “Real Name Policies: They Just Don’t Work.” Dreamwidth 3 Aug. 2011. 15 Oct. 2013 ‹http://denise.dreamwidth.org/60359.html›. Plant, Sadie. Zeros + Ones: Digital Women and the New Technoculture. New York: Doubleday, 1997. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge, MA: Basic Books, 2002. Sarkeesian, Anita. “Harassment, Misogyny and Silencing on YouTube.” Feminist Frequency 7 June 2012. 17 Apr. 2014 ‹http://www.feministfrequency.com/2012/06/harassment-misogyny-and-silencing-on-youtube/›. smith, s.e. “The Google+ Nymwars: Where Identity and Capitalism Collide.” Tiger Beatdown 3 Aug. 2011. 18 Oct. 2013 ‹http://tigerbeatdown.com/2011/08/03/the-google-nymwars-where-identity-and-capitalism-collide/›. smith, s.e. “On Blogging, Threats, and Silence.” Tiger Beatdown 11 Oct. 2011. 17 Apr. 2014 ‹http://tigerbeatdown.com/2011/10/11/on-blogging-threats-and-silence/›. Stokely, Sarah. “Why Google Should Allow Anonymous/Pseudonymous Names on Google+.” Sarah Stokely: On Teaching and Participating in Online Media 8 July 2011. 15 Oct. 2013 ‹http://www.sarahstokely.com/blog/2011/07/why-google-should-allow-anonymouspseudonymous-names-on-google/›. “Who Is Harmed by a Real Names Policy?” Geek Feminism Wiki n.d. 15 Oct. 2013 ‹http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F›.
APA, Harvard, Vancouver, ISO, and other styles
30

Milicki, Jasna. "Optimum implementation of information technology in elementary education." IASL Annual Conference Proceedings, October 8, 2019. http://dx.doi.org/10.29173/iasl7391.

Full text
Abstract:
It is well known that reading and writing techniques are learned throughout childhood and that they have a great significance for further development of each individual and the society in general. However, in this day and age children make their first contact with language and script using the widespread digital media. Later in life this will have a negative effect on their ability to recognize letters and start reading.Nowadays Croatian schools are experiencing intensive informatization of educational process. It is expected that modern technology will be used daily, for several hours. On the other hand, we have been witnessing everyday (mis)use of technology by the young people in their free time. The questions then arise: how much time will the students be exposed to the influence of the media on a daily basis, either for educational purposes or for fun? What consequences will this exposure have for them? Numerous researches have shown that overexposure to technology affects cognitive abilities of young people.It is true that young people possess technological skills which they use much more efficiently than the older population, but at the same time they have difficulties assessing or evaluating the sources of information. One of the possible problems is their lack of knowledge about how information is organized or the lack of previous knowledge of a certain field.As far as texts are concerned, most young people will choose printed ones because they think that learning through electronic media is tiresome. The (in)efficiency of learning from e-books is related to excessive use of hyperlinks and other links that divert attention.At the beginning of the school year 2019/2020, Croatian schools will introduce curricular reform which will be accompanied by an emphasized use of tablets and digital content. As educational experts, we advocate optimum implementation of media as technology that makes communication easier, but does not condition it. Communication in educational institutions should be mostly oriented towards quality, content of information and critical approach and to a lesser extent towards the possibilities offered by the media as a means of communication.As to the use of multimedia technology for educational purposes, the e-book and e-reading will be related to specific tasks, research, projects and tasks in popular science area. On the other hand, printed books will still be read in free time, for pleasure and for literary needs. The above are the results of our research done on reading e-books in elementary schools in the Republic of Croatia. With this research we have shown that the so-called Google generation still does not like reading online, including the assigned reading at schools. As it turns out, the assumption that the young people who have been surrounded by the new technology since their birth, will likewise be more interested in reading texts in the new media, is in fact wrong, despite favourable technical conditions. They use the internet and the technology for communication and for fun, but rarely for studying.Therefore, a pilot survey among eighth grade students is about to be conducted. It will show their attitudes and reflections about using more media at the same time (multitasking) and how it affects their studying. It will also show whether the students’ attitude toward e-books and reading has changed.
APA, Harvard, Vancouver, ISO, and other styles
31

Mallan, Kerry Margaret, and Annette Patterson. "Present and Active: Digital Publishing in a Post-print Age." M/C Journal 11, no. 4 (June 24, 2008). http://dx.doi.org/10.5204/mcj.40.

Full text
Abstract:
At one point in Victor Hugo’s novel, The Hunchback of Notre Dame, the archdeacon, Claude Frollo, looked up from a book on his table to the edifice of the gothic cathedral, visible from his canon’s cell in the cloister of Notre Dame: “Alas!” he said, “this will kill that” (146). Frollo’s lament, that the book would destroy the edifice, captures the medieval cleric’s anxiety about the way in which Gutenberg’s print technology would become the new universal means for recording and communicating humanity’s ideas and artistic expression, replacing the grand monuments of architecture, human engineering, and craftsmanship. For Hugo, architecture was “the great handwriting of humankind” (149). The cathedral as the material outcome of human technology was being replaced by the first great machine—the printing press. At this point in the third millennium, some people undoubtedly have similar anxieties to Frollo: is it now the book’s turn to be destroyed by yet another great machine? The inclusion of “post print” in our title is not intended to sound the death knell of the book. Rather, we contend that despite the enduring value of print, digital publishing is “present and active” and is changing the way in which research, particularly in the humanities, is being undertaken. Our approach has three related parts. First, we consider how digital technologies are changing the way in which content is constructed, customised, modified, disseminated, and accessed within a global, distributed network. This section argues that the transition from print to electronic or digital publishing means both losses and gains, particularly with respect to shifts in our approaches to textuality, information, and innovative publishing. Second, we discuss the Children’s Literature Digital Resources (CLDR) project, with which we are involved. This case study of a digitising initiative opens out the transformative possibilities and challenges of digital publishing and e-scholarship for research communities. Third, we reflect on technology’s capacity to bring about major changes in the light of the theoretical and practical issues that have arisen from our discussion. I. Digitising in a “post-print age” We are living in an era that is commonly referred to as “the late age of print” (see Kho) or the “post-print age” (see Gunkel). According to Aarseth, we have reached a point whereby nearly all of our public and personal media have become more or less digital (37). As Kho notes, web newspapers are not only becoming increasingly more popular, but they are also making rather than losing money, and paper-based newspapers are finding it difficult to recruit new readers from the younger generations (37). Not only can such online-only publications update format, content, and structure more economically than print-based publications, but their wide distribution network, speed, and flexibility attract advertising revenue. Hype and hyperbole aside, publishers are not so much discarding their legacy of print, but recognising the folly of not embracing innovative technologies that can add value by presenting information in ways that satisfy users’ needs for content to-go or for edutainment. As Kho notes: “no longer able to satisfy customer demand by producing print-only products, or even by enabling online access to semi-static content, established publishers are embracing new models for publishing, web-style” (42). Advocates of online publishing contend that the major benefits of online publishing over print technology are that it is faster, more economical, and more interactive. However, as Hovav and Gray caution, “e-publishing also involves risks, hidden costs, and trade-offs” (79). The specific focus for these authors is e-journal publishing and they contend that while cost reduction is in editing, production and distribution, if the journal is not open access, then costs relating to storage and bandwith will be transferred to the user. If we put economics aside for the moment, the transition from print to electronic text (e-text), especially with electronic literary works, brings additional considerations, particularly in their ability to make available different reading strategies to print, such as “animation, rollovers, screen design, navigation strategies, and so on” (Hayles 38). Transition from print to e-text In his book, Writing Space, David Bolter follows Victor Hugo’s lead, but does not ask if print technology will be destroyed. Rather, he argues that “the idea and ideal of the book will change: print will no longer define the organization and presentation of knowledge, as it has for the past five centuries” (2). As Hayles noted above, one significant indicator of this change, which is a consequence of the shift from analogue to digital, is the addition of graphical, audio, visual, sonic, and kinetic elements to the written word. A significant consequence of this transition is the reinvention of the book in a networked environment. Unlike the printed book, the networked book is not bound by space and time. Rather, it is an evolving entity within an ecology of readers, authors, and texts. The Web 2.0 platform has enabled more experimentation with blending of digital technology and traditional writing, particularly in the use of blogs, which have spawned blogwriting and the wikinovel. Siva Vaidhyanathan’s The Googlization of Everything: How One Company is Disrupting Culture, Commerce and Community … and Why We Should Worry is a wikinovel or blog book that was produced over a series of weeks with contributions from other bloggers (see: http://www.sivacracy.net/). Penguin Books, in collaboration with a media company, “Six Stories to Start,” have developed six stories—“We Tell Stories,” which involve different forms of interactivity from users through blog entries, Twitter text messages, an interactive google map, and other features. For example, the story titled “Fairy Tales” allows users to customise the story using their own choice of names for characters and descriptions of character traits. Each story is loosely based on a classic story and links take users to synopses of these original stories and their authors and to online purchase of the texts through the Penguin Books sales website. These examples of digital stories are a small part of the digital environment, which exploits computer and online technologies’ capacity to be interactive and immersive. As Janet Murray notes, the interactive qualities of digital environments are characterised by their procedural and participatory abilities, while their immersive qualities are characterised by their spatial and encyclopedic dimensions (71–89). These immersive and interactive qualities highlight different ways of reading texts, which entail different embodied and cognitive functions from those that reading print texts requires. As Hayles argues: the advent of electronic textuality presents us with an unparalleled opportunity to reformulate fundamental ideas about texts and, in the process, to see print as well as electronic texts with fresh eyes (89–90). The transition to e-text also highlights how digitality is changing all aspects of everyday life both inside and outside the academy. Online teaching and e-research Another aspect of the commercial arm of publishing that is impacting on academe and other organisations is the digitising and indexing of print content for niche distribution. Kho offers the example of the Mark Logic Corporation, which uses its XML content platform to repurpose content, create new content, and distribute this content through multiple portals. As the promotional website video for Mark Logic explains, academics can use this service to customise their own textbooks for students by including only articles and book chapters that are relevant to their subject. These are then organised, bound, and distributed by Mark Logic for sale to students at a cost that is generally cheaper than most textbooks. A further example of how print and digital materials can form an integrated, customised source for teachers and students is eFictions (Trimmer, Jennings, & Patterson). eFictions was one of the first print and online short story anthologies that teachers of literature could customise to their own needs. Produced as both a print text collection and a website, eFictions offers popular short stories in English by well-known traditional and contemporary writers from the US, Australia, New Zealand, UK, and Europe, with summaries, notes on literary features, author biographies, and, in one instance, a YouTube movie of the story. In using the eFictions website, teachers can build a customised anthology of traditional and innovative stories to suit their teaching preferences. These examples provide useful indicators of how content is constructed, customised, modified, disseminated, and accessed within a distributed network. However, the question remains as to how to measure their impact and outcomes within teaching and learning communities. As Harley suggests in her study on the use and users of digital resources in the humanities and social sciences, several factors warrant attention, such as personal teaching style, philosophy, and specific disciplinary requirements. However, in terms of understanding the benefits of digital resources for teaching and learning, Harley notes that few providers in her sample had developed any plans to evaluate use and users in a systematic way. In addition to the problems raised in Harley’s study, another relates to how researchers can be supported to take full advantage of digital technologies for e-research. The transformation brought about by information and communication technologies extends and broadens the impact of research, by making its outputs more discoverable and usable by other researchers, and its benefits more available to industry, governments, and the wider community. Traditional repositories of knowledge and information, such as libraries, are juggling the space demands of books and computer hardware alongside increasing reader demand for anywhere, anytime, anyplace access to information. Researchers’ expectations about online access to journals, eprints, bibliographic data, and the views of others through wikis, blogs, and associated social and information networking sites such as YouTube compete with the traditional expectations of the institutions that fund libraries for paper-based archives and book repositories. While university libraries are finding it increasingly difficult to purchase all hardcover books relevant to numerous and varied disciplines, a significant proportion of their budgets goes towards digital repositories (e.g., STORS), indexes, and other resources, such as full-text electronic specialised and multidisciplinary journal databases (e.g., Project Muse and Proquest); electronic serials; e-books; and specialised information sources through fast (online) document delivery services. An area that is becoming increasingly significant for those working in the humanities is the digitising of historical and cultural texts. II. Bringing back the dead: The CLDR project The CLDR project is led by researchers and librarians at the Queensland University of Technology, in collaboration with Deakin University, University of Sydney, and members of the AustLit team at The University of Queensland. The CLDR project is a “Research Community” of the electronic bibliographic database AustLit: The Australian Literature Resource, which is working towards the goal of providing a complete bibliographic record of the nation’s literature. AustLit offers users with a single entry point to enhanced scholarly resources on Australian writers, their works, and other aspects of Australian literary culture and activities. AustLit and its Research Communities are supported by grants from the Australian Research Council and financial and in-kind contributions from a consortium of Australian universities, and by other external funding sources such as the National Collaborative Research Infrastructure Strategy. Like other more extensive digitisation projects, such as Project Gutenberg and the Rosetta Project, the CLDR project aims to provide a centralised access point for digital surrogates of early published works of Australian children’s literature, with access pathways to existing resources. The first stage of the CLDR project is to provide access to digitised, full-text, out-of-copyright Australian children’s literature from European settlement to 1945, with selected digitised critical works relevant to the field. Texts comprise a range of genres, including poetry, drama, and narrative for young readers and picture books, songs, and rhymes for infants. Currently, a selection of 75 e-texts and digital scans of original texts from Project Gutenberg and Internet Archive have been linked to the Children’s Literature Research Community. By the end of 2009, the CLDR will have digitised approximately 1000 literary texts and a significant number of critical works. Stage II and subsequent development will involve digitisation of selected texts from 1945 onwards. A precursor to the CLDR project has been undertaken by Deakin University in collaboration with the State Library of Victoria, whereby a digital bibliographic index comprising Victorian School Readers has been completed with plans for full-text digital surrogates of a selection of these texts. These texts provide valuable insights into citizenship, identity, and values formation from the 1930s onwards. At the time of writing, the CLDR is at an early stage of development. An extensive survey of out-of-copyright texts has been completed and the digitisation of these resources is about to commence. The project plans to make rich content searchable, allowing scholars from children’s literature studies and education to benefit from the many advantages of online scholarship. What digital publishing and associated digital archives, electronic texts, hypermedia, and so forth foreground is the fact that writers, readers, publishers, programmers, designers, critics, booksellers, teachers, and copyright laws operate within a context that is highly mediated by technology. In his article on large-scale digitisation projects carried out by Cornell and University of Michigan with the Making of America collection of 19th-century American serials and monographs, Hirtle notes that when special collections’ materials are available via the Web, with appropriate metadata and software, then they can “increase use of the material, contribute to new forms of research, and attract new users to the material” (44). Furthermore, Hirtle contends that despite the poor ergonomics associated with most electronic displays and e-book readers, “people will, when given the opportunity, consult an electronic text over the print original” (46). If this preference is universally accurate, especially for researchers and students, then it follows that not only will the preference for electronic surrogates of original material increase, but preference for other kinds of electronic texts will also increase. It is with this preference for electronic resources in mind that we approached the field of children’s literature in Australia and asked questions about how future generations of researchers would prefer to work. If electronic texts become the reference of choice for primary as well as secondary sources, then it seems sensible to assume that researchers would prefer to sit at the end of the keyboard than to travel considerable distances at considerable cost to access paper-based print texts in distant libraries and archives. We considered the best means for providing access to digitised primary and secondary, full text material, and digital pathways to existing online resources, particularly an extensive indexing and bibliographic database. Prior to the commencement of the CLDR project, AustLit had already indexed an extensive number of children’s literature. Challenges and dilemmas The CLDR project, even in its early stages of development, has encountered a number of challenges and dilemmas that centre on access, copyright, economic capital, and practical aspects of digitisation, and sustainability. These issues have relevance for digital publishing and e-research. A decision is yet to be made as to whether the digital texts in CLDR will be available on open or closed/tolled access. The preference is for open access. As Hayles argues, copyright is more than a legal basis for intellectual property, as it also entails ideas about authorship, creativity, and the work as an “immaterial mental construct” that goes “beyond the paper, binding, or ink” (144). Seeking copyright permission is therefore only part of the issue. Determining how the item will be accessed is a further matter, particularly as future technologies may impact upon how a digital item is used. In the case of e-journals, the issue of copyright payment structures are evolving towards a collective licensing system, pay-per-view, and other combinations of print and electronic subscription (see Hovav and Gray). For research purposes, digitisation of items for CLDR is not simply a scan and deliver process. Rather it is one that needs to ensure that the best quality is provided and that the item is both accessible and usable by researchers, and sustainable for future researchers. Sustainability is an important consideration and provides a challenge for institutions that host projects such as CLDR. Therefore, items need to be scanned to a high quality and this requires an expensive scanner and personnel costs. Files need to be in a variety of formats for preservation purposes and so that they may be manipulated to be useable in different technologies (for example, Archival Tiff, Tiff, Jpeg, PDF, HTML). Hovav and Gray warn that when technology becomes obsolete, then content becomes unreadable unless backward integration is maintained. The CLDR items will be annotatable given AustLit’s NeAt funded project: Aus-e-Lit. The Aus-e-Lit project will extend and enhance the existing AustLit web portal with data integration and search services, empirical reporting services, collaborative annotation services, and compound object authoring, editing, and publishing services. For users to be able to get the most out of a digital item, it needs to be searchable, either through double keying or OCR (optimal character recognition). The value of CLDR’s contribution The value of the CLDR project lies in its goal to provide a comprehensive, searchable body of texts (fictional and critical) to researchers across the humanities and social sciences. Other projects seem to be intent on putting up as many items as possible to be considered as a first resort for online texts. CLDR is more specific and is not interested in simply generating a presence on the Web. Rather, it is research driven both in its design and implementation, and in its focussed outcomes of assisting academics and students primarily in their e-research endeavours. To this end, we have concentrated on the following: an extensive survey of appropriate texts; best models for file location, distribution, and use; and high standards of digitising protocols. These issues that relate to data storage, digitisation, collections, management, and end-users of data are aligned with the “Development of an Australian Research Data Strategy” outlined in An Australian e-Research Strategy and Implementation Framework (2006). CLDR is not designed to simply replicate resources, as it has a distinct focus, audience, and research potential. In addition, it looks at resources that may be forgotten or are no longer available in reproduction by current publishing companies. Thus, the aim of CLDR is to preserve both the time and a period of Australian history and literary culture. It will also provide users with an accessible repository of rare and early texts written for children. III. Future directions It is now commonplace to recognize that the Web’s role as information provider has changed over the past decade. New forms of “collective intelligence” or “distributed cognition” (Oblinger and Lombardi) are emerging within and outside formal research communities. Technology’s capacity to initiate major cultural, social, educational, economic, political and commercial shifts has conditioned us to expect the “next big thing.” We have learnt to adapt swiftly to the many challenges that online technologies have presented, and we have reaped the benefits. As the examples in this discussion have highlighted, the changes in online publishing and digitisation have provided many material, network, pedagogical, and research possibilities: we teach online units providing students with access to e-journals, e-books, and customized archives of digitised materials; we communicate via various online technologies; we attend virtual conferences; and we participate in e-research through a global, digital network. In other words, technology is deeply engrained in our everyday lives. In returning to Frollo’s concern that the book would destroy architecture, Umberto Eco offers a placatory note: “in the history of culture it has never happened that something has simply killed something else. Something has profoundly changed something else” (n. pag.). Eco’s point has relevance to our discussion of digital publishing. The transition from print to digital necessitates a profound change that impacts on the ways we read, write, and research. As we have illustrated with our case study of the CLDR project, the move to creating digitised texts of print literature needs to be considered within a dynamic network of multiple causalities, emergent technological processes, and complex negotiations through which digital texts are created, stored, disseminated, and used. Technological changes in just the past five years have, in many ways, created an expectation in the minds of people that the future is no longer some distant time from the present. Rather, as our title suggests, the future is both present and active. References Aarseth, Espen. “How we became Postdigital: From Cyberstudies to Game Studies.” Critical Cyber-culture Studies. Ed. David Silver and Adrienne Massanari. New York: New York UP, 2006. 37–46. An Australian e-Research Strategy and Implementation Framework: Final Report of the e-Research Coordinating Committee. Commonwealth of Australia, 2006. Bolter, Jay David. Writing Space: The Computer, Hypertext, and the History of Writing. Hillsdale, NJ: Erlbaum, 1991. Eco, Umberto. “The Future of the Book.” 1994. 3 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Gunkel, David. J. “What's the Matter with Books?” Configurations 11.3 (2003): 277–303. Harley, Diane. “Use and Users of Digital Resources: A Focus on Undergraduate Education in the Humanities and Social Sciences.” Research and Occasional Papers Series. Berkeley: University of California. Centre for Studies in Higher Education. 12 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Hayles, N. Katherine. My Mother was a Computer: Digital Subjects and Literary Texts. Chicago: U of Chicago P, 2005. Hirtle, Peter B. “The Impact of Digitization on Special Collections in Libraries.” Libraries & Culture 37.1 (2002): 42–52. Hovav, Anat and Paul Gray. “Managing Academic E-journals.” Communications of the ACM 47.4 (2004): 79–82. Hugo, Victor. The Hunchback of Notre Dame (Notre-Dame de Paris). Ware, Hertfordshire: Wordsworth editions, 1993. Kho, Nancy D. “The Medium Gets the Message: Post-Print Publishing Models.” EContent 30.6 (2007): 42–48. Oblinger, Diana and Marilyn Lombardi. “Common Knowledge: Openness in Higher Education.” Opening up Education: The Collective Advancement of Education Through Open Technology, Open Content and Open Knowledge. Ed. Toru Liyoshi and M. S. Vijay Kumar. Cambridge, MA: MIT Press, 2007. 389–400. Murray, Janet H. Hamlet on the Holodeck: The Future of Narrative in Cyberspace. Cambridge, MA: MIT Press, 2001. Trimmer, Joseph F., Wade Jennings, and Annette Patterson. eFictions. New York: Harcourt, 2001.
APA, Harvard, Vancouver, ISO, and other styles
32

Michielse, Maarten. "Musical Chameleons: Fluency and Flexibility in Online Remix Contests." M/C Journal 16, no. 4 (August 11, 2013). http://dx.doi.org/10.5204/mcj.676.

Full text
Abstract:
While digital remix practices in music have been researched extensively in the last few years (see recently Jansen; Navas; Pinch and Athanasiades; Väkevä), the specific challenges and skills that are central to remixing are still not well understood (Borschke 90). As writers like Demers, Lessig, and Théberge argue, the fact that remixers rework already existing songs rather than building a track from scratch, often means they are perceived as musical thieves or parasites rather than creative artists. Moreover, as writers like Borschke and Rodgers argue, because remixers make use of digital audio workstations to produce and rework their sounds, their practices tend to be seen as highly automated, offering relatively little by way of musical and creative challenges, especially compared to more traditional (electro)acoustic forms of music-making. An underestimation of skill is problematic, however, because, as my own empirical research shows, creative skills and challenges are important to the way digital remixers themselves experience and value their practice. Drawing from virtual ethnographic research within the online remix communities of Indaba Music, this article argues that, not despite but because remixers start from already existing songs and because they rework these songs with the help of digital audio workstations, a particular set of creative abilities becomes foregrounded, namely: ‘fluency’ and ‘flexibility’ (Gouzouasis; Guilford, “Creativity Research”, Intelligence, “Measurement”). Fluency, the way the concept is used here, refers to the ability to respond to, and produce ideas for, a wide variety of musical source materials, quickly and easily. Flexibility refers to the ability to understand, and adapt these approaches to, the ‘musical affordances’ (Gibson; Windsor and De Bézenac) of the original song, that is: the different musical possibilities and constraints the source material provides. For remixers, fluency and flexibility are not only needed in order to be able to participate in these remix contests, they are also central to the way they value and evaluate each other’s work.Researching Online Remix ContestsAs part of a larger research project on online music practices, between 2011 and 2012, I spent eighteen months conducting virtual ethnographic research (Hine) within several remix competitions hosted on online music community Indaba Music. Indaba is not the only online community where creative works can be exchanged and discussed. For this research, however, I have chosen to focus on Indaba because, other than in a remix community like ccMixter for example, competitions are very much central to the Indaba community, thus making it a good place to investigate negotiations of skills and techniques. Also, unlike a community like ACIDplanet which is tied explicitly to Sony’s audio software program ACID Pro, Indaba is not connected to any particular audio workstation, thus providing an insight into a relatively broad variety of remix practices. During my research on Indaba, I monitored discussions between participants, listened to work that had been uploaded, and talked to remixers via personal messaging. In addition to my daily monitoring, I also talked to 21 remixers more extensively through Skype interviews. These interviews were semi-structured, and lasted between 50 minutes and 3.5 hours, sometimes spread over multiple sessions. During these interviews, remixers not only talked about their practices, they also shared work in progress with me by showing their remixes on screen or by directing a webcam to their instruments while they played, recorded, or mixed their material. All the remixers who participated in these interviews granted me permission to quote them and to use the original nicknames or personal names they use on Indaba in this publication. Besides the online observations and interviews, I also participated in three remix competitions myself, in order to gain a better understanding of what it means to be part of a remix community and to see what kind of challenges and abilities are involved. In the online remix contests of Indaba, professional artists invite remixers to rework a song and share and discuss these works within the community. For the purpose of these contests, artists provide separate audio files (so-called ‘stems’) for different musical elements such as voice, drums, bass, or guitar. Remixers can produce their tracks by rearranging these stems, or they can add new audio material, such as beats, chords, and rhythms, as long as this material is not copyrighted. Remixers generally comply with this rule. During the course of a contest, remixers upload their work to the website and discuss and share the results with other remixers. A typical remix contest draws between 200 or 300 participants. These participants are mostly amateur musicians or semi-professionals in the sense that they do not make a living with their creative practices, but rather participate in these contests as a hobby. A remix contest normally lasts for four or five weeks. After that time, the hosting artist chooses a winner and the remixers move on to another contest, hosted by a different artist and featuring a new song, sometimes from a completely different musical genre. It is partly because of this move from contest to contest that fluency and flexibility can be understood as central abilities within these remix practices. Fluency and flexibility are concepts adopted from the work of Joy Paul Guilford (“Creativity Research”, Intelligence, “Measurement”) who developed them in his creativity research from the 1950s onwards. For Guilford, fluency and flexibility are part of divergent-production abilities, those abilities we need in order to be able to deal with open questions or tasks, in which multiple solutions or answers are possible, in a quick and effective way. Within creativity research, divergent-production abilities have mainly been measured and evaluated quantitatively. In music related studies, for example, researchers have scored and assessed so-called fluency and flexibility factors in the music practices of children and adults and compared them to other creative abilities (Webster). For the purpose of this article, however, I do not wish to approach fluency and flexibility quantitatively. Rather, I would like to show that in online remix practices, fluency and flexibility, as creative abilities, become very much foregrounded. Gouzouasis already alludes to this possibility, pointing out that, in digital music practices, fluency might be more important than the ability to read and write traditional music notation. Gouzouasis’ argument, however, does not refer to a specific empirical case. Also, it does not reflect on how digital musicians themselves consider these abilities central to their own practices. Looking at online remix competitions, however, this last aspect becomes clear.FluencyFor Guilford, ‘fluency’ can be understood as the ability to produce a response, or multiple responses, to an open question or task quickly and easily (“Creativity Research”, Intelligence, “Measurement”). It is about making associations, finding different uses or purposes for certain source materials, and combining separate elements into organised phrases and patterns. Based on this definition, it is not difficult to see a link with remix competitions, in which remixers are asked to come up with a musical response to a given song within a limited time frame. Online remix contests are essentially a form of working on demand. It is the artist who invites the audience to remix a song. It is also the artist who decides which song can be remixed and which audio files can be used for that mix. Remixers who participate in these contests are usually not fans of these artists. Often they do not even know the song before they enter a competition. Instead, they travel from contest to contest, taking on many different remix opportunities. For every competition, then, remixers have to first familiarise themselves with the source material, and then try to come up with a creative response that is not only different from the original, but also different from all the other remixes that have already been uploaded. Remixers do not consider this a problem, but embrace it as a challenge. As Moritz Breit, one of the remixers, explained to me: “I like remixing [on Indaba] because it’s a challenge. You get something and have to make something different out of it, and later people will tell you how you did.” Or as hüpersonique put it: “It’s really a challenge. You hear a song and you say: ‘OK, it’s not my taste. But it’s good quality and if I could do something in my genre that would be very interesting’.” If these remixers consider the competitions to be a challenge, it is mainly because these contests provide an exercise of call and response. On Indaba, remixers apply different tempos, timbres, and sounds to a song, they upload and discuss work in progress, and they evaluate and compare the results by commenting on each other’s work. While remixers officially only need to develop one response, in practice they tend to create multiple ideas which they either combine in a single eclectic mix or otherwise include in different tracks which they upload separately. Remixers even have their own techniques in order to stimulate a variety of responses. Some remixers, for example, told me how they expose themselves to a large number of different songs and artists before they start remixing, in order to pick up different ideas and sounds. Others told me how they prefer not to listen to the original song, as it might diminish their ability to move away from it. Instead, they download only one or two of the original stems (usually the vocals) and start improvising around those sounds, without ever having heard the original song as a whole. As Ola Melander, one of the remixers, explained: “I never listen to it. I just load [the vocals] and the drum tracks. [....] I have to do it [in] my own style. [….] I don’t want that the original influences it, I want to make the chords myself, and figure out what it will sound like.” Or as Stretched Mind explained to me: “I listen to the vocal stem, only that, so no synths, no guitars, just pure vocal stems, nothing else. And I figure out what could fit with that.” On Indaba, being able to respond to, and associate around, the original track is considered to be more important than what Guilford calls ‘elaboration’ (“Measurement” 159). For Guilford, elaboration is the ability to turn a rough outline into a detailed and finished whole. It is basically a form of fine tuning. In the case of remixing, this fine tuning is called ‘mastering’ and it is all about getting exactly the right timbre, dynamics, volume, and balance in a track in order to create a ‘perfect’ sounding mix. On Indaba, only a select group of remixers is actually interested in such a professional form of elaboration. As Moritz Breit told me: “It’s not that you have like a huge bunch of perfectly mastered submissions. So nobody is really expecting that from you.” Indeed, in the comment section remixers tend to say less about audio fidelity than about how they like a certain approach. Even when a critical remark is made about the audio quality of a mix, these criticisms are often preceded or followed by encouraging comments which praise the idea behind the track or applaud the way a remixer has brought the song into a new direction. In short, the comments are often directed more towards fluency than towards elaboration, showing that for many of these remixers the idea of a response, any response, is more important than creating a professional or sellable track.Being able to produce a musical response is also more important on Indaba than having specific musical instrument skills. Most remixers work with digital audio workstations, such as Cubase, Logic Pro, and Pro Tools. These software programs make it possible to manipulate and produce sounds in ways that may include musical instruments, but do not necessarily involve them. As Hugill writes, with these programs “a sound source could be a recording, a live sound, an acoustic instrument, a synthesizer, the human body, etc. In fact, any sounding object can be a sound source” (128). As such, remix competitions tend to draw a large variety of different participants, with a wide range of musical backgrounds and instrument skills. Some remixers on Indaba create their remixes by making use of sample libraries and loops. Others, who have the ability, also add sounds with instruments such as drums, guitars, or violins, which they record with microphones or, in the case of electronic or digital instruments, plug directly into their personal computers. Remixers who are confident about their instrument skills improvise around the original tracks in real-time, while less confident players record short segments, which they then alter and correct afterwards with their audio programs. Within the logic of these digital audio workstation practices, these differences are not significant, as all audio input merely functions as a starting point, needing to be adjusted, layered, combined, and recombined afterwards in order to create the final mix. For the contestants themselves these differences are also not so significant, as contestants are still, in their own ways, involved in the challenge of responding to and associating around the original stems, regardless of the specific techniques or instruments used. The fact that remixers are open to different methods and techniques does not mean, however, that every submission is considered to be as valid as any other. Remixers do have strong opinions about what is a good remix and what is not. Looking at the comments contestants give on each other’s work, and the way they talk about their practices during interviews, it becomes clear that remixers find it important that a remix somehow fits the original source material. As hüpersonique explained: “A lot of [remixes] don’t really match the vocals (…) and then it sounds not that good.” From this perspective, remixers not only need to be fluent, they also need to be flexible towards their source material. FlexibilityFor Guilford, flexibility is the readiness to change direction or method (Intelligence, “Measurement”). It is, as Arnold writes, “facilitated by having a great many tricks in your bag, knowing lots of techniques, [and] having broad experience” (129). In music, flexibility can be understood as the ability to switch easily between different sounds, rhythms, and approaches, in order to achieve a desired musical effect. Guilford distinguishes between two forms of flexibility: ‘spontaneous flexibility’, when a subject chooses himself to switch between different approaches, and ‘adaptive flexibility’ when a switch in approach is necessary or preferred to fit a certain task (“Measurement” 158). While both forms of flexibility can be found on Indaba, adaptive flexibility is seen as a particularly important criterion of being a skilled remixer, as it shows that a remixer is able to understand, and react to, the musical affordances of the original track. The idea that music has affordances is not new. As Windsor and De Bézenac argue, building on Gibson’s original theory of affordances, even in the most free expressive jazz improvisations, there are certain cues that make us understand if a solo is “going with” or “going against” the shared context, and it is these cues that guide a musician through an improvisation (111). The same is true for remix practices. As Regelski argues, any form of music rearranging or appropriation “requires considerable understanding of music’s properties – and the different affordances of those properties” (38). Even when remixers only use one of the original stems, such as the vocals, they need to take into account, for example, the tempo of the song, the intensity of the voice, the chord patterns on which the vocals are based, and the mood or feeling the singer is trying to convey. A skilled remixer, then, builds his or her ideas on top of that so that they strengthen and not diminish these properties. On Indaba, ironic or humoristic remixers too are expected to consider at least some of the basic features of the original track, such as its key or its particular form of musical phrasing. Remixes in which these features are purposely ignored are often not appreciated by the community. As Tim Toz, one of the remixers, explained: “There’s only so much you can do, I think, in the context of a melody plus the way the song was originally sung. […] I hear guys trying to bend certain vocal cadences into other kinds of grooves, and it somehow doesn’t work […], it [begins] to sound unnatural.” On Indaba, remixers complement each other when they find the right approach to the original track. They also critique each other when an approach does not fit the original song, when it does not go along with the ‘feel’ of the track, or when it seem to be out of key or sync with the vocals. By discussing each other’s tracks, remixers not only collectively explore the limits and possibilities of a song, they also implicitly discuss their abilities to hear those possibilities and be able to act on them appropriately. What remixers need in order to be able to do this is what Hugill calls, ‘aural awareness’ (15): the ability to understand how sound works, both in a broad and in-depth way. While aural awareness is important for any musician, remixers are especially reliant on it, as their work is centred around the manipulation and extension of already existing sounds (Hugill). In order to be able to move from contest to contest, remixers need to have a broad understanding of how different musical styles work and the kind of possibilities they afford. At the same time they also need to know, at a more granular level, how sounds interact and how small alterations of chords, timbres, or rhythms can change the overall feel of a track. ConclusionRemix competitions draw participants with a wide variety of musical backgrounds who make use of a broad range of instruments and techniques. The reason such a diverse group is able to participate and compete together is not because these practices do not require musical skill, but rather because remix competitions draw on particular kinds of abilities which are not directly linked to specific methods or techniques. While it might not be necessary to produce a flawless track or to be able to play musical material in real-time, remixers do need to be able to respond to a wide variety of source materials, in a quick and effective way. Also, while it might not be necessary for remixers to be able to produce a song from scratch, they do need to be able to understand, and adapt to, the musical affordances different songs provide. In order to be able to move from contest to contest, as true musical chameleons, remixers need a broad and in-depth understanding of how sound works in different musical contexts and how particular musical responses can be achieved. As soon as remixers upload a track, it is mainly these abilities that will be judged, discussed, and evaluated by the community. In this way fluency and flexibility are not only central abilities in order to be able to participate in these remix competitions, they are also important yardsticks by which remixers measure and evaluate both their own work and the achievements of their peers.AcknowledgementsThe author would like to thank Renée van de Vall, Karin Wenz, and Dennis Kersten for their comments on early drafts of this article. Parts of this research have, in an earlier stage, been presented during the IASPM International Conference for the Study of Popular Music in Gijon, Spain 2013. ReferencesArnold, John E. “Education for Innovation.” A Source Book for Creative Thinking. Eds. Sidney Jay Parnes and Harold F. Harding. New York: Charles Scribner’s Sons, 1962.Borschke, Margie. Rethinking the Rhetoric of Remix. Copies and Material Culture in Digital Networks. PhD Thesis U of New South Wales, 2012.Demers, Joanna. Steal This Music. How Intellectual Property Law Affects Musical Creativity. Athens: The U of Georgia P, 2006. Gibson, James J. The Ecological Approach to Visual Perception. London: Lawrence Erlbaum, 1986. Gouzouasis, Peter. “Fluency in General Music and Arts Technologies: Is the Future of Music a Garage Band Mentality?” Action, Criticism, and Theory for Music Education 4. 2 (2005). 26 Aug. 2012 .Guilford, Joy Paul. “Creativity: It’s Measurement and Development.” A Source Book for Creative Thinking. Eds. Sidney Jay Parnes and Harold F. Harding. New York: Charles Scribner’s Sons, 1962. Guilford, Joy Paul. “Creativity Research: Past, Present and Future.” Frontiers of Creativity Research. Beyond the Basics. Ed. Scott G. Isaksen. Buffalo: Bearly Limited, 1987 [1950]. 33–65. Guilford, Joy Paul. The Nature of Human Intelligence. London: McGraw-Hill, 1971. Hine, Christine. Virtual Ethnography. London: Sage, 2000. Hugill, Andrew. The Digital Musician. New York: Routledge, 2008.Jansen, Bas. Where Credit is Due: Cultural Practices of Recorded Music. PhD Thesis U of Amsterdam, 2011. Lessig, Lawrence. Remix. Making Art and Commerce Thrive in the Hybrid Economy. London: Bloomsbury, 2008. Navas, Eduardo. Remix Theory. The Aesthetics of Sampling. New York: Springer Wien, 2012.Pinch, Trevor, and Katherine Athanasiades. “Online Music Sites as Sonic Sociotechnical Communities: Identity, Reputation, and Technology at ACIDplanet.com.” The Oxford Handbook of Sound Studies. Eds. Trevor Pinch and Karin Bijsterveld. Oxford: Oxford UP, 2011. 480–505.Regelski, Thomas A. “Amateuring in Music and its Rivals.” Action, Criticism, and Theory for Music Education 6. 3 (2007): 22–50. Rodgers, Tara. “On the Process and Aesthetics of Sampling in Electronic Music Production.” Organised Sound 8.3 (2003): 313–20. Théberge, Paul. “Technology, Creative Practice and Copyright.” Music and Copyright. Second Edition. Eds. Simon Frith and Lee Marshall. Edinburgh: Edinburgh UP, 2004. 139–56. Väkevä, Lauri. “Garage Band or GarageBand®? Remixing Musical Futures.” British Journal of Music Education 27. 1 (2010): 59–70.Webster, Peter R. “Research on Creative Thinking in Music: The Assessment Literature.” Handbook of Research on Music Teaching and Learning. Ed. Richard Colwell. New York: Shirmer, 1992. 266–80. Windsor, W. Luke, and Christophe de Bézenac. “Music and Affordances.” Musicae Scientiae 16. 1 (2012): 102–20.
APA, Harvard, Vancouver, ISO, and other styles
33

Potts, Graham. ""I Want to Pump You Up!" Lance Armstrong, Alex Rodriguez, and the Biopolitics of Data- and Analogue-Flesh." M/C Journal 16, no. 6 (November 6, 2013). http://dx.doi.org/10.5204/mcj.726.

Full text
Abstract:
The copyrighting of digital augmentations (our data-flesh), their privatization and ownership by others from a vast distance that is simultaneously instantly telematically surmountable started simply enough. It was the initially innocuous corporatization of language and semiotics that started the deeper ontological flip, which placed the posthuman bits and parts over the posthuman that thought that it was running things. The posthumans in question, myself included, didn't help things much when, for instance, we all clicked an unthinking or unconcerned "yes" to Facebook® or Gmail®'s "terms and conditions of use" policies that gives them the real ownership and final say over those data based augments of sociality, speech, and memory. Today there is growing popular concern (or at least acknowledgement) over the surveillance of these augmentations by government, especially after the Edward Snowden NSA leaks. The same holds true for the dataveillance of data-flesh (i.e. Gmail® or Facebook® accounts) by private corporations for reasons of profit and/or at the behest of governments for reasons of "national security." While drawing a picture of this (bodily) state, of the intrusion through language of brands into our being and their coterminous policing of intelligible and iterative body boundaries and extensions, I want to address the next step in copyrighted augmentation, one that is current practice in professional sport, and part of the bourgeoning "anti-aging" industry, with rewriting of cellular structure and hormonal levels, for a price, on the open market. What I want to problematize is the contradiction between the rhetorical moralizing against upgrading the analogue-flesh, especially with respect to celebrity sports stars like Lance Armstrong and Alex Rodriquez, all the while the "anti-aging" industry does the same without censor. Indeed, it does so within the context of the contradictory social messaging and norms that our data-flesh and electric augmentations receive to constantly upgrade. I pose the question of the contradiction between the messages given to our analogue-flesh and data-flesh in order to examine the specific site of commentary on professional sports stars and their practices, but also to point to the ethical gap that exists not just for (legal) performance enhancing drugs (PED), but also to show the link to privatized and copyrighted genomic testing, the dataveillance of this information, and subsequent augmentations that may be undertaken because of the results. Copyrighted Language and Semiotics as Gateway Drug The corporatization of language and semiotics came about with an intrusion of exclusively held signs from the capitalist economy into language. This makes sense if one want to make surplus value greater: stamp a name onto something, especially a base commodity like a food product, and build up the name of that stamp, however one will, so that that name has perceived value in and of itself, and then charge as much as one can for it. Such is the story of the lack of real correlation between the price of Starbucks Coffee® and coffee as a commodity, set by Starbucks® on the basis of the cultural worth of the symbols and signs associated with it, rather than by what they pay for the labor and production costs prior to its branding. But what happens to these legally protected stamps once they start acting as more than just a sign and referent to a subsection of a specific commodity or thing? Once the stamp has worth and a life that is socially determined? What happens when these stamps get verbed, adjectived, and nouned? Naomi Klein, in the book that the New York Times referred to as a "movement bible" for the anti-globalization forces of the late 1990s said "logos, by the force of ubiquity, have become the closest thing we have to an international language, recognized and understood in many more places than English" (xxxvi). But there is an inherent built-in tension of copyrighted language and semiotics that illustrates the coterminous problems with data- and analogue-flesh augments. "We have almost two centuries' worth of brand-name history under our collective belt, coalescing to create a sort of global pop-cultural Morse code. But there is just one catch: while we may all have the code implanted in our brains, we're not really allowed to use it" (Klein 176). Companies want their "brands to be the air you breathe in - but don't dare exhale" or otherwise try to engage in a two-way dialogue that alters the intended meaning (Klein 182). Private signs power first-world and BRIC capitalism, language, and bodies. I do not have a coffee in the morning; I have Starbucks®. I do not speak on a cellular phone; I speak iPhone®. I am not using my computer right now; I am writing MacBook Air®. I do not look something up, search it, or research it; I Google® it. Klein was writing before the everyday uptake of sophisticated miniaturized and mobile computing and communication devices. With the digitalization of our senses and electronic limbs this viral invasion of language became material, effecting both our data- and analogue-flesh. The trajectory? First we used it; then we wore it as culturally and socially demarcating clothing; and finally we no longer used copyrighted speech terms: it became an always-present augmentation, an adjective to the lexicon body of language, and thereby out of democratic semiotic control. Today Twitter® is our (140 character limited) medium of speech. Skype® is our sense of sight, the way we have "real" face-to-face communication. Yelp® has extended our sense of taste and smell through restaurant reviews. The iPhone® is our sense of hearing. And OkCupid® and/or Grindr® and other sites and apps have become the skin of our sexual organs (and the site where they first meet). Today, love at first sight happens through .jpeg extensions; our first sexual experience ranked on a scale of risk determined by the type of video feed file format used: was it "protected" enough to stop its "spread"? In this sense the corporatization of language and semiotics acted as the gateway drug to corporatized digital-flesh; from use of something that is external to us to an augmentation that is part of us and indeed may be in excess of us or any notion of a singular liberal subject.Replacement of Analogue-Flesh? Arguably, this could be viewed as the coming to be of the full replacement of the fleshy analogue body by what are, or started as digital augmentations. Is this what Marshall McLuhan meant when he spoke of the "electronic exteriorization of the central nervous system" through the growing complexity of our "electric extensions"? McLuhan's work that spoke of the "global village" enabled by new technologies is usually read as a euphoric celebration of the utopic possibilities of interconnectivity. What these misreadings overlook is the darker side of his thought, where the "cultural probe" picks up the warning signals of the change to come, so that a Christian inspired project, a cultural Noah’s Ark, can be created to save the past from the future to come (Coupland). Jean Baudrillard, Paul Virilio, and Guy Debord have analyzed this replacement of the real and the changes to the relations between people—one I am arguing is branded/restricted—by offering us the terms simulacrum (Baudrillard), substitution (Virilio), and spectacle (Debord). The commonality which links Baudrillard and Virilio, but not Debord, is that the former two do not explicitly situate their critique as being within the loss of the real that they then describe. Baudrillard expresses that he can have a 'cool detachment' from his subject (Forget Foucault/Forget Baudrillard), while Virilio's is a Catholic moralist's cry lamenting the disappearance of the heterogeneous experiential dimensions in transit along the various axes of space and time. What differentiates Debord is that he had no qualms positioning his own person and his text, The Society of the Spectacle (SotS), as within its own subject matter - a critique that is limited, and acknowledged as such, by the blindness of its own inescapable horizon.This Revolt Will Be Copyrighted Yet today the analogue - at the least - performs a revolt in or possibly in excess of the spectacle that seeks its containment. How and at what site is the revolt by the analogue-flesh most viewable? Ironically, in the actions of celebrity professional sports stars and the Celebrity Class in general. Today it revolts against copyrighted data-flesh with copyrighted analogue-flesh. This is even the case when the specific site of contestation is (at least the illusion of) immortality, where the runaway digital always felt it held the trump card. A regimen of Human Growth Hormone (HGH) and other PEDs purports to do the same thing, if not better, at the cellular level, than the endless youth paraded in the unaging photo employed by the Facebook or Grindr Bodies®. But with the everyday use and popularization of drugs and enhancement supplements like HGH and related PEDs there is something more fundamental at play than the economic juggernaut that is the Body Beautiful; more than fleshy jealousy of Photoshopped® electronic skins. This drug use represents the logical extension of the ethics that drive our tech-wired lives. We are told daily to upgrade: our sexual organs (OkCupid® or Grindr®) for a better, more accurate match; our memory (Google® services) for largeness and safe portability; and our hearing and sight (iPhone® or Skype®) for increase connectivity, engaging the "real" (that we have lost). These upgrades are controlled and copyrighted, but that which grows the economy is an especially favored moral act in an age of austerity. Why should it be surprising, then, that with the economic backing of key players of Google®—kingpin of the global for-profit dataveillance racket—that for $99.95 23andMe® will send one a home DNA test kit, which once returned will be analyzed for genetic issues, with a personalized web-interface, including "featured links." Analogue-flesh fights back with willing copyrighted dataveillance of its genetic code. The test and the personalized results allow for augmentations of the Angelina Jolie type: private testing for genetic markers, a double mastectomy provided by private healthcare, followed by copyrighted replacement flesh. This is where we find the biopolitics of data- and analogue-flesh, lead forth, in an ironic turn, by the Celebrity Class, whom depend for their income on the lives of their posthuman bodies. This is a complete reversal of the course Debord charts out for them: The celebrity, the spectacular representation of a living human being, embodies this banality by embodying the image of a possible role. Being a star means specializing in the seemingly lived; the star is the object of identification with the shallow seeming life that has to compensate for the fragmented productive specializations which are actually lived. (SotS) While the electronic global village was to have left the flesh-and-blood as waste, today there is resistance by the analogue from where we would least expect it - attempts to catch up and replant itself as ontologically prior to the digital through legal medical supplementation; to make the posthuman the posthuman. We find the Celebrity Class at the forefront of the resistance, of making our posthuman bodies as controlled augmentations of a posthuman. But there is a definite contradiction as well, specifically in the press coverage of professional sports. The axiomatic ethical and moral sentiment of our age to always upgrade data-flesh and analogue-flesh is contradicted in professional sports by the recent suspensions of Lance Armstrong and Alex Rodriguez and the political and pundit critical commentary on their actions. Nancy Reagan to the Curbside: An Argument for Lance Armstrong and Alex Rodriguez's "Just Say Yes to Drugs" Campaign Probably to the complete shock of most of my family, friends, students, and former lovers who may be reading this, I actually follow sports reporting with great detail and have done so for years. That I never speak of any sports in my everyday interactions, haven't played a team or individual sport since I could speak (and thereby use my voice to inform my parents that I was refusing to participate), and even decline amateur or minor league play, like throwing a ball of any kind at a family BBQ, leaves me to, like Judith Butler, "give an account of oneself." And this accounting for my sports addiction is not incidental or insignificant with respect either to how the posthuman present can move from a state of posthumanism to one of posthumanism, nor my specific interpellation into (and excess) in either of those worlds. Recognizing that I will not overcome my addiction without admitting my problem, this paper is thus a first-step public acknowledgement: I have been seeing "Dr. C" for a period of three years, and together, through weekly appointments, we have been working through this issue of mine. (Now for the sake of avoiding the cycle of lying that often accompanies addiction I should probably add that Dr. C is a chiropractor who I see for back and nerve damage issues, and the talk therapy portion, a safe space to deal with the sports addiction, was an organic outgrowth of the original therapy structure). My data-flesh that had me wired in and sitting all the time had done havoc to the analogue-flesh. My copyrighted augments were demanding that I do something to remedy a situation where I was unable to be sitting and wired in all the time. Part of the treatment involved the insertion of many acupuncture needles in various parts of my body, and then having an electric current run through them for a sustained period of time. Ironically, as it was the wired augmentations that demanded this, due to my immobility at this time - one doesn't move with acupuncture needles deep within the body - I was forced away from my devices and into unmediated conversation with Dr. C about sports, celebrity sports stars, and the recent (argued) infractions by Armstrong and Rodriguez. Now I say "argued" because in the first place are what A-Rod and Armstrong did, or are accused of doing, the use of PEDs, HGH, and all the rest (cf. Lupica; Thompson, and Vinton) really a crime? Are they on their way, or are there real threats of jail and criminal prosecution? And in the most important sense, and despite all the rhetoric, are they really going against prevailing social norms with respect to medical enhancement? No, no, and no. What is peculiar about the "witch-hunt" of A-Rod and Armstrong - their words - is that we are undertaking it in the first place, while high-end boutique medical clinics (and internet pharmacies) offer the same treatment for analogue-flesh. Fixes for the human in posthuman; ways of keeping the human up to speed; arguably the moral equivalent, if done so with free will, of upgrading the software for ones iOS device. If the critiques of Baudrillard and Virilio are right, we seem to find nothing wrong with crippling our physical bodies and social skills by living through computers and telematic technologies, and obsess over the next upgrade that will make us (more) faster and quicker (than the other or others), while we righteously deny the same process to the flesh for those who, in Debord's description, are the most complicit in the spectacle, to the supposedly most posthuman of us - those that have become pure spectacle (Debord), pure simulation (Baudrillard), a total substitution (Virilio). But it seems that celebrities, and sports celebrities in specific haven't gone along for the ride of never-ending play of their own signifiers at the expense of doing away with the real; they were not, in Debord's words, content with "specializing in the seemingly lived"; they wanted, conversely, to specialize in the most maximally lived flesh, right down to cellular regeneration towards genetic youth, which is the strongest claim in favor of taking HGH. It looks like they were prepared to, in the case of Armstrong, engage in the "most sophisticated, professionalized and successful doping program that sport has ever seen" in the name of the flesh (BBC). But a doping program that can, for the most part, be legally obtained as treatment, and in the same city as A-Rod plays in and is now suspended for his "crimes" to boot (NY Vitality). This total incongruence between what is desired, sought, and obtained legally by members of their socioeconomic class, and many classes below as well, and is a direct outgrowth of the moral and ethical axiomatic of the day is why A-Rod and Armstrong are so bemused, indignant, and angry, if not in a state of outright denial that they did anything that was wrong, even while they admit, explicitly, that yes, they did what they are accused of doing: taking the drugs. Perhaps another way is needed to look at the unprecedentedly "harsh" and "long" sentences of punishment handed out to A-Rod and Armstrong. The posthuman governing bodies of the sports of the society of the spectacle in question realize that their spectacle machines are being pushed back at. A real threat because it goes with the grain of where the rest of us, or those that can buy in at the moment, are going. And this is where the talk therapy for my sports addiction with Dr. C falls into the story. I realized that the electrified needles were telling me that I too should put the posthuman back in control of my damaged flesh; engage in a (medically copyrighted) piece of performance philosophy and offset some of the areas of possible risk that through restricted techne 23andMe® had (arguably) found. Dr. C and I were peeved with A-Rod and Armstrong not for what they did, but what they didn't tell us. We wanted better details than half-baked admissions of moral culpability. We wanted exact details on what they'd done to keep up to their digital-flesh. Their media bodies were cultural probes, full in view, while their flesh bodies, priceless lab rats, are hidden from view (and likely to remain so due to ongoing litigation). These were, after all, big money cover-ups of (likely) the peak of posthuman science, and the lab results are now hidden behind an army of sports federations lawyers, and agents (and A-Rod's own army since he still plays); posthuman progress covered up by posthuman rules, sages, and agents of manipulation. Massive posthuman economies of spectacle, simulation, or substitution of the real putting as much force as they can bare on resurgent posthuman flesh - a celebrity flesh those economies, posthuman economies, want to see as utterly passive like Debord, but whose actions are showing unexpected posthuman alignment with the flesh. Why are the centers of posthumanist power concerned? Because once one sees that A-Rod and Armstrong did it, once one sees that others are doing the same legally without a fuss being made, then one can see that one can do the same; make flesh-and-blood keep up, or regrow and become more organically youthful, while OkCupid® or Grindr® data-flesh gets stuck with the now lagging Photoshopped® touchups. Which just adds to my desire to get "pumped up"; add a little of A-Rod and Armstrong's concoction to my own routine; and one of a long list of reasons to throw Nancy Reagan under the bus: to "just say yes to drugs." A desire that is tempered by the recognition that the current limits of intelligibility and iteration of subjects, the work of defining the bodies that matter that is now set by copyrighted language and copyrighted electric extensions is only being challenged within this society of the spectacle by an act that may give a feeling of unease for cause. This is because it is copyrighted genetic testing and its dataveillance and manipulation through copyrighted medical technology - the various branded PEDs, HGH treatments, and their providers - that is the tool through which the flesh enacts this biopolitical "rebellion."References Baudrillard, Jean. Forget Foucault/Forget Baudrillard. Trans Nicole Dufresne. Los Angeles: Semiotext(e), 2007. ————. Simulations. Trans. Paul Foss, Paul Patton and Philip Beitchman. Cambridge: Semiotext(e), 1983. BBC. "Lance Armstong: Usada Report Labels Him 'a Serial Cheat.'" BBC Online 11 Oct. 2012. 1 Dec. 2013 ‹http://www.bbc.co.uk/sport/0/cycling/19903716›. Butler, Judith. Giving an Account of Oneself. New York: Fordham University Press, 2005. Clark, Taylor. Starbucked: A Double Tall Tale of Caffeine, Commerce, and Culture. New York: Back Bay, 2008. Coupland, Douglas. Marshall McLuhan. Toronto: Penguin Books, 2009. Debord, Guy. Society of the Spectacle. Detroit: Black & Red: 1977. Klein, Naomi. No Logo: Taking Aim at the Brand Bullies. Toronto: Knopf Canada, 1999. Lupica, Mike. "Alex Rodriguez Beginning to Look a Lot like Lance Armstrong." NY Daily News. 6 Oct. 2013. 1 Dec. 2013 ‹http://www.nydailynews.com/sports/baseball/lupica-a-rod-tour-de-lance-article-1.1477544›. McLuhan, Marshall. Understanding Media: The Extensions of Man. New York: McGraw-Hill Book Company, 1964. NY Vitality. "Testosterone Treatment." NY Vitality. 1 Dec. 2013 ‹http://vitalityhrt.com/hgh.html›. Thompson, Teri, and Nathaniel Vinton. "What Does Alex Rodriguez Hope to Accomplish by Following Lance Armstrong's Legal Blueprint?" NY Daily News 5 Oct. 2013. 1 Dec. 2013 ‹http://www.nydailynews.com/sports/i-team/a-rod-hope-accomplish-lance-blueprint-article-1.1477280›. Virilio, Paul. Speed and Politics. Trans. Mark Polizzotti. New York: Semiotext(e), 1986.
APA, Harvard, Vancouver, ISO, and other styles
34

Pryor, Melanie. "Dark Peripatetic Walking as Radical Wandering in Cheryl Strayed’s Memoir Wild." M/C Journal 22, no. 4 (August 14, 2019). http://dx.doi.org/10.5204/mcj.1558.

Full text
Abstract:
IntroductionWhen she divorced, Cheryl Strayed chose for herself an entirely new surname. In Wild: A Journey from Lost to Found, the memoir she wrote and published in 2012 about hiking 1,100 miles of the Pacific Crest Trail (PCT) from the Mojave Desert to the Oregon-Washington border, she recalls looking up the definition of the word “strayed”, and how its meaning resonated for her. “I had diverged, digressed, wandered, and become wild”, Strayed writes. “Even in my darkest days—those very days in which I was naming myself—I saw the power of the darkness. Saw that, in fact, I had strayed and that I was a stray and that from the wild places my straying had brought me, I knew things I couldn’t have known before” (97).From the outset of her memoir, Strayed links the notion of wildness with movement, suggesting that “becom[ing] wild” only came about for her when she moved away from—and I would suggest here deliberately rejected—a sedentary role in her life. That is, when she became a peripatetic walker: someone “travelling from place to place, in particular working or based in various places for relatively short periods” (Oxford English Dictionary online). In this article, I discuss Strayed’s memoir Wild as an example of radical wandering. I argue that Strayed subverts the figure of the adventuring explorer in nature—who we usually think of as male—by using the idea of “dark peripatetic walking” whereby the dark peripatetic walker transgresses by going against, or existing outside of, society’s norms, walking “perhaps out of life itself” (Adams 196). Strayed walks the PCT out of desperation and grief after her mother dies and her marriage ends. While Paul Adams interprets dark peripatetic walking as a dire act, in this article I offer a reading of this impulse to wander away from as empowering: a radical “return to the self” only made possible by solitude (Barbour 201-202). My reading of Strayed’s walking as dark peripatetic offers a framework for understanding women’s walking in the wild; how, in wandering away from society’s norms, and in seeking solitude and being self-sufficient, the female walker rejects what society expects of women in the wild and finds empowerment in the transgressive act of existing in a male-dominated terrain: in this case, the literal one of the PCT, and the generic one that comprises memoirs about journeys in nature.Dark Peripatetic Walking as Radical Wandering A rich history of walking exists throughout the last few centuries, from Charles Baudelaire’s flâneur strolling the streets of Paris, to psychogeography and Guy Debord’s theory of the dérive, to pilgrimages throughout the ages. However, much of this walking was conducted in primarily urban spaces—and flânerie, in particular, excluded women both culturally and linguistically. Dark peripatetic walking is also associated with the urban rather than nature, but I want to take it out into wild landscapes. Adams describes two kinds of walking that Western society practises: “light peripatetic” and “dark peripatetic”. Light peripatetic is associated with solitude, simplicity, and idyll; in short, it connotes a Romantic strolling (193-194). Adams cites the celebrated nature writer Henry David Thoreau’s essay “Walking” as an example of light peripatetic, in which, for Thoreau, walking is an essential, routine part of each day. Dark peripatetic is a more ominous form of walking. Adams writes that “the dark peripatetic motif signals that the bonds of society have been torn, or a character’s identity is beginning to dissolve, or both” (196). The dark peripatetic walker is seen to walk “out of doors, out of society, out of community, out of normal reality, and perhaps even out of life itself” (196). Adams associates dark peripatetic with walking in urban spaces, driven by a sense of leaving, or being forced to leave, society.Extending Adams’s concept of the dark peripatetic, we might follow the dark peripatetic walker away from an urban setting and into the wilderness. Here we find Strayed. By the time she sets out to embark on the PCT, she has transgressed a number of social norms that have taken her to the edge of society and her existence: she has been unfaithful in her marriage, which has now fallen apart; she regularly takes drugs (though does not consider herself an addict); she is struggling with depression after the death of her mother; she is emotionally isolated as significant relationships with her family and wider networks have collapsed, and she has almost no money and no plans for the immediate future. We can see in Strayed a figure poised at the edge of what could be conceived as the limit of what is bearable. Strayed’s solution is to walk away from her broken life and into solitude and nature. The impulse of dark peripatetic is away from; the dark peripatetic walker transgresses by going against, or existing outside of society’s norms, walking “perhaps out of life itself” (Adams 196). However, while Strayed’s sense of identity, and her connections with society, have come to feel tenuous, I do not insinuate that she sees hiking the PCT as an act that leads her away from life and into death. While her reasoning for embarking on the hike comes from a place of desperation, it is not a desperate act; while Strayed is unprepared for the rigours of the hike, her inexperience does not equal failure. While Adams interprets dark peripatetic walking as dire, it is possible also to interpret this impulse to walk away from as radical and empowering—particularly for women walking away from societal norms and gendered constrictions that say women should not be, nor want to be, in the wild. Woman in the WildWhen we think about “wildness”, notions of the unfamiliar are evoked; the uncomfortable, the frightening, and the physically arduous. But wildness can also evoke the empowering. For Thoreau, the word “wild” was “the past participle of to will, self-willed” (cited in Turner 111). Carol Black elaborates on this idea, describing Thoreau’s wild as “that which lives out of its own intrinsic nature rather than bowing to some extrinsic force” (Black). Understood like this, to be wild is ultimately to embody your intrinsic essence. Of course, the discussion of an “intrinsic essence”, or, implicitly, one of a woman’s, is complicated territory: as the feminist scholar Donna Haraway writes, “there is not even such a state as ‘being’ female, itself a highly complex category constructed in contested sexual scientific discourses and other social practices” (155). There is a long association between women and nature as the ecofeminist scholar Carolyn Merchant discusses in her important book The Death of Nature, with both being dominated by science and men, and both being conflated as the “nurturing mother” (xx). The association between men and nature, however, is interestingly fluid, as the ecocritic Astrid Bracke points out: “‘male’ can be seen as both culture, and nature: culture, when ‘wild’, ‘natural’ women have to be civilized, nature when it comes to drawing a contrast to the domestic sphere of the home, the place of women and children” (“Macho Nature”). The discussion of the essence of a human being is complex and potentially fraught, and would require another article to do it justice, so what I want to focus on here is the idea of wildness as being, or returning to, a sense of selfhood that may have been forgotten. I focus here on how Strayed experiences self and wildness through the act of walking in solitude, and what this means for narratives of being in the wild. The ability to inhabit, explore freely, and stake claims on wild places has often been the business of men in history and male characters in literature. For instance, Tanya Kam argues that women who hike alone are more likely to be asked what compelled them to do so, whereas this legitimisation is not required when a man does the same thing (365). She suggests that adventures in the wild are often perceived in Western society as a “rite of masculinity” (365) where the male explorer sets out to conquer “rugged, natural terrain” (353). For Kam, this stems from the concept of “frontier masculinity”, which, she writes, “depends on romanticised conceptions of the wilderness, rugged self-sufficiency, courage, masculine physical strength, autonomous individualism, and the active subordination of nature” (353). This masculine explorer trope impedes the fact that women have always been present in nature and wilderness. Sarah McFarland calls for “the reconstruction of the concept of nature itself” (45), which she argues women’s nature writing can bring about, in a way that will “integrat[e] the interests of actual women into an actual wilderness” (45). Memoirs such as Tracks (1980) by Robyn Davidson, Woman in the Wilderness (2018) by Miriam Lancewood, Welcome to the Goddamn Ice Cube (2016) by Blair Braverman, and even The Word for Woman Is Wilderness by Abi Andrews (2018), which is not a memoir but a novel that reads like one, are a suite of texts that I think would interest McFarland, who proposes that by disrupting the notion of the solitary male “questing hero” (37), women-authored texts about being in nature refute “the myth of a womanless wilderness” (38). Strayed, with Wild, joins the lineage of women writers who do this.One strategy that Strayed uses to refute this myth, and provide an alternative to the male explorer, is to embody some of the tropes of this figure in her narration of hiking the PCT. The criteria by which Kam defines this masculine explorer are evident, in most instances, in Strayed’s narrator in Wild. During the three months that she spends hiking the PCT, she is forced to become self-sufficient; she finds courage in the face of extreme hardship; her physical strength develops, and she becomes comfortable in her autonomy. Strayed consistently highlights the gender of her body in this narration: her overweight pack “Monster” is a constant struggle for her smaller physique; she pushes herself physically so male hikers don’t overtake her; she lists the condoms and natural sea sponge she packs, anticipating occasions of physical intimacy and attending to the practicality of menstruating while on the trail. She notes, as the weeks pass, the way her hair grows straw-like from exposure to the weather, and how the developing muscles in her legs “rippl[e] beneath [her] thinning flesh in ways they never had” (190). Patches of skin on her hips and tailbone bleed and scab over from her pack chafing (190). Strayed’s walking, and how she foregrounds the femininity of her body, disrupts the idea that the wilderness is not a place for a woman’s body.However, it is important that the narrator does not seek to subordinate nature—a key aspect of Kam’s “frontier masculinity”. Embodying some, but not all, of the masculine explorer’s traits, as a female narrator-protagonist, Strayed engages with, but ultimately resists, conforming to this tradition, subverting the dominant picture of the masculine explorer in wild places. This is not to say that Strayed refrains from engaging in adversarial encounters with nature; she feels triumphant after successfully navigating snow-covered parts of the trail, and loudly blows her whistle to scare away wildlife. Strayed’s gender is key here: with this strategy, Strayed claims her place as a woman in masculine territory, but in doing so she is more concerned with reflecting on her inner life than in asserting herself over the land that she traverses. In a statement against patriarchal and colonial conceptions of “the wilderness” as empty space to be claimed (via literally claiming land, or by inscribing a romantic narrative upon it), Strayed finds her place in the landscape without owning it. She writes about being in nature, but is ultimately more occupied with being in herself.Witnessing the SelfIf the need to assert himself over nature drives the male adventurer, as Kam suggests, we might read in Wild’s female adventurer an antithesis to this impulse: the act of witness. In a moment of revelation, the narrator realises what it is that drove her, and others before her, to hike the PCT:It had only to do with how it felt to be in the wild. With what it was like to walk for miles for no reason other than to witness the accumulation of trees and meadows, mountains and deserts, streams and rocks, rivers and grasses, sunrises and sunsets. The experience was powerful and fundamental. It seemed to me that it had always felt like this to be a human in the wild, and as long as the wild existed it would always feel this way. (207)Strayed’s language choices are significant here. In walking through the landscape features that she names in the above passage, she is witnessing place. Witnessing connotes viewing, but not acting upon. We might also surmise, however, that she is witnessing herself located in these places. Strayed uses the phrase “how it felt to be” to describe the essence of her experience in the wild—again, “felt” could refer to tactile experience in the landscape, or a sense of wildness in her identity that manifested through being in that landscape.On the trail, Strayed also discovers that she is comfortable alone. In a passage that is deceptively short, Strayed makes a remarkable comment on solitude as a transgressive and transformative state for a woman to seek out and ultimately feel at home in: Alone had always felt like an actual place to me, as if it weren’t a state of being, but rather a room where I could retreat to be who I really was. The radical aloneness of the PCT had altered that sense. Alone wasn’t a room anymore, but the whole wide world, and now I was alone in that world, occupying it in a way I never had before. (119, emphasis mine)There are two important points in this passage: the first is that Strayed feels most herself when she is alone, and the second that her understanding of aloneness has shifted. Reading Strayed’s walking as dark peripatetic allows us to see the act of walking as a radical “return to the self”. John Barbour, from whom I have borrowed this phrase, explains that “solitude … is not oriented toward escaping the world, but toward a different kind of participation in it, as made possible by the disengagement from ordinary social interactions. Solitude is a return to the self” (201-202). Kam discusses how Barbour’s “return to the self” (201-202) occurs when the subject is freed from the various social and domestic responsibilities by which they would normally be bound. She speculates that isolation, or solitude, is generally discouraged in the individual as it endangers the functionality of society. This criticism seems particularly relevant in relation to women, as it highlights their roles as home-makers in a patriarchal society. Hiking alone, Strayed finds that her participation in the world has changed—and it is through her solitary experience that this occurs. There is a safety, a self-containment, in Strayed’s solitude—which counters the narrative that for women, in particular, the wilderness contains danger and threat. As Kam points out, it is not wild animals that present the greatest threat to Strayed; it is a pair of male hunters who encounter her campsite on one occasion (Kam 363).Claiming autonomy and seeking out solitude, as Strayed does in Wild, suggests an experience of wildness that resonates with Thoreau’s understanding of it as “self-willedness” (Turner 111). After reading Wild, the phrase “radical self-containment” seems to me to describe the phenomenon of the particular kind of wildness enabled by walking; the autonomy found in solitude; and in existing beyond the reach of extrinsic forces that would normally affect one’s life. In this experience of wildness, walking, the natural world, and solitude are entwined and essential to the other: wildness is both an embodied and internal experience. ConclusionWild asks us to think about what we make of women venturing into the wild, and the role that walking plays in this. Reading Strayed’s walking in Wild as dark peripatetic suggests a framework for understanding women’s walking in the wild; how, in seeking and discovering that she is at home in solitude, the female walker rejects what society expects of women. Women are not, culturally speaking, encouraged to seek out either solitude or wild places. As nature writing has historically suggested, wild terrain is male terrain. Strayed subverts the figure of the adventuring explorer in nature with her walking by foregrounding the lived experiences of her female body, rejecting society’s role for her, and finding that she is at home in solitude. But most importantly, she does so by shifting the gaze of the walker that we encounter in much male-authored nature literature: rather than looking outward with the intention of conquering, dominating, or claiming landscape, she looks inwards, witnessing the changes in self that walking in remote, wild landscapes enables, and in doing so, gives us another narrative for contemporary journeys in the wild.ReferencesAdams, Paul C. “Peripatetic Imagery and Peripatetic Sense of Place.” Textures of Place: Exploring Humanist Geographies. Eds. Paul C. Adams, Steven Hoelscher, and Karen E. Till. Minnesota: U of Minnesota P, 2001.Andrews, Abi. The Word for Woman Is Wilderness. London: Profile Books, 2018.Barbour, John D. The Value of Solitude: The Ethics and Spirituality of Aloneness in Autobiography. Charlottesville: U of Virginia P, 2004.Black, Carol. “On the Wildness of Children: The Revolution Will Not Take Place in the Classroom.” Carolblack.org, Apr. 2016. 27 May 2019 <https://www.filmsforaction.org/articles/on-the-wildness-of-children/>.Bracke, Astrid. “Macho Nature? Or, Gender in New Nature Writing Part I.” Astridbracke.com, 19 Feb. 2013. Braverman, Blair. Welcome to the Goddamn Ice Cube: Chasing Fear and Finding Home in the Great White North. New York: HarperCollins, 2016.Davidson, Robyn. Tracks. 1980. London: Bloomsbury, 2017.Haraway, Donna. “A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late 20th Century.” In Simians, Cyborgs, and Women: The Reinvention of Nature. New York: Routledge, 1991.Kam, Tanya Y. “Forests of the Self: Life Writing and ‘Wild’ Wanderings.” Life Writing 13.3 (2016): 351-371. 22 Apr. 2019 <https://www.tandfonline.com/doi/abs/10.1080/14484528.2016.1086290>.Lancewood, Miriam. Woman in the Wilderness: A Story of Survival, Love and Self-Discovery in New Zealand. New Zealand: Allen & Unwin. 2017.McFarland, Sarah E. “Wild Women: Literary Explorations of American Landscapes.” Ed. Barbara J. Cook. Women Writing Nature: A Feminist View. Plymouth: Lexington Books, 2008.Merchant, Carolyn. The Death of Nature: Women, Ecology and the Scientific Revolution. New York: HarperCollins, 1983.“Peripatetic.” Oxford English Dictionary. Lexico, 2019. <https://www.lexico.com/en/definition/peripatetic>.Strayed, Cheryl. Wild: A Journey from Lost to Found. Rev. ed. London: Atlantic Books, 2013.Turner, Jack. The Abstract Wild. Tucson: U of Arizona P, 1996.
APA, Harvard, Vancouver, ISO, and other styles
35

Pikner, Tarmo. "Contingent Spaces of Collective Action: Evoking Translocal Concerns." M/C Journal 14, no. 2 (November 17, 2010). http://dx.doi.org/10.5204/mcj.322.

Full text
Abstract:
Collectives bring people and their concerns together. In the twenty-first century, this assembly happens across different material and virtual spaces that, together, establish connective layers of society. A kind of politics has emerged that seeks new forms of communication and expression and proposes new modes of (co)existence. Riots in the suburbs of metropolitan areas, the repair of a public village centre, railway workers’ strikes, green activists’ protests, songs in support of tsunami victims… These are some examples of collective actions that unite people and places. But very often these kinds of events and social practices take place and fade away too quickly without visible traces of becoming collectives. This article focuses on the contingent spaces that enable collective action and provide possibilities for “peripheral” concerns and communities to become public. The concept of “diasporas” is widened to permit discussion of how emerging (international) communities make their voices heard through political events. Some theoretical concepts will be illustrated, using two examples of collective action on 1 May 2009 that demonstrate different initiatives concerning the global (economic) crisis. Assembling Collectives and Affective Events Building a house/centre and singing for something: these are examples of practices that bring people and their ideals together in a collective action or event. This article discusses the different communities that evolve within spaces that enable collective action. These communities are formed not only on the basis of nationality, occupation, or race; elements of (temporal) membership are created out of a wide spectrum of affiliations and a sense of solidarity. Hinchliffe (13) argues that collective action can be seen as a collection of affects that link together disparate places and times, and thus the collective is a matter of considerable political interest. The emergent spaces of collective action publicise particular concerns that may connect already existing but (spatially) dispersed communities and diasporas. However, there is a need to discuss the affects, places, and temporalities that make the assemblage of new collectivities possible. The political potential of collective spaces needs careful elaboration in order that such initiatives may continue to grow without extending the influence of existing (capitalist) powers. Various communities connected “glocally” (locally and globally) can call new publics into existence, posing questions to politics which are not yet “of politics” (Thrift 3). Thus collective action can invent new connecting concerns and practices that catalyse (political) change in society. To understand the complex spatiality of collective action and community formations, it is crucial to look at processes of “affect”. Affects occur in society as “in-becoming” atmospheres and “imitation-suggestions” (Brennan 1-10) that stimulate concerns and motivate practices. The “imitation” can also be an invention that creatively binds existing know-how and experiences into a local-social context. Thinking about affects within the spaces of collective action provides a challenge to rethink what is referred to simply as the “social”. Massumi (228) argues that such affects are virtual expressions of the actually existing things that embody them; however, affects such as emotions and feelings are also autonomous to the degree that they exceed the particular body within which they are presently confined. The emerging bodies, or spaces, of collective action thus carry the potential to transform coexistence across both intellectual and physical boundaries, and communication technology has been instrumental in linking the affective spaces of collective action across both time and space. According to Thrift, the collision of different space-times very often provokes a “stutter” in social relations: the jolt which arises from new encounters, new connections, new ways of proceeding. But how can these turbulent spheres and trajectories of collective action be described and discussed? Here the mechanisms of “events” themselves need to be addressed. The “event” represents, abstractly, a spatio-temporal locus where different concerns and practices are encountered and negotiated. “Event” refers to an incoming, or emerging, object (agent) triggering, through various affective responses, new ideas and initiatives (Clark 33). In addition to revolutions or tsunamis, there are also smaller-scale events that change how people live and come together. In this sense, events can be understood to combine individual and social “bodies” within collective action and imaginations. As Appadurai has argued, the imagination is central to all forms of agency, is itself a social practice, and is the key component of our new global order (Appadurai 29-30). Flusty (7) argues that the production of the global is as present in our day-to-day thoughts and actions as it is in the mass movement of capital, information, and populations which means that there should be the potential to include more people in the democratic process (Whatmore). This process can be seen to be a defining characteristic of the term cosmopolitics which Thrift describes as: “one of the best hopes for changing our engagement with the political by simply acknowledging that there is more there” (Thrift 189). For many, these hopes are based on a new kind of telematic connectedness, in which tele- and digital communications represent the beginning of a global networked consciousness based on the continuous exchange of ideas, both cognitive and affective. Examples of Events and Collectives Taking Place on 1 May 2009 The first day in May is traditionally dedicated to working people, and there are many public gatherings to express solidarity with workers and left-wing (“red”) policy. Issues concerning work and various productions are complex, and recently the global economic crisis exposed some weaknesses in neoliberal capitalism. Different participatory/collective actions and spaces are formed to make some common concerns public at the same time in various locations. The two following examples are part of wider “ideoscapes” (official state ideologies and counter-ideologies) (see Appadurai) in action that help to illustrate both the workings of twenty-first century global capitalism and the translocal character of the public concern. EuroMayDay One alternative form of collective action is EuroMayDay, which has taken place on May 1 every year since 2001 in several cities across (mainly Western) Europe. For example, in 2006 a total of about 300,000 young demonstrators took part in EuroMayDay parades in 20 EU cities (Wikipedia). The purpose of this political action is “to fight against the widespread precarisation of youth and the discrimination of migrants in Europe and beyond: no borders, no workfare, no precarity!” (EuroMayDay). This manifesto indicates that the aim of the collective action is to direct public attention to the insecure conditions of immigrants and young people across Europe. These groups may be seen to constitute a kind of European “diasporic collective” in which the whole of Europe is figured as a “problem area” in which unemployment, displacement, and (possibly) destitution threaten millions of lives. In this emerging “glocality”, there is a common, and urgent, need to overcome the boundaries of exclusion. Here, the proposed collective body (EuroMayDay) is described as a process for action, thus inviting translocal public participation. The body has active nodes in (Western) Europe (Bremen, Dortmund, Geneva, Hamburg, Hanau, Lisbon, Lausanne, Malaga, Milan, Palermo, Tübingen, Zürich) and beyond (Tokyo, Toronto, Tsukuba). The collective process marks these cities on the map through a webpage offering contacts with each of the “nodes” in the network. On 1 May 2009, May Day events, or parades, took place in all the cities listed above. The “nodes” of the EuroMayDay process prepared posters and activities following some common lines, although collective action had to be performed locally in every city. By way of example, let’s look at how this collective action realised its potential in Berlin, Germany. The posters (EuroMayDay Berlin, "Call") articulate the oppressive and competitive power of capitalism which affects everyone, everyday, like a machine: it constitutes “the permanent crisis”. One’s actual or potential unemployment and/or immigrant status may cause insecurity about the future. There is also a focus on liminal or transitional time, and a call for a new collectivity to overcome oppressive forces from above that protect the interests of the State and the banks. EuroMayDay thus calls for the weaving together of different forms of resistance against a deeply embedded capitalist system and the bringing together of common concerns for the attention of the general public through the May Day parade. Another poster (EuroMayDay Berlin, "May"), depicting the May Day parade, centres around the word “KRISE?” (“crisis”). The poster ends with an optimistic call to action, expressing a desire to free capitalism from institutional oppression and recreate it in a more humanistic way. Together, these two posters represent fragments of the “ideoscope” informing the wider, collective process. In Berlin in 2009, thousands of people (mostly young) participated in the May Day parade (which started from the public square Bebelplatz), backed by a musical soundtrack (see Rudi). Some people also had posters in their hands, displaying slogans like: “For Human Rights”; “Class Struggle”; “Social Change Not Climate Change”; and “Make Capitalism a Thing of the Past”. Simultaneously, dozens of other similar parades were taking place across the cities of Europe, all bearing “accelerated affective hope” (Rosa) for political change and demanding justice in society. Unfortunately, the May Day parade in Berlin took a violent turn at night, when some demonstrators attacked police and set cars on fire. There were also clashes during demonstrations in Hamburg (Kirschbaum). The media blamed the clashes also on the economic recession and recently dashed hopes for change. The Berlin May Day parade event was covered on the EuroMayDay webpage and on television news. This collective action connected many people; some participated in the parade, and many more saw the clashes and burning cars on their screens. The destructive and critical force of the collective action brought attention to some of the problems associated with youth employment and immigration though, sadly, without offering any concrete proposals for a solution to the problem. The emotional character of the street marches, and later the street fighting, were arguably an important aspect of the collective action inasmuch as they demonstrated the potential for citizens to unite, translocally, around affective as well as material grief (a process that has been given dramatic expression in more recent times with events in Egypt, Libya, and Syria). Further, although the recent May Day events have achieved very little in terms of material results, the network remains active, and further initiatives are likely in the future. “Let’s Do It! My Estonia” On 1 May 2009, about 11,000 people participated in a public “thought-bee” in Estonia (located in north-eastern Europe in the region of the Baltic Sea) and (through the Estonian diaspora) abroad. The “thought-bee” can be understood as a civil society initiative designed to bring people together for discussion and problem-solving with regards to everyday social issues. The concept of the “bee” combines work with pleasure. The bee tradition was practised in old Estonian farming communities, when families in adjacent villages helped one another. Bees were often organised for autumn harvesting, and the intense, communal work was celebrated by offering participants food and drink. Similarly, during the Soviet era, on certain Saturdays there were organised days (obligatory) for collective working (e.g. to reconstruct sites or to pick up litter). Now the “bee” concept has become associated with brainstorming in small groups across the country as well as abroad. The number of participants in the May 1st thought-bee was relatively large, given that Estonia’s total population is only 1.4 million. The funding of the initiative combined public and private sources, e.g. Estonian Civil Society Foundation, the European Commission, and some companies. The information sheet, presented to participants of the May 1st thought-bee, explains the event’s purpose in this way: The main purpose of today’s thought-bee is to initiate as many actions as possible that can change life in Estonia for the better. My Estonia, our more enjoyable and more efficient society, will appear through smaller and bigger thoughts. In the thought-bee we think how to make life better for our own home-place... Let’s think together and do it! (Teeme Ära, "Teeme", translated from Estonian) The civil society event grew out of a collective action on 3 May 2008 to pick up and dispose of litter throughout Estonia. The thought-bee initiative was coordinated by volunteers. The emotional appeal to participate in the thought-bee event on May 1st was presented and circulated in newspapers, radio, television, Internet portals, and e-mails. Famous people called on residents to take part in the public discussion events. Some examples of arguments for the collective activity included the economic crisis, the need for new jobs, self-responsibility, environmental pressures, and the general need to learn and find communal solutions. The thought-bee initiative took place simultaneously in about 500 “thought-halls” all over Estonia and abroad. Small groups of people registered, chose main discussion topics (with many suggestions from organisers of the bee) and made their groups visible as nodes on the “initiative” webpage. Other people had the opportunity of reading several proposals from the various thought-halls and of joining as members of the public brainstorming event on 1 May. The virtual and living map of the halls presented them as (green) nodes with location, topics, members, and discussion leaders. Various sites such as schools, clubs, cultural centres, municipality buildings, and theatres became part of the multiple and synchronous “space-times” within the half-day thought-bee event. Participants in the thought-bee were asked to bring their own food to share and, in some municipalities, open concerts were held to celebrate the day. These practices indicate some continuity with the national tradition of bees, where work has always been combined with pleasure. Most “thought-halls” were located in towns and smaller local centres as well as on several Estonian islands. Moreover, these thought-halls provided for both as face-to-face and online encounters. Further, one English-speaking discussion group was organised in Tallinn so that non-Estonian speakers could also participate. However, the involvement of Russian-speaking people in the initiative remained rather limited. It is important to note that these embodied spaces of participation were also to be found outside of Estonia—in Brussels, Amsterdam, Toronto, Oslo, Stockholm, Helsinki, Copenhagen, Prague, Baltimore, New York, and San Diego—and, in this way, the Estonian diaspora was also given the opportunity to become involved in the collective action. Following the theories of Thrift and Clark cited at the beginning of this article, it is interesting to see an event in which simultaneously connected places, embodying multiple voices, becomes part of the communal present with a shared vision of the future. The conclusions of each thought-hall discussion group were recorded on video shortly after the event. These videos were made available on the “Let’s Do It! My Estonia” webpage. The most frequently addressed topics of the thought-bee (in order of importance) were: community activities and collaboration; entrepreneurship and new jobs; education, values; free time and sport; regional development; rural life; and the environment and nature conservation (PRAXIS). The participants of the collective action were aware of the importance of local as well as national initiatives as a catalyst for change. The initiative “Let’s Do It! My Estonia” continued after the events of May Day 2009; people discussed issues and suggested proposals through the “initiative” webpage and supported the continuation of the collective action (Teeme Ära, "Description"). Environmental concerns (e.g. planting trees, reducing noise, and packaging waste) appear as important elements in these imaginings along with associated other practices for the improvement of daily life. It is important to understand the thought-bee event as a part of an emerging collective action that started with a simple litter clean-up and grew, through various other successful local community initiatives, into shared visions for a better future predicated upon the principles of glocality and coexistence. The example indicates that (international) NGOs can apply, and also invent, radical information politics to change the terms of debate in a national context by providing a voice for groups and issues that would otherwise remain unheard and unseen (see also Atkinson and Scurrah 236-44). Conclusions The collective actions discussed above have created new publics and contingent spaces to bring additional questions and concerns into politics. In both cases, the potential of “the event” (as theorised in the introduction of this article) came to the foreground, creating an additional international layer of temporal connectivity between many existing social groups such as unemployed young people or members of a village union. These events were both an “outcome” of, and an attempt to change, the involuntary exclusion of certain “peripheral” groups within the melting pot that the European Union has become. As such, they may be thought of as extending the concept of “diasporas” to include emerging platforms of collective action that aim to make problematic issues visible and multiple voices heard across the wider public. This, in turn, illustrates the need to rethink diasporas in the context of the intensive de-territorialisation of human concerns, “space-times and movement-trajectories yet to (be)come” (Braziel and Mannur 18). Both the examples of collective action discussed here campaigned for “changing the world” through a one-day event and may thus be understood in terms of Rosa’s theory of “social acceleration” (Rosa). This theory shows how both to the “contraction of the present” and the general instability of contemporary life have given rise to a newly affective desire to improve life through an expression of the collective will. Such a tendency can clearly take on far more radical forms as has been recently demonstrated by the mass protests and revolts against autocratic ruling powers in Egypt, Libya, and Syria. In this article, however, cosmopolitics is better understood in terms of the particular skills (most evident in the Estonian case) and affective spheres that mobilised in suggestions to bring about local action and global change. Together, these examples of collective action are part of a wider “ideoscape” (Appadurai) trying to reduce the power of capitalism and of the state by encouraging alternative forms of collective action that are not bound up solely with earning money or serving the state as a “salient” citizen. However, it could be argued that “EuroMayDay” is ultimately a reactionary movement used to highlight the oppressive aspects of capitalism without offering clear alternatives. By contrast, “Let’s Do It! My Estonia” has facilitated interactive public discussion and the practice of local skills that have the power to improve everyday life and the environment in a material and quantifiable way. Such changes in collective action also illustrate the speed and “imitative capacity stimulating expressive interactions” that now characterise everyday life (Thrift). Crucially, both these collective events were achieved through rapid advances in communication technologies in recent times; this technology made it possible to spread know-how as well as feelings of solidarity and social contact across the world. Further research on these fascinating developments in g/local politics is clearly urgently needed to help us better understand the changes in collective action currently taking place. Acknowledgements This research was supported by Estonian Science Foundation grant SF0130008s07 and by the European Union through the European Regional Development Fund (Center of Excellence CECT). References Appadurai, Arjun. “Disjuncture and Difference in the Global Cultural Economy.” Theorizing Diaspora: A Reader. Ed. Jana Evans Braziel and Anita Mannur. Oxford: Blackwell, 2003. 25-48. Atkinson, Jeffrey, and Martin Scurrah. Globalizing Social Justice: The Role of Non-Governmental Organizations in Bringing about Social Change. New York: Palgrave Macmillian, 2009. Braziel, Jana Evans, and Anita Mannur. “Nation, Migration, Globalisation: Points of Contention in Diaspora Studies.” Theorizing Diaspora: A Reader. Eds. Jana Evans Braziel and Anita Mannur. Oxford: Blackwell, 2003. 1-18. Brennan, Teresa. The Transmission of Affect. London: Continuum, 2004. Clark, Nigel. “The Play of the World.” Using Social Theory: Thinking Through Research. Eds. Michael Pryke, Gillian Rose, and Sarah Whatmore. London: Sage, 2003. 28-46. EuroMayDay. “What Is EuroMayDay?” 23 May 2009. ‹http://www.euromayday.org/about.php›. EuroMayDay Berlin. “Call of May Parade.” 3 Aug. 2009. ‹http://maydayberlin.blogsport.de/aufruf/text-only/›. EuroMayDay Berlin. “May Parade Poster.” 3 Aug. 2009. ‹http://maydayberlin.blogsport.de/propaganda/›. Flusty, Steven. De-Coca-Colonization. Making the Globe from the Inside Out. New York: Routledge, 2004. Hinchliffe, Steve. Geographies of Nature: Societies, Environments, Ecologies. London: Sage, 2007. Kirschbaum, Erik. “Police Hurt in May Day Clashes in Germany.” Reuters, 3 Aug. 2009. ‹http://www.reuters.com/article/idUSTRE5401UI20090501›. Massumi, Brian. “The Autonomy of Affect.” Deleuze: A Critical Reader. Ed. Paul Patton. Oxford: Blackwell, 1997. 217-39. PRAXIS. “Minu Eesti mõttetalgute ideede tähtsamad analüüsitulemused” (Main analysing results about ideas of My Estonia thought-bee). 26 Oct. 2009. ‹http://www.minueesti.ee/index.php?leht=6&mID=949›. Rosa, Hartmut. “Social Acceleration: Ethical and Political Consequences of a Desynchronised High-Speed Society.” Constellations 10 (2003): 1-33. Rudi 5858. “Mayday-Parade-Demo in Berlin 2009.” 3 Aug. 2009. ‹http://wn.com/Rudi5858›. Teeme Ära. “Teeme Ära! Minu Eesti” (Let’s Do It! My Estonia). Day Program of 1 May 2009. Printed information sheet, 2009. Teeme Ära. “Description of Preparation and Content of Thought-bee.” 20 Apr. 2009. ‹http://www.minueesti.ee/?leht=321›. Thrift, Nigel. Non-Representational Theory: Space, Politics and Affect. London: Routledge, 2008. Whatmore, Sarah. “Generating Materials.” Using Social Theory: Thinking Through Research. Eds. Michael Pryke, Gillian Rose and Sarah Whatmore. London: Sage, 2003. 89-104. Wikipedia. “EuroMayDay.” 23 May 2009. ‹http://en.wikipedia.org/wiki/EuroMayDay›.
APA, Harvard, Vancouver, ISO, and other styles
36

Chin, Bertha. "Locating Anti-Fandom in Extratextual Mash-Ups." M/C Journal 16, no. 4 (August 12, 2013). http://dx.doi.org/10.5204/mcj.684.

Full text
Abstract:
Fan cultural production, be it in the form of fan fiction, art or videos are often celebrated in fan studies as evidence of fan creativity, fans’ skills in adopting technology and their expert knowledge of the texts. As Jenkins argues, “the pleasure of the form centers on the fascination in watching familiar images wrenched free from their previous contexts and assigned alternative meanings” (227). However, can fan mash-up videos can also offer an alternative view, not of one’s fandom, but of anti-fandom? Fan pleasure is often seen as declaring love for a text through juxtaposing images to sound in a mash-up video, but this paper will argue that it can also demonstrate hate. Specifically, can these videos affirm anti-fandom readings of a particular text, when clips from two (or more) different texts, seemingly of the same genre and targeting the same demographics, are edited together to offer an alternative story? In 2009, a video entitled Buffy vs Edward: Twilight Remixed (hereafter BvE) (See Video 1) was uploaded to YouTube, juxtaposing clips from across the seven series of Buffy, the Vampire Slayer and the first film of the Twilight series. Twilight is a series of novels written by Stephenie Meyer which was adapted into a successful series of five films between the period of 2008 and 2012. Its vampire-centric romance story has resulted in numerous comparisons to, among others, the cult and popular television series, Buffy the Vampire Slayer (hereafter Buffy) created by Joss Whedon, which aired from 1997 to 2003. In BvE, which has over three million views to date and reportedly has been translated into thirty different languages, Jonathan McIntosh, the video’s creator, “changes Edward Cullen from a smouldering, sparkly antihero into a self-obsessed stalker who's prone to throwing tantrums. Buffy Summers reacts to him with disdain and dwindling patience, assertively rebuking his every self-indulgence” (Leduc). By editing together clips from two texts seemingly of the same genre and targeting the same demographics, this video affirms an anti-fandom reading of Twilight. Video 1: Buffy vs Edward: Twilight RemixedOn the first viewing of the video, I was struck by how accurately it portrayed my own misgivings about Twilight, and by how I had wished Bella Swan was more like Buffy Summers and been a positive role model for girls and women. The content of the video mash-up—along with fan reactions to it—suggests and perpetuates an anti-fandom reading of Twilight via Buffy, by positioning the latter as a text with higher cultural value, in terms of its influence and representations of female characters. As McIntosh himself clarifies in an interview, “the audience is not supposed to go “Oh, see how TV is stupid?” They’re supposed to go “Oh, see how Buffy was awesome!”” (ikat381). As such, the BvE mash-up can be read, not just as a criticism of popular commercial texts, but also as an anti-fan production. Much work surrounding fan culture extrapolates on fans’ love for a text, but I’d like to propose that mash-ups such as BvE reaffirms anti-fandom readings of derided texts via another that is deemed—and presented—as culturally more valuable. In this essay, BvE will be used as an example of how anti-fandom productions can reinforce the audience’s opinion of a despised text. When BvE first launched, it was circulated widely among Buffy fandom, and the narrative of the mash-up, and its implications were debated rather fiercely on Whedonesque.com [http://whedonesque.com/comments/20883], one of the main sites for Joss Whedon’s fandom. Comparisons between the two texts, despite existing in different mediums (film vs. television), were common among general media—some survey respondents reveal they were persuaded to read the books or watch the first film by its assumed similarities to Buffy— as both feature somewhat similar storylines on the surface: a young, teenaged (human) girl falling in love with a vampire, and were presumably aimed at the same demographics of teenaged and college-aged girls. The similarities seem to end there though, for while Buffy is often hailed as a feminist text, Twilight is dismissed as anti-feminist, down to its apparently rabid and overly-emotional (female) fanbase. As one Buffy fan on Whedonesque clarifies: Buffy was more real than Bella ever thought of being. Buffy was flawed, made mistakes, bad decisions and we never saw her sort out a healthy romantic relationship but she was still a tremendous role model not for just teen girl but teen boys as well. […] Bella's big claim to fame seems to be she didn't sleep with her boyfriend before marriage but that was his choice, not hers. BvE appears to reflect the above comparison, as McIntosh justifies the video as “a pro-feminist visual critique of Edward’s character and generally creepy behaviour”—essentially a problem that Buffy, as a vampire slayer and a feminist icon can solve (for the greater good). For the purpose of this paper, I was interested to see if those who are active in fandom in general are aware of the BvE video, and if it informs or reaffirms their anti-fandom views of Twilight. Methodology A short online survey was devised with this in mind and a link to the survey was provided via Twitter (the link was retweeted 27 times), with the explanation that it is on Twilight anti-fandom and the BvE mash-up video. It was further shared on Facebook, by friends and peers. At the same time, I also requested for the link to be posted by the administrators of Whedonesque.com. Despite the posting at Whedonesque, the survey was not particularly aimed at Buffy fans, but rather fans in general who are familiar with both texts. The survey received 419 responses in the span of 24 hours, suggesting that the topic of (Twilight) anti-fandom is one that fans—or anti-fans—are passionately engaged with. Out of the 419 responses, 357 people have seen BvE, and 208 have read the book(s) and/or saw the film(s). The other 211 respondents came into contact with Twilight through paratexts, “semi-textual fragments that surround and position the work” (Gray New 72), such as trailers, word-of-mouth and news outlets. Anti-Fandom, Twilight, and the Buffy vs Edward Mash-Up Fan studies have given us insights into the world of fandom, informing us about the texts that fans love, what fans do with those texts and characters, and how fans interact with one another within the context of fandom. As Henry Jenkins explains: Fan culture finds that utopian dimension within popular culture a site for constructing an alternative culture. Its society is responsive to the needs that draw its members to commercial entertainment, most especially the desire for affiliation, friendship, community (282). Fan studies has obviously progressed from Jenkins’s initial observations as fan scholars subsequently proceed to complicate and augment the field. However, many gaps and silences remain to be filled: Hills (2002) […] argued that fandom is ‘not a thing that can be picked over analytically’ (pp. xi-xii) and separated into neat categories, but is a performative, psychological action that differs according to person, fandom, and generation (Sheffield and Merlo 209). In a 2003 article, Jonathan Gray reflects that in fan scholars’ enthusiasm to present the many interesting facets of fan culture, “reception studies are distorting our understanding of the text, the consumer and the interaction between them” (New Audiences 68). So while there is the friendship, affiliation and sense of community where fans share their mutual affection for their favourite texts and characters, there are also those who engage critically with the texts that they dislike. Gray identifies them as the anti-fans, arguing that these anti-fans are not “against fandom per se, […] but they strongly dislike a given text or genre, considering it inane, stupid, morally bankrupt and/or aesthetic drivel” (New New Audiences 70). Most anti-fans’ encounter with their hated text will not merely be through the text itself, but also through its surrounding paratexts, such as trailers and press articles. These paratextual pieces inform the anti-fan about the text, as much as the original text itself, and together they add to the formation of the anti-fannish identity: Rather than engaging the text directly, […] anti-fans often respond to a “text” they construct from paratextual fragments such as news coverage or word-of-mouth, reading, watching, and learning all they can about a show, book, or person in order to better understand and criticize the text (and, very often, its fans) (Sheffield and Merlo 209). Media attention directed at the Twilight franchise, as well as the attention Twilight fans receive has made it a popular subject in both fan and anti-fan studies. Dan Haggard, in a 2010 online posting, commented on the fascinating position of Twilight fans in popular culture: The Twilight fan is interesting because of reports (however well substantiated) of a degree of extremism that goes beyond what is acceptable, even when considered from a perspective relative to standard fan obsession. The point here is not so much whether Twilight fans are any more extreme than standard fans, but that there is a perception that they are so. (qtd. in Pinkowitz) Twilight fans are more often than not, described as “rabid” and “frenzied” (Click), particularly by the media. This is, of course, in total opposition to the identity of the fan as effective consumer or productive (free) labourer, which scholars like Baym and Burnett, for example, have observed. The anti-fandom in this case seems to go beyond the original text (both the books and the film franchises), extending to the fans themselves. Pinkowitz explains that the anti-fans she examined resent the success Twilight has amassed as they consider the books to be poorly written and they “strongly dislike the popular belief that the Twilight books are good literature and that they deserve the fanaticism its rabid fans demonstrate”. Some survey respondents share this view, criticising that the “writing is horrible”, the books have “awful prose” and “melodramatic characterisations”. Sheffield and Merlo demonstrate that the “most visible Twilight anti-fan behaviors are those that mock or “snark” about the “rabid” Twilight fans, who they argue, “give other fans a bad name”” (210). However, BvE presents another text with which Twilight can be compared to in the form of Buffy. As one survey respondent explains: Bella is a weak character who lacks agency. She lacks the wit, will-power, and determination that makes Buffy such a fun character. […] She is a huge step back especially compared to Buffy, but also compared to almost any modern heroine. Paul Booth argues that for mash-ups, or remixes, to work, as audiences, we are expected to understand—and identify—the texts that are referenced, even if they may be out of context: “we as audiences must be knowledgeable about both sources, as well as the convergence of them, in order to make sense of the final product”. Survey respondents have commented that the mash-up was “more about pleasing Buffy fans”, and that it was “created with an agenda, by someone who hates Twilight and loves Buffy,” which gives “a biased introduction to Buffy”. On the other hand, others have commented that the mash-up “makes [Twilight] seem better than it actually is”, and that it “reinforced [their] perceptions” of Twilight as a weaker text. Booth also suggests that mash-ups create new understandings of taste, of which I would argue that is reinforced through BvE, which McIntosh describes as a “metaphor for the ongoing battle between two opposing visions of gender roles in the 21st century”. In fact, many of the survey respondents share McIntosh’s view, criticising Twilight as an anti-feminist text that, for all its supposed cultural influence, is sending a dangerous message to young girls who are the target demographic of the franchise. As they reflect: It bothers me that so many people (and especially women) love and embrace the story, when at its crux it is about a woman trying to choose between two men. Neither men are particularly good/safe for her, but the book romanticizes the possible violence toward Bella. The idea that Bella is nothing without Edward, that her entire life is defined by this man. She gives up her life—literally—to be with him. It is unhealthy and obsessive. It also implies to women that stalking behaviour like Edward's is romantic rather than illegal. I think what bothers me the most is how Meyers presents an abusive relationship where the old guy (but he's sparkly and pretty, so it's ok) in question stalks the heroine, has her kidnapped, and physically prevents her from seeing whom she wants to see is portrayed as love. In a good way. These testimonials show that fans take a moral stand towards Twilight’s representation of women, specifically Bella Swan. Twilight acts in counterpoint to a text like Buffy, which is critically acclaimed and have been lauded for its feminist representation (the idea that a young, petite girl has the power to fight vampires and other supernatural creatures). The fact that Buffy is a chronological older text makes some fans lament that the girl-power and empowerment that was showcased in the 1990s has now regressed down to the personification of Bella Swan. Gray argues that anti-fandom is also about expectations of quality and value: “of what a text should be like, of what is a waste of media time and space, of what morality or aesthetics texts should adopt, and of what we would like to see others watch or read” (New 73). This notion of taste, and cultural value comes through again as respondents who are fans of Buffy testify: It's not very well-written. I strongly dislike the weak parallels one could draw between the two. Yes Angel and Spike went through a creepy stalking phase with Buffy, and yes for a while there was some romantic triangle action but there was so much more going on. […] My biggest issue is with Bella's characterization. She has flaws and desires but she is basically a whiney, mopey blob. She is a huge step back especially compared to Buffy, but also compared to almost any modern heroine. There is tremendous richness in Buffy—themes are more literate, historically allusive and psychologically deeper than boy-meets-girl, girl submits, boy is tamed. Edward Cullen is white-faced and blank; Spike and Angel are white-faced and shadowed, hollowed, sculpted—occasionally tortured. Twilight invites teen girls to project their desires; Spike and Angel have qualities which are discovered. Buffy the character grows and evolves. Her environment changes as she experiences the world around her. Decisions that she made in high school were re-visited years later, and based on her past experiences, she makes different choices. Bella, however, loses nothing. There's no consequence to her being turned. There's no growth to her character. The final act in the mash-up video, of Buffy slaying Edward can be seen as a re-empowerment for those who do not share the same love for Twilight as its fans do. In the follow-up to his 2003 article that launched the concept of anti-fandom, Gray argues that: Hate or dislike of a text can be just as powerful as can a strong and admiring, affective relationship with a text, and they can produce just as much activity, identification, meaning, and “effects” or serve just as powerfully to unite and sustain a community or subculture (Antifandom 841). Conclusion The video mash-up, in this case, can be read as an anti-fandom reading of Twilight via Buffy, in which the superiority of Buffy as a text is repeatedly reinforced. When asked if the mash-up video would encourage the survey respondents to consider watching Twilight (if they have not before), the respondents’ answers range from a repeated mantra of “No”, to “It makes me want to burn every copy”, to “Not unless it is to mock, or for the purpose of a drinking game”. Not merely resorting to mocking, what McIntosh’s mash-up video has given Twilight anti-fans is yet another paratextual fragment with which to read the text (as in, Edward Cullen is creepy and controlling, therefore he deserves to be slayed, as should have happened if he was in the Buffy universe instead of Twilight). In other words, what I am suggesting here is that anti-fandom can be enforced through the careful framing of a mash-up video, such as that of the Buffy vs Edward: Twilight Remixed mash-up, where the text considered more culturally valuable is used to read and comment on the one considered less valuable. References Baym, Nancy, and Robert Burnett. Amateur Experts: International Fan Labour in Swedish Independent Music. Copenhagen, Denmark, 2008. Booth, Paul. “Mashup as Temporal Amalgam: Time, Taste, and Textuality.” Transformative Works and Cultures 9 (2012): n. pag. 3 Apr. 2013 < http://journal.transformativeworks.org/index.php/twc/article/view/297/285 >. Click, Melissa. “‘Rabid’, ‘Obsessed’, and ‘Frenzied’: Understanding Twilight Fangirls and the Gendered Politics of Fandom.” Flow 11.4 (2009): n. pag. 18 June 2013 < http://flowtv.org/2009/12/rabid-obsessed-and-frenzied-understanding-twilight-fangirls-and-the-gendered-politics-of-fandom-melissa-click-university-of-missouri/ >. Gray, Jonathan. “Antifandom and the Moral Text: Television without Pity and Textual Dislike.” American Behavioral Scientist 48 (2005): 840–858. ———. “New Audiences, New Textualities: Anti-Fans and Non-Fans.” International Journal of Cultural Studies 6.1 (2003): 64–81. Hills, Matt. Fan Cultures. London: Routledge, 2002. ikat381. “Total Recut Interviews Jonathan McIntosh about Buffy vs. Edward.” Total Recut 24 Dec. 2009. 20 July 2013 < http://www.totalrecut.com/permalink.php?perma_id=265 >. Jenkins, Henry. Textual Poachers: Television Fans & Participatory Culture. New York: Routledge, 1992. Leduc, Martin. “The Two-Source Illusion: How Vidding Practices Changed Jonathan McIntosh’s Political Remix Videos.” Transformative Works and Cultures 9 (2012): n. pag. 19 July 2013 < http://journal.transformativeworks.org/index.php/twc/article/view/379/274 >. McIntosh, Jonathan. “Buffy vs Edward: Twilight Remixed.” Rebelliouspixels 20 June 2009. 2 Apr. 2013 < http://www.rebelliouspixels.com/2009/buffy-vs-edward-twilight-remixed >. Pinkowitz, Jacqueline. “‘The Rabid Fans That Take [Twilight] Much Too Seriously’: The Construction and Rejection of Excess in Twilight Antifandom.” Transformative Works and Cultures 7 (2011): n. pag. 21 June 2013 < http://journal.transformativeworks.org/index.php/twc/article/view/247/253 >. Sheffield, Jessica, and Elyse Merlo. “Biting Back: Twilight Anti-Fandom and the Rhetoric of Superiority.” Bitten by Twilight: Youth Culture, Media and the Vampire Franchise. Eds. Melissa Click, Jessica Stevens Aubrey, & Elizabeth Behm-Morawitz. New York: Peter Lang Publishers, 2010. 207–224.
APA, Harvard, Vancouver, ISO, and other styles
37

Allen, Rob. "Lost and Now Found: The Search for the Hidden and Forgotten." M/C Journal 20, no. 5 (October 13, 2017). http://dx.doi.org/10.5204/mcj.1290.

Full text
Abstract:
The Digital TurnMuch of the 19th century disappeared from public view during the 20th century. Historians recovered what they could from archives and libraries, with the easy pickings-the famous and the fortunate-coming first. Latterly, social and political historians of different hues determinedly sought out the more hidden, forgotten, and marginalised. However, there were always limitations to resources-time, money, location, as well as purpose, opportunity, and permission. 'History' was principally a professionalised and privileged activity dominated by academics who had preferential access to, and significant control over, the resources, technologies and skills required, as well as the social, economic and cultural framework within which history was recovered, interpreted, approved and disseminated.Digitisation and the broader development of new communication technologies has, however, transformed historical research processes and practice dramatically, removing many constraints, opening up many opportunities, and allowing many others than the professional historian to trace and track what would have remained hidden, forgotten, or difficult to find, as well as verify (or otherwise), what has already been claimed and concluded. In the 21st century, the SEARCH button has become a dominant tool of research. This, along with other technological and media developments, has altered the practice of historians-professional or 'public'-who can now range deep and wide in the collection, portrayal and dissemination of historical information, in and out of the confines of the traditional institutional walls of retained information, academia, location, and national boundaries.This incorporation of digital technologies into academic historical practice generally, has raised, as Cohen and Rosenzweig, in their book Digital History, identified a decade ago, not just promises, but perils. For the historian, there has been the move, through digitisation, from the relative scarcity and inaccessibility of historical material to its (over) abundance, but also the emerging acceptance that, out of both necessity and preference, a hybridity of sources will be the foreseeable way forward. There has also been a significant shift, as De Groot notes in his book Consuming History, in the often conflicted relationship between popular/public history and academic history, and the professional and the 'amateur' historian. This has brought a potentially beneficial democratization of historical practice but also an associated set of concerns around the loss of control of both practice and product of the professional historian. Additionally, the development of digital tools for the collection and dissemination of 'history' has raised fears around the commercialised development of the subject's brand, products and commodities. This article considers the significance and implications of some of these changes through one protracted act of recovery and reclamation in which the digital made the difference: the life of a notorious 19th century professional agitator on both sides of the Atlantic, John De Morgan. A man thought lost, but now found."Who Is John De Morgan?" The search began in 1981, linked to the study of contemporary "race riots" in South East London. The initial purpose was to determine whether there was a history of rioting in the area. In the Local History Library, a calm and dusty backwater, an early find was a fading, but evocative and puzzling, photograph of "The Plumstead Common Riots" of 1876. It showed a group of men and women, posing for the photographer on a hillside-the technology required stillness, even in the middle of a riot-spades in hand, filling in a Mr. Jacob's sandpits, illegally dug from what was supposed to be common land. The leader of this, and other similar riots around England, was John De Morgan. A local journalist who covered the riots commented: "Of Mr. De Morgan little is known before or since the period in which he flashed meteorlike through our section of the atmosphere, but he was indisputably a remarkable man" (Vincent 588). Thus began a trek, much interrupted, sometimes unmapped and haphazard, to discover more about this 'remarkable man'. "Who is John De Morgan" was a question frequently asked by his many contemporary antagonists, and by subsequent historians, and one to which De Morgan deliberately gave few answers. The obvious place to start the search was the British Museum Reading Room, resplendent in its Victorian grandeur, the huge card catalogue still in the 1980s the dominating technology. Together with the Library's newspaper branch at Colindale, this was likely to be the repository of all that might then easily be known about De Morgan.From 1869, at the age of 21, it appeared that De Morgan had embarked on a life of radical politics that took him through the UK, made him notorious, lead to accusations of treasonable activities, sent him to jail twice, before he departed unexpectedly to the USA in 1880. During that period, he was involved with virtually every imaginable radical cause, at various times a temperance advocate, a spiritualist, a First Internationalist, a Republican, a Tichbornite, a Commoner, an anti-vaccinator, an advanced Liberal, a parliamentary candidate, a Home Ruler. As a radical, he, like many radicals of the period, "zigzagged nomadically through the mayhem of nineteenth century politics fighting various foes in the press, the clubs, the halls, the pulpit and on the street" (Kazin 202). He promoted himself as the "People's Advocate, Champion and Friend" (Allen). Never a joiner or follower, he established a variety of organizations, became a professional agitator and orator, and supported himself and his politics through lecturing and journalism. Able to attract huge crowds to "monster meetings", he achieved fame, or more correctly notoriety. And then, in 1880, broke and in despair, he disappeared from public view by emigrating to the USA.LostThe view of De Morgan as a "flashing meteor" was held by many in the 1870s. Historians of the 20th century took a similar position and, while considering him intriguing and culturally interesting, normally dispatched him to the footnotes. By the latter part of the 20th century, he was described as "one of the most notorious radicals of the 1870s yet remains a shadowy figure" and was generally dismissed as "a swashbuckling demagogue," a "democratic messiah," and" if not a bandit … at least an adventurer" (Allen 684). His politics were deemed to be reactionary, peripheral, and, worst of all, populist. He was certainly not of sufficient interest to pursue across the Atlantic. In this dismissal, he fell foul of the highly politicised professional culture of mid-to-late 20th-century academic historians. In particular, the lack of any significant direct linkage to the story of the rise of a working class, and specifically the British Labour party, left individuals like De Morgan in the margins and footnotes. However, in terms of historical practice, it was also the case that his mysterious entry into public life, his rapid rise to brief notability and notoriety, and his sudden disappearance, made the investigation of his career too technically difficult to be worthwhile.The footprints of the forgotten may occasionally turn up in the archived papers of the important, or in distant public archives and records, but the primary sources are the newspapers of the time. De Morgan was a regular, almost daily, visitor to the pages of the multitude of newspapers, local and national, that were published in Victorian Britain and Gilded Age USA. He also published his own, usually short-lived and sometimes eponymous, newspapers: De Morgan's Monthly and De Morgan's Weekly as well as the splendidly titled People's Advocate and National Vindicator of Right versus Wrong and the deceptively titled, highly radical, House and Home. He was highly mobile: he noted, without too much hyperbole, that in the 404 days between his English prison sentences in the mid-1870s, he had 465 meetings, travelled 32,000 miles, and addressed 500,000 people. Thus the newspapers of the time are littered with often detailed and vibrant accounts of his speeches, demonstrations, and riots.Nonetheless, the 20th-century technologies of access and retrieval continued to limit discovery. The white gloves, cradles, pencils and paper of the library or archive, sometimes supplemented by the century-old 'new' technology of the microfilm, all enveloped in a culture of hallowed (and pleasurable) silence, restricted the researcher looking to move into the lesser known and certainly the unknown. The fact that most of De Morgan's life was spent, it was thought, outside of England, and outside the purview of the British Library, only exacerbated the problem. At a time when a historian had to travel to the sources and then work directly on them, pencil in hand, it needed more than curiosity to keep searching. Even as many historians in the late part of the century shifted their centre of gravity from the known to the unknown and from the great to the ordinary, in any form of intellectual or resource cost-benefit analysis, De Morgan was a non-starter.UnknownOn the subject of his early life, De Morgan was tantalisingly and deliberately vague. In his speeches and newspapers, he often leaked his personal and emotional struggles as well as his political battles. However, when it came to his biographical story, he veered between the untruthful, the denial, and the obscure. To the twentieth century observer, his life began in 1869 at the age of 21 and ended at the age of 32. His various political campaign "biographies" gave some hints, but what little he did give away was often vague, coy and/or unlikely. His name was actually John Francis Morgan, but he never formally acknowledged it. He claimed, and was very proud, to be Irish and to have been educated in London and at Cambridge University (possible but untrue), and also to have been "for the first twenty years of his life directly or indirectly a railway servant," and to have been a "boy orator" from the age of ten (unlikely but true). He promised that "Some day-nay any day-that the public desire it, I am ready to tell the story of my strange life from earliest recollection to the present time" (St. Clair 4). He never did and the 20th century could unearth little evidence in relation to any of his claims.The blend of the vague, the unlikely and the unverifiable-combined with an inclination to self-glorification and hyperbole-surrounded De Morgan with an aura, for historians as well as contemporaries, of the self-seeking, untrustworthy charlatan with something to hide and little to say. Therefore, as the 20th century moved to closure, the search for John De Morgan did so as well. Though interesting, he gave most value in contextualising the lives of Victorian radicals more generally. He headed back to the footnotes.Now FoundMeanwhile, the technologies underpinning academic practice generally, and history specifically, had changed. The photocopier, personal computer, Internet, and mobile device, had arrived. They formed the basis for both resistance and revolution in academic practices. For a while, the analytical skills of the academic community were concentrated on the perils as much as the promises of a "digital history" (Cohen and Rosenzweig Digital).But as the Millennium turned, and the academic community itself spawned, inter alia, Google, the practical advantages of digitisation for history forced themselves on people. Google enabled the confident searching from a neutral place for things known and unknown; information moved to the user more easily in both time and space. The culture and technologies of gathering, retrieval, analysis, presentation and preservation altered dramatically and, as a result, the traditional powers of gatekeepers, institutions and professional historians was redistributed (De Groot). Access and abundance, arguably over-abundance, became the platform for the management of historical information. For the search for De Morgan, the door reopened. The increased global electronic access to extensive databases, catalogues, archives, and public records, as well as people who knew, or wanted to know, something, opened up opportunities that have been rapidly utilised and expanded over the last decade. Both professional and "amateur" historians moved into a space that made the previously difficult to know or unknowable now accessible.Inevitably, the development of digital newspaper archives was particularly crucial to seeking and finding John De Morgan. After some faulty starts in the early 2000s, characterised as a "wild west" and a "gold rush" (Fyfe 566), comprehensive digitised newspaper archives became available. While still not perfect, in terms of coverage and quality, it is a transforming technology. In the UK, the British Newspaper Archive (BNA)-in pursuit of the goal of the digitising of all UK newspapers-now has over 20 million pages. Each month presents some more of De Morgan. Similarly, in the US, Fulton History, a free newspaper archive run by retired computer engineer Tom Tryniski, now has nearly 40 million pages of New York newspapers. The almost daily footprints of De Morgan's radical life can now be seen, and the lives of the social networks within which he worked on both sides of the Atlantic, come easily into view even from a desk in New Zealand.The Internet also allows connections between researchers, both academic and 'public', bringing into reach resources not otherwise knowable: a Scottish genealogist with a mass of data on De Morgan's family; a Californian with the historian's pot of gold, a collection of over 200 letters received by De Morgan over a 50 year period; a Leeds Public Library blogger uncovering spectacular, but rarely seen, Victorian electoral cartoons which explain De Morgan's precipitate departure to the USA. These discoveries would not have happened without the infrastructure of the Internet, web site, blog, and e-mail. Just how different searching is can be seen in the following recent scenario, one of many now occurring. An addition in 2017 to the BNA shows a Master J.F. Morgan, aged 13, giving lectures on temperance in Ledbury in 1861, luckily a census year. A check of the census through Ancestry shows that Master Morgan was born in Lincolnshire in England, and a quick look at the 1851 census shows him living on an isolated blustery hill in Yorkshire in a railway encampment, along with 250 navvies, as his father, James, works on the construction of a tunnel. Suddenly, literally within the hour, the 20-year search for the childhood of John De Morgan, the supposedly Irish-born "gentleman who repudiated his class," has taken a significant turn.At the end of the 20th century, despite many efforts, John De Morgan was therefore a partial character bounded by what he said and didn't say, what others believed, and the intellectual and historiographical priorities, technologies, tools and processes of that century. In effect, he "lived" historically for a less than a quarter of his life. Without digitisation, much would have remained hidden; with it there has been, and will still be, much to find. De Morgan hid himself and the 20th century forgot him. But as the technologies have changed, and with it the structures of historical practice, the question that even De Morgan himself posed – "Who is John De Morgan?" – can now be addressed.SearchingDigitisation brings undoubted benefits, but its impact goes a long way beyond the improved search and detection capabilities, into a range of technological developments of communication and media that impact on practice, practitioners, institutions, and 'history' itself. A dominant issue for the academic community is the control of "history." De Groot, in his book Consuming History, considers how history now works in contemporary popular culture and, in particular, examines the development of the sometimes conflicted relationship between popular/public history and academic history, and the professional and the 'amateur' historian.The traditional legitimacy of professional historians has, many argue, been eroded by shifts in technology and access with the power of traditional cultural gatekeepers being undermined, bypassing the established control of institutions and professional historian. While most academics now embrace the primary tools of so-called "digital history," they remain, De Groot argues, worried that "history" is in danger of becoming part of a discourse of leisure, not a professionalized arena (18). An additional concern is the role of the global capitalist market, which is developing, or even taking over, 'history' as a brand, product and commodity with overt fiscal value. Here the huge impact of newspaper archives and genealogical software (sometimes owned in tandem) is of particular concern.There is also the new challenge of "navigating the chaos of abundance in online resources" (De Groot 68). By 2005, it had become clear that:the digital era seems likely to confront historians-who were more likely in the past to worry about the scarcity of surviving evidence from the past-with a new 'problem' of abundance. A much deeper and denser historical record, especially one in digital form seems like an incredible opportunity and a gift. But its overwhelming size means that we will have to spend a lot of time looking at this particular gift horse in mouth. (Cohen and Rosenzweig, Web).This easily accessible abundance imposes much higher standards of evidence on the historian. The acceptance within the traditional model that much could simply not be done or known with the resources available meant that there was a greater allowance for not knowing. But with a search button and public access, democratizing the process, the consumer as well as the producer can see, and find, for themselves.Taking on some of these challenges, Zaagsma, having reminded us that the history of digital humanities goes back at least 60 years, notes the need to get rid of the "myth that historical practice can be uncoupled from technological, and thus methodological developments, and that going digital is a choice, which, I cannot emphasis strongly enough, it is not" (14). There is no longer a digital history which is separate from history, and with digital technologies that are now ubiquitous and pervasive, historians have accepted or must quickly face a fundamental break with past practices. However, also noting that the great majority of archival material is not digitised and is unlikely to be so, Zaagsma concludes that hybridity will be the "new normal," combining "traditional/analogue and new/digital practices at least in information gathering" (17).ConclusionA decade on from Cohen and Rozenzweig's "Perils and Promises," the digital is a given. Both historical practice and historians have changed, though it is a work in progress. An early pioneer of the use of computers in the humanities, Robert Busa wrote in 1980 that "the principal aim is the enhancement of the quality, depth and extension of research and not merely the lessening of human effort and time" (89). Twenty years later, as Google was launched, Jordanov, taking on those who would dismiss public history as "mere" popularization, entertainment or propaganda, argued for the "need to develop coherent positions on the relationships between academic history, the media, institutions…and popular culture" (149). As the digital turn continues, and the SEARCH button is just one part of that, all historians-professional or "amateur"-will take advantage of opportunities that technologies have opened up. Looking across the whole range of transformations in recent decades, De Groot concludes: "Increasingly users of history are accessing the past through complex and innovative media and this is reconfiguring their sense of themselves, the world they live in and what history itself might be about" (310). ReferencesAllen, Rob. "'The People's Advocate, Champion and Friend': The Transatlantic Career of Citizen John De Morgan (1848-1926)." Historical Research 86.234 (2013): 684-711.Busa, Roberto. "The Annals of Humanities Computing: The Index Thomisticus." Computers and the Humanities 14.2 (1980): 83-90.Cohen, Daniel J., and Roy Rosenzweig. Digital History: A Guide to Gathering, Preserving, and Presenting the Past on the Web. Philadelphia, PA: U Pennsylvania P, 2005.———. "Web of Lies? Historical Knowledge on the Internet." First Monday 10.12 (2005).De Groot, Jerome. Consuming History: Historians and Heritage in Contemporary Popular Culture. 2nd ed. Abingdon: Routledge, 2016.De Morgan, John. Who Is John De Morgan? A Few Words of Explanation, with Portrait. By a Free and Independent Elector of Leicester. London, 1877.Fyfe, Paul. "An Archaeology of Victorian Newspapers." Victorian Periodicals Review 49.4 (2016): 546-77."Interchange: The Promise of Digital History." Journal of American History 95.2 (2008): 452-91.Johnston, Leslie. "Before You Were Born, We Were Digitizing Texts." The Signal 9 Dec. 2012, Library of Congress. <https://blogs.loc.gov/thesignal/292/12/before-you-were-born-we-were-digitizing-texts>.Jordanova, Ludmilla. History in Practice. 2nd ed. London: Arnold, 2000.Kazin, Michael. A Godly Hero: The Life of William Jennings Bryan. New York: Anchor Books, 2006.Saint-Clair, Sylvester. Sketch of the Life and Labours of J. De Morgan, Elocutionist, and Tribune of the People. Leeds: De Morgan & Co., 1880.Vincent, William T. The Records of the Woolwich District, Vol. II. Woolwich: J.P. Jackson, 1890.Zaagsma, Gerban. "On Digital History." BMGN-Low Countries Historical Review 128.4 (2013): 3-29.
APA, Harvard, Vancouver, ISO, and other styles
38

Moore, Christopher Luke. "Digital Games Distribution: The Presence of the Past and the Future of Obsolescence." M/C Journal 12, no. 3 (July 15, 2009). http://dx.doi.org/10.5204/mcj.166.

Full text
Abstract:
A common criticism of the rhythm video games genre — including series like Guitar Hero and Rock Band, is that playing musical simulation games is a waste of time when you could be playing an actual guitar and learning a real skill. A more serious criticism of games cultures draws attention to the degree of e-waste they produce. E-waste or electronic waste includes mobiles phones, computers, televisions and other electronic devices, containing toxic chemicals and metals whose landfill, recycling and salvaging all produce distinct environmental and social problems. The e-waste produced by games like Guitar Hero is obvious in the regular flow of merchandise transforming computer and video games stores into simulation music stores, filled with replica guitars, drum kits, microphones and other products whose half-lives are short and whose obsolescence is anticipated in the annual cycles of consumption and disposal. This paper explores the connection between e-waste and obsolescence in the games industry, and argues for the further consideration of consumers as part of the solution to the problem of e-waste. It uses a case study of the PC digital distribution software platform, Steam, to suggest that the digital distribution of games may offer an alternative model to market driven software and hardware obsolescence, and more generally, that such software platforms might be a place to support cultures of consumption that delay rather than promote hardware obsolescence and its inevitability as e-waste. The question is whether there exists a potential for digital distribution to be a means of not only eliminating the need to physically transport commodities (its current 'green' benefit), but also for supporting consumer practices that further reduce e-waste. The games industry relies on a rapid production and innovation cycle, one that actively enforces hardware obsolescence. Current video game consoles, including the PlayStation 3, the Xbox 360 and Nintendo Wii, are the seventh generation of home gaming consoles to appear within forty years, and each generation is accompanied by an immense international transportation of games hardware, software (in various storage formats) and peripherals. Obsolescence also occurs at the software or content level and is significant because the games industry as a creative industry is dependent on the extensive management of multiple intellectual properties. The computing and video games software industry operates a close partnership with the hardware industry, and as such, software obsolescence directly contributes to hardware obsolescence. The obsolescence of content and the redundancy of the methods of policing its scarcity in the marketplace has been accelerated and altered by the processes of disintermediation with a range of outcomes (Flew). The music industry is perhaps the most advanced in terms of disintermediation with digital distribution at the center of the conflict between the legitimate and unauthorised access to intellectual property. This points to one issue with the hypothesis that digital distribution can lead to a reduction in hardware obsolescence, as the marketplace leader and key online distributor of music, Apple, is also the major producer of new media technologies and devices that are the paragon of stylistic obsolescence. Stylistic obsolescence, in which fashion changes products across seasons of consumption, has long been observed as the dominant form of scaled industrial innovation (Slade). Stylistic obsolescence is differentiated from mechanical or technological obsolescence as the deliberate supersedence of products by more advanced designs, better production techniques and other minor innovations. The line between the stylistic and technological obsolescence is not always clear, especially as reduced durability has become a powerful market strategy (Fitzpatrick). This occurs where the design of technologies is subsumed within the discourses of manufacturing, consumption and the logic of planned obsolescence in which the product or parts are intended to fail, degrade or under perform over time. It is especially the case with signature new media technologies such as laptop computers, mobile phones and portable games devices. Gamers are as guilty as other consumer groups in contributing to e-waste as participants in the industry's cycles of planned obsolescence, but some of them complicate discussions over the future of obsolescence and e-waste. Many gamers actively work to forestall the obsolescence of their games: they invest time in the play of older games (“retrogaming”) they donate labor and creative energy to the production of user-generated content as a means of sustaining involvement in gaming communities; and they produce entirely new game experiences for other users, based on existing software and hardware modifications known as 'mods'. With Guitar Hero and other 'rhythm' games it would be easy to argue that the hardware components of this genre have only one future: as waste. Alternatively, we could consider the actual lifespan of these objects (including their impact as e-waste) and the roles they play in the performances and practices of communities of gamers. For example, the Elmo Guitar Hero controller mod, the Tesla coil Guitar Hero controller interface, the Rock Band Speak n' Spellbinder mashup, the multiple and almost sacrilegious Fender guitar hero mods, the Guitar Hero Portable Turntable Mod and MAKE magazine's Trumpet Hero all indicate a significant diversity of user innovation, community formation and individual investment in the post-retail life of computer and video game hardware. Obsolescence is not just a problem for the games industry but for the computing and electronics industries more broadly as direct contributors to the social and environmental cost of electrical waste and obsolete electrical equipment. Planned obsolescence has long been the experience of gamers and computer users, as the basis of a utopian mythology of upgrades (Dovey and Kennedy). For PC users the upgrade pathway is traversed by the consumption of further hardware and software post initial purchase in a cycle of endless consumption, acquisition and waste (as older parts are replaced and eventually discarded). The accumulation and disposal of these cultural artefacts does not devalue or accrue in space or time at the same rate (Straw) and many users will persist for years, gradually upgrading and delaying obsolescence and even perpetuate the circulation of older cultural commodities. Flea markets and secondhand fairs are popular sites for the purchase of new, recent, old, and recycled computer hardware, and peripherals. Such practices and parallel markets support the strategies of 'making do' described by De Certeau, but they also continue the cycle of upgrade and obsolescence, and they are still consumed as part of the promise of the 'new', and the desire of a purchase that will finally 'fix' the users' computer in a state of completion (29). The planned obsolescence of new media technologies is common, but its success is mixed; for example, support for Microsoft's operating system Windows XP was officially withdrawn in April 2009 (Robinson), but due to the popularity in low cost PC 'netbooks' outfitted with an optimised XP operating system and a less than enthusiastic response to the 'next generation' Windows Vista, XP continues to be popular. Digital Distribution: A Solution? Gamers may be able to reduce the accumulation of e-waste by supporting the disintermediation of the games retail sector by means of online distribution. Disintermediation is the establishment of a direct relationship between the creators of content and their consumers through products and services offered by content producers (Flew 201). The move to digital distribution has already begun to reduce the need to physically handle commodities, but this currently signals only further support of planned, stylistic and technological obsolescence, increasing the rate at which the commodities for recording, storing, distributing and exhibiting digital content become e-waste. Digital distribution is sometimes overlooked as a potential means for promoting communities of user practice dedicated to e-waste reduction, at the same time it is actively employed to reduce the potential for the unregulated appropriation of content and restrict post-purchase sales through Digital Rights Management (DRM) technologies. Distributors like Amazon.com continue to pursue commercial opportunities in linking the user to digital distribution of content via exclusive hardware and software technologies. The Amazon e-book reader, the Kindle, operates via a proprietary mobile network using a commercially run version of the wireless 3G protocols. The e-book reader is heavily encrypted with Digital Rights Management (DRM) technologies and exclusive digital book formats designed to enforce current copyright restrictions and eliminate second-hand sales, lending, and further post-purchase distribution. The success of this mode of distribution is connected to Amazon's ability to tap both the mainstream market and the consumer demand for the less-than-popular; those books, movies, music and television series that may not have been 'hits' at the time of release. The desire to revisit forgotten niches, such as B-sides, comics, books, and older video games, suggests Chris Anderson, linked with so-called “long tail” economics. Recently Webb has queried the economic impact of the Long Tail as a business strategy, but does not deny the underlying dynamics, which suggest that content does not obsolesce in any straightforward way. Niche markets for older content are nourished by participatory cultures and Web 2.0 style online services. A good example of the Long Tail phenomenon is the recent case of the 1971 book A Lion Called Christian, by Anthony Burke and John Rendall, republished after the author's film of a visit to a resettled Christian in Africa was popularised on YouTube in 2008. Anderson's Long Tail theory suggests that over time a large number of items, each with unique rather than mass histories, will be subsumed as part of a larger community of consumers, including fans, collectors and everyday users with a long term interest in their use and preservation. If digital distribution platforms can reduce e-waste, they can perhaps be fostered by to ensuring digital consumers have access to morally and ethically aware consumer decisions, but also that they enjoy traditional consumer freedoms, such as the right to sell on and change or modify their property. For it is not only the fixation on the 'next generation' that contributes to obsolescence, but also technologies like DRM systems that discourage second hand sales and restrict modification. The legislative upgrades, patches and amendments to copyright law that have attempted to maintain the law's effectiveness in competing with peer-to-peer networks have supported DRM and other intellectual property enforcement technologies, despite the difficulties that owners of intellectual property have encountered with the effectiveness of DRM systems (Moore, Creative). The games industry continues to experiment with DRM, however, this industry also stands out as one of the few to have significantly incorporated the user within the official modes of production (Moore, Commonising). Is the games industry capable (or willing) of supporting a digital delivery system that attempts to minimise or even reverse software and hardware obsolescence? We can try to answer this question by looking in detail at the biggest digital distributor of PC games, Steam. Steam Figure 1: The Steam Application user interface retail section Steam is a digital distribution system designed for the Microsoft Windows operating system and operated by American video game development company and publisher, Valve Corporation. Steam combines online games retail, DRM technologies and internet-based distribution services with social networking and multiplayer features (in-game voice and text chat, user profiles, etc) and direct support for major games publishers, independent producers, and communities of user-contributors (modders). Steam, like the iTunes games store, Xbox Live and other digital distributors, provides consumers with direct digital downloads of new, recent and classic titles that can be accessed remotely by the user from any (internet equipped) location. Steam was first packaged with the physical distribution of Half Life 2 in 2004, and the platform's eventual popularity is tied to the success of that game franchise. Steam was not an optional component of the game's installation and many gamers protested in various online forums, while the platform was treated with suspicion by the global PC games press. It did not help that Steam was at launch everything that gamers take objection to: a persistent and initially 'buggy' piece of software that sits in the PC's operating system and occupies limited memory resources at the cost of hardware performance. Regular updates to the Steam software platform introduced social network features just as mainstream sites like MySpace and Facebook were emerging, and its popularity has undergone rapid subsequent growth. Steam now eclipses competitors with more than 20 million user accounts (Leahy) and Valve Corporation makes it publicly known that Steam collects large amounts of data about its users. This information is available via the public player profile in the community section of the Steam application. It includes the average number of hours the user plays per week, and can even indicate the difficulty the user has in navigating game obstacles. Valve reports on the number of users on Steam every two hours via its web site, with a population on average between one and two million simultaneous users (Valve, Steam). We know these users’ hardware profiles because Valve Corporation makes the results of its surveillance public knowledge via the Steam Hardware Survey. Valve’s hardware survey itself conceptualises obsolescence in two ways. First, it uses the results to define the 'cutting edge' of PC technologies and publishing the standards of its own high end production hardware on the companies blog. Second, the effect of the Survey is to subsequently define obsolescent hardware: for example, in the Survey results for April 2009, we can see that the slight majority of users maintain computers with two central processing units while a significant proportion (almost one third) of users still maintained much older PCs with a single CPU. Both effects of the Survey appear to be well understood by Valve: the Steam Hardware Survey automatically collects information about the community's computer hardware configurations and presents an aggregate picture of the stats on our web site. The survey helps us make better engineering and gameplay decisions, because it makes sure we're targeting machines our customers actually use, rather than measuring only against the hardware we've got in the office. We often get asked about the configuration of the machines we build around the office to do both game and Steam development. We also tend to turn over machines in the office pretty rapidly, at roughly every 18 months. (Valve, Team Fortress) Valve’s support of older hardware might counter perceptions that older PCs have no use and begins to reverse decades of opinion regarding planned and stylistic obsolescence in the PC hardware and software industries. Equally significant to the extension of the lives of older PCs is Steam's support for mods and its promotion of user generated content. By providing software for mod creation and distribution, Steam maximises what Postigo calls the development potential of fan-programmers. One of the 'payoffs' in the information/access exchange for the user with Steam is the degree to which Valve's End-User Licence Agreement (EULA) permits individuals and communities of 'modders' to appropriate its proprietary game content for use in the creation of new games and games materials for redistribution via Steam. These mods extend the play of the older games, by requiring their purchase via Steam in order for the individual user to participate in the modded experience. If Steam is able to encourage this kind of appropriation and community support for older content, then the potential exists for it to support cultures of consumption and practice of use that collaboratively maintain, extend, and prolong the life and use of games. Further, Steam incorporates the insights of “long tail” economics in a purely digital distribution model, in which the obsolescence of 'non-hit' game titles can be dramatically overturned. Published in November 2007, Unreal Tournament 3 (UT3) by Epic Games, was unappreciated in a market saturated with games in the first-person shooter genre. Epic republished UT3 on Steam 18 months later, making the game available to play for free for one weekend, followed by discounted access to new content. The 2000 per cent increase in players over the game's 'free' trial weekend, has translated into enough sales of the game for Epic to no longer consider the release a commercial failure: It’s an incredible precedent to set: making a game a success almost 18 months after a poor launch. It’s something that could only have happened now, and with a system like Steam...Something that silently updates a purchase with patches and extra content automatically, so you don’t have to make the decision to seek out some exciting new feature: it’s just there anyway. Something that, if you don’t already own it, advertises that game to you at an agreeably reduced price whenever it loads. Something that enjoys a vast community who are in turn plugged into a sea of smaller relevant communities. It’s incredibly sinister. It’s also incredibly exciting... (Meer) Clearly concerns exist about Steam's user privacy policy, but this also invites us to the think about the economic relationship between gamers and games companies as it is reconfigured through the private contractual relationship established by the EULA which accompanies the digital distribution model. The games industry has established contractual and licensing arrangements with its consumer base in order to support and reincorporate emerging trends in user generated cultures and other cultural formations within its official modes of production (Moore, "Commonising"). When we consider that Valve gets to tax sales of its virtual goods and can further sell the information farmed from its users to hardware manufacturers, it is reasonable to consider the relationship between the corporation and its gamers as exploitative. Gabe Newell, the Valve co-founder and managing director, conversely believes that people are willing to give up personal information if they feel it is being used to get better services (Leahy). If that sentiment is correct then consumers may be willing to further trade for services that can reduce obsolescence and begin to address the problems of e-waste from the ground up. Conclusion Clearly, there is a potential for digital distribution to be a means of not only eliminating the need to physically transport commodities but also supporting consumer practices that further reduce e-waste. For an industry where only a small proportion of the games made break even, the successful relaunch of older games content indicates Steam's capacity to ameliorate software obsolescence. Digital distribution extends the use of commercially released games by providing disintermediated access to older and user-generated content. For Valve, this occurs within a network of exchange as access to user-generated content, social networking services, and support for the organisation and coordination of communities of gamers is traded for user-information and repeat business. Evidence for whether this will actively translate to an equivalent decrease in the obsolescence of game hardware might be observed with indicators like the Steam Hardware Survey in the future. The degree of potential offered by digital distribution is disrupted by a range of technical, commercial and legal hurdles, primary of which is the deployment of DRM, as part of a range of techniques designed to limit consumer behaviour post purchase. While intervention in the form of legislation and radical change to the insidious nature of electronics production is crucial in order to achieve long term reduction in e-waste, the user is currently considered only in terms of 'ethical' consumption and ultimately divested of responsibility through participation in corporate, state and civil recycling and e-waste management operations. The message is either 'careful what you purchase' or 'careful how you throw it away' and, like DRM, ignores the connections between product, producer and user and the consumer support for environmentally, ethically and socially positive production, distribrution, disposal and recycling. This article, has adopted a different strategy, one that sees digital distribution platforms like Steam, as capable, if not currently active, in supporting community practices that should be seriously considered in conjunction with a range of approaches to the challenge of obsolescence and e-waste. References Anderson, Chris. "The Long Tail." Wired Magazine 12. 10 (2004). 20 Apr. 2009 ‹http://www.wired.com/wired/archive/12.10/tail.html›. De Certeau, Michel. The Practice of Everyday Life. Berkeley: U of California P, 1984. Dovey, Jon, and Helen Kennedy. Game Cultures: Computer Games as New Media. London: Open University Press,2006. Fitzpatrick, Kathleen. The Anxiety of Obsolescence. Nashville: Vanderbilt UP, 2008. Flew, Terry. New Media: An Introduction. South Melbourne: Oxford UP, 2008. Leahy, Brian. "Live Blog: DICE 2009 Keynote - Gabe Newell, Valve Software." The Feed. G4TV 18 Feb. 2009. 16 Apr. 2009 ‹http://g4tv.com/thefeed/blog/post/693342/Live-Blog-DICE-2009-Keynote-–-Gabe-Newell-Valve-Software.html›. Meer, Alec. "Unreal Tournament 3 and the New Lazarus Effect." Rock, Paper, Shotgun 16 Mar. 2009. 24 Apr. 2009 ‹http://www.rockpapershotgun.com/2009/03/16/unreal-tournament-3-and-the-new-lazarus-effect/›.Moore, Christopher. "Commonising the Enclosure: Online Games and Reforming Intellectual Property Regimes." Australian Journal of Emerging Technologies and Society 3. 2, (2005). 12 Apr. 2009 ‹http://www.swin.edu.au/sbs/ajets/journal/issue5-V3N2/abstract_moore.htm›. Moore, Christopher. "Creative Choices: Changes to Australian Copyright Law and the Future of the Public Domain." Media International Australia 114 (Feb. 2005): 71–83. Postigo, Hector. "Of Mods and Modders: Chasing Down the Value of Fan-Based Digital Game Modification." Games and Culture 2 (2007): 300-13. Robinson, Daniel. "Windows XP Support Runs Out Next Week." PC Business Authority 8 Apr. 2009. 16 Apr. 2009 ‹http://www.pcauthority.com.au/News/142013,windows-xp-support-runs-out-next-week.aspx›. Straw, Will. "Exhausted Commodities: The Material Culture of Music." Canadian Journal of Communication 25.1 (2000): 175. Slade, Giles. Made to Break: Technology and Obsolescence in America. Cambridge: Harvard UP, 2006. Valve. "Steam and Game Stats." 26 Apr. 2009 ‹http://store.steampowered.com/stats/›. Valve. "Team Fortress 2: The Scout Update." Steam Marketing Message 20 Feb. 2009. 12 Apr. 2009 ‹http://storefront.steampowered.com/Steam/Marketing/message/2269/›. Webb, Richard. "Online Shopping and the Harry Potter Effect." New Scientist 2687 (2008): 52-55. 16 Apr. 2009 ‹http://www.newscientist.com/article/mg20026873.300-online-shopping-and-the-harry-potter-effect.html?page=2›. With thanks to Dr Nicola Evans and Dr Frances Steel for their feedback and comments on drafts of this paper.
APA, Harvard, Vancouver, ISO, and other styles
39

Starrs, Bruno. "Hyperlinking History and Illegitimate Imagination: The Historiographic Metafictional E-novel." M/C Journal 17, no. 5 (October 25, 2014). http://dx.doi.org/10.5204/mcj.866.

Full text
Abstract:
‘Historiographic Metafiction’ (HM) is a literary term first coined by creative writing academic Linda Hutcheon in 1988, and which refers to the postmodern practice of a fiction author inserting imagined--or illegitimate--characters into narratives that are intended to be received as authentic and historically accurate, that is, ostensibly legitimate. Such adventurous and bold authorial strategies frequently result in “novels which are both intensely self-reflexive and yet paradoxically also lay claim to historical events and personages” (Hutcheon, A Poetics 5). They can be so entertaining and engaging that the overtly intertextual, explicitly inventive work of biographical HM can even change the “hegemonic discourse of history” (Nunning 353) for, as Philippa Gregory, the author of HM novel The Other Boleyn Girl (2001), has said regarding this genre of creative writing: “Fiction is about imagined feelings and thoughts. History depends on the outer life. The novel is always about the inner life. Fiction can sometimes do more than history. It can fill the gaps” (University of Sussex). In a way, this article will be filling one of the gaps regarding HM.Forrest Gump (Robert Zemeckis, 1994) is possibly the best known cinematic example of HM, and this film version of the 1986 novel by Winston Groom particularly excels in seamlessly inserting images of a fictional character into verified history, as represented by well-known television newsreel footage. In Zemeckis’s adaptation, gaps were created in the celluloid artefact and filled digitally with images of the actor, Tom Hanks, playing the eponymous role. Words are often deemed less trustworthy than images, however, and fiction is considered particularly unreliable--although there are some exceptions conceded. In addition to Gregory’s novel; Midnight’s Children (1980) by Salman Rushdie; The Name of the Rose (1983) by Umberto Eco; and The Flashman Papers (1969-2005) by George MacDonald Fraser, are three well-known, loved and lauded examples of literary HM, which even if they fail to convince the reader of their bona fides, nevertheless win a place in many hearts. But despite the genre’s popularity, there is nevertheless a conceptual gap in the literary theory of Hutcheon given her (perfectly understandable) inability in 1988 to predict the future of e-publishing. This article will attempt to address that shortcoming by exploring the potential for authors of HM e-novels to use hyperlinks which immediately direct the reader to fact providing webpages such as those available at the website Wikipedia, like a much speedier (and more independent) version of the footnotes in Fraser’s Flashman novels.Of course, as Roland Barthes declared in 1977, “the text is a tissue of quotations drawn from innumerable centres of culture” (146) and, as per any academic work that attempts to contribute to knowledge, a text’s sources--its “quotations”--must be properly identified and acknowledged via checkable references if credibility is to be securely established. Hence, in explaining the way claims to fact in the HM novel can be confirmed by independently published experts on the Internet, this article will also address the problem Hutcheon identifies, in that for many readers the entirety of the HM novel assumes questionable authenticity, that is, the novel’s “meta-fictional self-reflexivity (and intertextuality) renders their claims to historical veracity somewhat problematic, to say the least” ("Historiographic Metafiction: Parody", 3). This article (and the PhD in creative writing I am presently working on at Murdoch University in Perth, Western Australia) will possibly develop the concept of HM to a new level: one at which the Internet-connected reader of the hyperlinked e-novel is made fully (and even instantly) aware of those literary elements of the narrative that are legitimate and factual as distinct from those that are fictional, that is, illegitimate. Furthermore, utilising examples from my own (yet-to-be published) hyperlinked HM e-novel, this article demonstrates that such hyperlinking can add an ironic sub-text to a fictional character’s thoughts and utterances, through highlighting the reality concerning their mistaken or naïve beliefs, thus creating HM narratives that serve an entertainingly complex yet nevertheless truly educational purpose.As a relatively new and under-researched genre of historical writing, HM differs dramatically from the better known style of standard historical or biographical narrative, which typically tends to emphasise mimesis, the cataloguing of major “players” in historical events and encyclopaedic accuracy of dates, deaths and places. Instead, HM involves the re-contextualisation of real-life figures from the past, incorporating the lives of entirely (or, as in the case of Gregory’s Mary Boleyn, at least partly) fictitious characters into their generally accepted famous and factual activities, and/or the invention of scenarios that gel realistically--but entertainingly--within a landscape of well-known and well-documented events. As Hutcheon herself states: “The formal linking of history and fiction through the common denominators of intertextuality and narrativity is usually offered not as a reduction, as a shrinking of the scope and value of fiction, but rather as an expansion of these” ("Intertextuality", 11). Similarly, Gregory emphasises the need for authors of HM to extend themselves beyond the encyclopaedic archive: “Archives are not history. The trouble with archives is that the material is often random and atypical. To have history, you have to have a narrative” (University of Sussex). Functionally then, HM is an intertextual narrative genre which serves to communicate to a contemporary audience an expanded story or stories of the past which present an ultimately more self-reflective, personal and unpredictable authorship: it is a distinctly auteurial mode of biographical history writing for it places the postmodern author’s imaginative “signature” front and foremost.Hutcheon later clarified that the quest for historical truth in fiction cannot possibly hold up to the persuasive powers of a master novelist, as per the following rationale: “Fact is discourse-defined: an event is not” ("Historiographic Metafiction", 843). This means, in a rather simplistic nutshell, that the new breed of HM novel writer is not constrained by what others may call fact: s/he knows that the alleged “fact” can be renegotiated and redefined by an inventive discourse. An event, on the other hand, is responsible for too many incontrovertible consequences for it to be contested by her/his mere discourse. So-called facts are much easier for the HM writer to play with than world changing events. This notion was further popularised by Ansgar Nunning when he claimed the overtly explicit work of HM can even change the “hegemonic discourse of history” (353). HM authors can radically alter, it seems, the way the reader perceives the facts of history especially when entertaining, engaging and believable characters are deliberately devised and manipulated into the narrative by the writer. Little wonder, then, that Hutcheon bemoans the unfortunate reality that for many readers the entirety of a HM work assumes questionable “veracity” due to its author’s insertion of imaginary and therefore illegitimate personages.But there is an advantage to be found in this, the digital era, and that is the Internet’s hyperlink. In our ubiquitously networked electronic information age, novels written for publication as e-books may, I propose, include clickable links on the names of actual people and events to Wikipedia entries or the like, thus strengthening the reception of the work as being based on real history (the occasional unreliability of Wikipedia notwithstanding). If picked up for hard copy publication this function of the HM e-novel can be replicated with the inclusion of icons in the printed margins that can be scanned by smartphones or similar gadgets. This small but significant element of the production reinforces the e-novel’s potential status as a new form of HM and addresses Hutcheon’s concern that for HM novels, their imaginative but illegitimate invention of characters “renders their claims to historical veracity somewhat problematic, to say the least” ("Historiographic Metafiction: Parody", 3).Some historic scenarios are so little researched or so misunderstood and discoloured by the muddy waters of time and/or rumour that such hyperlinking will be a boon to HM writers. Where an obscure facet of Australian history is being fictionalised, for example, these edifying hyperlinks can provide additional background information, as Glenda Banks and Martin Andrew might have wished for when they wrote regarding Bank’s Victorian goldfields based HM novel A Respectable Married Woman. This 2012 printed work explores the lives of several under-researched and under-represented minorities, such as settler women and Aboriginal Australians, and the author Banks lamented the dearth of public awareness regarding these peoples. Indeed, HM seems tailor-made for exposing the subaltern lives of those repressed individuals who form the human “backdrop” to the lives of more famous personages. Banks and Andrew explain:To echo the writings of Homi K. Bhaba (1990), this sets up a creative site for interrogating the dominant, hegemonic, ‘normalised’ master narratives about the Victorian goldfields and ‘re-membering’ a marginalised group - the women of the goldfields, the indigenous [sic], the Chinese - and their culture (2013).In my own hyperlinked short story (presently under consideration for publishing elsewhere), which is actually a standalone version of the first chapter of a full-length HM e-novel about Aboriginal Australian activists Eddie Mabo and Chicka Dixon and the history of the Aboriginal Tent Embassy in Canberra, entitled The Bullroarers, I have focussed on a similarly under-represented minority, that being light-complexioned, mixed race Aboriginal Australians. My second novel to deal with Indigenous Australian issues (see Starrs, That Blackfella Bloodsucka Dance), it is my first attempt at writing HM. Hopefully avoiding overkill whilst alerting readers to those Wikipedia pages with relevance to the narrative theme of non-Indigenous attitudes towards light-complexioned Indigenous Australians, I have inserted a total of only six hyperlinks in this 2200-word piece, plus the explanatory foreword stating: “Note, except where they are well-known place names or are indicated as factual by the insertion of Internet hyperlinks verifying such, all persons, organisations, businesses and places named in this text are entirely fictitious.”The hyperlinks in my short story all take the reader not to stubs but to well-established Wikipedia pages, and provide for the uninformed audience the following near-unassailable facts (i.e. events):The TV program, A Current Affair, which the racist character of the short story taken from The Bullroarers, Mrs Poulter, relies on for her prejudicial opinions linking Aborigines with the dealing of illegal drugs, is a long-running, prime-time Channel Nine production. Of particular relevance in the Wikipedia entry is the comment: “Like its main rival broadcast on the Seven Network, Today Tonight, A Current Affair is often considered by media critics and the public at large to use sensationalist journalism” (Wikipedia, “A Current Affair”).The Aboriginal Tent Embassy, located on the lawns opposite the Old Parliament House in Canberra, was established in 1972 and ever since has been the focus of Aboriginal Australian land rights activism and political agitation. In 1995 the Australian Register of the National Estate listed it as the only Aboriginal site in Australia that is recognised nationally for representing Aboriginal and Torres Strait Islander people and their political struggles (Wikipedia, “The Aboriginal Tent Embassy”).In 1992, during an Aboriginal land rights case known as Mabo, the High Court of Australia issued a judgment constituting a direct overturning of terra nullius, which is a Latin term meaning “land belonging to no one”, and which had previously formed the legal rationale and justification for the British invasion and colonisation of Aboriginal Australia (Wikipedia, “Terra Nullius”).Aboriginal rights activist and Torres Strait Islander, Eddie Koiki Mabo (1936 to 1992), was instrumental in the High Court decision to overturn the doctrine of terra nullius in 1992. In that same year, Eddie Mabo was posthumously awarded the Australian Human Rights Medal in the Human Rights and Equal Opportunity Commission Awards (Wikipedia, “Eddie Mabo”).The full name of what Mrs Poulter blithely refers to as “the Department of Families and that” is the Australian Government’s Department of Families, Housing, Community Services and Indigenous Affairs (Wikipedia, “The Department of Families, Housing, Community Services and Indigenous Affairs”).The British colonisation of Australia was a bloody, murderous affair: “continuous Aboriginal resistance for well over a century belies the ‘myth’ of peaceful settlement in Australia. Settlers in turn often reacted to Aboriginal resistance with great violence, resulting in numerous indiscriminate massacres by whites of Aboriginal men, women and children” (Wikipedia, “History of Australia (1788 - 1850)”).Basically, what is not evidenced empirically with regard to the subject matter of my text, that is, the egregious attitudes of non-Indigenous Australians towards Indigenous Australians, can be extrapolated thanks to the hyperlinks. This resonates strongly with Linda Tuhiwai Smith’s assertion in 2012 that those under-represented by mainstream, patriarchal epistemologies need to be engaged in acts of “reclaiming, reformulating and reconstituting” (143) so as to be re-presented as authentic identities in these HM artefacts of literary research.Exerting auteurial power as an Aboriginal Australian author myself, I have sought to imprint on my writing a multi-levelled signature pertaining to my people’s under-representation: there is not just the text I have created but another level to be considered by the reader, that being my careful choice of Wikipedia pages to hyperlink certain aspects of the creative writing to. These electronic footnotes serve as politically charged acts of “reclaiming, reformulating and reconstituting” Aboriginal Australian history, to reuse the words of Smith, for when we Aboriginal Australian authors reiterate, when we subjugated savages wrestle the keyboard away from the colonising overseers, our readers witness the Other writing back, critically. As I have stated previously (see Starrs, "Writing"), receivers of our words see the distorted and silencing master discourse subverted and, indeed, inverted. Our audiences are subjectively repositioned to see the British Crown as the monster. The previously presumed rational, enlightened and civil coloniser is instead depicted as the author and perpetrator of a violently racist, criminal discourse, until, eventually, s/he is ultimately eroded and made into the Other: s/he is rendered the villainous, predatory savage by the auteurial signatures in revisionist histories such as The Bullroarers.Whilst the benefit in these hyperlinks as electronic educational footnotes in my short story is fairly obvious, what may not be so obvious is the ironic commentary they can make, when read in conjunction with the rest of The Bullroarers. Although one must reluctantly agree with Wayne C. Booth’s comment in his classic 1974 study A Rhetoric of Irony that, in some regards, “the very spirit and value [of irony] are violated by the effort to be clear about it” (ix), I will nevertheless strive for clarity and understanding by utilizing Booth’s definition of irony “as something that under-mines clarities, opens up vistas of chaos, and either liberates by destroying all dogmas or destroys by revealing the inescapable canker of negation at the heart of every affirmation” (ix). The reader of The Bullroarers is not expecting the main character, Mrs Poulter, to be the subject of erosive criticism that destroys her “dogmas” about Aboriginal Australians--certainly not so early in the narrative when it is unclear if she is or is not the protagonist of the story--and yet that’s exactly what the hyperlinks do. They expose her as hopelessly unreliable, laughably misinformed and yes, unforgivably stupid. They reveal the illegitimacy of her beliefs. Perhaps the most personally excoriating of these revelations is provided by the link to the Wikipedia entry on the Australian Government’s Department of Families, Housing, Community Services and Indigenous Affairs, which is where her own daughter, Roxy, works, but which Mrs Poulter knows, gormlessly, as “the Department of Families and that”. The ignorant woman spouts racist diatribes against Aboriginal Australians without even realising how inextricably linked she and her family, who live at the deliberately named Boomerang Crescent, really are. Therein lies the irony I am trying to create with my use of hyperlinks: an independent, expert adjudication reveals my character, Mrs Poulter, and her opinions, are hiding an “inescapable canker of negation at the heart of every affirmation” (Booth ix), despite the air of easy confidence she projects.Is the novel-reading public ready for these HM hyperlinked e-novels and their potentially ironic sub-texts? Indeed, the question must be asked: can the e-book ever compete with the tactile sensations a finely crafted, perfectly bound hardcover publication provides? Perhaps, if the economics of book buying comes into consideration. E-novels are cheap to publish and cheap to purchase, hence they are becoming hugely popular with the book buying public. Writes Mark Coker, the founder of Smashwords, a successful online publisher and distributor of e-books: “We incorporated in 2007, and we officially launched the business in May 2008. In our first year, we published 140 books from 90 authors. Our catalog reached 6,000 books in 2009, 28,800 in 2010, 92,000 in 2011, 191,000 in 2012 and as of this writing (November 2013) stands at over 250,000 titles” (Coker 2013). Coker divulged more about his company’s success in an interview with Forbes online magazine: “‘It costs essentially the same to pump 10,000 new books a month through our network as it will cost to do 100,000 a month,’ he reasons. Smashwords book retails, on average, for just above $3; 15,000 titles are free” (Colao 2012).In such a burgeoning environment of technological progress in publishing I am tempted to say that yes, the time of the hyperlinked e-novel has come, and to even predict that HM will be a big part of this new wave of postmodern literature. The hyperlinked HM e-novel’s strategy invites the reader to reflect on the legitimacy and illegitimacy of different forms of narrative, possibly concluding, thanks to ironic electronic footnoting, that not all the novel’s characters and their commentary are to be trusted. Perhaps my HM e-novel will, with its untrustworthy Mrs Poulter and its little-known history of the Aboriginal Tent Embassy addressed by gap-filling hyperlinks, establish a legitimising narrative for a people who have traditionally in white Australian society been deemed the Other and illegitimate. Perhaps The Bullroarers will someday alter attitudes of non-Indigenous Australians to the history and political activities of this country’s first peoples, to the point even, that as Nunning warns, we witness a change in the “hegemonic discourse of history” (353). If that happens we must be thankful for our Internet-enabled information age and its concomitant possibilities for hyperlinked e-publications, for technology may be separated from the world of art, but it can nevertheless be effectively used to recreate, enhance and access that world, to the extent texts previously considered illegitimate achieve authenticity and veracity.ReferencesBanks, Glenda. A Respectable Married Woman. Melbourne: Lacuna, 2012.Banks, Glenda, and Martin Andrew. “Populating a Historical Novel: A Case Study of a Practice-led Research Approach to Historiographic Metafiction.” Bukker Tillibul 7 (2013). 19 Sep. 2014 ‹http://bukkertillibul.net/Text.html?VOL=7&INDEX=2›.Barthes, Roland. Image, Music, Text. Trans. Stephen Heath. London: Fontana Press, 1977.Booth, Wayne C. A Rhetoric of Irony. Chicago: U of Chicago P, 1974.Colao, J.J. “Apple’s Biggest (Unknown) Supplier of E-books.” Forbes 7 June 2012. 19 Sep. 2014 ‹http://www.forbes.com/sites/jjcolao/2012/06/07/apples-biggest-unknown-supplier-of-e-books/›.Coker, Mark. “Q & A with Smashwords Founder, Mark Coker.” About Smashwords 2013. 19 Sep. 2014 ‹https://www.smashwords.com/about›.Eco, Umberto. The Name of the Rose. Trans. William Weaver, San Diego: Harcourt, 1983.Forrest Gump. Dir. Robert Zemeckis. Paramount Pictures, 1994.Fraser, George MacDonald. The Flashman Papers. Various publishers, 1969-2005.Groom, Winston. Forrest Gump. NY: Doubleday, 1986.Gregory, Philippa. The Other Boleyn Girl. UK: Scribner, 2001.Hutcheon, Linda. A Poetics of Postmodernism: History, Theory, Fiction, 2nd ed. Abingdon, UK: Taylor and Francis, 1988.---. “Intertextuality, Parody, and the Discourses of History: A Poetics of Postmodernism History, Theory, Fiction.” 1988. 19 Sep. 2014 ‹http://ieas.unideb.hu/admin/file_3553.pdf›.---. “Historiographic Metafiction: Parody and the Intertextuality of History.” Eds. P. O’Donnell and R.C. Davis, Intertextuality and Contemporary American Fiction. Baltimore, Maryland: John Hopkins UP, 1989. 3-32.---. “Historiographic Metafiction.” Ed. Michael McKeon, Theory of the Novel: A Historical Approach Baltimore, Maryland: Johns Hopkins UP, 2000. 830-50.Nunning, Ansgar. “Where Historiographic Metafiction and Narratology Meet.” Style 38.3 (2004): 352-75.Rushdie, Salman. Midnight’s Children. London: Jonathan Cape, 1980.Starrs, D. Bruno. That Blackfella Bloodsucka Dance! Saarbrücken, Germany: Just Fiction Edition (paperback), 2011; Starrs via Smashwords (e-book), 2012.---. “Writing Indigenous Vampires: Aboriginal Gothic or Aboriginal Fantastic?” M/C Journal 17.4 (2014). 19 Sep. 2014 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/834›.Tuhiwai Smith, Linda. Decolonizing Methodologies. London & New York: Zed Books, 2012.University of Sussex. “Philippa Gregory Fills the Historical Gaps.” University of Sussex Alumni Magazine 51 (2012). 19 Sep. 2014 ‹http://www.scribd.com/doc/136033913/University-of-Sussex-Alumni-Magazine-Falmer-issue-51›.Wikipedia. “A Current Affair.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/A_Current_Affair›.---. “Aboriginal Tent Embassy.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/Aboriginal_Tent_Embassy›.---. “Department of Families, Housing, Community Services and Indigenous Affairs.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/Department_of_Families,_Housing,_Community_Services_and_Indigenous_Affairs›.---. “Eddie Mabo.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/Eddie_Mabo›.---. “History of Australia (1788 – 1850).” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/History_of_Australia_(1788%E2%80%931850)#Aboriginal_resistance›.---. “Terra Nullius.” 2014. 19 Sep. 2014 ‹http://en.wikipedia.org/wiki/Terra_nullius›.
APA, Harvard, Vancouver, ISO, and other styles
40

B2041171009, HARNOTO. "PENGARUH PRAKTEK MSDM TERHADAP ORGANIZATIONAL CITIZENSHIP BEHAVIOUR (OCB) MELALUI KEPUASAN KERJA SEBAGAI MEDIATOR (STUDI PADA PEGAWAI UPT PPD PROVINSI KALIMANTAN BARAT)." Equator Journal of Management and Entrepreneurship (EJME) 7, no. 4 (August 2, 2019). http://dx.doi.org/10.26418/ejme.v7i4.34535.

Full text
Abstract:
Pentingnya membangun OCB tidak lepas dari komitmen karyawan dalam organisasi. Komitmen karyawan akan mendorong terciptanya OCB dan tanpa adanya kontrol yang baik dalam pemberian kompensasi yang sesuai dengan hasil kerja tentunya memperlambat kerja pegawai. Penelitian ini bertujuan untuk menguji dan menganalisis pengaruh kompensasi dan komitmen organisasi terhadap kepuasan kerja dan OCB. Jumlah responden dalam penelitian ini berjumlah 86 orang. Pengumpulan data diperoleh dengan kuesioner menggunakan skala likert. Metode analisis data menggunakan Path Analysis. Hasil penelitian diperoleh bahwa kompensasi berpengaruh positif dan signifikan terhadap kepuasan kerja dan Kepuasan kerja berpengaruh positif dan signifikan terhadap OCB. Kata Kunci : Komitmen Organisasi, Kompensasi, Kepuasan kerja dan OCBDAFTAR PUSTAKA Bangun, Wilson. (2012). Manajemen Sumber Daya Manusia. Erlangga. Jakarta. Bernardin, H. John, & Joyce E.A Russel. (2003). Human resource management(An Experimental Approach International Edition). Mc. Graw-Hill Inc. Singapore. Baedhowi. (2007). Manajemen Sumber Daya Manusia. Pelita Insani. Semarang Bigliardi, Barbara & Albert, Ivo Dormio. (2012). The Impact of Organizational Culture on The Job Satisfaction of Knowledge Workers. Emerald Group. Vol.2 No.1, 36-51.Blau, P.M. (1964). Exchange and Power in Social Life. Transaction Publishers. Wiley, New York, NY.Bohlander, George, & Snell, Scott. (2010). Principles of Human Resource. Management, 15th ed. Mason, OH: South Western – Cengage Learning Boon, C. & Hartog, D.D. (2014). Human Resource Management and Organizational Citizenship Behavior The Mediating Role of Job Satisfaction. Netherland: Scriptiesonline.uba.uva.nl Cassio, Wayne F. (1997). Managing Human Resources, Productivity, Quality of Work Life Product Fourth Edition, New York: McGraw Hill International. Chinyere N. I. (2013). Job Satisfaction and Organizational Citizenship Behavior of Library Personnel in Selected Nigerian Universities. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Colquitt, Jason A., Jeffery A. LePine., Michael J. Wesson. (2011). Organizational Behaviour. New York: McGraw-Hill International Companies. Delery, E. J. & Doty, H. D. (1996). Modes of Theorizing in Strategic Human ResourcecManagement: Tests of Universalistic, Contingency, and Configurationally PerformancecPredictions, Academy of Management Journal, 39(4), 802–35. Dewi, S., Suwandana, Made. (2016). Pengaruh Kepuasan Kerja Terhadap Organizational Citizenship Behavior (OCB) Dengan Komitmen Organisasional Sebagai Variabel Mediasi. E-Jurnal Manajemen Unud, Vol. 5 No.9 : 5643-5670. Darma, P.S & Supryanto, Achmad.S. (2017). The effect of compensation on satisfaction and employe performance. Management and Economics Journal. E-ISSN: 2598-9537 P-ISSN: 2599-3402. Journal Home Page: http://ejournal.uin-malang.ac.id/index.php/mec. De Saa-Perez, P. & JM. Garcia-Falcon. (2002). A Resource-based View of Human Resource Management & Organizational Capabilities Development. International Journal of Human Resource Management. Vol. 13. 123–40. Dewanggana, B.D., Paramita, P.D. & Haryono, A.T. (2016). Pengaruh Komitmen Organisasi, Kepuasan Kerja, Budaya Organisasi Terhadap Organizational Citizenship Behavior (OCB) Yang Berdampak Pada Prestasi Kerja Karyawan (Studi Pada PT. PLN App Semarang). Journal Of Management, Vol. 2 No. 2 Edy Sutrisno, (2014). Manajemen Sumber Daya Manusia. Cetak Ke Enam. Pranada Media Group. Jakarta. Fahmi, Irham. (2014). Analisa kinerja keuangan. Alfabeta. Bandung. Fitrianasari,D.,Nimran,U.,&Utami,H.,N. (2013).Pengaruh Kompensasi DanKepuasanKerja Terhadap OrganizationalCitizenship Behavior(OCB)dan Kinerja Karyawan. (Studi pada Perawat Rumah SakitUmum “Darmayu”di KabupatenPonorogo”). Jurnal ProfitVol.7 No.1Flippo, Edwin B (1997). Manajemen Personalia, Edisi Indonesia. ErlangaJakarta. Guest, D. (1997). Human Resource Management and Performance: A Review and Research Agenda. The International Journal of Human Resource Management. Vol. 8 (3). 263-76. Hartono, B & Setiawan, R. (2013). Judul penelitian Pengaruh Komitmen Organisasional Terhadap Kepuasan Kerja Karyawan Paparon’s Pizza City Of Tomorrow. AGORAVol.1, No.1, 1-8. Hasibuan, Malayu. (2012). Manajemen Sumber Daya Manusia dan Kunci Keberhasilan. Haji Mas Agung. Jakarta. Handoko,THani.(2014).Manajemen Personalia &SumberdayaManusia.Edisi Kedua.Cetakan Ke-21. BPFE-Yogyakarta. Yogyakarta. Indrawati, Endang Sri. dan Nafi’, C. (2017). Hubungan Antara Kepuasan Kerja Dengan Organizational Citizenship Behavior Pada Karyawan CV. Elfa’s Kudus. Jurnal Empati. Vol. 7 No. 3, 134 – 145. Joarder, M. H. R., Sharif, M. Y., & Ahmmed, K. (2011). Mediating role of affectivecommitment in hrm practices and turnover intention. relationship: a study in adeveloping context. Business and Economics Research Journal, Vol 2 (4), 135–158. Kamel B., El Amine M.B., and Abdeljalil M., (2015). Relationship between Job Satisfaction and Organizational Citizenship Behavior in the National Company for Distribution of Electricity and Gas.European Journal of Business and Management Vol.7, No.30 1-6 Khan, A.H.,Muhammad M.N., Muhammad A &Wasim, H. (2012). Impact ofJob Satisfaction onEmployee Performance:An Empirical Study of Autonomous MedicalInstitutions of Pakistan.African Journalof Business Management,Vol. 6, 2697-2705 Kreitner, R &Kinicki, A. (2014). Perilaku Organisasi. Salemba Empat. Jakarta. Kurniawan, A. (2015). Pengaruh Komitmen Organisasi Terhadap Organizational Citizenship Behavior (OCB) PT X Bandung. Jurnal Manajemen, Vol.15 No.1, 95-118. Kwantes, Karam, Kuo, & Towson. (2009). Culture's influence on the perception of OCB as in-role or extra-role. Kanada. International Journal of Intercultural Relations Luthans, Fred. (2006). Perilaku Organisasi edisi 10. Penerbit ANDI. Yogyakarta. Mangkunegara, A.A. Anwar Prabu. 2013.Manajemen Sumber Daya ManusiaPerusahaan.RemajaRosdakarya. Bandung. Mathis, R.L. & J.H. Jackson. (2006). Human Resource Management: Manajemen Sumber Daya Manusia. Terjemahan Dian Angelia. Salemba Empat. Jakarta. ----------------------------------. (2011). Human Resource Management: Manajemen Sumber Daya Manusia. Terjemahan Dian Angelia. Salemba Empat. Jakarta. Mehboob & Bhutto. (2012). Job Satisfaction as a Predictor of Organizational Citizenship Behavior A Study of Faculty Members at Business Institutes. Jurnal Ilmu Pendidikan, (Online) Vol. 3, No 9(http://www.journal-archieves14.webs.com/1447-1455.pdf) Mondy,R Wayne. (2008).ManajemenSumberDaya Manusia. Jilid 2Edisi 10. PenerbitErlangga. Jakarta. Muguongo, Muguna,, Muriithi. (2015). Effects of Compensation on Job Satisfaction Among Secondary School Teachers in Maara Sub - County o Tharaka Nithi County, Kenya”, Published online October 10, 2015 (http://www.sciencepublishinggroup.com/j/jhrm) ISSN: 2331-0707 (Print); ISSN: 2331-0715 (Online) Nazar, Omer Abdallah Ahmed. (2016). Impact of Human Resource Management Practices on Organizational Citizenship Behavior: An Empirical Investigation from Banking Sector of Sudan. International Review of Management and Marketing. Vol. 6(4), 964-973. Nursyamsi. (2013). Organizational Citizenship Behavior dan Pemberdayaan terhadap Komitmen Organisasi serta Dampaknya terhadap Kinerja Karyawan. Jurnal Keuangan dan Perbankan Vol. 17 No 3, 488-498. Nurandini, A & Lataruva, E. (2014). Judul penelitian Analisis Pengaruh Komitmen Organisasi Terhadap Kinerja Karyawan (Studi Pada Pegawai Perum PERUMNAS Jakarta). JurnalStudiManajemen& Organisasi Vol 11, 78–91. Omer, N. & Ahmed, A. (2017). Impact of Human Resource Management Practices on Organizational Citizenship Behavior: An Empirical Investigation from Banking Sector of Sudan. International Review of Management and Marketing. Vol. 6(4), 964-973. Oyeniyi, K.O, Afolabi, M.A, Olayanju, Mufutau (2014). Effect of Human Resource Management Practices on Job Satisfaction: An Empirical Investigation of Nigeria Banks. International Journal of Academic Research in Business and Social Sciences, Vol. 4, No. 8, 243-251. Organ, D. W. (1990). The motivational basis of organizational citizen ship behavior. In B. M. Staw, & L. L. Cummings (Eds.), Research in organizational behavior (pp. 43-72). Greenwich, CT: JAI Press. Organ, D. W., Podsakoff, P. M., & MacKenzie, S. B. (2006). Organizational citizenship behavior: Its nature, antecedents, and consequences. Thousand Oaks, CA: SAGE. Pala, Fikri. Eker, Semith dkk.2008. The effect of demographic characteristic on organizational commitment and job satisfaction : An Empirical study on Turkish health care staff. The journal of industrial relations and human resources Vol. 10 No. 2 Purwanto, A.H. (2011). Pengaruh Kualitas Layanan Internal dan Orientasi Pemberi Layanan Terhadap Kinerja Pegawai di Kantor Perijinan Kabupaten Lamongan. Jurnal Psikosains. Vol. 3(1) : 55-72. Priyatno, Duwi. (2011). Buku Saku Analisis Statistik Data. Penerbit Media Kom. Yogyakarta. Prowse, Peter & Prowse, Julie. (2009). The dilemma of performance appraisal. Measuring Business Excellence, 13 (4) : 69 – 77. Podsakoff P.M, Michae Ahearne, MacKenzie S.B (1997). Organizational Citizenship Behavior and the Quantity of Work Group Perpormance. American Psychological Association. Vol. 82 No. 2, 262-270. Rahayu, N.M.N & Riana, I.G. (2017). Pengaruh Kompensasi Terhadap Kepuasan Kerja dan Keinginan Keluar Pada Hotel Amaris Legian. E-JurnalManajemen Unud, Vol. 6,No. 11, 5804-5833 Ramadhani, A.A (2013). Pengaruh Kompensasi Terhadap Motivasi Kerja Di PT. Pos Indonesia (Persero) Bandung. Skripsi: Program Studi Manajemen, Universitas Pendidikan Indonesia. (http://repository.upi.edu/1299/ [16 November 2013]Rahmayanti, Febriana, dan Dewi. (2014). Faktor-Faktor yang MempengaruhiOrganizationalCitizenshipBehavior(OCB).JurnalEcopsyVol.1No.3 Retnoningsih, T., Sunuharjo, B.S & Ruhana, I. 2015. Pengaruh Kompensasi Terhadap Kepuasan Kerja Dan Kinerja Karyawan (Studi Pada Karyawan PT PLN (Persero) Distribusi Jawa Timur Area Malang). Richard L. Hughes, Robert C. Ginnett, and Gordon J. Curphy. (2012). Leadership, Enhancing the Lessons of Experience, Alih Bahasa: Putri Izzati. Salemba Humanika. Jakarta. Robbins, S.P., & Judge, T.A. (2008). Perilaku organisasi. organizational behavior. buku 1. edisi 12. Penerjemah: Angelica, D., Cahyani, R., dan Rosyid, A. Salemba Empat. Jakarta. Robbins, S. P. & Coulter, M. (2012). Management (11th ed.). Prentice Hall: River, N.J. Robbins, S.P dan Judge T.A. (2015).Perilaku Organisasi.SalembaEmpat. Jakarta. Rozzaid, Y., Toni Herlambang, T & dan Devi, A.M. (2015). Pengaruh Kompensasi Dan Motivasi Terhadap Kepuasan Kerja Karyawan (Studi Kasus Pada PT. Nusapro Telemedia Persada Cabang Banyuwangi). Jurnal ManajemenDanBisnis IndonesiaVol. 1No. 2, 201-220. Saleem, Sharjeel & Saba, Amin. (2013). The Impact of Organizational Support for Career Development and Supervisory Suppoert on Employee Performance : An Emperical Study From Pakistani Academic Sector. Europen Journal of Business and Management. 5 (5) : 194-207. Samsudin, Sadili. (2010). Manajemen Sumber Daya Manusia. Pustaka Setia. Bandung. Sasilu, J.B, Chinyio & Sures, S. (2015). The impact of compensation on the job satisfaction of public sector construction workers of jigawa state of Nigeria. The Business and Management Review. Vol. 6 No. 4.Schneider, B., dan Bowen, D.E. (1985). Employee and customer perceptions of service in bank: Replication and extension. Journal of Applied Psychology. Vol 70, 423-433. Sekaran, Uma. (2014). Metodologi Penelitian untuk Bisnis (Research Methods for Business). Salemba Empat. Jakarta. Siagian, Sondang., P. (2013). Manajemen Sumber Daya Manusia. Binapura Aksara. Jakarta. --------------------------, (2008). Manajemen Sumber Daya Manusia (EdisiPertama). Binapura Aksara. Jakarta. Siregar, S & Prasetio, A.P. (2015). Pengaruh Kepuasan Kerja dan Komikmen Organisasi Terhadap Organizational Citizenship Behavior (Prilaku OCB) Karyawan Kantor Distribusi PT. PLN (Persero) Distribusi Jawa Barat Dan Banten. E-Proceeding ofManagement.Vol.2 no.3Society for Human Resource Management. (2012). EmployeeJob Satisfaction and Engagement. A research report by SHRM. Retrieved from www.shrmstore. shrm.org. Solihin, Dadang. (2013). Optimalisasi Otonomi Daerah Kebijakan, Strategi dan Upaya. Yayasan Empat Sembilan. Jakarta. Srimulyani, V. A. (2009). Tipilogi dan Anteseden Komitmen Organisasi. Jurnal Ilmiah Widya Wana. Vol. 33 (1), 1-20. Steven, H Appelbaum, Michel Roy & Terry Gilliland. (2011). Globalization of performance appraisals: theory and applications. Management Decision, Vol. 49 (4) : 570-585. Subekhi, A. (2012). Pengantar Manajemen Sumber DayaManusia.PrestasiPustakaJakarta. Jakarta. Sugiyono. (2013). Metode Penelitian Kuantitatif Kualitatif dan R&D. Alfabeta. Bandung. Sutrisno,E. (2011).ManajemenSumberDayaManusia. PrenadaMediaGroup.Jakarta. Tan, R&Tarigan, Z.J.H. (2017). PengaruhKompensasiDanKepuasanKerjaTerhadap OrganizationalCitizenshipBehavior(OCB)MelaluiMotivasi KerjaSebagaiVariabelInterveningPada3HMotosport. AGORAVol. 5,No. 1 Titisari, Purnamie. (2014). Peranan Organizational Citizenship Behaviour (OCB) dalam Meningkatkan Kinerja Karyawan. Mitra Wacana Media. Jakarta. Uma Sankar Mishra, Aurolipy, Madhusmita Dash. (2017). Impact of HRM Practices on Job Satisfaction and Performance: An Empirical Study in Health Care Sector. International journal of economic research. Vol. 14, No. 1 Umar, Husein. (2003). Riset Sumber Daya Manusia Dalam Organisasi. Penerbit Gramedia Pustaka Utama. Jakarta. Wexley, Kenneth. & Gary Yukl. (2003). Perilaku organisasi dan psikologi personalia. Rineka Cipta. Jakarta. Wibowo. (2016). Manajemen Kinerja. PT. Rajagrafindo Persada. Jakarta. Widodo, SE. (2015). Manajemen Pengembangan Sumber Daya Manusia. Pustaka Pelajar. Yogyakarta. Yani. (2012). Manajemen Sumber Daya Manusia. Mitra Wacana Media. Jakarta.Zaenabadi, H. (2010). Job satisfaction and organizational commitment as antecedents of Organizational Citizenship Behavior (OCB) of teachers. Procedia Social and Behavioral Sciences Vol. 5 : 998–1003.
APA, Harvard, Vancouver, ISO, and other styles
41

Miletic, Sasa. "‘Everyone Has Secrets’: Revealing the Whistleblower in Hollwood Film in the Examples of Snowden and The Fifth Estate." M/C Journal 23, no. 4 (August 12, 2020). http://dx.doi.org/10.5204/mcj.1668.

Full text
Abstract:
In one of the earliest films about a whistleblower, On the Waterfront (1954), the dock worker Terry Malloy (Marlon Brando), who also works for the union boss and mobster Johnny Friendly (Lee J. Cobb), decides to testify in court against him and uncover corruption and murder. By doing so he will not only suffer retribution from Friendly but also be seen as a “stool pigeon” by his co-workers, friends, and neighbours who will shun him, and he will be “marked” forever by his deed. Nonetheless, he decides to do the right thing. Already it is clear that in most cases the whistleblowers are not simply the ones who reveal things, but they themselves are also revealed.My aim in this article is to explore the depiction of Edward Snowden and Julian Assange in fiction film and its connection to what I would like to call, with Slavoj Žižek, “Hollywood ideology”; the heroisation of the “ordinary guy” against a big institution or a corrupt individual, as it is the case in Snowden (2016) on the one hand, and at the same time the impossibility of true systemic critique when the one who is criticising is “outside of the system”, as Assange in The Fifth Estate (2013). Both films also rely on the notion of individualism and convey conflicting messages in regard to understanding the perception of whistleblowers today. Snowden and AssangeAlthough there are many so called “whistleblower films” since On the Waterfront, like Serpico (1973), All the President’s Men (1976), or Silkwood (1983), to name but a few (for a comprehensive list see https://ew.com/movies/20-whistleblower-movies-to-watch/?), in this article I will focus on the most recent films that deal with Edward Snowden and Julian Assange. These are the most prominent cases of whistleblowing in the last decade put to film. They are relevant today also regarding their subject matter—privacy. Revealing secrets that concern privacy in this day and age is of importance and is pertinent even to the current Coronavirus crisis, where the question of privacy again arises in form of possible tracking apps, in the age of ever expanding “surveillance capitalism” (Zuboff).Even if Assange is not strictly speaking a whistleblower, an engagement with his work in this context is indispensable since his outsider status, up to a point, resembles those of Snowden or Manning. They are not only important because they can be considered as “authentic heroe[s] of our time” (Žižek, Pandemic, 7), but also because of their depiction which differs in a very crucial way: while Snowden is depicted as a “classic” whistleblower (an American patriot who did his duty, someone from the “inside”), Assange’s action are coming from the outside of the established system and are interpreted as a selfish act, as it is stated in the film: “It was always about him.”Whistleblowers In his Whistleblower’s Handbook, Kohn writes: “who are these whistleblowers? Sometimes they are people you read about with admiration in the newspaper. Other times they are your co-workers or neighbours. However, most whistleblowers are regular workers performing their jobs” (Kohn, xi). A whistleblower, as the employee or a “regular worker”, can be regarded as someone who is a “nobody” at first, an invisible “cog in the wheel” of a certain institution, a supposedly devoted and loyal worker, who, through an act of “betrayal”, becomes a “somebody”. They do something truly significant, and by doing so becomes a hero to some and a traitor to others. Their persona suddenly becomes important.The wrongdoings that are uncovered by the whistleblower are for the most part not simply isolated missteps, but of a systemic nature, like the mass surveillance by the National Security Agency (NSA) uncovered by Snowden. The problem with narratives that deal with whistleblowing is that the focus inevitably shifts from the systemic problem (surveillance, war crimes, etc.) to the whistleblower as an individual. Moretti states that the interest of the media regarding whistleblowing, if one compares the reactions to the leaking of the “Pentagon Papers” regarding the Vietnam War in the 1970s by Daniel Ellsberg and to Snowden’s discoveries, shifted from the deed itself to the individual. In the case of Ellsberg, Moretti writes:the legitimate questions were not about him and what motivated him, but rather inquiry on (among other items) the relationship between government and media; whether the U.S. would be damaged militarily or diplomatically because of the release of the papers; the extent to which the media were acting as watchdogs; and why Americans needed to know about these items. (8)This shift of public interest goes along, according to Moretti, with the corporate ownership of media (7), where profit is the primary goal and therefore sensationalism is the order of the day, which is inextricably linked to the focus on the “scandalous” individual. The selfless and almost self-effacing act of whistleblowing becomes a narrative that constructs the opposite: yet another determined individual that through their sheer willpower achieves their goal, a notion that conforms to neoliberal ideology.Hollywood IdeologyThe endings of All the President’s Men and The Harder They Fall (1956), another early whistleblower film, twenty years apart, are very similar: they show the journalist eagerly typing away on his typewriter a story that will, in the case of the former, bring down the president of the United States and in the latter, bring an end to arranged fights in the boxing sport. This depiction of the free press vanquishing the evil doers, as Žižek states it, is exactly the point where “Hollywood ideology” becomes visible, which is:the ideology of such Hollywood blockbusters as All the President’s Men and The Pelican Brief, in which a couple of ordinary guys discover a scandal which reaches up to the president, forcing him to step down. Corruption is shown to reach the very top, yet the ideology of such works resides in their upbeat final message: what a great country ours must be, when a couple of ordinary guys like you and me can bring down the president, the mightiest man on Earth! (“Good Manners”)This message is of course part of Hollywood’s happy-ending convention that can be found even in films that deal with “serious” subject matters. The point of the happy end in this case is that before it is finally reached, the film can show corruption (Serpico), wrongdoings of big companies (The Insider, 1999), or sexual harassment (North Country, 2005). It is important that in the end all is—more or less—good. The happy ending need not necessarily be even truly “happy”—this depends on the general notion the film wants to convey (see for instance the ending of Silkwood, where the whistleblower is presumed to have been killed in the end). What is important in the whistleblower film is that the truth is out, justice has been served in one way or the other, the status quo has been re-established, and most importantly, there is someone out there who cares.These films, even when they appear to be critical of “the system”, are there to actually reassure their audiences in the workings of said system, which is (liberal) democracy supported by neoliberal capitalism (Frazer). Capitalism, on the other hand, is supported by the ideology of individualism which functions as a connecting tissue between the notions of democracy, capitalism, and film industry, since we are admiring exceptional individuals in performing acts of great importance. This, in turn, is encapsulated by the neoliberal mantra—“anyone can make it, only if they try heard enough”. As Bauman puts it more concretely, the risks and contradictions in a society are produced socially but are supposed to be solved individually (46).Individualism, as a part of the neoliberal capitalist ideology, is described already by Milton Friedman, who sees the individual as the “ultimate entity in the society” and the freedom of the individual as the “ultimate goal” within this society (12). What makes this an ideology is the fact that, in reality, the individual, or in the context of the market, the entrepreneur, is always-already tethered to and supported by the state, as Varoufakis has successfully proven (“Varoufakis/Chomsky discussion”). Therefore individualism is touted as an ideal to strive for, while for neoliberalism in order to function, the state is indispensable, which is often summed up in the formula “socialism for the rich, capitalism for the poor” (Polychroniou). The heroic Hollywood individual, as shown in the whistleblower film, regardless of real-life events, is the perfect embodiment of individualist ideology of neoliberal capitalism—we are not seeing a stylised version of it, a cowboy or a masked vigilante, but a “real” person. It is paradoxically precisely the realism that we see in such films that makes them ideological: the “based on a true story” preamble and all the historical details that are there in order to create a fulfilling cinematic experience. All of this supports its ideology because, as Žižek writes, “the function of ideology is not to offer us a point of escape from our reality but to offer us the social reality itself as an escape from some traumatic, real kernel” (Sublime Object 45). All the while Snowden mostly adheres to Hollywood ideology, The Fifth Estate also focuses on individualism, but goes in a different direction, and is more problematic – in the former we see the “ordinary guy” as the American hero, in the latter a disgruntled individual who reveals secrets of others for strictly personal reasons.SnowdenThere is an aspect of the whistleblower film that rings true and that is connected to Michel Foucault’s notion of power (“Truth and Power”). Snowden, through his employment at the NSA, is within a power relations network of an immensely powerful organisation. He uses “his” power, to expose the mass surveillance by the NSA. It is only through his involvement with this power network that he could get insight into and finally reveal what NSA is doing. Foucault writes that these resistances to power from the inside are “effective because they are formed right at the point where relations of power are exercised; resistance to power does not have to come from elsewhere to be real … It exists all the more by being in the same place as power” (Oushakine 206). In the case of whistleblowing, the resistance to power must come exactly from the inside in order to be effective since whistleblowers occupy the “same place as power” that they are up against and that is what in turn makes them “powerful”.Fig. 1: The Heroic Individual: Edward Snowden in SnowdenBut there is an underside to this. His “relationship” to the power structure he is confronting greatly affects his depiction as a whistleblower within the film—precisely because Snowden, unlike Assange, is someone from inside the system. He can still be seen as a patriot and a “disillusioned idealist” (Scott). In the film this is shown right at the beginning as Snowden, in his hotel room in Hong Kong, tells the documentary filmmaker Laura Poitras (Melissa Leo) and journalist Glenn Greenwald (Zachary Quinto) his name and who he is. The music swells and the film cuts to Snowden in uniform alongside other soldiers during a drill, when he was enlisted in the army before work for the NSA.Snowden resembles many of Stone’s typical characters, the all-American patriot being disillusioned by certain historical events, as in Born on the 4th of July (1989) and JFK (1991), which makes him question the government and its actions. It is generally of importance for a mainstream Hollywood film that the protagonist is relatable in order for the audiences to sympathise with them (Bordwell and Thompson 82). This is important not only regarding personal traits but, I would argue, also political views of the character. There needs to be no doubt in the mind of American audiences when it comes to films that deal with politics, that the protagonists are patriots.Stone’s film profits from this ambivalence in Snowden’s own political stance: at first he is more of a right winger who is a declared fan of Ayn Rand’s conservative-individualist manifesto Atlas Shrugged, then, after meeting his future partner Lindsey Mills, he turns slightly to the left, as he at one point states his support for President Obama. This also underlines the films ambiguity, as Oliver Stone openly stated about his Vietnam War film Platoon (1986) that “it could be embraced by … the right and the left. Essentially, most movies make their money in the middle” (Banff Centre). As Snowden takes the lie detector test as a part of the process of becoming a CIA agent, he confirms, quite sincerely it seems, that he thinks that the United States is the “greatest country in the world” and that the most important day in his life was 9/11. This again confirms his patriotic stance.Snowden is depicted as the exceptional individual, and at the same time the “ordinary guy”, who, through his act of courage, defied the all-powerful USA. During the aforementioned job interview scene, Snowden’s superior, Corbin O’Brian (Rhys Ifans), quotes Ayn Rand to him: “one man can stop the motor of the world”. Snowden states that he also believes that. The quote could serve as the film’s tagline, as a “universal truth” that seems to be at the core of American values and that also coincides with and reaffirms neoliberal ideology. Although it is undeniable that individuals can accomplish extraordinary feats, but when there is no systemic change, those can remain only solitary achievements that are only there to support the neoliberal “cult of the individual”.Snowden stands in total contrast to Assange in regard to his character and private life. There is nothing truly “problematic” about him, he seems to be an almost impeccable person, a “straight arrow”. This should make him a poster boy for American democracy and freedom of speech, and Stone tries to depict him in this way.Still, we are dealing with someone who cannot simply be redeemed as a patriot who did his duty. He cannot be unequivocally hailed as an all-American hero since betraying state secrets (and betrayal in general) is seen as a villainous act. For many Americans, and for the government, he will forever be remembered as a traitor. Greenwald writes that most of the people in the US, according to some surveys, still want to see Snowden in prison, even if they find that the surveillance by the NSA was wrong (365).Snowden remains an outcast and although the ending is not quite happy, since he must live in Russian exile, there is still a sense of an “upbeat final message” that ideologically colours the film’s ending.The Fifth EstateThe Fifth Estate is another example of the ideological view of the individual, but in this case with a twist. The film tries to be “objective” at first, showing the importance and impact of the newly established online platform WikiLeaks. However, towards the end of the film, it proceeds to dismantle Julian Assange (Benedict Cumberbatch) with the “everyone has secrets” platitude, which effectively means that none of us should ever try to reveal any secrets of those in power, since all of us must have our own secrets we do not want revealed. The film is shown from the perspective of Assange’s former disgruntled associate Daniel Domscheit-Berg (Daniel Brühl), who wrote a book about his time at WikiLeaks on which the film is partly based on (Inside WikiLeaks). We see Assange through his eyes and delve into personal moments that are supposed to reveal the “truth” about the individual behind the project. In a cynical twist, it is Daniel who is the actual whistleblower, who reveals the secrets of WikiLeaks and its founder.Assange, as it is said in the film, is denounced as a “messiah” or a “prophet”, almost a cult leader who only wants to satisfy his perverse need for other people’s secrets, except that he is literally alone and has no followers and, unlike real cult leaders, needs no followers. The point of whistleblowing is exactly in the fact that it is a radical move, it is a big step forward in ending a wrongdoing. To denounce the radical stance of WikiLeaks is to misunderstand and undermine the whole notion of whistleblowing as a part of true changes in a society.The cult aspects are often referred to in the film when Assange’s childhood is mentioned. His mother was supposed to be in a cult, called “The Family”, and we should regard this as an important (and bad) influence on his character. This notion of the “childhood trauma” seems to be a crutch that is supposed to serve as a characterisation, something the scriptwriting-guru Robert McKee criticises as a screenwriting cliché: “do not reduce characters to case studies (an episode of child abuse is the cliché in vogue at the moment), for in truth there are no definitive explanations for anyone’s behaviour” (376).Although the film does not exaggerate the childhood aspect, it is still a motive that is supposed to shed some light into the “mystery” that is Assange. And it also ties into the question of the colour of his hair as a way of dismantling his lies. In a flashback that resembles a twist ending of an M. Night Shyamalan thriller, it turns out that Assange actually dyes his hair white, witnessed in secret by Daniel, instead of it turning naturally white, as Assange explains on few occasions but stating different reasons for it. Here he seems like a true movie villain and resembles the character of the Joker from The Dark Knight (2008), who also tells different stories about the origin of his facial scars. This mystery surrounding his origin makes the villain even more dangerous and, what is most important, unpredictable.Žižek also draws a parallel between Assange and Joker of the same film, whom he sees as the “figure of truth”, as Batman and the police are using lies in order to “protect” the citizens: “the film’s take-home message is that lying is necessary to sustain public morale: only a lie can redeem us” (“Good Manners”). Rather than interpreting Assange’s role in a positive way, as Žižek does, the film truly establishes him as a villain.Fig. 2: The Problematic Individual: Julian Assange in The Fifth EstateThe Fifth Estate ends with another cheap psychologisation of Assange on Daniel’s part as he describes the “true purpose” of WikiLeaks: “only someone so obsessed with his own secrets could’ve come up with a way to reveal everyone else’s”. This faux-psychological argument paints the whole WikiLeaks endeavour as Assange’s ego-trip and makes of him an egomaniac whose secret perverted pleasure is to reveal the secrets of others.Why is this so? Why are Woodward and Bernstein in All the President’s Men depicted as heroes and Assange is not? The true underlying conflict here is between classic journalism; where journalists can publish their pieces and get the acclaim for publishing the “new Pentagon Papers”, once again ensuring the freedom of the press and “inter-systemic” critique. This way of working of the press, as the films show, always pays off. All the while, in reality, very little changes since, as Žižek writes, the “formal functioning of power” stays in place. He further states about WikiLeaks:The true targets here weren’t the dirty details and the individuals responsible for them; not those in power, in other words, so much as power itself, its structure. We shouldn’t forget that power comprises not only institutions and their rules, but also legitimate (‘normal’) ways of challenging it (an independent press, NGOs, etc.). (“Good Manners”)In the very end, the “real” journalism is being reinforced as the sole vehicle of criticism, while everything else is “extremism” and, again, can only stem from a frustrated, even “evil”, individual. If neoliberal individualism is the order of the day, then the thinking must also revolve around that notion and cannot transcend that horizon.ConclusionŽižek expresses the problem of revealing the truth in our day and age by referring to the famous fable “The Emperor’s New Clothes”, where a child is the only one who is naive and brave enough to state that the emperor is in fact naked. But for Žižek today,in our cynical era, such strategy no longer works, it has lost its disturbing power, since everyone now proclaims that the emperor is naked (that Western democracies are torturing terrorist suspects, that wars are fought for profit, etc., etc.), and yet nothing happens, nobody seems to mind, the system just goes on functioning as if the emperor were fully dressed. (Less than Nothing 92)The problem with the “Collateral Murder”, a video of the killing of Iraqi civilians by the US Army, leaked by Wikileaks and Chelsea Manning, that was presented to the public, for instance, was according to accounts in Inside Wikileaks and Inside Julian Assange’s War on Secrecy, that it did not have the desired impact. The public seems, in the end, to be indifferent to such reveals since it effectively cannot do anything about it. The return to the status quo after these reveals supports this stance, as Greenwald writes that after Snowden’s leaks there was no substantial change within the system; during the Obama administration, there was even an increase of criminal investigations of whistleblowers with an emergence of a “climate of fear” (Greenwald 368). Many whistleblower films assure us that in the end the system works; the good guys always win, the antagonists are punished, and laws have been passed. This is not to be accepted simply as a Hollywood convention, something that we also “already know”, but as an ideological stance, since these films are taken more seriously than films with similar messages but within other mainstream genres. Snowden shows that only individualism has the power to challenge the system, while The Fifth Estate draws the line that should not be crossed when it comes to privacy as a “universal” good because, again, “everyone has secrets”. Such representations of whistleblowing and disruption only further cement the notion that in our societies no real change is possible because it seems unnecessary. Whistleblowing as an act of revelation needs therefore to be understood as only one small step made by the individual that in the end depends on how society and the government decide to act upon it.References All the President’s Men. Dir. Alan J. Pakula. Wildwood Enterprises. 1976.Banff Centre for Arts and Creativity. “Oliver Stone- Satire and Controversy.” 23 Mar. 2013. 30 Juy 2020 <https://www.youtube.com/watch?v=7s2gBKApxyk>.Bauman, Zygmunt. Flüchtige Moderne. Frankfurt am Main: Suhrkamp, 2003.Bordwell, David, and Kristin Thomson. Film Art: An Introduction. New York: McGraw-Hill, 2010.Born on the 4th of July. Dir. Oliver Stone. Ixtian, 1989.The Dark Knight. Dir. Christopher Nolan. Warner Brothers, Legendary Entertainment. 2008.Domscheit-Berg, Daniel. Inside WikiLeaks: My Time with Julian Assange at the World’s Most Dangerous Website. London: Jonathan Cape, 2011.The Fifth Estate. Dir. Bill Condon. Dreamworks, Anonymous Content (a.o.). 2013.Foucault, Michel. “Truth and Power.” Power: Essential Works of Foucault 1954-1984. Vol. 3. Ed. James D. Faubion. Penguin Books, 2000. 111-33.Frazer, Nancy. “From Progressive Neoliberalism to Trump – and Beyond.” American Affairs 1.4 (2017). 19 May. 2020 <https://americanaffairsjournal.org/2017/11/progressive-neoliberalism-trump-beyond/>.Friedman, Milton. Capitalism and Freedom. Chicago: U of Chicago P, 1982.“Full Transcript of the Yanis Varoufakis/Noam Chomsky NYPL Discussion.” Yanisvaroufakis.eu, 28 June 2016. 15 Mar. 2020 <https://www.yanisvaroufakis.eu/2016/06/28/full-transcript-of-the-yanis-varoufakis-noam-chomsky-nypl-discussion/>.Greenwald, Glenn. Die globale Überwachung: Der Fall Snowden, die amerikanischen Geheimdienste und die Folgen. München: Knaur, 2015.The Harder They Fall. Dir. Mark Robson. Columbia Pictures. 1956.The Insider. Dir. Michael Mann. Touchstone Pictures, Mann/Roth Productions (a.o.). 1999.JFK. Dir. Oliver Stone. Warner Bros., 1991.Kohn, Stephen Martin. The Whistleblower’s Handbook: A Step-by-Step Guide to Doing What’s Right and Protecting Yourself. Guilford, Lyons P, 2011.Leigh, David, and Luke Harding. WikiLeaks: Inside Julian Assange’s War on Secrecy. London: Guardian Books, 2011.McKee, Robert. Story: Substance, Structure, Style, and the Principles of Screenwriting. New York: Harper-Collins, 1997.Moretti, Anthony. “Whistleblower or Traitor: Edward Snowden, Daniel Ellsberg and the Power of Media Celebrity.” Moscow Readings Conference, 14-15 Nov. 2013, Moscow, Russia.North Country. Dir. Niki Caro. Warner Bros., Industry Entertainment (a.o.). 2005.On the Waterfront. Dir. Elia Kazan. Horizon Pictures. 1954.Oushakine, Sergei A. “The Terrifying Mimicry of Samizdat.” Public Culture 13.2 (2001): 191-214.Platoon. Dir. Oliver Stone. Hemdake, Cinema ‘84. 1986.Polychroniou, C.J. “Socialism for the Rich, Capitalism for the Poor: An Interview with Noam Chomsky.” Truthout, 11 Dec. 2016. 25 May 2020 <https://truthout.org/articles/socialism-for-the-rich-capitalism-for-the-poor-an-interview-with-noam-chomsky/>.Scott, A.O. “Review: ‘Snowden,’ Oliver Stone’s Restrained Portrait of a Whistle-Blower.” The New York Times, 15 Sep. 2016. 5 May 2020 <https://www.nytimes.com/2016/09/16/movies/snowden-review-oliver-stone-joseph-gordon-levitt.html>. Serpico. Dir. Sidney Lumet. Artists Entertainment Complex, Produzioni De Laurentiis. 1973. Silkwood. Dir. Mike Nichols. ABC Motion Pictures. 1983.Snowden. Dir. Oliver Stone. Krautpack Entertainment, Wild Bunch (a.o.). 2016.Žižek, Slavoj. “Good Manners in the Age of WikiLeaks.” Los Angeles Review of Books 33.2 (2011). 15 May 2020 <https://www.lrb.co.uk/the-paper/v33/n02/slavoj-zizek/good-manners-in-the-age-of-wikileaks>.———. Less than Nothing: Hegel and the Shadow of Dialectical Materialism. Verso, 2013.———. Pandemic! COVID-19 Shakes the World. New York: Polity, 2020.———. The Sublime Object of Ideology. Verso, 2008.Zuboff, Shoshana. The Age of Surveillance Capitalism: The Fight for a Human Future and the New Frontier of Power. New York: Public Affairs, 2020.
APA, Harvard, Vancouver, ISO, and other styles
42

Brabazon, Tara. "Welcome to the Robbiedome." M/C Journal 4, no. 3 (June 1, 2001). http://dx.doi.org/10.5204/mcj.1907.

Full text
Abstract:
One of the greatest joys in watching Foxtel is to see all the crazy people who run talk shows. Judgement, ridicule and generalisations slip from their tongues like overcooked lamb off a bone. From Oprah to Rikki, from Jerry to Mother Love, the posterior of pop culture claims a world-wide audience. Recently, a new talk diva was added to the pay television stable. Dr Laura Schlessinger, the Mother of Morals, prowls the soundstage. attacking 'selfish acts' such as divorce, de facto relationships and voting Democrat. On April 11, 2001, a show aired in Australia that added a new demon to the decadence of the age. Dr Laura had been told that a disgusting video clip, called 'Rock DJ', had been televised at 2:30pm on MTV. Children could have been watching. The footage that so troubled our doyenne of daytime featured the British performer Robbie Williams not only stripping in front of disinterested women, but then removing skin, muscle and tissue in a desperate attempt to claim their gaze. This was too much for Dr Laura. She was horrified: her strident tone became piercing. She screeched, "this is si-ee-ck." . My paper is drawn to this sick masculinity, not to judge - but to laugh and theorise. Robbie Williams, the deity of levity, holds a pivotal role in theorising the contemporary 'crisis' of manhood. To paraphrase Austin Powers, Williams returned the ger to singer. But Williams also triumphed in a captivatingly original way. He is one of the few members of a boy band who created a successful solo career without regurgitating the middle of the road mantras of boys, girls, love, loss and whining about it. Williams' journey through post-war popular music, encompassing influences from both Sinatra and Sonique, forms a functional collage, rather than patchwork, of masculinity. He has been prepared to not only age in public, but to discuss the crevices and cracks in the facade. He strips, smokes, plays football, wears interesting underwear and drinks too much. My short paper trails behind this combustible masculinity, focussing on his sorties with both masculine modalities and the rock discourse. My words attack the gap between text and readership, beat and ear, music and men. The aim is to reveal how this 'sick masculinity' problematises the conservative rendering of men's crisis. Come follow me I'm an honorary Sean Connery, born '74 There's only one of me … Press be asking do I care for sodomy I don't know, yeah, probably I've been looking for serial monogamy Not some bird that looks like Billy Connolly But for now I'm down for ornithology Grab your binoculars, come follow me. 'Kids,' Robbie Williams Robbie Williams is a man for our age. Between dating supermodels and Geri 'Lost Spice' Halliwell [1], he has time to "love … his mum and a pint," (Ansen 85) but also subvert the Oasis cock(rock)tail by frocking up for a television appearance. Williams is important to theories of masculine representation. As a masculinity to think with, he creates popular culture with a history. In an era where Madonna practices yoga and wears cowboy boots, it is no surprise that by June 2000, Robbie Williams was voted the world's sexist man [2]. A few months later, in the October edition of Vogue, he posed in a British flag bikini. It is reassuring in an era where a 12 year old boy states that "You aren't a man until you shoot at something," (Issac in Mendel 19) that positive male role models exist who are prepared to both wear a frock and strip on national television. Reading Robbie Williams is like dipping into the most convincing but draining of intellectual texts. He is masculinity in motion, conveying foreignness, transgression and corruption, bartering in the polymorphous economies of sex, colonialism, race, gender and nation. His career has spanned the boy bands, try-hard rock, video star and hybrid pop performer. There are obvious resonances between the changes to Williams and alterations in masculinity. In 1988, Suzanne Moore described (the artist still known as) Prince as "the pimp of postmodernism." (165-166) Over a decade later, the simulacra has a new tour guide. Williams revels in the potency of representation. He rarely sings about love or romance, as was his sonic fodder in Take That. Instead, his performance is fixated on becoming a better man, glancing an analytical eye over other modes of masculinity. Notions of masculine crisis and sickness have punctuated this era. Men's studies is a boom area of cultural studies, dislodging the assumed structures of popular culture [3]. William Pollack's Real Boys has created a culture of changing expectations for men. The greater question arising from his concerns is why these problems, traumas and difficulties are emerging in our present. Pollack's argument is that boys and young men invest energy and time "disguising their deepest and most vulnerable feelings." (15) This masking is difficult to discern within dance and popular music. Through lyrics and dancing, videos and choreography, masculinity is revealed as convoluted, complex and fragmented. While rock music is legitimised by dominant ideologies, marginalised groups frequently use disempowered genres - like country, dance and rap genres - to present oppositional messages. These competing representations expose seamless interpretations of competent masculinity. Particular skills are necessary to rip the metaphoric pacifier out of the masculine mouth of popular culture. Patriarchal pop revels in the paradoxes of everyday life. Frequently these are nostalgic visions, which Kimmel described as a "retreat to a bygone era." (87) It is the recognition of a shared, simpler past that provides reinforcement to heteronormativity. Williams, as a gaffer tape masculinity, pulls apart the gaps and crevices in representation. Theorists must open the interpretative space encircling popular culture, disrupting normalising criteria. Multiple nodes of assessment allow a ranking of competent masculinity. From sport to business, drinking to sex, masculinity is transformed into a wired site of ranking, judgement and determination. Popular music swims in the spectacle of maleness. From David Lee Roth's skied splits to Eminem's beanie, young men are interpellated as subjects in patriarchy. Robbie Williams is a history lesson in post war masculinity. This nostalgia is conservative in nature. The ironic pastiche within his music videos features motor racing, heavy metal and Bond films. 'Rock DJ', the 'sick text' that vexed Doctor Laura, is Williams' most elaborate video. Set in a rollerdrome with female skaters encircling a central podium, the object of fascination and fetish is a male stripper. This strip is different though, as it disrupts the power held by men in phallocentralism. After being confronted by Williams' naked body, the observing women are both bored and disappointed at the lack-lustre deployment of masculine genitalia. After this display, Williams appears embarrassed, confused and humiliated. As Buchbinder realised, "No actual penis could every really measure up to the imagined sexual potency and social or magical power of the phallus." (49) To render this banal experience of male nudity ridiculous, Williams then proceeds to remove skin and muscle. He finally becomes an object of attraction for the female DJ only in skeletal form. By 'going all the way,' the strip confirms the predictability of masculinity and the ordinariness of the male body. For literate listeners though, a higher level of connotation is revealed. The song itself is based on Barry White's melody for 'It's ecstasy (when you lay down next to me).' Such intertextuality accesses the meta-racist excesses of a licentious black male sexuality. A white boy dancer must deliver an impotent, but ironic, rendering of White's (love unlimited) orchestration of potent sexuality. Williams' iconography and soundtrack is refreshing, emerging from an era of "men who cling … tightly to their illusions." (Faludi 14) When the ideological drapery is cut away, the male body is a major disappointment. Masculinity is an anxious performance. Fascinatingly, this deconstructive video has been demeaned through its labelling as pornography [4]. Oddly, a man who is prepared to - literally - shave the skin of masculinity is rendered offensive. Men's studies, like feminism, has been defrocking masculinity for some time. Robinson for example, expressed little sympathy for "whiny men jumping on the victimisation bandwagon or playing cowboys and Indians at warrior weekends and beating drums in sweat lodges." (6) By grating men's identity back to the body, the link between surface and depth - or identity and self - is forged. 'Rock DJ' attacks the new subjectivities of the male body by not only generating self-surveillance, but humour through the removal of clothes, skin and muscle. He continues this play with the symbols of masculine performance throughout the album Sing when you're winning. Featuring soccer photographs of players, coaches and fans, closer inspection of the images reveal that Robbie Williams is actually every character, in every role. His live show also enfolds diverse performances. Singing a version of 'My Way,' with cigarette in tow, he remixes Frank Sinatra into a replaying and recutting of masculine fabric. He follows one dominating masculinity with another: the Bond-inspired 'Millennium.' Some say that we are players Some say that we are pawns But we've been making money Since the day we were born Robbie Williams is comfortably located in a long history of post-Sinatra popular music. He mocks the rock ethos by combining guitars and drums with a gleaming brass section, hailing the lounge act of Dean Martin, while also using rap and dance samples. Although carrying fifty year's of crooner baggage, the spicy scent of homosexuality has also danced around Robbie Williams' career. Much of this ideology can be traced back to the Take That years. As Gary Barlow and Jason Orange commented at the time, Jason: So the rumour is we're all gay now are we? Gary: Am I gay? I am? Why? Oh good. Just as long as we know. Howard: Does anyone think I'm gay? Jason: No, you're the only one people think is straight. Howard: Why aren't I gay? What's wrong with me? Jason: It's because you're such a fine figure of macho manhood.(Kadis 17) For those not literate in the Take That discourse, it should come as no surprise that Howard was the TT equivalent of The Beatle's Ringo Starr or Duran Duran's Andy Taylor. Every boy band requires the ugly, shy member to make the others appear taller and more attractive. The inference of this dialogue is that the other members of the group are simply too handsome to be heterosexual. This ambiguous sexuality has followed Williams into his solo career, becoming fodder for those lads too unappealing to be homosexual: Oasis. Born to be mild I seem to spend my life Just waiting for the chorus 'Cause the verse is never nearly Good enough Robbie Williams "Singing for the lonely." Robbie Williams accesses a bigger, brighter and bolder future than Britpop. While the Gallagher brothers emulate and worship the icons of 1960s British music - from the Beatles' haircuts to the Stones' psychedelia - Williams' songs, videos and persona are chattering in a broader cultural field. From Noel Cowardesque allusions to the ordinariness of pub culture, Williams is much more than a pretty-boy singer. He has become an icon of English masculinity, enclosing all the complexity that these two terms convey. Williams' solo success from 1999-2001 occurred at the time of much parochial concern that British acts were not performing well in the American charts. It is bemusing to read Billboard over this period. The obvious quality of Britney Spears is seen to dwarf the mediocrity of British performers. The calibre of Fatboy Slim, carrying a smiley backpack stuffed with reflexive dance culture, is neither admitted nor discussed. It is becoming increasing strange to monitor the excessive fame of Williams in Britain, Europe, Asia and the Pacific when compared to his patchy career in the United States. Even some American magazines are trying to grasp the disparity. The swaggering king of Britpop sold a relatively measly 600,000 copies of his U.S. debut album, The ego has landed … Maybe Americans didn't appreciate his songs about being famous. (Ask Dr. Hip 72) In the first few years of the 2000s, it has been difficult to discuss a unified Anglo-American musical formation. Divergent discursive frameworks have emerged through this British evasion. There is no longer an agreed centre to the musical model. Throughout 1990s Britain, blackness jutted out of dance floor mixes, from reggae to dub, jazz and jungle. Plied with the coldness of techno was an almost too hot hip hop. Yet both were alternate trajectories to Cool Britannia. London once more became swinging, or as Vanity Fair declared, "the nerve centre of pop's most cohesive scene since the Pacific Northwest grunge explosion of 1991." (Kamp 102) Through Britpop, the clock turned back to the 1960s, a simpler time before race became 'a problem' for the nation. An affiliation was made between a New Labour, formed by the 1997 British election, and the rebirth of a Swinging London [5]. This style-driven empire supposedly - again - made London the centre of the world. Britpop was itself a misnaming. It was a strong sense of Englishness that permeated the lyrics, iconography and accent. Englishness requires a Britishness to invoke a sense of bigness and greatness. The contradictions and excesses of Blur, Oasis and Pulp resonate in the gap between centre and periphery, imperial core and colonised other. Slicing through the arrogance and anger of the Gallaghers is a yearning for colonial simplicity, when the pink portions of the map were the stable subjects of geography lessons, rather than the volatile embodiment of postcolonial theory. Simon Gikandi argues that "the central moments of English cultural identity were driven by doubts and disputes about the perimeters of the values that defined Englishness." (x) The reason that Britpop could not 'make it big' in the United States is because it was recycling an exhausted colonial dreaming. Two old Englands were duelling for ascendancy: the Oasis-inflected Manchester working class fought Blur-inspired London art school chic. This insular understanding of difference had serious social and cultural consequences. The only possible representation of white, British youth was a tabloidisation of Oasis's behaviour through swearing, drug excess and violence. Simon Reynolds realised that by returning to the three minute pop tune that the milkman can whistle, reinvoking parochial England with no black people, Britpop has turned its back defiantly on the future. (members.aol.com/blissout/Britpop.html) Fortunately, another future had already happened. The beats per minute were pulsating with an urgent affirmation of change, hybridity and difference. Hip hop and techno mapped a careful cartography of race. While rock was colonialisation by other means, hip hop enacted a decolonial imperative. Electronic dance music provided a unique rendering of identity throughout the 1990s. It was a mode of musical communication that moved across national and linguistic boundaries, far beyond Britpop or Stateside rock music. While the Anglo American military alliance was matched and shadowed by postwar popular culture, Brit-pop signalled the end of this hegemonic formation. From this point, English pop and American rock would not sail as smoothly over the Atlantic. While 1995 was the year of Wonderwall, by 1996 the Britpop bubble corroded the faces of the Gallagher brothers. Oasis was unable to complete the American tour. Yet other cultural forces were already active. 1996 was also the year of Trainspotting, with "Born Slippy" being the soundtrack for a blissful journey under the radar. This was a cultural force that no longer required America as a reference point [6]. Robbie Williams was able to integrate the histories of Britpop and dance culture, instigating a complex dialogue between the two. Still, concern peppered music and entertainment journals that British performers were not accessing 'America.' As Sharon Swart stated Britpop acts, on the other hand, are finding it less easy to crack the U.S. market. The Spice Girls may have made some early headway, but fellow purveyors of pop, such as Robbie Williams, can't seem to get satisfaction from American fans. (35 British performers had numerous cultural forces working against them. Flat global sales, the strength of the sterling and the slow response to the new technological opportunities of DVD, all caused problems. While Britpop "cleaned house," (Boehm 89) it was uncertain which cultural formation would replace this colonising force. Because of the complex dialogues between the rock discourse and dance culture, time and space were unable to align into a unified market. American critics simply could not grasp Robbie Williams' history, motives or iconography. It's Robbie's world, we just buy tickets for it. Unless, of course you're American and you don't know jack about soccer. That's the first mistake Williams makes - if indeed one of his goals is to break big in the U.S. (and I can't believe someone so ambitious would settle for less.) … Americans, it seems, are most fascinated by British pop when it presents a mirror image of American pop. (Woods 98 There is little sense that an entirely different musical economy now circulates, where making it big in the United States is not the singular marker of credibility. Williams' demonstrates commitment to the international market, focussing on MTV Asia, MTV online, New Zealand and Australian audiences [7]. The Gallagher brothers spent much of the 1990s trying to be John Lennon. While Noel, at times, knocked at the door of rock legends through "Wonderwall," he snubbed Williams' penchant for pop glory, describing him as a "fat dancer." (Gallagher in Orecklin 101) Dancing should not be decried so summarily. It conveys subtle nodes of bodily knowledge about men, women, sex and desire. While men are validated for bodily movement through sport, women's dancing remains a performance of voyeuristic attention. Such a divide is highly repressive of men who dance, with gayness infiltrating the metaphoric masculine dancefloor [8]. Too often the binary of male and female is enmeshed into the divide of rock and dance. Actually, these categories slide elegantly over each other. The male pop singers are located in a significant semiotic space. Robbie Williams carries these contradictions and controversy. NO! Robbie didn't go on NME's cover in a 'desperate' attempt to seduce nine-year old knickerwetters … YES! He used to be teenybopper fodder. SO WHAT?! So did the Beatles the Stones, the Who, the Kinks, etc blah blah pseudohistoricalrockbollocks. NO! Making music that gurlz like is NOT a crime! (Wells 62) There remains an uncertainty in his performance of masculinity and at times, a deliberate ambivalence. He grafts subversiveness into a specific lineage of English pop music. The aim for critics of popular music is to find a way to create a rhythm of resistance, rather than melody of credible meanings. In summoning an archaeology of the archive, we begin to write a popular music history. Suzanne Moore asked why men should "be interested in a sexual politics based on the frightfully old-fashioned ideas of truth, identity and history?" (175) The reason is now obvious. Femininity is no longer alone on the simulacra. It is impossible to separate real men from the representations of masculinity that dress the corporeal form. Popular music is pivotal, not for collapsing the representation into the real, but for making the space between these states livable, and pleasurable. Like all semiotic sicknesses, the damaged, beaten and bandaged masculinity of contemporary music swaddles a healing pedagogic formation. Robbie Williams enables the writing of a critical history of post Anglo-American music [9]. Popular music captures such stories of place and identity. Significantly though, it also opens out spaces of knowing. There is an investment in rhythm that transgresses national histories of music. While Williams has produced albums, singles, video and endless newspaper copy, his most important revelations are volatile and ephemeral in their impact. He increases the popular cultural vocabulary of masculinity. [1] The fame of both Williams and Halliwell was at such a level that it was reported in the generally conservative, pages of Marketing. The piece was titled "Will Geri's fling lose its fizz?" Marketing, August 2000: 17. [2] For poll results, please refer to "Winners and Losers," Time International, Vol. 155, Issue 23, June 12, 2000, 9 [3] For a discussion of this growth in academic discourse on masculinity, please refer to Paul Smith's "Introduction," in P. Smith (ed.), Boys: Masculinity in contemporary culture. Colorado: Westview Press, 1996. [4] Steve Futterman described Rock DJ as the "least alluring porn video on MTV," in "The best and worst: honour roll," Entertainment Weekly 574-575 (December 22-December 29 2000): 146. [5] Michael Bracewell stated that "pop provides an unofficial cartography of its host culture, charting the national mood, marking the crossroads between the major social trends and the tunnels of the zeitgeist," in "Britpop's coming home, it's coming home." New Statesman .(February 21 1997): 36. [6] It is important to make my point clear. The 'America' that I am summoning here is a popular cultural formation, which possesses little connection with the territory, institution or defence initiatives of the United States. Simon Frith made this distinction clear, when he stated that "the question becomes whether 'America' can continue to be the mythical locale of popular culture as it has been through most of this century. As I've suggested, there are reasons now to suppose that 'America' itself, as a pop cultural myth, no longer bears much resemblance to the USA as a real place even in the myth." This statement was made in "Anglo-America and its discontents," Cultural Studies 5 1991: 268. [7] To observe the scale of attention paid to the Asian and Pacific markets, please refer to http://robbiewilliams.com/july13scroll.html, http://robbiewilliams.com/july19scroll.html and http://robbiewilliams.com/july24scroll.html, accessed on March 3, 2001 [8] At its most naïve, J. Michael Bailey and Michael Oberschneider asked, "Why are gay men so motivated to dance? One hypothesis is that gay men dance in order to be feminine. In other words, gay men dance because women do. An alternative hypothesis is that gay men and women share a common factor in their emotional make-up that makes dancing especially enjoyable," from "Sexual orientation in professional dance," Archives of Sexual Behaviour. 26.4 (August 1997). Such an interpretation is particularly ludicrous when considering the pre-rock and roll masculine dancing rituals in the jive, Charleston and jitterbug. Once more, the history of rock music is obscuring the history of dance both before the mid 1950s and after acid house. [9] Women, gay men and black communities through much of the twentieth century have used these popular spaces. For example, Lynne Segal, in Slow Motion. London: Virago, 1990, stated that "through dancing, athletic and erotic performance, but most powerfully through music, Black men could express something about the body and its physicality, about emotions and their cosmic reach, rarely found in white culture - least of all in white male culture,": 191 References Ansen, D., Giles, J., Kroll, J., Gates, D. and Schoemer, K. "What's a handsome lad to do?" Newsweek 133.19 (May 10, 1999): 85. "Ask Dr. Hip." U.S. News and World Report 129.16 (October 23, 2000): 72. Bailey, J. Michael., and Oberschneider, Michael. "Sexual orientation in professional dance." Archives of Sexual Behaviour. 26.4 (August 1997):expanded academic database [fulltext]. Boehm, E. "Pop will beat itself up." Variety 373.5 (December 14, 1998): 89. Bracewell, Michael. "Britpop's coming home, it's coming home." New Statesman.(February 21 1997): 36. Buchbinder, David. Performance Anxieties .Sydney: Allen and Unwin, 1998. Faludi, Susan. Stiffed. London: Chatto and Windus, 1999. Frith, Simon. "Anglo-America and its discontents." Cultural Studies. 5 1991. Futterman, Steve. "The best and worst: honour roll." Entertainment Weekly, 574-575 (December 22-December 29 2000): 146. Gikandi, Simon. Maps of Englishness. New York: Columbia University Press, 1996. Kadis, Alex. Take That: In private. London: Virgin Books, 1994. Kamp, D. "London Swings! Again!" Vanity Fair ( March 1997): 102. Kimmel, Michael. Manhood in America. New York: The Free Press, 1996. Mendell, Adrienne. How men think. New York: Fawcett, 1996. Moore, Susan. "Getting a bit of the other - the pimps of postmodernism." In Rowena Chapman and Jonathan Rutherford (ed.) Male Order .London: Lawrence and Wishart, 1988. 165-175. Orecklin, Michele. "People." Time. 155.10 (March 13, 2000): 101. Pollack, William. Real boys. Melbourne: Scribe Publications, 1999. Reynolds, Simon. members.aol.com/blissout/britpop.html. Accessed on April 15, 2001. Robinson, David. No less a man. Bowling Green: Bowling Green State University, 1994. Segal, Lynne. Slow Motion. London: Virago, 1990. Smith, Paul. "Introduction" in P. Smith (ed.), Boys: Masculinity in contemporary culture. Colorado: Westview Press, 1996. Swart, S. "U.K. Showbiz" Variety.(December 11-17, 2000): 35. Sexton, Paul and Masson, Gordon. "Tips for Brits who want U.S. success" Billboard .(September 9 2000): 1. Wells, Steven. "Angst." NME.(November 21 1998): 62. "Will Geri's fling lose its fizz?" Marketing.(August 2000): 17. Woods, S. "Robbie Williams Sing when you're winning" The Village Voice. 45.52. (January 2, 2001): 98.
APA, Harvard, Vancouver, ISO, and other styles
43

Fuller, Glen. "The Getaway." M/C Journal 8, no. 6 (December 1, 2005). http://dx.doi.org/10.5204/mcj.2454.

Full text
Abstract:
From an interview with “Mr A”, executive producer and co-creator of the Getaway in Stockholm (GiS) films: Mr A: Yeah, when I tell my girlfriend, ‘You should watch this, it’s good, it’s a classic, it’s an old movie’ and she thinks it’s, like, the worst. And when I actually look at it and it is the worst, it is just a car chase … [Laughs] But you have to look a lot harder, to how it is filmed, you have to learn … Because, you can’t watch car racing for instance, because they are lousy at filming; you get no sensation of speed. If you watch the World Rally Championship it looks like they go two miles an hour. The hardest thing [of the whole thing] is capturing the speed … I want to engage with the notion of “speed” in terms of the necessary affects of automobility, but first I will give some brief background information on the Getaway in Stockholm series of films. Most of the information on the films is derived from the interview with Mr A carried out over dinner in Stockholm, October 2004. Contact was made via e-mail and I organised with the editors of Autosalon Magazine for an edited transcription to be published as an incentive to participate in the interview. Mr A’s “Tarantino-style” name is necessary because the films he makes with Mr X (co-creator) and a small unnamed group of others involve filming highly illegal acts: one or two cars racing through the streets of Stockholm evading police at sustained speeds well over 200 km/h. Due to a quirk in Swedish traffic law, unless they are caught within a certain time frame of committing driving offences or they actually admit to the driving offences, then they cannot be charged. The Swedish police are so keen to capture these renegade film makers that when they appeared on Efterlyst (pron: ef-de-list; the equivalent of “Sweden’s Most Wanted”) instead of the normal toll-free 1-800 number that viewers could phone to give tips, the number on the screen was the direct line to the chief of Stockholm’s traffic unit. The original GiS film (2000) was made as a dare. Mr A and some friends had just watched Claude Lelouch’s 1976 film C’était un Rendez-vous. Rumour has it that Lelouch had a ten-minute film cartridge and had seen how a gyro stabilised camera worked on a recent film. He decided to make use of it with his Ferrari. He mounted the camera to the bonnet and raced through the streets of Paris. In typical Parisian style at the end of the short nine minute film the driver parks and jumps from the Ferrari to embrace a waiting woman for their “rendezvous”. Shortly after watching the film someone said to Mr A, “you don’t do that sort of thing in Stockholm”. Mr A and Mr X set out to prove him wrong. Nearly all the equipment used in the filming of the first GiS film was either borrowed or stolen. The Porsche used in the film (like all the cars in the films) was lent to them. The film equipment consisted of, in Mr A’s words, a “big ass” television broadcast camera and a smaller “lipstick” camera stolen from the set of the world’s first “interactive” reality TV show called The Bar. (The Bar followed a group of people who all lived together in an apartment and also worked together in a bar. The bar was a “real” bar and served actual customers.) The first film was made for fun, but after Mr A and his associates received several requests for copies they decided to ramp up production to commercial levels. Mr A has a “real job” working in advertising; making the GiS films once a year is his main job with his advertising job being on a self-employed, casual basis. As a production team it is a good example of amateurs becoming semi-professionals within the culture industries. The GiS production team distributes one film per year under the guise of being a “documentary” which allows them to escape the wrath of Swedish authorities due to further legal quirks. Although they still sell DVDs from their Website, the main source of income comes from the sale of the worldwide distribution rights to British “powersports” specialist media company Duke Video. Duke also sells a digitally remastered DVD version of Rendezvous on their Website. As well as these legitimate distribution methods, copies of all six GiS films and Rendezvous are available on the internet through various peer-to-peer file-sharing networks. Mr A says there isn’t much he can do about online file sharing besides asking people to support the franchise if they like the films by buying the DVDs. There are a number of groups making films for car enthusiast using similar guerilla film production methods. However, most of the films are one-offs or do not involve cars driven at such radical speeds. An exception was another Swedish film maker who called himself “Ghostrider” and who produced similar films using a motorbike. Police apprehended a man who they alleged is “Ghostrider” in mid-2004 within the requisite timeframe of an offence that had been allegedly committed. The GiS films alongside these others exist within the automotive cultural industry. The automotive cultural industry is a term I am using to describe the overlap between the automotive industry and the cultural industries of popular culture. The films tap in to a niche market of car enthusiasts. There are many different types of car enthusiasts, everything from petite-bourgeois vintage-car restorers to moral panic-inducing street racers. Obviously the GiS films are targeted more towards the street racing end of the spectrum, which is not surprising because Sweden has a very developed underground street racing scene. A good example is the Stockholm-based “Birka Cup”: a quasi-professional multi-round underground street-racing tournament with 60,000 SEK (approx. AUD$11,000) prize money. The rules and rankings for the tournament are found on the tournament Website. To give some indication of what goes on at these events a short teaser video clip for the 2003 Birka Cup DVD is also available for download from the Website. The GiS films have an element of the exotic European-Other about them, not only because of the street-racing pedigree exemplified by the Birka Cup and similar underground social institutions (such as another event for “import” street racers called the “Stockholm Open”), but because they capture an excess within European car culture normally associated with exotic supercars or the extravagant speeds of cars driven on German autobahns or Italian autostradas. For example, the phrase “European Styling” is often used in Australia to sell European designed “inner-city” cars, such as the GM Holden Barina, a.k.a. the Vauxhall Corsa or the Opel Corsa. Cars from other regional manufacturing zones often do not receive such a specific regional identification; for example, cars built in Asian countries are described as “fully imported” rather than “Asian styling”. Tom O’Dell has noted that dominant conception of automobility in Sweden is different to that of the US. That is, “automobility” needs to be qualified with a national or local context and I assume that other national contexts in Europe would equally be just as different. However, in non-European, mainly post-colonial contexts, such as Australia, the term “European” is an affectation signaling something special. On a different axis, “excess” is directly expressed in the way the police are “captured” in the GiS films. Throughout the GiS series there is a strongly antagonist relation to the police. The initial pre-commercial version of the first GiS film had NWA’s “Fuck the Police” playing over the opening credits. Subsequent commercially-released versions of the film had to change the opening title music due to copyright infringement issues. The “bonus footage” material of subsequent DVDs in the series represents the police as impotent and foolish. Mr A describes it as a kind of “prank” played on police. His rationale is that they live out the fantasy that “everyone” wishes they could do to the police when they are pulled over for speeding and the like; as he puts it, “flipping the bird and driving off”. The police are rendered foolish and captured on film, which is an inversion of the normative traffic-cop-versus-traffic-infringer power relation. Mr A specifies the excess of European modernity to something specific to automobility, which is the near-universal condition of urbanity in most developed nations. The antagonism between the GiS drivers and the police is figured as a duel. The speed of the car(s) obviously exceeds what is socially and legally acceptable and therefore places the drivers in direct conflict with police. The speed captured on film is in part a product of this tension and gives speed a qualitative cultural dimension beyond a simple notion from rectilinear physics of speed as a rate of motion. The qualitative dimension of speed as been noted by Peter Wollen: Speed is not simply thrilling in itself, once sufficiently accelerated, but also enables us to enter exposed and unfamiliar situations, far removed from the zones of safety and normality – to travel into space, for instance, beyond the frontiers of the known. (106) Knowledge is subsumed by the dialect of road safety: “safety” versus “speed”. Knowledge takes on many forms and it is here that speed gains its complexity. In the high-school physics of rectilinear motion speed refers to a rate. Mr A discusses speed as a sensation (“thrill” in the language of Wollen) in the quote at the beginning of the essay. If the body develops sensations from affects and percepts (Deleuze and Guattari 179-83), then what are the affects and percepts that are developed by the body into the sensation of speed? The catchphrase for the GiS films is “Reality Beats Fiction By Far!” The “reality” at stake here is not only the actuality of cars traveling at high speeds within urban spaces, which in the vernacular of automotive popular culture is more “real” than Hollywood representations, but the “reality” of automobilised bodies engaging with and “getting away” from the police. Important here is that the police serve as the symbolic representatives of the governmental institutions and authorities that regulate and discipline populations to be automobilised road users. The police are principally symbolic because one’s road-user body is policed, to a large degree, by one’s self; that is, by the perceptual apparatus that enables us to judge traffic’s rates of movement and gestures of negotiation that are indoctrinated into habit. We do this unthinkingly as part of everyday life. What I want to suggest is that the GiS films tap into the part of our respective bodily perceptual and affective configurations that allow us to exist as road users. To explain this I need to go on a brief detour through “traffic” and its relation to “speed”. Speed serves a functional role within automobilised societies. Contrary to the dominant line from the road safety industry, the “speed limit” we encounter everyday on the road is not so much a limit, but a guide for the self-organisation of traffic. To think the “speed limit” as a limit allows authorities to imagine a particular movement-based threshold of perception and action that bestows upon drivers the ability to negotiate the various everyday hazard-events that constitute the road environment. This is a negative way to look at traffic and is typical of the (post)modernist preoccupation with incorporating contingency (“the accident”) into behavioural protocol and technical design (Lyotard 65-8). It is not surprising that the road safety industry is an exemplary institution of what Gilles Deleuze called the “control society”. The business of the road safety industry is the perpetual modulation of road user populations in a paradoxical attempt to both capture (forecast and study) the social mechanics of the accident-event while postponing its actualisation. Another way to look at traffic is to understand it as a self-organising system. Ilya Prigogine and Robert Herman modeled vehicle traffic as two flows – collective and individual – as a function of the concentration and speed of vehicles. At a certain tipping point the concentration of traffic is such that individual mobility is subsumed by the collective. Speed plays an important role both in the abstract sense of a legislated “speed limit” and as the emergent consistency of mobile road users distributed in traffic. That is, automotive traffic does not move at a constant speed, but nominally moves at a consistent speed. The rate and rhythms of traffic have a consistency that we all must become familiar with to successfully negotiate the everyday system of automobility. For example, someone simply walking becomes a “pedestrian” in the duration of automobilised time-space. Pedestrians must embody a similar sense of the rate of traffic as that perceived by drivers in the cars that constitute traffic. The pedestrian uses this sense of speed when negotiating traffic so as to cross the road, while the driver uses it to maintain a safe distance from the car in front and so on. The shared sense of speed demands an affective complicity of road-user bodies to allow them to seamlessly incorporate themselves into the larger body of traffic on a number of different registers. When road users do not comply with this shared sense of speed that underpins traffic they are met with horn blasts, rude figure gestures, abuse, violence and so on. The affects of traffic are accelerated in the body and developed by the body into the sensations and emotions of “road rage”. Road users must performatively incorporate the necessary dispositions for participating with other road users in traffic otherwise they disrupt the affective script (“habits”) for the production of traffic. When I screened the first GiS film in a seminar in Sweden the room was filled with the sound of horrified gasps. Afterwards someone suggested to me that they (the Swedes) were more shocked than I (an Australian) about the film. Why? Is it because I am a “hoon”? We had all watched the same images heard the same sounds, yet, the “speeds” were not equal. They had experienced the streets in the film as a part of traffic. Their bodies knew just how slow the car was meant to be going. The film captured and transmitted the affects of a different automobilised body. Audiences follow the driver “getting away” from those universally entrusted (at least on a symbolic level) with the governance of traffic – the police – while, for a short period, becoming a new body that gets away from the “practiced perception” (Massumi 189) of habits that normatively enable the production of traffic. What is captured in the film – the event of the getaway – has the potential to develop in the body of the spectator as the sensation of “speed” and trigger a getaway of the body. Acknowledgement I would like to acknowledge the generous funding from the Centre for Cultural Research and the College of Arts, Education and Social Sciences, University of Western Sydney, in awarding me the 2004 CCR CAESS Postgraduate International Scholarship, and the support from my colleagues at the Advanced Cultural Studies Institute of Sweden where I carried out this research as a doctoral exchange student. References Deleuze, Gilles. “Postscript on Control Societies”. Negotiations. Trans. Martin Joughin. New York: Columbia UP, 1995. Deleuze, Gilles, and Felix Guattari. What Is Philosophy? Trans. Graham Burchill and Hugh Tomlinson. London: Verso, 1994. Getaway in Stockholm series. 21 Oct. 2005 http://www.getawayinstockholm.com>. Lyotard, Jean François. The Inhuman: Reflections on Time. Trans. Geoffrey Bennington and Rachel Bowlby. Stanford, California: Stanford UP, 1991. Massumi, Brian. “Parables for the Virtual: Movement, Affect, Sensation”. Post-Contemporary Interventions. Eds. Stanley Fish and Fredric Jameson. Durham, London: Duke UP, 2002. O’Dell, Tom. “Raggare and the Panic of Mobility: Modernity and Everyday Life in Sweden.” Car Culture. Ed. Daniel Miller. Oxford: Berg, 2001. 105-32. Prigogine, Ilya, and Robert Herman. “A Two-Fluid Approach to Town Traffic.” Science 204 (1979): 148-51. Wollen, Peter. “Speed and the Cinema.” New Left Review 16 (2002): 105–14. Citation reference for this article MLA Style Fuller, Glen. "The Getaway." M/C Journal 8.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0512/07-fuller.php>. APA Style Fuller, G. (Dec. 2005) "The Getaway," M/C Journal, 8(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0512/07-fuller.php>.
APA, Harvard, Vancouver, ISO, and other styles
44

Irwin, Kathleen, and Jeff Morton. "Pianos: Playing, Value, and Augmentation." M/C Journal 16, no. 6 (November 6, 2013). http://dx.doi.org/10.5204/mcj.728.

Full text
Abstract:
In rejoinder to a New York Times’s article claiming, “the value of used pianos, especially uprights, has plummeted … Instead of selling them … , donating them … or just passing them along … , owners are far more likely to discard them” (Walkin), artists Kathleen Irwin (scenography) and Jeff Morton (sound/composition) responded to this ignoble passing with an installation playing with the borders delineating music, theatre, digital technology, and economies of value using two upright red pianos, sound and video projection—and the sensibility of relational aesthetics. The installation was a collaboration between two artists who share a common interest in the performative qualities of public space and how technological augmentation is used in identificatory and embodied art processes as a means of extending the human body and enhancing the material space of person-to-person interaction. The title of the installation, PLAY, referenced the etymology of the word itself and how it has been variously understood over time, across artistic disciplines, and in digital and physical environments. Fundamentally, it explored the relative value of a material object (the piano) and how its social and cultural signification persists, shifts, is diminished or augmented by technology. The installation was mounted at the Dunlop Art Gallery, in the Regina Public Library (Saskatchewan, Canada, 14 June - 25 August 2013) and, as such, it illustrated the Library’s mandate to support all forms of literacy through community accessibility and forms of public outreach, social arrangements, and encounters. Indirectly, (as this was not the initial focus), it also exemplified the artists’s gentle probing of the ways, means, claims, and values when layering information and enhancing our visual experience as we interact with (literally, walk through) our physical landscapes and environments—“to see the world for what it is,” as Matt Turbow says “and to see the elements within” (Chapeau). The installation reflected on, among other things, the piano as a still potent cultural signifier, the persistent ability of our imagination to make meaning and codify experience even without digital overlay, and the library as an archive and disseminator of public knowledge. The artists questioned whether old technologies such as the piano will lose their hold on us entirely as technological augmentation develops the means to enhance or colonize the natural world, through graphics, sounds, haptic feedback, smell and, eventually, commodified experiences. This paper intends to reflect on our work and initiate a friendly (playful) interdisciplinary discussion about material objects in the age of physical and digital interactivity, and the terms of augmentation as we chose to understand it through our installation. In response to the call proposed by this journal on the subject of augmentation, we considered: 1. How audio/visual apparatuses in the gallery space augmented the piano’s expressivity; 2. How the piano augmented the social function of its physical situation; 3. How the technology augmented random and fragmentary musical phrases, creating a prolonged musical composition; 4. How each spectator augmented the art through his/her subjective engagement: how there is always meaning generated in excess of the artists’s intention. Image 1: Piano installed outside Dunlop Gallery/ Regina Public Library (photo credit: Jeff Morton) To begin, a brief description of the site of the installation is in order. The first of the red pianos was installed outside the main doors of the Central Library, located in the city’s downtown. The library’s entrance is framed within a two-story glass atrium and the red piano repeated the architecture’s function to open the space by breaking down perceived barriers, and beckoning the passersby inside. Reflecting Irwin’s community-oriented, site-specific practice, this was the relational catalyst of the work—the piano made available for anyone to play and enjoy, day or night, an invitation to respond to an object inserted into the shared space of the sidewalk: to explore, as Nicolas Bourriaud suggests, “the art as a state of encounter” (16). It was the centerpiece of the exhibition's outreach, which included the exhibition’s vernissage featuring new music and performance artists in concert, a costume and prop workshop for a late night public choir procession, and a series of artist talks. This was, arguably, a defining characteristic of the work, underscoring how the work of art, in this case the piano itself, its abjection illustrated by the perfunctory means typically used to dispose of them, is augmented or gains value through its social construction, over-and-above any that is originally ascribed to it. As Bourriaud writes, any kind of production takes on a social form which no longer has anything to do with its original usefulness. It acquires exchange value that partly covers and shrouds its primary “nature”. The fact is that a work of art has no a priori useful function—not that it is socially useless, but because it is available and flexible, and has an “infinite tendency”. (42) In the Dunlop’s press release, curator Blair Fornwald also confers a supplemental value ascribed to the reframed material object. She describes how the public space in front of the library, as a place of social interaction and cultural identification—of “being seen”—is augmented by the red piano: its presence in an unfamiliar setting underscores the multitude of creative and performative possibilities inherent within it, possibilities that may extend far beyond playing a simple melody. By extension, its presence asserts that the every day is a social, cultural, and physical environment rich with potentiality and promise. (Fornwald) Juxtaposed with the first red piano, the second was dramatically staged within the Dunlop gallery. The room, painted black, formally replicated the framing and focusing conventions of the theatre: its intention to propose other ways of “being seen” and to suggest the blurring of lines between “on stage and off,” and by extension, “on line and off.” A camera embedded in the front of the piano and a large projection screen in the space provided a celebrity moment for anyone approaching the instrument and implied, arguably, the ubiquitous surveillance associated with public space. Indeed, a plausible way of reading the red piano in the darkened gallery was as a provocation to think about how the digital and physical are increasingly enmeshed in our daily lives (Jurgenson). Lit by a chandelier and staged on a circular red carpet, this piano was also available to be played. Unlike the one outside of the building, it was augmented by speakers, a microphone, and a webcam. Through a custom-built digital system (using MaxMSP software), it recorded and played back the sound and image of everyone who sat down to perform, then repeated and superimposed these over similar previously captured material. Enhanced by the unusual stark acoustics of the gallery, the sound filled the reverberant space. Affixed to the gallery’s back wall was the projection screen made up of sheet music (Bach, Debussy and Mozart) taken from the Irwin family’s piano bench, a veritable time capsule from the 1950s. Image 2: Piano installed inside Dunlop Gallery (photo credit: Jeff Morton) In addition to the centrally placed piano, a miniature red piano was situated near the gallery entrance. It and a single red chair placed near the screen, repeated the vivid colour and drew the eye into and around the space underscoring its theatrical quality. The toy piano functioned as a lighthearted invitation, as well as a serious citation of other artists—Eikoh Sudoh, Margaret Leng Tan, John Cage, and Charles M. Schulz’s “Schroeder”—who have employed the miniature instrument to great advantage. It was intended as an illustration of the infinite resonances that material objects may provide and the diverse ways they may signify contingent on the viewer. Considered in a historical context, in the golden age of the upright and at the turn of the twentieth-century, piano lessons signified for many, the formation of a modern citizen schooled in European culture and values. Owning one of these intricately engineered and often beautiful machines, as one in five households did, reflected the social aspirations of its owners and marked their upward economic mobility (Canadian Encyclopedia). One hundred years later, pianos are often relegated to the basement or dump. Irretrievably out of tune, their currency as musical instruments largely devalued. Nonetheless, their cultural and social value persists, no longer the pervasive marker of status, but through the ways they are mediated by artists who prepare, deconstruct, and leave them to deteriorate in beautiful ways. They seem to retain their hold on us through the natural impulse to engage them kinetically, ergonomically, and metaphorically. Built to be an extension of the human hand, body, and imagination, they are a sublime human-scale augmentation of a precise musical system of notation, and a mechanism evolved over centuries through physical augmentations meant to increase the expressivity of both instrument and player. In PLAY, the use of the pianos referenced both their traditional role in public life, and our current relationship with forms of digital media that have replaced these instruments as our primary means of being linked, informed, and entertained—an affirmation of the positive attributes of technology and a reminder of what we may have lost. Indeed, while this was not necessarily clear from the written responses in the Gallery’s guest book (Gorgeous!: Neat!; Too, too cool!; etc.), we surmised that memory might have played a key role in the experience of the installation, set in motion by the precise arrangement of the few material objects – red piano, the piano bench, red chair, and toy piano, each object designed to fit the shape of the body and hold the memory of physical contact. These were designed to trigger a chain of recollections, each chasing the next; each actively participating in what follows. In the Gallery’s annual exhibition catalogue, Ellen Moffat suggests that the relationship the piano builds with the player is important: “the piano plays and is played by the performer. Performing the piano assigns a posture for the performer in relation to the keyboard physically and figuratively” (Moffat 80). Technically, the piano is the sum of many parts, understandable finally as a discrete mechanical system, but unbounded in imagination and limited only by our capacity to play it. Functionally, it acts as an affective repository of memory and feeling, a tool to control the variables of physical and expressive interaction. In PLAY, the digital system in the gallery piano captured, delayed and displayed audio and video clips according to a rubric of cause and effect. Controlled by computer software designed by Morton, the installation captured musical phrases played randomly by individuals and augmented these notes by playing them back at variable speeds and superimposing one over another—musical phrases iterated and reiterated. The effect was fugue-like—an indeterminate composition with a determinant structure, achieved by intertwining physical and digital systems with musical content supplied by participants. The camera hidden in the front of the piano recorded individuals as they sat at the instrument and, immediately, they saw themselves projected in extreme close up onto the screen behind. As the individual struck a note, their image faded and the screen was filled again with the image of a previous participant abstracted and in slow motion. The effect, we suggest, was dreamlike—an echo or a fleeting fragment of something barely remembered. Like the infinite variations the piano permits, the software was also capable of expressing immense variety—each sound and image adding to an expanding archive in an ever-changing improvised composition developed through iterative call and response. Drawing on elements of relational aesthetics, scenographic representation, and digital technology, in PLAY we attempted to cross disciplines in ways that distinguished it from the other piano projects seen over the past several years. Indeed, the image of the upright piano has resonated in the zeitgeist of the international art scene with colourful uprights placed in public places in urban centers across Europe and North America. Wherever they are, individuals engage enthusiastically with them and they, in turn, become the centre of attention: this is part of their appeal. The pianos seem to evoke a utopian sense of community, however temporary, providing opportunities to rediscover old neighbours and make new friends. In PLAY, we posed two different social and aesthetic encounters—one analogue, real, “off-line” and one digital, theatrical, and “on-line,” illustrating less a false binary between two possible realities that ascribes more value to one than the other, than a world where the digital and the physical comingle. Working within a public library, this was a germane train of thought considering how these institutes struggle to stay relevant in the age of Google search and the promise of technological augmentation. The piano also represents a dichotomy: both a failure to represent and an excess of meaning. For decades replete with social signification, they have now become an encumbrance, fit only for the bone yard. As these monumental relics come to the end of their mechanical life, there is more money made in their disposal than in musical production, and more value in their recycled metals, solid wooden bodies, and ivory keys then in their tone and function. The industry that supported their commodification collapsed years ago, as has the market for their sale and the popular music publishing industry that accompanied it. Of course, pianos will be with us for a long time in one form or another, but their history, as a culturally potent object, has diverged. The assumption could easily follow that they have been rendered useless as an aesthetic, generative, and social object. What this installation offered was the possibility of an alternative ending to the story of this erstwhile entertainment console even as we seek our amusement by other means and through other devices. Not surprisingly, the title of the installation suggests that the consideration of “play,” as social and recuperative engagement, is significant. In his seminal work, Homo Ludens, Johan Huizinga discusses the importance of play, suggesting that it is primary to and a necessary condition of the making of culture. He writes, “In play there is something in play, which transcends the immediate needs of life and imparts meaning to the action” (Huizinga 97). According to games theorist Mary Flanagan, playing may serve as a way of creating something beautiful, offering frameworks for new ways of thinking, exploring divergent logic, or for imaging what is possible. She writes, “Games, both digital and analog, offer a space to explore creativity, agency, representation and emergent behaviour” (Flanagan 2010). In reaching out to Regina’s downtown community, the Dunlop Art Gallery dispersed some of the playfulness of PLAY in planned and accidental ways, as the outdoor piano became a daily destination for individuals who live rough or in the city’s hostels, some of whom who have enviable musical skills and considerable stage presence. One man came daily with sheet music in hand to practice on the indoor piano—ignoring the inevitable echo and repeat that the software triggered. Another young woman appeared regularly to perform at the outdoor piano, her umbrella raised against sun and rain, wedged under her arm to keep both hands free. Children invariably drew parents to it as they entered or exited the library—for some it may have been the first time they had touched such an instrument. Overall, in press, blogs, and the visitors’s book, responses to the pianos were enthusiastic and positive. One blogger wrote in response to an online publication, Art, Music, News (Beatty), chapeau June 13, 2013 at 11:51am this is most definitely up and running, and it would be interesting to see/hear all that will go on with that red piano. my two-and-a-half year old daughter and i jammed a bit yesterday morning, while a stranger watched and listened, then insisted that i play the same mostly crappy c-blues again while he sang! so i did, and he did, and my daughter and i learned a bit about what he feels about his dog via his singing. it was the highlight of the day for us—I mean really, jamming outside on a very red upright piano with strangers—good times! (Simpson) As evidence of public approbation, for the better part of the summer it stood unprotected on the sidewalk in front of the library encountering only one minor incident of defacement—a rather fragile tag in white spray paint, someone’s name in proper cursive writing. Once repaired and retuned, it became a dynamic focus for the annual Folk Festival that takes over the area for a week in August. In these ways, PLAY fulfilled the Library’s aim of encouraging literacy and reinforcing a sense of community—a social augmentation, in a manner of speaking. As Moffat writes, it encourages the social dimension of participation through community-engagement and dialogic practices. It blurs distinctions between spectator and participant, professional and amateur. It generates relationships between people or social actions. (Moffat 76) Finally, PLAY toyed with the overtones of the word itself—as verb, noun, and adjective—signifier, and metaphor. The title illustrated its obvious current potential and evoked the piano’s past, referencing the glittering world of the stage. While many may have more memories of seeing pianos in disrepair than in the concert hall, its iconic stage setting is never far from the imagination, although this too changes as people from other cultures and backgrounds recognize little cultural capital in such activity. In current vernacular, the word “play” also implies the re-imagination of ourselves in the digital overlays of the future. So we ask, what will be the fate of the piano and its meme in the 22nd century? Will the augmentation of reality enhance our experience of the world in inverse proportion to a loss of social interaction? Conclusion In her essay, Moffat notes that as digital technology replaces the analog piano, a surplus of second-hand uprights has become available. Citing artists Luke Jerram, Monica Yunus, and Camille Zamora (among others), she argues that the use of them as public art coincides with their disappearance, suggesting a farewell or memorial to a collective cultural icon (Moffat 76). What is there in this piece of furniture that speaks to us in art practice? The answer, it would seem, is potential. In a curatorial interview, Irwin suggested the possibility that beyond the artist’s initial meaning, there is always something more—an augmentation. The pleasure of discovering this supplement is part of the pleasure of the subjective experience of the spectator. Similarly, the aleatoric in music composition, refers to the pursuit of chance as a formal determinant and its openness to individual interpretation at the moment of reception. For Morton, the randomness of memory and affect are key components in composition. They cannot be predicted, controlled or quantified; nor can they be denied. There is no correct interpretation or response to music or, indeed, to relational art practice. Moffat concludes, as a multi-faceted media installation, PLAY proposed “a suite, chorus or a polyphony of things” (Moffat 76). Depending on your point of reference, the installation provided a dynamic venue for considering our relationships with material objects, with each other and with new technologies asking how they may or may not augment our reality in ways that supplement real-time, person-to-person interaction. References Beatty, Gregory. “Exciting Goings-On at Central Library.” Prairie Dog Blog 11 June 2013. Bourriaud, Nicolas. Relational Aesthetics. Trans. Simon Pleasance and Fronza Woods. Paris: Les Presses du Réel, 1998. Canadian Encyclopedia. “Piano Building.” ‹http://www.thecanadianencyclopedia.com/en/article/piano-building-emc/›. Chapeau [David Simpson]. “One Response to ‘Exciting Goings-On at Central Library.’” Prairie Dog Blog 13 June 2013. Fornwald, Blair. PLAY. Regina, Saskatchewan: Dunlop Art Gallery. 2013. Flanagan, Mary. “Creating Critical Play.” In Ruth Catlow, Marc Garret and Corrado Morgana, eds., Artists Rethinking Games. Liverpool: Liverpool University Press, 2010. 49-53. Huizinga, Johan. Homo Ludens. Boston: Beacon Press, 1995. Jerram, Luke. Play Me, I’m Yours. Site-Specific Piano Installation. Multiple Venues. 2008-2013. Jurgenson, Nathan. “Digital Dualism versus Augmented Reality.” Cybergology: The Society Pages 24 Feb. 2011. 1 Dec. 2013 ‹http://thesocietypages.org/cyborgology/2011/02/24/digital-dualism-versus-augmented-reality/›. Moffat, Ellen. “Stages and Players” in DAG 2 (2013). Regina: Dunlop Art Gallery, 2013. 75-87. Walkin, Daniel J. “For More Pianos, Last Note Is Thud in the Dump.” New York Times 29 June 2012. Yunus, Monica, and Camille Zamora. Sing for Hope Pianos. Site-Specific Piano Installation and Performance. New York City. 2013.
APA, Harvard, Vancouver, ISO, and other styles
45

Coghlan, Jo. "Dissent Dressing: The Colour and Fabric of Political Rage." M/C Journal 22, no. 1 (March 13, 2019). http://dx.doi.org/10.5204/mcj.1497.

Full text
Abstract:
What we wear signals our membership within groups, be theyorganised by gender, class, ethnicity or religion. Simultaneously our clothing signifies hierarchies and power relations that sustain dominant power structures. How we dress is an expression of our identity. For Veblen, how we dress expresses wealth and social stratification. In imitating the fashion of the wealthy, claims Simmel, we seek social equality. For Barthes, clothing is embedded with systems of meaning. For Hebdige, clothing has modalities of meaning depending on the wearer, as do clothes for gender (Davis) and for the body (Entwistle). For Maynard, “dress is a significant material practice we use to signal our cultural boundaries, social separations, continuities and, for the present purposes, political dissidences” (103). Clothing has played a central role in historical and contemporary forms of political dissent. During the French Revolution dress signified political allegiance. The “mandated costumes, the gold-braided coat, white silk stockings, lace stock, plumed hat and sword of the nobility and the sober black suit and stockings” were rejected as part of the revolutionary struggle (Fairchilds 423). After the storming of the Bastille the government of Paris introduced the wearing of the tricolour cockade, a round emblem made of red, blue and white ribbons, which was a potent icon of the revolution, and a central motif in building France’s “revolutionary community”. But in the aftermath of the revolution divided loyalties sparked power struggles in the new Republic (Heuer 29). In 1793 for example anyone not wearing the cockade was arrested. Specific laws were introduced for women not wearing the cockade or for wearing it in a profane manner, resulting in six years in jail. This triggered a major struggle over women’s abilities to exercise their political rights (Heuer 31).Clothing was also central to women’s political struggles in America. In the mid-nineteenth century, women began wearing the “reform dress”—pants with shortened, lightweight skirts in place of burdensome and restrictive dresses (Mas 35). The wearing of pants, or bloomers, challenged gender norms and demonstrated women’s agency. Women’s clothes of the period were an "identity kit" (Ladd Nelson 22), which reinforced “society's distinctions between men and women by symbolizing their natures, roles, and responsibilities” (Ladd Nelson 22, Roberts 555). Men were positioned in society as “serious, active, strong and aggressive”. They wore dark clothing that “allowed movement, emphasized broad chests and shoulders and presented sharp, definite lines” (Ladd Nelson 22). Conversely, women, regarded as “frivolous, inactive, delicate and submissive, dressed in decorative, light pastel coloured clothing which inhibited movement, accentuated tiny waists and sloping shoulders and presented an indefinite silhouette” (Ladd Nelson 22, Roberts 555). Women who challenged these dress codes by wearing pants were “unnatural, and a perversion of the “true” woman” (Ladd Nelson 22). For Crane, the adoption of men’s clothing by women challenged dominant values and norms, changing how women were seen in public and how they saw themselves. The wearing of pants came to “symbolize the movement for women's rights” (Ladd Nelson 24) and as with women in France, Victorian society was forced to consider “women's rights, including their right to choose their own style of dress” (Ladd Nelson 23). As Yangzom (623) puts it, clothing allows groups to negotiate boundaries. How the “embodiment of dress itself alters political space and civic discourse is imperative to understanding how resistance is performed in creating social change” (Yangzom 623). Fig. 1: 1850s fashion bloomersIn a different turn is presented in Mahatma Gandhi’s Khadi movement. Khadi is a term used for fabrics made on a spinning wheel (or charkha) or hand-spun and handwoven, usually from cotton fibre. Khadi is considered the “fabric of Indian independence” (Jain). Gandhi recognised the potential of the fabric to a self-reliant, independent India. Gandhi made the struggle for independence synonymous with khadi. He promoted the materials “simplicity as a social equalizer and made it the nation’s fabric” (Sinha). As Jain notes, clothing and in this case fabric, is a “potent sign of resistance and change”. The material also reflects consciousness and agency. Khadi was Gandhi’s “own sartorial choices of transformation from that of an Englishman to that of one representing India” (Jain). For Jain the “key to Khadi becoming a successful tool for the freedom struggle” was that it was a “material embodiment of an ideal” that “represented freedom from colonialism on the one hand and a feeling of self-reliance and economic self-sufficiency on the other”. Fig. 2: Gandhi on charkha The reappropriating of Khadi as a fabric of political dissent echoes the wearing of blue denim by the Student Nonviolent Coordinating Committee (SNCC) at the 1963 National Mall Washington march where 250,000 people gather to hear Martin Luther King speak. The SNCC formed in 1960 and from then until the 1963 March on Washington they developed a “style aesthetic that celebrated the clothing of African American sharecroppers” (Ford 626). A critical aspect civil rights activism by African America women who were members of the SNCC was the “performance of respectability”. With the moral character of African American women under attack (as a way of delegitimising their political activities), the female activists “emphasized the outward display of their respectability in order to withstand attacks against their characters”. Their modest, neat “as if you were going to church” (Chappell 96) clothing choices helped them perform respectability and this “played an important performative role in the black freedom struggle” (Ford 626). By 1963 however African American female civil rights activists “abandoned their respectable clothes and processed hairstyles in order to adopt jeans, denim skirts, bib-and-brace overalls”. The adoption of bib-and-brace overalls reflected the sharecropper's blue denim overalls of America’s slave past.For Komar the blue denim overalls “dramatize[d] how little had been accomplished since Reconstruction” and the overalls were practical to fix from attack dog tears and high-pressure police hoses. The blue denim overalls, according to Komar, were also considered to be ‘Negro clothes’ purchased by “slave owners bought denim for their enslaved workers, partly because the material was sturdy, and partly because it helped contrast them against the linen suits and lace parasols of plantation families”. The clothing choice was both practical and symbolic. While the ‘sharecropper’ narrative is problematic as ‘traditional’ clothing (something not evident in the case of Ghandi’s Khandi Movement, there is an emotion associated with the clothing. As Barthes (6-7) has shown, what makes ‘traditional clothing,’ traditional is that it is part of a normative system where not only does clothing have its historical place, but it is governed by its rules and regimentation. Therefore, there is a dialectical exchange between the normative system and the act of dressing where as a link between the two, clothing becomes the conveyer of its meanings (7). Barthes calls this system, langue and the act of dressing parole (8). As Ford does, a reading of African American women wearing what she calls a “SNCC Skin” “the uniform [acts] consciously to transgress a black middle-class worldview that marginalised certain types of women and particular displays of blackness and black culture”. Hence, the SNCC women’s clothing represented an “ideological metamorphosis articulated through the embrace and projection of real and imagined southern, working-class, and African American cultures. Central to this was the wearing of the blue denim overalls. The clothing did more than protect, cover or adorn the body it was a conscious “cultural and political tool” deployed to maintain a movement and build solidarity with the aim of “inversing the hegemonic norms” via “collective representations of sartorial embodiment” (Yangzom 622).Fig. 3: Mississippi SNCC March Coordinator Joyce Ladner during the March on Washington for Jobs and Freedom political rally in Washington, DC, on 28 Aug. 1963Clothing in each of these historical examples performs an ideological function that can bridge, that is bring diverse members of society together for a cause, or community cohesion or clothing can act as a fence to keep identities separate (Barnard). This use of clothing is evident in two indigenous examples. For Maynard (110) the clothes worn at the 1988 Aboriginal ‘Long March of Freedom, Justice and Hope’ held in Australia signalled a “visible strength denoted by coherence in dress” (Maynard 112). Most noted was the wearing of colours – black, red and yellow, first thought to be adopted during protest marches organised by the Black Protest Committee during the 1982 Commonwealth Games in Brisbane (Watson 40). Maynard (110) describes the colour and clothing as follows:the daytime protest march was dominated by the colours of the Aboriginal people—red, yellow and black on flags, huge banners and clothing. There were logo-inscribed T-shirts, red, yellow and black hatband around black Akubra’s, as well as red headbands. Some T-shirts were yellow, with images of the Australian continent in red, others had inscriptions like 'White Australia has a Black History' and 'Our Land Our Life'. Still others were inscribed 'Mourn 88'. Participants were also in customary dress with body paint. Older Indigenous people wore head bands inscribed with the words 'Our Land', and tribal elders from the Northern Territory, in loin cloths, carried spears and clapping sticks, their bodies marked with feathers, white clay and red ochres. Without question, at this most significant event for Aboriginal peoples, their dress was a highly visible and cohesive aspect.Similar is the Tibetan Freedom Movement, a nonviolent grassroots movement in Tibet and among Tibet diaspora that emerged in 2008 to protest colonisation of Tibet. It is also known as the ‘White Wednesday Movement’. Every Wednesday, Tibetans wear traditional clothes. They pledge: “I am Tibetan, from today I will wear only Tibetan traditional dress, chuba, every Wednesday”. A chuba is a colourful warm ankle-length robe that is bound around the waist by a long sash. For the Tibetan Freedom Movement clothing “symbolically functions as a nonverbal mechanism of communication” to “materialise consciousness of the movement” and functions to shape its political aims (Yangzom 622). Yet, in both cases – Aboriginal and Tibet protests – the dress may “not speak to single cultural audience”. This is because the clothing is “decoded by those of different political persuasions, and [is] certainly further reinterpreted or reframed by the media” (Maynard 103). Nevertheless, there is “cultural work in creating a coherent narrative” (Yangzom 623). The narratives and discourse embedded in the wearing of a red, blue and white cockade, dark reform dress pants, cotton coloured Khadi fabric or blue denim overalls is likely a key feature of significant periods of political upheaval and dissent with the clothing “indispensable” even if the meaning of the clothing is “implied rather than something to be explicated” (Yangzom 623). On 21 January 2017, 250,000 women marched in Washington and more than two million protesters around the world wearing pink knitted pussy hats in response to the remarks made by President Donald Trump who bragged of grabbing women ‘by the pussy’. The knitted pink hats became the “embodiment of solidarity” (Wrenn 1). For Wrenn (2), protests such as this one in 2017 complete with “protest visuals” which build solidarity while “masking or excluding difference in the process” indicates “a tactical sophistication in the social movement space with its strategic negotiation of politics of difference. In formulating a flexible solidarity, the movement has been able to accommodate a variety of races, classes, genders, sexualities, abilities, and cultural backgrounds” (Wrenn 4). In doing so they presented a “collective bodily presence made publicly visible” to protest racist, sexist, homophobic, Islamophobic, and xenophobic white masculine power (Gokariksel & Smith 631). The 2017 Washington Pussy Hat March was more than an “embodiment tactic” it was an “image event” with its “swarms of women donning adroit posters and pink pussy hats filling the public sphere and impacting visual culture”. It both constructs social issues and forms public opinion hence it is an “argumentative practice” (Wrenn 6). Drawing on wider cultural contexts, as other acts of dissent note here do, in this protest with its social media coverage, the “master frame” of the sea of pink hats and bodies posited to audiences the enormity of the anger felt in the community over attacks on the female body – real or verbal. This reflects Goffman’s theory of framing to describe the ways in which “protestors actively seek to shape meanings such that they spark the public’s support and encourage political openings” (Wrenn 6). The hats served as “visual tropes” (Goodnow 166) to raise social consciousness and demonstrate opposition. Protest “signage” – as the pussy hats can be considered – are a visual representation and validation of shared “invisible thoughts and emotions” (Buck-Coleman 66) affirming Georg Simmel’s ideas about conflict; “it helps individuals define their differences, establish to which group(s) they belong, and determine the degrees to which groups are different from each other” (Buck-Coleman 66). The pink pussy hat helped define and determine membership and solidarity. Further embedding this was the hand-made nature of the hat. The pattern for the hat was available free online at https://www.pussyhatproject.com/knit/. The idea began as one of practicality, as it did for the reform dress movement. This is from the Pussy Hat Project website:Krista was planning to attend the Women’s March in Washington DC that January of 2017 and needed a cap to keep her head warm in the chill winter air. Jayna, due to her injury, would not be able to attend any of the marches, but wanted to find a way to have her voice heard in absentia and somehow physically “be” there. Together, a marcher and a non-marcher, they conceived the idea of creating a sea of pink hats at Women’s Marches everywhere that would make both a bold and powerful visual statement of solidarity, and also allow people who could not participate themselves – whether for medical, financial, or scheduling reasons — a visible way to demonstrate their support for women’s rights. (Pussy Hat Project)In the tradition of “craftivism” – the use of traditional handcrafts such as knitting, assisted by technology (in this case a website with the pattern and how to knit instructions), as a means of community building, skill-sharing and action directed towards “political and social causes” (Buszek & Robertson 197) –, the hand-knitted pink pussy hats avoided the need to purchase clothing to show solidarity resisting the corporatisation of protest clothing as cautioned by Naomi Klein (428). More so by wearing something that could be re-used sustained solidarity. The pink pussy hats provided a counter to the “incoherent montage of mass-produced clothing” often seen at other protests (Maynard 107). Everyday clothing however does have a place in political dissent. In late 2018, French working class and middle-class protestors donned yellow jackets to protest against the government of French President Emmanuel Macron. It began with a Facebook appeal launched by two fed-up truck drivers calling for a “national blockade” of France’s road network in protest against rising fuel prices was followed two weeks later with a post urging motorist to display their hi-vis yellow vests behind their windscreens in solidarity. Four million viewed the post (Henley). Weekly protests continued into 2019. The yellow his-vis vests are compulsorily carried in all motor cars in France. They are “cheap, readily available, easily identifiable and above all representing an obligation imposed by the state”. The yellow high-vis vest has “proved an inspired choice of symbol and has plainly played a big part in the movement’s rapid spread” (Henley). More so, the wearers of the yellow vests in France, with the movement spreading globally, are winning in “the war of cultural representation. Working-class and lower middle-class people are visible again” (Henley). Subcultural clothing has always played a role as heroic resistance (Evans), but the coloured dissent dressing associated with the red, blue and white ribboned cockades, the dark bloomers of early American feminists, the cotton coloured natural fabrics of Ghandi’s embodiment of resistance and independence, the blue denim sharecropper overalls worn by African American women in their struggles for civil rights, the black, red and orange of Aboriginal protestors in Australia and the White Wednesday performances of resistance undertaken by Tibetans against Chinese colonisation, the Washington Pink Pussy Hat marches for gender respect and equality and the donning of every yellow hi-vis vests by French protestors all posit the important role of fabric and colour in protest meaning making and solidarity building. It is in our rage we consciously wear the colours and fabrics of dissent dress. ReferencesBarnard, Malcolm. Fashion as Communication. New York: Routledge, 1996. Barthes, Roland. “History and Sociology of Clothing: Some Methodological Observations.” The Language of Fashion. Eds. Michael Carter and Alan Stafford. UK: Berg, 2006. 3-19. Buck-Coleman, Audra. “Anger, Profanity, and Hatred.” Contexts 17.1 (2018): 66-73.Buszek, Maria Elena, and Kirsty Robertson. “Introduction.” Utopian Studies 22.1 (2011): 197-202. Chappell, Marisa, Jenny Hutchinson, and Brian Ward. “‘Dress Modestly, Neatly ... As If You Were Going to Church’: Respectability, Class and Gender in the Montgomery Bus Boycott and the Early Civil Rights Movement.” Gender and the Civil Rights Movement. Eds. Peter J. Ling and Sharon Monteith. New Brunswick, N.J., 2004. 69-100.Crane, Diana. Fashion and Its Social Agendas. Chicago: University of Chicago Press, 2000. Davis, Fred. Fashion, Culture, and Identity. Chicago: University of Chicago Press, 1992.Entwistle, Joanne. The Fashioned Body: Fashion, Dress, and Modern Social Theory. Cambridge: Polity Press, 2000.Evans, Caroline. “Dreams That Only Money Can Buy ... Or the Shy Tribe in Flight from Discourse.” Fashion Theory 1.2 (1997): 169-88.Fairchilds, Cissie. “Fashion and Freedom in the French Revolution.” Continuity and Change 15.3 (2000): 419-33.Ford, Tanisha C. “SNCC Women, Denim, and the Politics of Dress.” The Journal of Southern History 79.3 (2013): 625-58.Gökarıksel, Banu, and Sara Smith. “Intersectional Feminism beyond U.S. Flag, Hijab and Pussy Hats in Trump’s America.” Gender, Place & Culture 24.5 (2017): 628-44.Goodnow, Trischa. “On Black Panthers, Blue Ribbons, & Peace Signs: The Function of Symbols in Social Campaigns.” Visual Communication Quarterly 13 (2006): 166-79.Hebdige, Dick. Subculture: The Meaning of Style. London: Routledge, 2002. Henley, Jon. “How Hi-Vis Yellow Vest Became Symbol of Protest beyond France: From Brussels to Basra, Gilets Jaunes Have Brought Visibility to People and Their Grievances.” The Guardian 21 Dec. 2018. <https://www.theguardian.com/world/2018/dec/21/how-hi-vis-yellow-vest-became-symbol-of-protest-beyond-france-gilets-jaunes>.Heuer, Jennifer. “Hats On for the Nation! Women, Servants, Soldiers and the ‘Sign of the French’.” French History 16.1 (2002): 28-52.Jain, Ektaa. “Khadi: A Cloth and Beyond.” Bombay Sarvodaya Mandal & Gandhi Research Foundation. ND. 19 Dec. 2018 <https://www.mkgandhi.org/articles/khadi-a-cloth-and-beyond.html>. Klein, Naomi. No Logo. London: Flamingo, London, 2000. Komar, Marlen. “What the Civil Rights Movement Has to Do with Denim: The History of Blue Jeans Has Been Whitewashed.” 30 Oct. 2017. 19 Dec. 2018 <https://www.racked.com/2017/10/30/16496866/denim-civil-rights-movement-blue-jeans-history>.Ladd Nelson, Jennifer. “Dress Reform and the Bloomer.” Journal of American and Comparative Cultures 23.1 (2002): 21-25.Maynard, Margaret. “Dress for Dissent: Reading the Almost Unreadable.” Journal of Australian Studies 30.89 (2006): 103-12. Pussy Hat Project. “Design Interventions for Social Change.” 20 Dec. 2018. <https://www.pussyhatproject.com/knit/>.Roberts, Helene E. “The Exquisite Slave: The Role of Clothes in the Making of the Victorian Woman.” Signs (1977): 554-69.Simmel, Georg. “Fashion.” American Journal of Sociology 62 (1957): 541–58.Sinha, Sangita. “The Story of Khadi, India's Signature Fabric.” Culture Trip 2018. 18 Jan. 2019 <https://theculturetrip.com/asia/india/articles/the-story-of-khadi-indias-fabric/>.Yangzom, Dicky. “Clothing and Social Movements: Tibet and the Politics of Dress.” Social Movement Studies 15.6 (2016): 622-33. Veblen, Thorstein. The Theory of the Leisure Class: An Economic Study of Institutions. New York: Dover Thrift, 1899. Watson, Lilla. “The Commonwealth Games in Brisbane 1982: Analysis of Aboriginal Protests.” Social Alternatives 7.1 (1988): 1-19.Wrenn, Corey. “Pussy Grabs Back: Bestialized Sexual Politics and Intersectional Failure in Protest Posters for the 2017 Women’s March.” Feminist Media Studies (2018): 1-19.
APA, Harvard, Vancouver, ISO, and other styles
46

Isakhan, Ben, Jason Nelson, and Patrick West. "creativity.com: Aladdin’s Cave or Pandora’s Box?" M/C Journal 9, no. 1 (March 1, 2006). http://dx.doi.org/10.5204/mcj.2589.

Full text
Abstract:
At least as far back as classical Greek times, humankind has speculated over the complexities of creativity as a concept and the modes of its transmission (Madden 133-134). This paper considers what happens when our inherited conceptions of creativity collide with the World Wide Web. It concludes with a brief survey of the Creativity Resource Portal, a current on-line project managed by the authors and related to the conceptual issues raised in the body of the text. Today, creativity has moved beyond its traditional home in the rhetoric of the philosopher and the exploits of the artist to form an integral part of both the theory and practice of a myriad of disciplines. Health professionals (Dossey; Kirklin & Meakin; Meites, Bein & Shafer; Rees; Satalof), scientists (Bohn 1-3, 13-15; Culross), educators (Guilford; Sawyer; Sternberg & Williams; Wilks) and those involved in the corporate world (Forbes & Domm; Mauzy & Harriman; Robinson & Stern) all consider creativity to be a fundamental criterion by which they measure and achieve their successes. In this way, however, creativity has become something of an over-burdened signifier. Now the market is flooded with highly idealised and ever expanding models for understanding and transmitting creativity, in which the medium (transmission) strives to outdo the message (creativity itself). We are not attempting here to arbitrate between these various models with a view to providing a rank order of creativity. Instead, we want to focus on and explore the ways in which recent technological developments, primarily the internet, have been, and might be, used to transmit and facilitate new directions and expressions of creativity and the creative process itself. Although the internet has no single inventor or birth date, its origins lie in the communication system devised by the RAND corporation in the 1960s: a system designed to survive a nuclear war because it had no central point of control. To this extent, one could say that its initial egalitarianism tips towards the expression of creativity. From here, the internet evolved through various mutations, such as APRANET and Bulletin Boards, to become the World Wide Web that emerged in the 1990s. Since then, the internet has encroached further and further into our everyday lives: we buy and sell goods at sites like Amazon or E-bay, we communicate to the world via email accounts at Hotmail or Yahoo, we court potential partners at Lavalife or Okcupid, and we engage in scholarly debates on sites such as M/C – Media and Culture. The point here is that the sheer ubiquity of the internet has brought about a quiet revolution in our everyday modes of creativity. Web navigation, for example, is heavily dependent on the creativity of the user to move through virtual space, even or perhaps especially when he/she must counter the ‘point and click’ inducements of advertising and marketing strategies. Little wonder then that the emergence of creativity as a fundamental tenet for success across a wide array of disciplines, coupled with the pervasiveness of cyberspace, has led to an explosion of both the production and transmission of creativity on-line. One such development is the transmission and dissemination of already created products via the web: that is, products hijacked from the ‘real’. In its most controversial and publicized form, the creative output of musicians has become tender for trade between individuals who subscribe to programs such as Napster and Limewire. Beyond this, the internet extends ever outwards in a panoply of both solicited and pirated images and video clips of people’s creative output. Here the internet seems to move beyond the liberating potential that Benjamin saw in technology’s ability to reproduce the image (Benjamin) towards the simulacra (or hyper-real copies of the ‘real’) proposed by Baudrillard (Baudrillard). On-line creativity has not, however, been limited to the reproduction of artistic output that exists in the ‘real’. As with any practice fundamental to the expression of the human condition, creativity has found new and exciting ways to express itself on-line. For example, digital art has emerged as a serious artistic pursuit since the late 20th century. Here, a number of artists have fused their creative ability and their technological skills to generate new ways in which their creativity can be transmitted. A cyber-poet may meld both the classical poetic forms of stanza and rhyme with the language of HTML or Java to create a cyber-poem (see the work of Komninos Zervos). Visual artists such as Han Hoogerbrugge have also been able to successfully adapt their works to the digital world: Hooderbrugge converted a comic strip he wrote in the mid-1990s to a series of digital animations. As well as this, new on-line formats such as blogs have been used by a number of artists to express their creativity in new and interesting ways (see the work of Olia Lialina). Other artists have dived even further into the simulacra, preferring the aesthetic value of the code itself over the presence of images or words that might signify something in the ‘real’ (see this work by Jason Nelson). Unlike traditional art forms, these emerging digital art forms are intensively interactive and thereby encourage the creativity of their audience. By allowing the artistic product itself to be manipulated, digital artists facilitate new ways of ‘reading’ art. It is tempting then to offer the internet up as something of a creative utopia – an Aladdin’s Cave – a place where creativity, in all its manifestations, can be transmitted to the masses. However, in the final chapter of her book The Pearly Gates of Cyberspace, Margaret Wertheim discusses the notion of a ‘cyber-utopia’ and asks “Who is this cyber-utopia really going to be for?” (Wertheim 295). She goes on to point out that not only do the majority of the world’s inhabitants not have access to the internet, but that out of those who do, many are discriminated against in the virtual world because of their gender, their sexuality, their skin colour or their ethnicity. (Of course, this does not necessarily make online space any less democratic than traditional technologies such as print forms). More recently, Lawrence Lessig has taken Wertheim’s questioning of cyber-utopia to its logical dystopian antithesis in his book Free Culture. Here, Lessig agues that the internet has had a direct impact on the way that culture is made. Specifically, the control that major media conglomerates and governments have over the internet has meant that “the ordinary ways in which individuals create and share culture fall within the reach of the regulation of the law, which has expanded to draw within its control a vast amount of culture and creativity that it never reached before” (Lessig 8). Have we therefore clicked open a Pandora’s Box through our incessant attempts to get wired? All technologies are open to abuse. Cyberspace is neither Aladdin’s Cave nor Pandora’s Box but simply a work in progress. And it is on this basis that we are currently creating an online Creativity Resource Portal. This portal does not attempt to resolve immediately the many debates over the nature and transmission of creativity, nor does it set out to completely resolve the quandaries raised by creativity’s cyber manifestations. Instead, it aims, at least initially, to disseminate a broad range of knowledge about creativity – thus encouraging inter-fertilization across disciplines and practices – and also to act as a catalyst for currently unrecognized ways of creating and expressing creativity in the online world. That being said, we hope that future refined manifestations of the site will possess the characteristics of a ‘laboratory’, in which the serious issues of creative freedom and control outlined in this paper – issues of transmission in the broadest sense – might be more directly engaged with. It is through this direct virtual engagement that we hope to reach conclusions capable of extending outwards to the wider, global online environment. This might happen via experiments with new types of non-hierarchical site structures, or with the level of control given to visitors over what happens in the site. But can any structures resist the exercise of power? Can egalitarianism (cyber or otherwise) ever fully eschew borders and margins? These are the questions that challenge and excite us as managers of the CRP. References Benjamin, Walter. “The Work of Art in the Age of Mechanical Reproduction.” In Illuminations. London: Fontana, 1992. Baudrillard, Jean. The Ecstasy of Communication. New York: Semiotext(e), 1988. Bohn, David. On Creativity. London: Routledge, 1998. Culross, Rita R. “Individual and Contextual Variables among Creative Scientists: The New Work Paradigm.” Roeper Review 26.3 (2004): 126-27. Dossey, Larry. “Creativity: On Intelligence, Insight, and the Cosmic Soup.” Alternative Therapies in Health and Medicine [NLM – MEDLINE] 6.1 (2000): 12-17, 108-117. Forbes, Benjamin J., and Donald R. Domm. “Creativity and Productivity: Resolving the Conflict.” S.A.M. Advanced Management Journal 69.2 (2004): 4-11. Guilford, J. P. Intelligence, Creativity, and Their Educational Implications. San Diego: Robert R. Knapp, 1968. Kirklin, Deborah, and Richard Meakin. “Editorial: Medical Students and Arts and Humanities Research: Fostering Creativity, Inquisitiveness, and Lateral Thinking.” Journal of Medical Ethics 29.2 (2003): 103. Lessig, Lawrence. Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity. New York: The Penguin Press, 2004. Madden, Christopher. “Creativity and Arts Policy.” Journal of Arts Management, Law, and Society 34.2 (2004): 133-139. Mauzy, Jeff, and Richard Harriman. Creativity, Inc.: Building an Inventive Organisation. Boston: Harvard Business School Press, 2003. Meites, E., S. Bein, and A. Shafer. “Researching Medicine in Context: The Arts and Humanities Medical Scholars Program.” Journal of Medical Ethics: Medical Humanities 29 (2003): 104-108. Rees, Colin. “Celebrate Creativity.” Nursing Standard 19.14-16 (2004): 20-21. Robinson, Alan G., and Sam Stern. Corporate Creativity: How Innovation and Improvement Actually Happen. San Francisco: Berrett-Koehler Publishers, 1998. Sataloff, Robert Thayer. “Interdisciplinary Opportunities for Creativity in Medicine.” Ear, Nose & Throat Journal 77.7 (1998): 530-533. Sawyer, Keith R. “Creative Teaching: Collaborative Discussion as Disciplined Improvisation.” Educational Researcher 33.2 (2004): 12-20. Sternberg, Robert J., and Wendy M. Williams. How to Develop Student Creativity. Alexandria: Association for Supervision and Curriculum Development, 1996. Wertheim, Margaret. The Pearly Gates of Cyberspace: A History of Space from Dante to the Internet. Sydney: Doubleday, 1999. Wilks, Susan. Critical and Creative Thinking: Strategies for Classroom Inquiry. Armadale: Eleanor Curtain Publishing, 1995. Citation reference for this article MLA Style Isakhan, Ben, Jason Nelson, and Patrick West. "creativity.com: Aladdin’s Cave or Pandora’s Box?." M/C Journal 9.1 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0603/07-isakhan_nelson_west.php>. APA Style Isakhan, B., J. Nelson, and P. West. (Mar. 2006) "creativity.com: Aladdin’s Cave or Pandora’s Box?," M/C Journal, 9(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0603/07-isakhan_nelson_west.php>.
APA, Harvard, Vancouver, ISO, and other styles
47

Nairn, Angelique. "Chasing Dreams, Finding Nightmares: Exploring the Creative Limits of the Music Career." M/C Journal 23, no. 1 (March 18, 2020). http://dx.doi.org/10.5204/mcj.1624.

Full text
Abstract:
In the 2019 documentary Chasing Happiness, recording artist/musician Joe Jonas tells audiences that the band was “living the dream”. Similarly, in the 2012 documentary Artifact, lead singer Jared Leto remarks that at the height of Thirty Seconds to Mars’s success, they “were living the dream”. However, for both the Jonas Brothers and Thirty Seconds to Mars, their experiences of the music industry (much like other commercially successful recording artists) soon transformed into nightmares. Similar to other commercially successful recording artists, the Jonas Brothers and Thirty Seconds to Mars, came up against the constraints of the industry which inevitably led to a forfeiting of authenticity, a loss of creative control, increased exploitation, and unequal remuneration. This work will consider how working in the music industry is not always a dream come true and can instead be viewed as a proverbial nightmare. Living the DreamIn his book Dreams, Carl Gustav Jung discusses how that which is experienced in sleep, speaks of a person’s wishes: that which might be desired in reality but may not actually happen. In his earlier work, The Interpretation of Dreams, Freud argued that the dream is representative of fulfilling a repressed wish. However, the creative industries suggest that a dream need not be a repressed wish; it can become a reality. Jon Bon Jovi believes that his success in the music industry has surpassed his wildest dreams (Atkinson). Jennifer Lopez considers the fact that she held big dreams, had a focussed passion, and strong aspirations the reason why she pursued a creative career that took her out of the Bronx (Thomas). In a Twitter post from 23 April 2018, Bruno Mars declared that he “use [sic] to dream of this shit,” in referring to a picture of him performing for a sold out arena, while in 2019 Shawn Mendes informed his 24.4 million Twitter followers that his “life is a dream”. These are but a few examples of successful music industry artists who are seeing their ‘wishes’ come true and living the American Dream.Endemic to the American culture (and a characteristic of the identity of the country) is the “American Dream”. It centres on “a land in which life should be better and richer and fuller for every man, with opportunity for each according to his ability and achievement” (Adams, 404). Although initially used to describe having a nice house, money, stability and a reasonable standard of living, the American Dream has since evolved to what the scholar Florida believes is the new ‘aspiration of people’: doing work that is enjoyable and relies on human creativity. At its core, the original American Dream required striving to meet individual goals, and was promoted as possible for anyone regardless of their cultural, socio-economic and political background (Samuel), because it encourages the celebrating of the self and personal uniqueness (Gamson). Florida’s conceptualisation of the New American dream, however, tends to emphasise obtaining success, fame and fortune in what Neff, Wissinger, and Zukin (310) consider “hot”, “creative” industries where “the jobs are cool”.Whether old or new, the American Dream has perpetuated and reinforced celebrity culture, with many of the young generation reporting that fame and fortune were their priorities, as they sought to emulate the success of their famous role models (Florida). The rag to riches stories of iconic recording artists can inevitably glorify and make appealing the struggle that permits achieving one’s dream, with celebrities offering young, aspiring creative people a means of identification for helping them to aspire to meet their dreams (Florida; Samuel). For example, a young Demi Lovato spoke of how she idolised and looked up to singer Beyonce Knowles, describing Knowles as a role model because of the way she carries herself (Tishgart). Similarly, American Idol winner Kelly Clarkson cited Aretha Franklin as her musical inspiration and the reason that she sings from a place deep within (Nilles). It is unsurprising then, that popular media has tended to portray artists working in the creative industries and being paid to follow their passions as “a much-vaunted career dream” (Duffy and Wissinger, 4656). Movies such as A Star Is Born (2018), The Coal Miner’s Daughter (1980), Dreamgirls (2006), Begin Again (2013) and La La Land (2016) exalt the perception that creativity, talent, sacrifice and determination will mean dreams come true (Nicolaou). In concert with the American dream is the drive among creative people pursuing creative success to achieve their dreams because of the perceived autonomy they will gain, the chance of self-actualisation and social rewards, and the opportunity to fulfil intrinsic motivations (Amabile; Auger and Woodman; Cohen). For these workers, the love of creation and the happiness that accompanies new discoveries (Csikszentmihalyi) can offset the tight budgets and timelines, precarious labour (Blair, Grey, and Randle; Hesmondhalgh and Baker), uncertain demand (Caves; Shultz), sacrifice of personal relationships (Eikhof and Haunschild), the demand for high quality products (Gil & Spiller), and the tense relationships with administrators (Bilton) which are known to plague these industries. In some cases, young, up and coming creative people overlook these pitfalls, instead romanticising creative careers as ideal and worthwhile. They willingly take on roles and cede control to big corporations to “realize their passions [and] uncover their personal talent” (Bill, 50). Of course, as Ursell argues in discussing television employees, such idealisation can mean creatives, especially those who are young and unfamiliar with the constraints of the industry, end up immersed in and victims of the “vampiric” industry that exploits workers (816). They are socialised towards believing, in this case, that the record label is a necessary component to obtain fame and fortune and whether willing or unwilling, creative workers become complicit in their own exploitation (Cohen). Loss of Control and No CompensationThe music industry itself has been considered by some to typify the cultural industries (Chambers). Popular music has potency in that it is perceived as speaking a universal language (Burnett), engaging the emotions and thoughts of listeners, and assisting in their identity construction (Burnett; Gardikiotis and Baltzis). Given the place of music within society, it is not surprising that in 2018, the global music industry was worth US$19.1billion (IFPI). The music industry is necessarily underpinned by a commercial agenda. At present, six major recording companies exist and between them, they own between 70-80 per cent of the recordings produced globally (Konsor). They also act as gatekeepers, setting trends by defining what and who is worth following and listening to (Csikszentmihalyi; Jones, Anand, and Alvarez). In essence, to be successful in the music industry is to be affiliated with a record label. This is because the highly competitive nature and cluttered environment makes it harder to gain traction in the market without worthwhile representation (Moiso and Rockman). In the 2012 documentary about Thirty Seconds to Mars, Artifact, front man Jared Leto even questions whether it is possible to have “success without a label”. The recording company, he determines, “deal with the crappy jobs”. In a financially uncertain industry that makes money from subjective or experience-based goods (Caves), having a label affords an artist access to “economic capital for production and promotion” that enables “wider recognition” of creative work (Scott, 239). With the support of a record label, creative entrepreneurs are given the chance to be promoted and distributed in the creative marketplace (Scott; Shultz). To have a record label, then, is to be perceived as legitimate and credible (Shultz).However, the commercial music industry is just that, commercial. Accordingly, the desire to make money can see the intrinsic desires of musicians forfeited in favour of standardised products and a lack of remuneration for artists (Negus). To see this standardisation in practice, one need not look further than those contestants appearing on shows such as American Idol or The Voice. Nowhere is the standardisation of the music industry more evident than in Holmes’s 2004 article on Pop Idol. Pop Idol first aired in Britain from 2001-2003 and paved the way for a slew of similar shows around the world such as Australia’s Popstars Live in 2004 and the global Idol phenomena. According to Holmes, audiences are divested of the illusion of talent and stardom when they witness the obvious manufacturing of musical talent. The contestants receive training, are dressed according to a prescribed image, and the show emphasises those melodramatic moments that are commercially enticing to audiences. Her sentiments suggest these shows emphasise the artifice of the music industry by undermining artistic authenticity in favour of generating celebrities. The standardisation is typified in the post Idol careers of Kelly Clarkson and Adam Lambert. Kelly Clarkson parted with the recording company RCA when her manager and producer Clive Davis told her that her album My December (2007) was “not commercial enough” and that Clarkson, who had written most of the songs, was a “shitty writer… who should just shut up and sing” (Nied). Adam Lambert left RCA because they wanted him to make a full length 80s album comprised of covers. Lambert commented that, “while there are lots of great songs from that decade, my heart is simply not in doing a covers album” (Lee). In these instances, winning the show and signing contracts led to both Clarkson and Lambert forfeiting a degree of creative control over their work in favour of formulaic songs that ultimately left both artists unsatisfied. The standardisation and lack of remuneration is notable when signing recording artists to 360° contracts. These 360° contracts have become commonplace in the music industry (Gulchardaz, Bach, and Penin) and see both the material and immaterial labour (such as personal identities) of recording artists become controlled by record labels (Stahl and Meier). These labels determine the aesthetics of the musicians as well as where and how frequently they tour. Furthermore, the labels become owners of any intellectual property generated by an artist during the tenure of the contract (Sanders; Stahl and Meier). For example, in their documentary Show Em What You’re Made Of (2015), the Backstreet Boys lament their affiliation with manager Lou Pearlman. Not only did Pearlman manufacture the group in a way that prevented creative exploration by the members (Sanders), but he withheld profits to the point that the Backstreet Boys had to sue Pearlman in order to gain access to money they deserved. In 2002 the members of the Backstreet Boys had stated that “it wasn’t our destinies that we had to worry about in the past, it was our souls” (Sanders, 541). They were not writing their own music, which came across in the documentary Show Em What You’re Made Of when singer Howie Dorough demanded that if they were to collaborate as a group again in 2013, that everything was to be produced, managed and created by the five group members. Such a demand speaks to creative individuals being tied to their work both personally and emotionally (Bain). The angst encountered by music artists also signals the identity dissonance and conflict felt when they are betraying their true or authentic creative selves (Ashforth and Mael; Ashforth and Humphrey). Performing and abiding by the rules and regulations of others led to frustration because the members felt they were “being passed off as something we aren’t” (Sanders 539). The Backstreet Boys were not the only musicians who were intensely controlled and not adequately compensated by Pearlman. In the documentary The Boy Band Con: The Lou Pearlman Story 2019, Lance Bass of N*Sync and recording artist Aaron Carter admitted that the experience of working with Pearlman became a nightmare when they too, were receiving cheques that were so small that Bass describes them as making his heart sink. For these groups, the dream of making music was undone by contracts that stifled creativity and paid a pittance.In a similar vein, Thirty Seconds to Mars sought to cut ties with their record label when they felt that they were not being adequately compensated for their work. In retaliation EMI issued Mars with a US$30 million lawsuit for breach of contract. The tense renegotiations that followed took a toll on the creative drive of the group. At one point in the documentary Artifact (2012), Leto claims “I can’t sing it right now… You couldn’t pay me all the money in the world to sing this song the way it needs to be sung right now. I’m not ready”. The contract subordination (Phillips; Stahl and Meier) that had led to the need to renegotiate financial terms came at not only a financial cost to the band, but also a physical and emotional one. The negativity impacted the development of the songs for the new album. To make music requires evoking necessary and appropriate emotions in the recording studio (Wood, Duffy, and Smith), so Leto being unable to deliver the song proved problematic. Essentially, the stress of the lawsuit and negotiations damaged the motivation of the band (Amabile; Elsbach and Hargadon; Hallowell) and interfered with their creative approach, which could have produced standardised and poor quality work (Farr and Ford). The dream of making music was almost lost because of the EMI lawsuit. Young creatives often lack bargaining power when entering into contracts with corporations, which can prove disadvantaging when it comes to retaining control over their lives (Phillips; Stahl and Meier). Singer Demi Lovato’s big break came in the 2008 Disney film Camp Rock. As her then manager Phil McIntyre states in the documentary Simply Complicated (2017), Camp Rock was “perceived as the vehicle to becoming a superstar … overnight she became a household name”. However, as “authentic and believable” as Lovato’s edginess appeared, the speed with which her success came took a toll on Lovato. The pressure she experienced having to tour, write songs that were approved by others, star in Disney channel shows and movies, and look a certain way, became too much and to compensate, Lovato engaged in regular drug use to feel free. Accordingly, she developed a hybrid identity to ensure that the squeaky clean image required by the moral clauses of her contract, was not tarnished by her out-of-control lifestyle. The nightmare came from becoming famous at a young age and not being able to handle the expectations that accompanied it, coupled with a stringent contract that exploited her creative talent. Lovato’s is not a unique story. Research has found that musicians are more inclined than those in other workforces to use psychotherapy and psychotropic drugs (Vaag, Bjørngaard, and Bjerkeset) and that fame and money can provide musicians more opportunities to take risks, including drug-use that leads to mortality (Bellis, Hughes, Sharples, Hennell, and Hardcastle). For Lovato, living the dream at a young age ultimately became overwhelming with drugs her only means of escape. AuthenticityThe challenges then for music artists is that the dream of pursuing music can come at the cost of a musician’s authentic self. According to Hughes, “to be authentic is to be in some sense real and true to something ... It is not simply an imitation, but it is sincere, real, true, and original expression of its creator, and is believable or credible representations or example of what it appears to be” (190). For Nick Jonas of the Jonas Brothers, being in the spotlight and abiding by the demands of Disney was “non-stop” and prevented his personal and musical growth (Chasing Happiness). As Kevin Jonas put it, Nick “wanted the Jonas Brothers to be no more”. The extensive promotion that accompanies success and fame, which is designed to drive celebrity culture and financial motivations (Currid-Halkett and Scott; King), can lead to cynical performances and dissatisfaction (Hughes) if the identity work of the creative creates a disjoin between their perceived self and aspirational self (Beech, Gilmore, Cochrane, and Greig). Promoting the band (and having to film a television show and movies he was not invested in all because of contractual obligations) impacted on Nick’s authentic self to the point that the Jonas Brothers made him feel deeply upset and anxious. For Nick, being stifled creatively led to feeling inauthentic, thereby resulting in the demise of the band as his only recourse.In her documentary Gaga: Five Foot Two (2017), Lady Gaga discusses the extent she had to go to maintain a sense of authenticity in response to producer control. As she puts it, “when producers wanted me to be sexy, I always put some absurd spin on it, that made me feel like I was still in control”. Her words reaffirm the perception amongst scholars (Currid-Halkett and Scott; King; Meyers) that in playing the information game, industry leaders will construct an artist’s persona in ways that are most beneficial for, in this case, the record label. That will mean, for example, establishing a coherent life story for musicians that endears them to audiences and engaging recording artists in co-branding opportunities to raise their profile and to legitimise them in the marketplace. Such behaviour can potentially influence the preferences and purchases of audiences and fans, can create favourability, originality and clarity around artists (Loroz and Braig), and can establish competitive advantage that leads to producers being able to charge higher prices for the artists’ work (Hernando and Campo). But what impact does that have on the musician? Lady Gaga could not continue living someone else’s dream. She found herself needing to make changes in order to avoid quitting music altogether. As Gaga told a class of university students at the Emotion Revolution Summit hosted by Yale University:I don’t like being used to make people money. It feels sad when I am overworked and that I have just become a money-making machine and that my passion and creativity take a backseat. That makes me unhappy.According to Eikof and Haunschild, economic necessity can threaten creative motivation. Gaga’s reaction to the commercial demands of the music industry signal an identity conflict because her desire to create, clashed with the need to be commercial, with the outcome imposing “inconsistent demands upon” her (Ashforth and Mael, 29). Therefore, to reduce what could be considered feelings of dissonance and inconsistency (Ashforth and Mael; Ashforth and Humphrey) Gaga started saying “no” to prevent further loss of her identity and sense of authentic self. Taking back control could be seen as a means of reorienting her dream and overcoming what had become dissatisfaction with the commercial processes of the music industry. ConclusionsFor many creatives working in the creative industries – and specifically the music industry – is constructed as a dream come true; the working conditions and expectations experienced by recording artists are far from liberating and instead can become nightmares to which they want to escape. The case studies above, although likely ‘constructed’ retellings of the unfortunate circumstances encountered working in the music industry, nevertheless offer an inside account that contradicts the prevailing ideology that pursuing creative passions leads to a dream career (Florida; Samuel). If anything, the case studies explored above involving 30 Seconds to Mars, the Jonas Brothers, Lady Gaga, Kelly Clarkson, Adam Lambert and the Backstreet Boys, acknowledge what many scholars writing in the creative industries have already identified; that exploitation, subordination, identity conflict and loss of control are the unspoken or lesser known consequences of pursuing the creative dream. That said, the conundrum for creatives is that for success in the industry big “creative” businesses, such as recording labels, are still considered necessary in order to break into the market and to have prolonged success. This is simply because their resources far exceed those at the disposal of independent and up-and-coming creative entrepreneurs. Therefore, it can be argued that this friction of need between creative industry business versus artists will be on-going leading to more of these ‘dream to nightmare’ stories. The struggle will continue manifesting in the relationship between business and artist for long as the recording artists fight for greater equality, independence of creativity and respect for their work, image and identities. References@BrunoMars. “I use to dream about this shit!! #stilldreamin.” Twitter, 23 Apr. 2018, 00:31. <https://twitter.com/brunomars/status/988319530698059776?lang=en>.@ShawnMendes. “My life is a dream.” Twitter, 21 July 2019, 12:46. <https://twitter.com/shawnmendes/status/1153028603573145601?lang=en>.Adams, James Truslow. The Epic of America. New Brunswick: Transaction Publishers, 2012 [1931].Amabile, Teresa M. “Motivating Creativity in Organizations: On Doing What You Love and Loving What You Do.” California Management Review 40.1 (1997): 39-58.Artifact. Dir. J. Leto. Paradox, 2012.Ashforth, Blake E., and Ronald H. Humphrey. “Emotional Labor in Service Roles: The Influence of Identity.” The Academy of Management Review 18.1 (1993): 88-115.Ashforth, Blake E., and Fred Mael. “Social Identity Theory and the Organization.” Academy of Management Review 14.1 (1989): 20-39.Atkinson, Brian T. “Jon Bon Jovi Talks about Sambora, Songwriting and Living the Dream.” Statesman 8 Apr. 2013. 15 Sep. 2019 <https://www.statesman.com/article/20130408/NEWS/304089715>.Auger, Pascale, and Richard W. Woodman. “Creativity and Intrinsic Motivation: Exploring a Complex Relationship.” The Journal of Applied Behavioral Science 52.3 (2016): 342-366.Backstreet Boys: Show ‘Em What You’re Made Of. Dir. S. Kijak. Pulse Films, 2015.Bain, Alison. “Constructing an Artistic Identity.” Work, Employment and Society 19.1 (2005): 25-46.Beech, Nic, Charlotte Gilmore, Eilidh Cochrane, and Gail Greig. “Identity Work as a Response to Tensions: A Re-Narration in Opera Rehearsals.” Scandinavian Journal of Management 28.1 (2012): 39-47.Bellis, Mark A, Karen Hughes, Olivia Sharples, Tom Hennell, and Katherine A. Hardcastle. “Dying to Be Famous: Retrospective Cohort of Rock and Pop Star Mortality and Its Association with Adverse Childhood Experiences.” BMJ 2.6 (2012): 1-8. Bill, Amanda. “’Blood, Sweat and Shears’: Happiness, Creativity, and Fashion Education.” Fashion Theory 16.1 (2012): 49-66. Bilton, Chris. Management and Creativity: From Creative Industries to Creative Management. Malden: Blackwell, 2007.Blair, Helen, Susan Grey, and Keith Randle. “Working in Film: Employment in a Project Based Industry.” Personnel Review 30.2 (2001): 170-185.Burnett, Robert. The Global Jukebox: The International Music Industry. London: Routledge, 1996.Caves, Richard, E. Creative Industries: Contracts between Art and Commerce. Massachusetts: Harvard University Press, 2001. Chambers, Iain. “Some Critical Tracks.” Popular Music 2 (1982): 19-36.Chasing Happiness. Dir. J. Taylor. Amazon, 2019. Cohen, Nicole, S. “Cultural Work as a Site of Struggle: Freelancers and Exploitation.” TripleC 10.2 (2012): 141-155.Currid-Halkett, Elizabet, and Allen J. Scott. “The Geography of Celebrity and Glamour: Reflections on Economy, Culture, and Desire in the City.” City, Culture and Society 4.1 (2013): 2-11.Duffy, Brooke Erin, and Elizabeth Wissinger. “Mythologies of Creative Work in the Social Media Age: Fun, Free, and ‘Just Being Me’.” International Journal of Communication 11 (2017): 4652-4671.Eikof, Doris Ruth, and Axel Haunschild. “Lifestyle Meets Market: Bohemian Entrepreneurs in Creative Industries.” Creativity and Innovation Management 15.3 (2006): 234-241.Elsbach, Kimberly D. and Andrew B. Hargadon. “Enhancing Creativity through ‘Mindless’ Work: A Framework of Workday Design.” Organization Science 17.4 (2006): 470-483.Farr, James L., and Cameron M. Ford. “Individual Innovation.” Innovation and Creativity at Work: Psychological and Organizational Strategies. Eds. Michael A. West and James L. Farr. London: Wiley, 1990. 63-80.Florida, Richard. “The New American Dream.” The Washington Monthly 35.3 (2003): 26-33Freud, Sigmund. The Interpretation of Dreams. Trans. A.A. Brill. Dover Publications, 2015.Gaga: Five Foot Two. Dir. C. Moukarbel, Netflix, 2017.Gamson, Joshua. Claims to Fame: Celebrity in Contemporary America. Berkeley: University of California Press, 1992.Gardikiotis, Antonis, and Alexandros Baltzis. “’Rock Music for Myself and Justice to the World!’ Musical Identity, Values, and Music Preferences.” Psychology of Music 40.2 (2011): 143-163.Guichardaz, Rémy, Laurent Bach, and Julien Penin. “Music Industry Intermediation in the Digital Era and the Resilience of the Majors’ Oligopoly: The Role of Transactional Capability.” Industry and Innovation 26.7 (2019): 843-869.Hallowell, Edward M. “Overloaded Circuits: Why Smart People Underperform.” Harvard Business Review Jan. 2005. 17 Sep. 2019 <https://addmindfulness.com/wp-content/uploads/2013/08/Hallowell-HBR-Overloaded-Circuits.pdf>.Hesmondhalgh, David, and Sarah Baker. “A Very Complicated Version of Freedom: Conditions and Experiences of Creative Labour in Three Cultural Industries.” Poetics 38 (2010): 4-20.Hernando, Elisa, and Sara Campo. “Does the Artist’s Name Influence the Perceived Value of an Art Work?” International Journal of Arts Management 19.2 (2017): 46-58.Holmes, Su. “’Reality Goes Pop!’ Reality TV, Popular Music, and Narratives of Stardom in Pop Idol.” Television & New Media 5.2 (2004) 147-172.Hughes, Michael. “Country Music as Impression Management: A Meditation on Fabricating Authenticity.” Poetics 28 (2000): 185-205.IFPI. “Global Recorded Music Sales.” 18 Oct. 2019 <https://www.ifpi.org/global-statistics.php>.Jones, Candace, N. Anand, and Josè Luis Alvarez. “Manufactured Authenticity and Creative Voice in Cultural Industries.” Journal of Management Studies 42.5 (2005): 893-899.Jung, Carl Gustav. Dreams. Trans. Richard Francis Carrington Hull. Routledge, 2002.King, Barry. “Stardom, Celebrity, and the Money Form.” The Velvet Light Trap 65.1 (2010): 7-19.Konsor, Kellie J. Essays on the Industrial Organization of the Modern Music Industry. PhD dissertation. Purdue University, 2017. Lee, Christina. “Adam Lambert Parts Ways with RCA, Says ‘My Heart Is Simply Not in Doing a Covers Album.” Idolator 13 July 2013. 15 Sep. 2019 <https://www.idolator.com/7470764/adam-lambert-covers-album-parts-ways-with-rca?chrome=1>.Loroz, Peggy Sue, and Bridgette M. Braig. “Consumer Attachments to Human Brands: The ‘Oprah Effect.’” Connections 32.7 (2015): 751-763.Meyers, Erin. “’Can You Handle My Truth?’: Authenticity and the Celebrity Star Image.” Journal of Popular Culture 42.5 (2009): 890-907. Moisio, Laura, and Maija Rökman. “Musician’s Fans’ and Record Company’s Value Co-Creation in Internet.” Paper presented at The 2011 Naples Forum on Service. University Federico II, Capri, Italy, 14-17 June 2011.Neff, Gina, Elizabeth Wissing, and Sharon Zukin. “Entrepreneurial Labor among Cultural Producers: ‘Cool’ Jobs in ‘Hot’ Industries.” Social Semiotics 15.3 (2005): 307-334.Negus, Keith. “Where the Mystical Meets the Market: Creativity and Commerce in the Production of Popular Music.” The Sociological Review 43.2 (1995): 316-341.Nicolaou, Elena. “Fallen in Love with A Star Is Born? Watch These Movies Next.” Refinery29 17 Oct. 2018. 14 Sep. 2019 <https://www.refinery29.com/en-gb/2018/10/214287/movies-about-hollywood-showbiz#slide-13>.Nied, Michael. “Kelly Clarkson Freed from American Idol Contract.” PPCORN. 15 Sep. 2019 <http://ppcorn.com/us/kelly-clarkson-freed-from-american-idol-contract/>.Nilles, Billy. “How Aretha Franklin Inspired Kelly Clarkson, Jennifer Hudson and More Stars.” ENews 16 Aug. 2018. 19 Sep. 2019 <https://www.eonline.com/news/960776/how-aretha-franklin-inspired-kelly-clarkson-jennifer-hudson-and-more-stars>.Phillips, Ronnie J. Rock and Roll Fantasy? The Reality of Going from Garage Band to Superstardom. Colorado: Springer, 2013. Samuel, Lawrence, R. The American Dream: A Cultural History. New York: Syracuse UP, 2012.Sanders, Maria A. “Singing Machines: Boy Bands and the Struggle for Artistic Legitimacy.” 20 Cardozo Arts & Entertainment Law Journal 3 (2002): 525-588Scott, Michael. “Cultural Entrepreneurs, Cultural Entrepreneurship: Music Producers Mobilising and Converting Bourdieu’s Alternative Capitals.” Poetics 40 (2012): 237-255Shultz, Benjamin. “The Work behind the Scenes: The New Intermediaries of the Indie Crafts Business.” Regional Studies 49.3 (2015): 451-460.Simply Complicated. Dir. H.L. Davis. Philymack Productions, 2017,Stahl, Matt, and Leslie Meier. “The Firm Foundation of Organizational Flexibility: The 360 Contract in the Digitalizing Music Industry.” Canadian Journal of Communication 37.3 (2012): 441-458.The Boy Band Con: The Lou Pearlman Story. Dir. A. Kunkel. 1620 Media, 2019.Thomas, George M. “’Maid’ for Fame: J. Lo Living a Dream.” Chicago Tribune 12 Dec. 2002. 15 Sep. 2019 <https://www.chicagotribune.com/news/ct-xpm-2002-12-12-0212120189-story.html>.Tishgart, Sierra. “Demi Lovato on Launching Secret’s Anti-Bullying Campaign.” TeenVogue 17 Oct. 2012. 19 Sep. 2019 <https://www.teenvogue.com/story/demi-lovato-secret-anti-bullying>.Ursell, Gillian. “Television Production: Issues of Exploitation, Commodification and Subjectivity in UK Television Labour Markets.” Media, Culture & Society 22.6 (2000): 805-825.Vaag, Jonas, Johan Håkon Bjørngaard, and Ottar Bjerkeset. “Use of Psychotherapy and Psychotropic Medication among Norwegian Musicians Compared to the General Workforce.” Psychology of Music 44.6 (2016): 1439-1453. Wood, Nichola, Michelle Duffy, and Susan J. Smith. “The Art of Doing (Geographies of) Music.” Environment and Planning D: Society and Space 25.5 (2007): 867-889.Yale University. “Lady Gaga Emotion Revolution Summit 2015.” YouTube, 12 Nov. 2015. <https://www.youtube.com/watch?v=so2nDTZQmCo>.
APA, Harvard, Vancouver, ISO, and other styles
48

Phillips, Christopher. "A Good Coalition." M/C Journal 13, no. 6 (November 30, 2010). http://dx.doi.org/10.5204/mcj.316.

Full text
Abstract:
In 1996, the iconoclastic economist John Kenneth Galbraith wrote a manifesto, The Good Society, that elaborated his vision for what societal excellence and goodness should amount to. Though nearly 96, Galbraith was still a rabble-rouser, and he castigated the powers that be in the United States for propping up a “democracy of the fortunate” (8). To Galbraith, those who engaged in electoral politics, win or lose on any specific issue, tended to have all the social and economic advantages, while the less well off were deliberately marginalised by ‘the system.’ He lamented that “money, voice and political activism are now extensively controlled by the affluent, very affluent, and business interests" (140), making of the political sphere an "unequal contest" (8).To make democracy American style more inclusive, Galbraith called for “a coalition of the concerned and the compassionate and those now outside the political system” (143), so that all citizens had optimal prospects for enjoying “personal liberty, basic well-being, social and ethnic equality, the opportunity for a rewarding life" (4). Have inroads been made, in the nearly 15 years since first publication of The Good Society, in making come true Galbraith’s version of a good society? If not, how might such a coalition be achieved? What would it look like? Who among Americans would constitute the concerned, compassionate outsiders that would make such a coalition authentically ‘Galbraithian’? A Coalition on the MoveWhat about MoveOn.org? A progressive public advocacy group founded in 1998, MoveOn.org, according to Lelia Green in The Internet, is “an important indicator of the potential for bringing together communities of like-minded individuals” (139). Green singles out MoveOn.org as particularly pivotal in galvanising support for Barack Obama’s presidency (139). The New York Times describes MoveOn.org as “a bottom-up organization that has inserted itself into the political process in ways large and small” (Janofsky and Lee). Indeed, it represents “the next evolutionary change in American politics, a move away from one-way tools of influence like television commercials and talk radio to interactive dialogue, offering everyday people a voice in a process that once seemed beyond their reach.” MoveOn.org has expertly utilised the Internet to mobilise its members “to sign online petitions, organize street demonstrations and donate money to run political advertisements”. Green considers MoveOn.org one of today’s standout “coalitions of interests and political agendas”, “extraordinary” in its ability to “use websites and email lists to build communities around a shared passion” (139). In 2008, its 4.2 million members were at the vortex of a “dynamic that tipped the balance in favour of a more radical agenda with the election of President Barack Obama in 2008” (139). Galbraith, for one, would certainly agree with MoveOn.org’s politics, and likely would claim that their radical agenda is a compassionate and encompassing one that effectively addresses the concerns of everyday citizens. Yet the fact is that millions of disaffected Americans are not liberals, and so are not in sync with MoveOn.org’s interests and agendas, such as its firm insistence that a ‘public option’ is the best way to bring about meaningful health care reform, and its demand that all U.S. troops be immediately withdrawn from Iraq and Afghanistan. Tea Anyone?Another sort of coalition filled the void created by MoveOn.org. Enter the Tea Party. A movement that has been every bit as effective in its way in inspiring once-jaded ordinary citizens to coalesce around a set of interests and agendas – albeit, at least in principal if not necessarily in actual practice, of a professed libertarian strain – the Tea Party got underway in the waning days of the second presidential term of George W. Bush. It started out as a one-issue protest group voicing umbrage over the proposed economic stimulus plan, which it considered an unconstitutional subsidy. After Barack Obama became president, the Tea Party burgeoned into a much more influential movement that now professes to be a grassroots citizens’ watchdog for all unconstitutional activities (or what it deems to be such) on the part of the federal government. A New York Times article notes that many of its members are victims of the economic downturn; they “had lost their jobs, or perhaps watched their homes plummet in value, and they found common cause in the Tea Party’s fight for lower taxes and smaller government” (Zernike). Its members are akin to the millions of middle class Americans who lost their livelihoods during the Great Depression of the 1930s, an unparalleled economic downturn that eventually “mobilized many middle-class people who had fallen on hard times” to join forces in order to have an effective political voice. But those during the Great Depression who were aroused to political consciousness “tended to push for more government involvement”; in contrast, the Tea Party is a coalition that “vehemently wants less”. While Galbraith depicted the Republican Party of his time as “avowedly on the side of the fortunate” (141), the majority of today’s Tea Party members align themselves with the Republican Party, yet they are by no means principally made up of "the fortunate." Erick Erickson, a prominent Tea Party spokesman and a television commentator for the CNN news channel, blogs on Redstate.com that the Tea Party “has gotten a lot of people off the sidelines and into the political arena...” Erickson further contends that the Tea Party has “brought together a lot of likeminded citizens who thought they were alone in the world. They realized that not only were they not alone, but there were millions of others just as concerned.” Galbraithian Coalitions?Do MoveOn.org and Tea Party constitute Galbraithian-type coalitions, each in its own right? Both have inspired millions of once-disenchanted common citizens to come together around common political concerns and become a force to be reckoned with in electoral politics. As such, each has served as an effective counterweight against the money, voice and political activism of the very affluent. While Galbraith would probably have as much disdain for the Tea Party as he would have praise for MoveOn.org, the fact is that both groups have seen to it that an increasing number of regular Americans whose concerns had been ignored in the political arena now have to be reckoned with. But this is by no means where their commonality ends. Above and beyond the fact that both are comprised of millions who had been political outsiders, each has a decided anti-establishmentarian strain, along with a professed sense of alienation from and disdain for "politics as usual" and an impassioned belief in the right to self-government (though they differ on what this right amounts to). Moreover, both consider themselves grassroots-driven, and harbor anathema for professional lobbying organisations, which both regularly criticize for their undue political influence. Even though the two groups usually differ to the nth degree when it comes to those solutions they believe would effectively remedy the most pressing public problems in the U.S., they nonetheless share the conviction that one must initially focus one’s efforts at the local level if one is eventually to have the greatest impact on political decision-making on a national scale. The two groups came of age during the Internet revolution – indeed, it would have been impossible for their like-minded members to have found one another and coalesced so quickly and in such great numbers without the Internet – and they utilise the Internet as the principal tool for spurring concerted activism at the local level among their members. One can consider their shared approach Deweyan, in that Dewey maintained that genuinely democratic community, “in its deepest and richest sense, must always remain a matter of face-to-face intercourse” (367). Yet the two groups’ legion differences prevent them from engaging in meaningful face-to-face exchanges with one another. While the prospect of cultivating linkages between Tea Party and MoveOn.org are remote for the foreseeable future, it might nonetheless be seen as a promising development that some rank and file Tea Party acolytes do at least recognise that they must not identify solely with the Republican Party, lest they discourage potential recruits from rallying around their cause. For instance, one warns fellow members on the Redstate.com blog to be wary of casting their lot with Republicans, “because it would drive away the Democrats and Independents”. He actually uses Galbraith’s coinage in describing the Tea Party: “This movement is a coalition of the concerned, not a Republican outreach program.” Indeed, contrary to popular belief, the Tea Party is not, as a whole, on the conservative fringe (though it does often seem that those members who are given the most attention by the mainstream media are the fringe element, particularly the breakaway Tea Party Express). A Gallup Poll reveals that fully 17 percent of all Americans of voting age identify themselves as affiliated with the Tea Party; and while a majority have Republican leanings, fully 45 percent of all Tea Party members claimed they were either Democrats (17 percent) or independents (28 percent). To Tea Party leader Erick Erickson, the paramount challenge today for the Tea Party is for it to transform itself into a greater umbrella coalition, since the “issues and advocacy within the tea party movement are issues that resonate with the majority of Americans.” After all, he asserts, the Tea Party’s is “a very American cause — the first amendment right to protest, petition, and speak up.” While an expansion of its coalition does not in any way make it incumbent for the Tea Party to find common cause with MoveOn.org, can the claim nonetheless be legitimately made – utilising Erickson’s own criteria – that MoveOn.org’s is equally a very American cause? Christopher Hayes points out in an essay in The Nation that most of MoveOn.org’s members, as with the Tea Party’s, are “not inclined to protest,” but their “rising unease with the direction of the country has led to a new political consciousness.” Hayes could just as well be speaking of the Tea Party when he describes MoveOn.org’s members as made up mostly of “citizens angered, upset and disappointed with their government but [who were] unsure how to channel those sentiments.” For such citizens, MoveOn.org “provides simple, discrete actions: sign this petition, donate money to run this ad, show up at this vigil.” This is convincing evidence that MoveOn.org’s is also “a very American cause”, by the very benchmarks set forth by Erickson. A ‘Higher Coalition’?But is this in any way akin to a demonstrable sign that these unlikeliest of political bedfellows might be inspired at some future point to see themselves as part of a ‘higher coalition’ — one of the unlikeminded, that celebrates difference? Might a critical mass in both movements ever deem it a boon to coalesce around the cause of democratic pluralism? As things stand, neither side embraces such pluralism. Rather, one other attribute they share pervasively is dogmatism: both are convinced that their respective political sensibilities are beyond reproach. As a consequence, over the shorter term, neither group is likely to shed its brand of dogmatism and supplant it with an openness or receptivity to new, much less opposing, points of view. So, for instance, even as the Tea Party seeks to expand its fold, it is no more inclined to change its ideology-based stances on the issues than is MoveOn.org. For the time being, each group not only is entrenched in its own collective political mindset, but each coalesces around a demonstrated antipathy towards alternative approaches to public problem-solving. Is there any remotely plausible scenario by which the members of MoveOn.org and Tea Party might eventually come not just to tolerate their differences but to extol them? One other key Galbraithian element that those comprising an ideal coalition in a democracy must possess is compassion. For members of any coalition to cultivate compassion, they must first, or concomitantly, inculcate empathy, which is typically considered either a precursor to compassion or, along with understanding, a vital component of it. Henning Melber, Executive Director of the Dag Hammarskjold Foundation, and Reinhard Kössler maintain that “(w)hile empathy does not automatically translate into solidarity (nor into ethical behaviour), it can serve as a compass” for doing so, and can lead to a Galbraithian “coalition of the concerned and aware”(37). Such empathy is “a prerequisite for the ability to listen to one another and for permissiveness and openness towards ‘otherness’, and further, can only be born out of a sense of shared suffering” (37). To the authors, it isn’t just that “(s)uffering in its variety of forms requires empathy and solidarity by all,” but that it necessarily “transcends a politically correct ideology” (37). Millions in both the Tea Party and MoveOn.org long suffered from being a mere afterthought to the political establishment, both of them impacted by policies that they are convinced exacerbated rather than ameliorated their woes. But they have shown few if any indications of a willingness to transcend a politically correct ideology. For this to come about, it would, as Melber and Kössler maintain, require “hard, sustained, and imaginative work” (33). How might this come to pass? Greg Anderson, in The Athenian Experiment: Building an Imagined Political Community in Ancient Attica, 508-490 B.C., points to ancient Athens as a paradigmatic example of a society that undertook the hard imaginative work needed to develop the types of mediated connections that over time created a sense of shared belonging to a democratic community. “The process of transformation” in Attica, he argues, is “best understood as a bold exercise in social engineering, an experiment designed to bring together the diverse and far-flung inhabitants of an entire region and forge them into a single, self-governing political community of like-minded individuals” (5). While those males of sufficient socioeconomic distinction who were privileged enough to be citizens in the West’s first experiment in democracy were indeed like-minded, prising a self-governing political community, they were not single-minded; rather, those in the twelve dispersed tribes throughout Attica who coalesced to form a self-governing community apparently thrived on the free exchange and consideration of a wide range of ideas. They held that greater insights emerged only when a variety of views were subjected to scrutiny in the public sphere. Paul Woodruff notes in First Democracy that each Athenian was “given a share of the ability to be citizens, and that ability is understood both as a pair of virtues and as a kind of citizen wisdom.” Governing in this way was based on the shared view that “it is a natural part of being human to know enough to help govern your community” (149). Neither Tea Party nor MoveOn.org followers at present have this shared view on any semblance of a broad scale; rather, each betrays the sensibility that each ‘knows better’. As a consequence, any efforts at expanding their respective folds clearly do not include making overtures (or even extending olive branches) to one another. Even so, as impossibly optimistic as it might seem under current circumstances, I believe eventually they might come to see themselves as part of a greater or higher coalition – one serving the overriding cause of democracy itself – over the much longer term. But for this to become a reality, each group will first have to suffer some more. One other commonality they demonstrate is the power of grassroots activism – and the decided limitations. My hunch is that just as MoveOn.org’s progressives came to feel betrayed when Obama abandoned the liberal agenda of his presidential campaign to engage in political compromise and accommodation, Tea Party activists will come to find that their own expectations for political change will be equally stymied. In the 2010 elections, the Tea Party was a kingmaker in electoral politics, giving Republicans a decisive majority in Congress in the 2010 elections. But I suspect that those candidates the Tea Party supported will eventually resort to the practice of “politics as usual,” largely departing from the Tea Party agenda, in order to accomplish anything in Washington or become irrelevant in the existing system – a system long dominated by two political parties interested above and beyond all else in perpetuating their shared stranglehold on political power, and each equally beholden to corporate America for the contributions to their coffers that enable them to sustain this. If this scenario plays out, then at least some Tea Party activists might plausibly arrive at the unsettling conclusion that their suffering in the political arena is remarkably similar to that experienced by MoveOn.org’s cadre of concerned citizens who catapulted Obama into the office in the land, only to have most of their principal concerns neglected or dismissed, lost in the seamy world of back-room political deal-making. There is another possible scenario: What if either MoveOn.org or Tea Party becomes such an overwhelming force in politics that the other is attenuated, its members relegated once again to the fringe? If this occurred, the public sphere in the United States would be missing a vital dimension that has been part of its makeup since its founding days. For as Joseph Ellis, the Pulitzer Prize-winning historian, points out: the achievement of the revolutionary generation was a collective enterprise that succeeded because of the diversity of personalities and ideologies present in the mix. Their interactions and juxtapositions generated a dynamic form of balance and equilibrium, not because any of them was perfect or infallible, but because their mutual imperfections and fallibilities, as well as their eccentricities and excesses, checked each other… . (17) At the United States’s beginnings, the ties that bound those who revolted against Britain were forged despite their unbridgeable chasms of ideology; their “differing postures toward the twin goals of freedom and equality” were “not resolved so much as built into the fabric of our national identity” (16). Even or especially as irreconcilable differences prompted early Americans to continue waging a battle of ideas in the political trenches, Thomas Jefferson, for one, believed they were all (or nearly all) “constitutionally and conscientiously democrats” (185). Extrapolating from this, one can posit that MoveOn.org and Tea Party, regardless of whether they choose to acknowledge it, are in tandem a modern-day manifestation of the original American coalition. If they could be inspired to see that each is an important player in furthering the democratic experiment as singularly practiced in the U.S., they just might come to care more for one another. Out of such caring, they might realise that neither has a monopoly on political wisdom, and as a result coalesce around the cause of promoting a less hostile body politic. AcknowledgementsThe author is grateful to the two blind peer reviewers for their most helpful suggestions. ReferencesAnderson, Greg. The Athenian Experiment: Building an Imagined Political Community in Ancient Attica, 508-490 B.C. Ann Arbor, MI: University of Michigan Press, 2003. Dewey, John. In J. Boydston (Ed.) John Dewey, Volume 2: 1925-1927. Carbondale, Illinois: Southern Illinois University, 1984. Ellis, Joseph. Founding Brothers: The Revolutionary Generation. New York, NY: Vintage. 2002. Erickson, Erick. “Tea Party Movement 2.0: Moving beyond Protesting to Fighting in Primaries, Ballot Boxes, and Becoming More Effective Activists.” 14 April 2010. 28 Sep. 2010 ‹http://www.redstate.com/erick/2010/04/14/tea-party-movement-20/>.Galbraith, John Kenneth. The Good Society: The Humane Agenda. New York: Mariner Books, 1997. Green, Lelia. The Internet: An Introduction to New Media. Oxford: Berg, 2010.Hayes, Christopher. “MoveOn.org Is Not as Radical as Conservatives Think." The Nation. 16 July 2008. 28 Sep. 2010 ‹http://www.thenation.com/article/moveonorg-not-radical-conservatives-think>. Janofsky, Michael, Jennifer B. Lee. “Net Group Tries to Click Democrats to Power”. New York Times, 18 Nov 2003. 1 Oct. 2010 ‹http://www.nytimes.com/2003/11/18/us/net-group-tries-to-click- democrats-to-power.html?scp=1&sq=%22bottom-up%20organization%22&st=cse>. Jefferson, Thomas. In M. Peterson, ed. The Political Writings of Thomas Jefferson. Chapel Hill, NC: University of North Carolina Press, 1993. Kossler, Reinhart, and Hening Melber. “International Civil Society and the Challenge for Global Solidarity.” Development Dialogue 49 (Oct. 2007): 29-39. Malcolm, Andrew. “Myth-Busting Polls: Tea Party Members Are Average Americans, 41% Are Democrats, Independents.” Los Angeles Times, 5 April 2010 ‹http://latimesblogs.latimes.com/washington/2010/04/tea-party-obama.html>.MoveOn.org. n.d. 27 Sep. 2010 ‹http://moveon.org>. Tea Party. n.d. 1 Oct. 2010 ‹http://teaparty.freedomworks.org>.Tea Party Express. n.d. 1 Oct. 2010 ‹http://www.teapartyexpress.org>. Woodruff, Paul. First Democracy: The Challenge of an Ancient Idea. New York: Oxford University Press, 2006. Zernike, Kate. “With No Jobs, Plenty of Time for Tea Party.” New York Times, 27 Mar. 2010. 29 Sep. 2010 ‹http://www.nytimes.com/2010/03/28/us/politics/28teaparty.html?scp=1&sq=%22watched%20their%20homes%20plummet%20in%20value%22&st=cse>.
APA, Harvard, Vancouver, ISO, and other styles
49

Charman, Suw, and Michael Holloway. "Copyright in a Collaborative Age." M/C Journal 9, no. 2 (May 1, 2006). http://dx.doi.org/10.5204/mcj.2598.

Full text
Abstract:
The Internet has connected people and cultures in a way that, just ten years ago, was unimaginable. Because of the net, materials once scarce are now ubiquitous. Indeed, never before in human history have so many people had so much access to such a wide variety of cultural material, yet far from heralding a new cultural nirvana, we are facing a creative lock-down. Over the last hundred years, copyright term has been extended time and again by a creative industry eager to hold on to the exclusive rights to its most lucrative materials. Previously, these rights guaranteed a steady income because the industry controlled supply and, in many cases, manufactured demand. But now culture has moved from being physical artefacts that can be sold or performances that can be experienced to being collections of 1s and 0s that can be easily copied and exchanged. People are revelling in the opportunity to acquire and experience music, movies, TV, books, photos, essays and other materials that they would otherwise have missed out on; and they picking up the creative ball and running with it, making their own version, remixes, mash-ups and derivative works. More importantly than that, people are producing and sharing their own cultural resources, publishing their own original photos, movies, music, writing. You name it, somewhere someone is making it, just for the love of it. Whilst the creative industries are using copyright law in every way they can to prosecute, shut down, and scare people away from even legitimate uses of cultural materials, the law itself is becoming increasingly inadequate. It can no longer deal with society’s demands and expectations, nor can it cope with modern forms of collaboration facilitated by technologies that the law makers could never have anticipated. Understanding Copyright Copyright is a complex area of law and even a seemingly simple task like determining whether a work is in or out of copyright can be a difficult calculation, as illustrated by flowcharts from Tim Padfield of the National Archives examining the British system, and Bromberg & Sunstein LLP which covers American works. Despite the complexity, understanding copyright is essential in our burgeoning knowledge economies. It is becoming increasingly clear that sharing knowledge, skills and expertise is of great importance not just within companies but also within communities and for individuals. There are many tools available today that allow people to work, synchronously or asynchronously, on creative endeavours via the Web, including: ccMixter, a community music site that helps people find material to remix; YouTube, which hosts movies; and JumpCut:, which allows people to share and remix their movies. These tools are being developed because of the increasing number of cultural movements toward the appropriation and reuse of culture that are encouraging people to get involved. These movements vary in their constituencies and foci, and include the student movement FreeCulture.org, the Free Software Foundation, the UK-based Remix Commons. Even big business has acknowledged the importance of cultural exchange and development, with Apple using the tagline ‘Rip. Mix. Burn.’ for its controversial 2001 advertising campaign. But creators—the writers, musicians, film-makers and remixers—frequently lose themselves in the maze of copyright legislation, a maze complicated by the international aspect of modern collaboration. Understanding of copyright law is at such a low ebb because current legislation is too complex and, in parts, out of step with modern technology and expectations. Creators have neither the time nor the motivation to learn more—they tend to ignore potential issues and continue labouring under any misapprehensions they have acquired along the way. The authors believe that there is an urgent need for review, modernisation and simplification of intellectual property laws. Indeed, in the UK, intellectual property is currently being examined by a Treasury-level review lead by Andrew Gowers. The Gowers Review is, at the time of writing, accepting submissions from interested parties and is due to report in the Autumn of 2006. Internationally, however, the situation is likely to remain difficult, so creators must grasp the nettle, educate themselves about copyright, and ensure that they understand the legal ramifications of collaboration, publication and reuse. What Is Collaboration? Wikipedia, a free online encyclopaedia created and maintained by unpaid volunteers, defines collaboration as “all processes wherein people work together—applying both to the work of individuals as well as larger collectives and societies” (Wikipedia, “Collaboration”). These varied practices are some of our most common and basic tendencies and apply in almost every sphere of human behaviour; working together with others might be described as an instinctive, pragmatic or social urge. We know we are collaborating when we work in teams with colleagues or brainstorm an idea with a friend, but there are many less familiar examples of collaboration, such as taking part in a Mexican wave or standing in a queue. In creative works, the law expects collaborators to obtain permission to reuse work created by others before they embark upon that reuse. Yet this distinction between ‘my’ work and ‘your’ work is entirely a legal and social construct, as opposed to an absolute fact of human nature, and new technologies are blurring the boundaries between what is ‘mine’ and what is ‘yours’ whilst new cultural movements posit a third position, ‘ours’. Yochai Benkler coined the term ‘commons-based peer production’ (Benkler, Coase’s Penguin; The Wealth of Nations) to describe collaborative efforts, such as free and open-source software or projects such as Wikipedia itself, which are based on sharing information. Benkler posits this particular example of collaboration as an alternative model for economic development, in contrast to the ‘firm’ and the ‘market’. Benkler’s notion sits uncomfortably with the individualistic precepts of originality which dominate IP policy, but with examples of commons-based peer production on the increase, it cannot be ignored when considering how new technologies and ways of working interact with existing and future copyright legislation. The Development of Collaboration When we think of collaboration we frequently imagine academics working together on a research paper, or musicians jamming together to write a new song. In academia, researchers working on a project are expected to write papers for publication in journals on a regular basis. The motto ‘publish or die’ is well known to anyone who has worked in academic circle—publishing papers is the lifeblood of the academic career, forming the basis of a researcher’s status within the academic community and providing data and theses for other researchers to test and build upon. In these circumstances, copyright is often assigned by the authors to a journal and, because there is no direct commercial outcome for the authors, conflicts regarding copyright tend to be restricted to issues such as reuse and reproduction. Within the creative industries, however, the focus of the collaboration is to derive commercial benefit from the work, so copyright issues, such as division of fees and royalties, plagiarism, and rights for reuse are much more profitable and hence they are more vigorously pursued. All of these issues are commonly discussed, documented and well understood. Less well understood is the interaction between copyright and the types of collaboration that the Internet has facilitated over the last decade. Copyright and Wikis Ten years ago, Ward Cunningham invented the ‘wiki’—a Web page which could be edited in situ by anyone with a browser. A wiki allows multiple users to read and edit the same page and, in many cases, those users are either anonymous or identified only by a nickname. The most famous example of a wiki is Wikipedia, which was started by Jimmy Wales in 2001 and now has over a million articles and over 1.2 million registered users (Wikipedia, “Wikipedia Statistics”). The culture of online wiki collaboration is a gestalt—the whole is greater than the sum of the parts and the collaborators see the overall success of the project as more important than their contribution to it. The majority of wiki software records every single edit to every page, creating a perfect audit trail of who changed which page and when. Because copyright is granted for the expression of an idea, in theory, this comprehensive edit history would allow users to assert copyright over their contributions, but in practice it is not possible to delineate clearly between different people’s contributions and, even if it was possible, it would simply create a thicket of rights which could never be untangled. In most cases, wiki users do not wish to assert copyright and are not interested in financial gain, but when wikis are set up to provide a source of information for reuse, copyright licensing becomes an issue. In the UK, it is not possible to dedicate a piece of work to the public domain, nor can you waive your copyright in a work. When a copyright holder wishes to licence their work, they can only assign that licence to another person or a legal entity such as a company. This is because in the UK, the public domain is formed of the ‘leftovers’ of intellectual property—works for which copyright has expired or those aspects of creative works which do not qualify for protection. It cannot be formally added to, although it certainly can be reduced by, for example, extension of copyright term which removes work from the public domain by re-copyrighting previously unprotected material. So the question becomes, to whom does the content of a wiki belong? At this point traditional copyright doctrines are of little use. The concept of individuals owning their original contribution falls down when contributions become so entangled that it’s impossible to split one person’s work from another. In a corporate context, individuals have often signed an employment contract in which they assign copyright in all their work to their employer, so all material created individually or through collaboration is owned by the company. But in the public sphere, there is no employer, there is no single entity to own the copyright (the group of contributors not being in itself a legal entity), and therefore no single entity to give permission to those who wish to reuse the content. One possible answer would be if all contributors assigned their copyright to an individual, such as the owner of the wiki, who could then grant permission for reuse. But online communities are fluid, with people joining and leaving as the mood takes them, and concepts of ownership are not as straightforward as in the offline world. Instead, authors who wished to achieve the equivalent of assigning rights to the public domain would have to publish a free licence to ‘the world’ granting permission to do any act otherwise restricted by copyright in the work. Drafting such a licence so that it is legally binding is, however, beyond the skills of most and could be done effectively only by an expert in copyright. The majority of creative people, however, do not have the budget to hire a copyright lawyer, and pro bono resources are few and far between. Copyright and Blogs Blogs are a clearer-cut case. Blog posts are usually written by one person, even if the blog that they are contributing to has multiple authors. Copyright therefore resides clearly with the author. Even if the blog has a copyright notice at the bottom—© A.N. Other Entity—unless there has been an explicit or implied agreement to transfer rights from the writer to the blog owner, copyright resides with the originator. Simply putting a copyright notice on a blog does not constitute such an agreement. Equally, copyright in blog comments resides with the commenter, not the site owner. This reflects the state of copyright with personal letters—the copyright in a letter resides with the letter writer, not the recipient, and owning letters does not constitute a right to publish them. Obviously, by clicking the ‘submit’ button, commenters have decided themselves to publish, but it should be remembered that that action does not transfer copyright to the blog owner without specific agreement from the commenter. Copyright and Musical Collaboration Musical collaboration is generally accepted by legal systems, at least in terms of recording (duets, groups and orchestras) and writing (partnerships). The practice of sampling—taking a snippet of a recording for use in a new work—has, however, changed the nature of collaboration, shaking up the recording industry and causing a legal furore. Musicians have been borrowing directly from each other since time immemorial and the student of classical music can point to many examples of composers ‘quoting’ each other’s melodies in their own work. Folk musicians too have been borrowing words and music from each other for centuries. But sampling in its modern form goes back to the musique concrète movement of the 1940s, when musicians used portions of other recordings in their own new compositions. The practice developed through the 50s and 60s, with The Beatles’ “Revolution 9” (from The White Album) drawing heavily from samples of orchestral and other recordings along with speech incorporated live from a radio playing in the studio at the time. Contemporary examples of sampling are too common to pick highlights, but Paul D. Miller, a.k.a. DJ Spooky ‘that Subliminal Kid’, has written an analysis of what he calls ‘Rhythm Science’ which examines the phenomenon. To begin with, sampling was ignored as it was rare and commercially insignificant. But once rap artists started to make significant amounts of money using samples, legal action was taken by originators claiming copyright infringement. Notable cases of illegal sampling were “Pump Up the Volume” by M/A/R/R/S in 1987 and Vanilla Ice’s use of Queen/David Bowie’s “Under Pressure” in the early 90s. Where once artists would use a sample and sort out the legal mess afterwards, such high-profile litigation has forced artists to secure permission for (or ‘clear’) their samples before use, and record companies will now refuse to release any song with uncleared samples. As software and technology progress further, so sampling progresses along with it. Indeed, sampling has now spawned mash-ups, where two or more songs are combined to create a musical hybrid. Instead of using just a portion of a song in a new composition which may be predominantly original, mash-ups often use no original material and rely instead upon mixing together tracks creatively, often juxtaposing musical styles or lyrics in a humorous manner. One of the most illuminating examples of a mash-up is DJ Food Raiding the 20th Century which itself gives a history of sampling and mash-ups using samples from over 160 sources, including other mash-ups. Mash-ups are almost always illegal, and this illegality drives mash-up artists underground. Yet, despite the fact that good mash-ups can spread like wildfire on the Internet, bringing new interest to old and jaded tracks and, potentially, new income to artists whose work had been forgotten, this form of musical expression is aggressively demonised upon by the industry. Given the opportunity, the industry will instead prosecute for infringement. But clearing rights is a complex and expensive procedure well beyond the reach of the average mash-up artist. First, you must identify the owner of the sound recording, a task easier said than done. The name of the rights holder may not be included in the original recording’s packaging, and as rights regularly change hands when an artist’s contract expires or when a record label is sold, any indication as to the rights holder’s identity may be out of date. Online musical databases such as AllMusic can be of some use, but in the case of older or obscure recordings, it may not be possible to locate the rights holder at all. Works where there is no identifiable rights holder are called ‘orphaned works’, and the longer the term of copyright, the more works are orphaned. Once you know who the rights holder is, you can negotiate terms for your proposed usage. Standard fees are extremely high, especially in the US, and typically discourage use. This convoluted legal culture is an anachronism in desperate need of reform: sampling has produced some of the most culturally interesting and financially valuable recordings of the past thirty years, so should be supported rather than marginalised. Unless the legal culture develops an acceptance for these practices, the associated financial and cultural benefits for society will not be realised. The irony is that there is already a successful model for simplifying licensing. If a musician wishes to record a cover version of a song, then royalty terms are set by law and there is no need to seek permission. In this case, the lawmakers have recognised the social and cultural benefit of cover versions and created a workable solution to the permissions problem. There is no logical reason why a similar system could not be put in place for sampling. Alternatives to Traditional Copyright Copyright, in its default structure, is a disabling force. It says that you may not do anything with my work without my permission and forces creators wishing to make a derivative work to contact me in order to obtain that permission in writing. This ‘permissions society’ has become the norm, but it is clear that it is not beneficial to society to hide away so much of our culture behind copyright, far beyond the reach of the individual creator. Fortunately there are fast-growing alternatives which simplify whilst encouraging creativity. Creative Commons is a global movement started by academic lawyers in the US who thought to write a set of more flexible copyright licences for creative works. These licenses enable creators to precisely tailor restrictions imposed on subsequent users of their work, prompting the tag-line ‘some rights reserved’ Creators decide if they will allow redistribution, commercial or non-commercial re-use, or require attribution, and can combine these permissions in whichever way they see fit. They may also choose to authorise others to sample their works. Built upon the foundation of copyright law, Creative Commons licences now apply to some 53 million works world-wide (Doctorow), and operate in over 60 jurisdictions. Their success is testament to the fact that collaboration and sharing is a fundamental part of human nature, and treating cultural output as property to be locked away goes against the grain for many people. Creative Commons are now also helping scientists to share not just the results of their research, but also data and samples so that others can easily replicate experiments and verify or refute results. They have thus created Science Commons in an attempt to free up data and resources from unnecessary private control. Scientists have been sharing their work via personal Web pages and other Websites for many years, and additional tools which allow them to benefit from network effects are to be welcomed. Another example of functioning alternative practices is the Remix Commons, a grassroots network spreading across the UK that facilitates artistic collaboration. Their Website is a forum for exchange of cultural materials, providing a space for creators to both locate and present work for possible remixing. Any artistic practice which can reasonably be rendered online is welcomed in their broad church. The network’s rapid expansion is in part attributable to its developers’ understanding of the need for tangible, practicable examples of a social movement, as embodied by their ‘free culture’ workshops. Collaboration, Copyright and the Future There has never been a better time to collaborate. The Internet is providing us with ways to work together that were unimaginable even just a decade ago, and high broadband penetration means that exchanging large amounts of data is not only feasible, but also getting easier and easier. It is possible now to work with other artists, writers and scientists around the world without ever physically meeting. The idea that the Internet may one day contain the sum of human knowledge is to underestimate its potential. The Internet is not just a repository, it is a mechanism for new discoveries, for expanding our knowledge, and for making links between people that would previously have been impossible. Copyright law has, in general, failed to keep up with the amazing progress shown by technology and human ingenuity. It is time that the lawmakers learnt how to collaborate with the collaborators in order to bring copyright up to date. References Apple. “Rip. Mix. Burn.” Advertisement. 28 April 2006 http://www.theapplecollection.com/Collection/AppleMovies/mov/concert_144a.html>. Benkler, Yochai. Coase’s Penguin. Yale Law School, 1 Dec. 2002. 14 April 2006 http://www.benkler.org/CoasesPenguin.html>. ———. The Wealth of Nations. New Haven: Yape UP, 2006. Bromberg & Sunstein LLP. Flowchart for Determining when US Copyrights in Fixed Works Expire. 14 Apr. 2006 http://www.bromsun.com/practices/copyright-portfolio-development/flowchart.htm>. DJ Food. Raiding the 20th Century. 14 April 2006 http://www.ubu.com/sound/dj_food.html>. Doctorow, Cory. “Yahoo Finds 53 Million Creative Commons Licensed Works Online.” BoingBoing 5 Oct. 2005. 14 April 2006 http://www.boingboing.net/2005/10/05/yahoo_finds_53_milli.html>. Miller, Paul D. Rhythm Science. Cambridge, Mass.: MIT Press, 2004. Padfield, Tim. “Duration of Copyright.” The National Archives. 14 Apr. 2006 http://www.kingston.ac.uk/library/copyright/documents/DurationofCopyright FlowchartbyTimPadfieldofTheNationalArchives_002.pdf>. Wikipedia. “Collaboration.” 14 April 2006 http://en.wikipedia.org/wiki/Collaboration>. ———. “Wikipedia Statistics.” 14 April 2006 http://en.wikipedia.org/wiki/Special:Statistics>. Citation reference for this article MLA Style Charman, Suw, and Michael Holloway. "Copyright in a Collaborative Age." M/C Journal 9.2 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0605/02-charmanholloway.php>. APA Style Charman, S., and M. Holloway. (May 2006) "Copyright in a Collaborative Age," M/C Journal, 9(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0605/02-charmanholloway.php>.
APA, Harvard, Vancouver, ISO, and other styles
50

Wegner, Juliane, and Julia Stüwe. "Young Cancer on Instagram." M/C Journal 23, no. 6 (November 28, 2020). http://dx.doi.org/10.5204/mcj.2724.

Full text
Abstract:
Introduction Although our postmodern (media) society should provide room for diversity and otherness (Greer and Jewkes), some people are not integrated but rather excluded. Social exclusion can be defined as the discrepancy of the wish of being part of a society and its possibilities to be part of it and contains feelings or experiences of physically or emotionally exclusion from others (Burchardt et al.; Riva and Eck). It is not really known what or who is responsible for social exclusion (Hills et al.), but it is certain that it is not that rare phenomenon — especially in social media. Here, digital engagement characteristics (likes, follows, shares, and comments) are important to build up, renew, and strengthen different forms of relationships. But if users do not receive any feedback, the risk of feeling social excluded increases. In this context, adolescents and young adults as the primary audience are the focus of interest. They seem to be especially vulnerable when it comes to social ostracism within social media and its potential negative psychological effects (Timeo et al.). The variety of social exclusion allows multiple perspectives on the topic. Hereafter we focus on young people with cancer. This life-threatening disease can increase the risk of being excluded. Cancer as a chronic illness and its negative effects on people’s lives, such as potential death, long-term and late effects, private and social burdens (Hilgendorf et al.), show an obvious otherness compared to the healthy peer, which might push ostracism effects and social exclusion of young people within social media to a new level. We actually can see a large number of (included) young cancer patients and survivors using social media for information sharing, exchanging ideas, networking, and addressing their unmet needs of the real world (Chou et al.; Chou and Moskowitz; Ruckenstuhl et al.; Perales et al.). Especially Instagram is becoming more present in social cancer communication (Stage et al.), though it actually increasingly represents cheerful, easy-going content (Hu et al.; Waterloo et al.). Judging by the number of cancer-related hashtags, we can see more and more public cancer bloggers thematise cancer illness on Instagram. But less is known about the actual content posted by cancer bloggers on Instagram. This leads us to the question, to what extent is cancer content found and included or excluded on public Instagram profiles of German speaking cancer bloggers? And is there a difference between biography descriptions with visible cancer references and posted motifs, captions and hashtags? Chronic Illnesses, Identities, and Social Networks Chronic illnesses such as cancer not only affect the body, but also impact on the identity of those affected. It is understood as life-changing with both short-term and long-term effects on the identity-forming process and on the already developed identity (Bury; Charmaz; Leventhal et al.). With their diagnosis, adolescents and young adults face a double challenge: they have to cope with the typical developmental changes of this age group and they have to negotiate these changes against the background of a life-threatening illness (Makros and McCabe; Zebrack and Isaacso). Miller shows three levels of identity for young cancer patients (pre-cancer identity, patient identity, and post-cancer identity), which are used regularly and flexibly by those affected in their interaction with the social network in order to maintain relationships and to minimise communicative misunderstandings. Moreover, the negotiation of the self within the social network and its expectations, especially towards convalescent people, can lead to paradoxical situations and identities of young people with cancer (Jones et al.). Although therapeutic measures are completed and patients may be discharged as cured, physical, cognitive, and emotional challenges with regard to the illness (e.g. fatigue, loss of performance, difficulty concentrating) still have to be overcome. These challenges, despite recovery, cause those affected to feel they still belong to a cancer group which they have actually largely outgrown medically and therapeutically, and also continually remind them of their present difference from the healthy peer group. To minimise these differences, narratives are the means for those affected to negotiate their new illness-related identity with their network (Hyde). These processes can be digitally transformed on blogs or to age-appropriate social network sites (SNS), which enable users to record and communicate experiences and emotions in an uncomplicated, situational manner and with fewer inhibitions (Kim and Gilham). Cancer contents on SNS are called autopathography and can serve as a means of self-expression, whilst at the same time stimulating communication and networking and thus significantly influencing identity and identity development in the chronic disease process (Rettberg; Ressler et al.; Abrol et al.; Stage). The possibility of recording and archiving private moments in a digital environment through photos and texts creates a visual diary. Here, illness recordings are not just motifs, but also part of an identity process by accepting the self as being ill (Nesby and Salamonsen; Tembeck). Instagram-Exclusive Positivity Instagram is the most popular social media network amongst 14-29 year olds in Germany (Beisch et al.). It presents itself as a highly visual structured platform. Furthermore, both posts and stories are dominated by content with innocuous motifs (Hu et al.). Additionally, the visual culture on Instagram is supported by integrated image optimisations such as filters and therefore often associated with high aesthetic standards (Waterloo et al.). This encourages the exchange of idealised self-presenting and self-advertising content (Lee et al.; Lup et al.; Sheldon and Bryant). The positive tone of the shared motifs and captions can also be explained by larger, sometimes anonymous networks on Instagram. The principle of non-reciprocal following of public accounts increasingly creates weak ties, which can additionally encourage the sharing of positively connoted content due to the anonymity (Lin et al.; Waterloo et al.). The posting of negative moods or image motifs to anonymous followers does not seem to be socially standardised, due to the associated intimate thoughts and feelings (Bazarova). In addition, users are aware of the public framework in which they address intimate topics and discourses (Bazarova and Choi). Internal platform standards and technical possibilities thus create a particular posting culture: an environment that is—due to its strong visual-aesthetic structure and anonymous follower-based networks—almost exclusively positive. However, these assumptions and findings are based on a general posting culture, which is usually not focussed on niche topics like cancer. Previous studies show that SNS are used for exchange and networking, especially by young cancer patients (Chou and Moskowitz; Perales et al.). Studies from online SNS disease-related self-help groups show that weak ties in illness situations are considered beneficial when it comes to self-disclosure, seeking help, and support (Wright et al.; Love et al.; Donovan et al.). In addition, Instagram is part of the so-called “vital media” (Stage et al.), which means it is very important for young cancer patients to share cancer-related material. But despite these research findings less is known about the content shared by German-speaking bloggers who have visible cancer references in their Instagram biography. Do they include a serious, even life-threatening illness on a platform that actually stands for positivity, or do they follow the invisible platform regulations in their posted content and statements and exclude it by themselves? The specific objectives of this explorative study were (a) to obtain a descriptive analysis of the manner in which cancer bloggers post content on Instagram, and (b) to determine the extent to which most applied practices exclude the posting of certain negatively connoted motives and emotions associated with cancer. Methodology For the study, 142 German-speaking cancer bloggers (14–39 years of age) with public accounts and visible cancer references in their biography were researched on Instagram. The sample was divided into posts (7,553) and stories (4,117). The content was examined using a standardised content analysis and a code book with relevant categories (motifs, body presences, emotions, captions, emojis; ICR Cronbach’s alpha = 0.85). Measured by the value of the content posted, the story users, at 23 years of age, were comparatively much younger than the post users, at 30 years of age. The sample was predominantly female in both posts (81%) and stories (99%). The most common form of cancer was breast cancer (posts: 28%; stories: 29%), followed by brain tumors (posts: 19%; stories: 16%) and leukaemia (posts: 4%; stories: 19%). Most content was shared by people who were actively involved in treatment – 46% of posts and 54% of stories. Completed treatments were more common in posts (39%) than in stories (19%). At the time of data collection, the Instagram entries were explicitly open to the public, and no registration was required. The content, not the individual, was analysed to minimise the risk for the bloggers and to prevent them from violations of privacy and autonomy by third parties. Furthermore, the entries were assigned unidentifiable numbers to ensure that no tracing is possible (Franzke et al.). Results The sample consists of public cancer blogger accounts who document everyday experiences for their network in images and videos. The following results are shown for posts (P) and stories (S). Motifs and Bodies Looking at the evaluation of the image motifs, the selfie predominates both in posts, with 20.7 per cent, and stories, with 32.8 per cent. Other popular photo motifs are pictures of food (P: 10.2%; S: 11.0%), activities (P: 7.2%; S: 7.7%), landscapes (P: 6.3%; S: 7.1%), and of/with family and friends (P: 12.5%; S: 6.0%). Photos in medical or clinical settings are rare, with one per cent in the posts and three per cent in the stories. Looking at the bodies and faces displayed, a comparatively normal to positive image of the bloggers that were studied can be observed. Most of the people in the posts present themselves with hair (81.3%), wear make-up (53.3%) and smile at the camera (64.1%). A similar trend can also be seen in the stories. Here 63.8 per cent present themselves with hair, 62.7 per cent with make-up and 55.3 per cent with happy facial expressions. In contrast, scars (P: 1.6%; S: 4.4%) or amputations (P: 0.2%; S: 0.1%) are hardly ever shown. Thus, possible therapy-accompanying symptoms, such as alopecia, ports for chemotherapy, or amputations (e.g. mastectomy in the case of breast cancer) are rarely or hardly ever made visible by cancer bloggers. Captions, Hashtags, and Emojis Similar to the motifs, everyday themes dominate in the captions of the images, such as the description of activities (P: 23.2%; S: 18.0%), food (P: 8.2%; S: 9.3%), or beauty/fashion (P: 6.2%; S: 10.2%). However, information on the current health status of the person affected can be found under every tenth photo, both in the stories and in the posts. Hashtags are mainly found amongst the posts with 81.5 per cent. In keeping with the caption, normal themes were also chosen here, divided into the categories of activities (17.7%), beauty/fashion (7.6%), food (5.8%), and family/friends (4.8%). Illness-specific hashtags (e.g. #cancer, #survivor, or #chemo) were chosen in 15.6 per cent. In addition, the cancer bloggers in this study used emojis in 74 per cent of their posts. In the stories, however, only 28.2 per cent of the content was tagged with emojis. The most common category is smileys & people (P: 46.8%; S: 52.8%), followed by symbols (e.g. hearts, ribbons) (P: 21.1%; S: 26.5%), and animals & nature (P: 17.0%; S: 14.2%). Emotions In captions, hashtags and emojis, emotions were divided into positive (e.g. joy, fighting spirit), neutral (e.g. simple narration of the experience), and negative (e.g. fear, anger). It is noticeable that in all three categories predominantly and significantly positive or neutral words and images were used to describe emotional states or experiences. In the case of captions, 40.4 per cent of the posts and 43.9 per cent of the stories could be classified as positive. For the hashtags, the values were 18.7 per cent (P) and 43 per cent (S), and for the emojis 60 per cent (P) and 65.7 per cent (S). In contrast, there were hardly any negative moods (captions P: 5.7%, S: 5.8%; hashtags P: 4.4%, S: 0.7%; emojis P: 8.7%, S: 6.4%). Although the disease status (e.g. active in therapy or completed) had less impact on emotional messages, a significant connection with the applied thematic areas could be observed. Thus, it is apparent that medical and/or therapeutic aspects tend to be described with positive and negative words and hashtags, e.g. the current health status (χ²(3) = 795.44, p =.000, φ = 0.346) or the topics of illness/health via hashtag (χ²(3) = 797.67, p =.000, φ = 0.361). Topics such as food (χ²(3) = 20.49, p =.000, φ = 0.056) or beauty/fashion (χ²(3) = 51.52, p =.000, φ = 0.092) are recognisably more impersonal from an emotional perspective. Discussion A Digital Identity Paradox Drugs, chemotherapy, setbacks, physical impairments, or anxiety are issues that usually accompany cancer patients during treatment and also in remission. Looking at the content posted by German-speaking cancer bloggers on Instagram, illness-related images and words are comparatively rare. The bloggers show their normal, mostly cancer-free world, in which negative and illness-related content does not seem to fit. Although they clearly draw attention to their illness through their biography, this is not or only rarely addressed. Therefore, it can be stated that cancer as a topic is excluded by choice by the bloggers examined. Neither motifs, captions, nor hashtags make the illness visible. This seems paradoxical because the content and biography appear to contradict each other. And yet, the content studied only shows what Jones et al. and Miller have already described: their identity paradox, or multiple identities. The digital acceptance of one's own illness and solidarity with (anonymous) fellow sufferers is clearly given through the disclosure in the biography, but yet a normal and healthy online ego—comparable to the peer group and equal to their own illness identity—is aspired to. It seems as if those affected have to switch their identity back and forth. The awareness that they are already different in real life (in this case, ill) encourages the users examined to show a normal, age-appropriate life—at least online, which is why we speak of an identity paradox 2.0. Based on our data, the obvious otherness of being ill—and in this context the potential higher risk of digital ostracism effects (Greer and Jewkes; Timeo et al.)—can be a reason for self-exclusion of the cancer topic, in order not to be excluded by a healthy peer. The Standard Creates the Content The positive tone that can be found in almost every second post can be explained by the platform standards and practices themselves (Waterloo et al.). Thus, smiling faces in a public environment correspond more to this than sadness, anger, or despair. Although disease-related topics in captions are also provided with negatively connoted language, they do not have a determining influence on the public self-image of the blogger and their life and the illness. The strong visual culture on Instagram does not leave much scope for "other", perhaps more authentic serious content. The fact that published content has the potential to talk about cancer and to make one’s own experience with the disease transparent is proven by blogs (Kim and Gilham). Instagram does not currently seem to be particularly suitable for public profiles to make serious illness narratives about cancer. Conclusion It remains to be noted that public cancer blogs attempt to include a serious topic on Instagram. But with regard to the data, we can see a form of (maybe unconsciously) self-chosen exclusion of illness narratives. The reasons might vary. On the one hand, cancer bloggers want to belong to a healthy peer group, and expressing a visible otherness would exclude them. Therefore, they try to reduce the higher risk potential of ostracism effects. On the other hand, internal Instagram regulations and standards create an environment which can strengthen the bloggers' posting behaviours: young people, especially, post life-affirming and life-related content. This also helps them to cope with crisis situations and to avoid being dominated by a life-threatening disease. Further research on cancer on Instagram is needed to determine to what extent this is desired, and whether an awareness of this paradox exists or develops intuitively. Limitations The explorative character of this study only allows us to make statements about the bloggers investigated, not to make representative claims. References Abrol, Esha, et al. “Exploring the Digital Technology Preferences of Teenagers and Young Adults (TYA) with Cancer and Survivors: A Cross-Sectional Service Evaluation Questionnaire.” Journal of Cancer Survivorship 11 (2017): 670–682. Bazarova, Natalya N. “Public Intimacy: Disclosure Interpretation and Social Judgments on Facebook.” Journal of Communication 62 (2012): 815–832. Bazarova, Natalya N., and Yoon Hyung Choi. “Self-Disclosure in Social Media: Extending the Functional Approach to Disclosure Motivations and Characteristics on Social Network Sites.” Journal of Communication 64 (2014): 635–657. Beisch, Natalie, et al. “ARD/ZDF-Onlinestudie 2019: Mediale Internetnutzung und Video-on-Demand gewinnen weiter an Bedeutung.” Media Perspektiven 9 (2019): 374–388. Burchardt, Tania, et al. “Social Exclusion in Britain 1991-1995.” Social Policy and Administration 33 (1999): 227–244. Bury, Michael. “Chronic Illness as Biographical Disruption.” Sociology of Health and Illness 4 (1982): 167–182. Charmaz, Kathy. “The Body, Identity, and Self: Adapting to Impairment.” The Sociological Quarterly 36 (1995): 657–680. Chou, Wen-ying S., and Michal Moskowitz. “Social Media Use in Adolescent and Young Adult (AYA) Cancer Survivors.” Current Opinion in Psychology 9 (2016): 88–91. Chou, Wen-ying S., et al. “Health-Related Internet Use among Cancer Survivors: Data from the Health Information National Trends Survey, 2003-2008.” Journal of Cancer Survivorship 5 (2011): 263–270. Donovan, Erin E., et al. “Patterns of Social Support Communicated in Response to Expressions of Uncertainty in an Online Community of Young Adults with Cancer.” Journal of Applied Communication Research 42 (2014): 432–455. Franzke, Aline Shakti, et al. “Internet Research: Ethical Guidelines 3.0 Association of Internet Researchers 6.1.” Association of Internet Researchers, 2019. Greer, Chris, and Yvonne Jewkes. “Extremes of Otherness: Media Images of Social Exclusion.” Social Justice 32 (2005): 20–31. Hilgendorf, Inken, et al. “Onkologische Erkrankungen bei Jugendlichen und Jungen Erwachsenen – Zahlen aus dem Klinischen Krebsregister Rostock als Arbeitsgrundlage für eine Interdisziplinäre Herausforderung.“ TumorDiagnostik & Therapie 32 (2011): 85–92. Hills, John Robert, et al. “Understanding Social Exclusion.” CASE: Centre for Analysis of Social Exclusion (2002). Hu, Yuheng, et al. “What We Instagram: A First Analysis of Instagram Photo Content and User Types.” Proceedings of the 8th International Conference on Weblogs and Social Media, ICWSM. Ann Arbor: AAAI Press, 2014. 595–598. Hyden, Lars‐Christer. “Illness and Narrative.” Sociology of Health & Illness 19 (1997): 48–69. Jones, Barbara L., et al. “Adolescent Cancer Survivors: Identity Paradox and the Need to Belong.” Qualitative Health Research 8 (2011): 1033–1040. Kim, Bora, and David Michael Gillham. “The Experience of Young Adult Cancer Patients Described through Online Narratives.” Cancer Nursing 36 (2013): 377–384. Lee, Eunji, et al. “Pictures Speak Louder than Words: Motivations for Using Instagram.” Cyberpsychology, Behavior, and Social Networking 18 (2015): 552–556. Leventhal, Howard, et al. “The Impact of Chronic Illness on the Self System.” Self, Social Identity, and Physical Health. Ed. Richard J. Contrada, and Richard D. Ashmore. New York: Oxford UP, 1999. 185–208. Lin, Han, et al. “Emotional Disclosure on Social Networking Sites: The Role of Network Structure and Psychological Needs.” Computers in Human Behavior 41 (2014): 342–350. Love, Brad, et al. “Exploring Psychosocial Support Online: A Content Analysis of Messages in an Adolescent and Young Adult Cancer Community.” Cyberpsychology, Behavior, and Social Network 15 (2012): 555–559. Lup, Katerina, et al. “Instagram #Instasad?: Exploring Associations among Instagram Use, Depressive Symptoms, Negative Social Comparison, and Strangers Followed.” Cyberpsychology, Behavior, and Social Networking 18 (2015): 247–252. Makros, Jenny, and Marita P. McCabe. “Relationships between Identity and Self-Representations During Adolescence.” Journal of Youth and Adolescence 30 (2001): 623–639. Miller, Laura E. ‘“People Don’t Understand That It Is Not Easy Being a Cancer Survivor: Communicating and Negotiating Identity throughout Cancer Survivorship.” Southern Communication Journal 80 (2015): 1–19. Nesby, Linda, and Salamonsen, Anita. ”Youth Blogging and Serious Illness.” Medical Humanities 42 (2016): 46–51. Perales, Miguel-Angel, et al. “Social Media and the Adolescent and Young Adult (AYA) Patient with Cancer.” Current Hematologic Malignancy Reports 6 (2016): 449–455. Ressler, Pamela K., et al. “Communicating the Experience of Chronic Pain and Illness through Blogging.” Journal of Medical Internet Research 14 (2012): 240–253. Rettberg, Jill Walker. Seeing Ourselves through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape Ourselves. London: Palgrave Macmillan, 2014. Riva, Paolo, and Jennifer Eck. Social Exclusion: Psychological Approaches to Understanding and Reducing Its Impact. New York: Springer, 2016. Ruckenstuhl, Paul, et al. “Like or Dislike? Impact of Facebook on Ewing Sarcoma Treatment.” Journal of Medical Internet Research 2 (2016): 42–54. Sheldon, Pavica, and Katherine Bryant. “Instagram: Motives for Its Use and Relationship to Narcissism and Contextual Age.” Computers in Human Behavior 58 (2016): 89–97. Stage, Carsten. Networked Cancer: Affect, Narrative and Measurement. London: Palgrave Macmillan, 2017. Stage, Carsten, et al. “Vital Media: The Affective and Temporal Dynamics of Young Cancer Patients’ Social Media Practices.” Social Media + Society 6 (2020): 1–13. Tembeck, Tamar. “Selfies of Ill Health: Online Autopathographic Photography and the Dramaturgy of the Everyday.” Social Media + Society 2 (2016): 1–13. Timeo, Susanna, et al. “Being Liked or Not Being Liked: A Study on Social-Media Exclusion in a Preadolescent Population.” Journal of Adolescence 80 (2020): 173–181. Waterloo, Sophie F., et al. “Norms of Online Expressions of Emotion: Comparing Facebook, Twitter, Instagram, and WhatsApp." New Media & Society 20 (2018): 1813–1831. Wright, Kevin B., et al. “Weak-Tie Support Network Preference and Perceived Life Stress among Participants in Health-Related Computer-Mediated Support Groups.” Journal of Computer-Mediated Communication 15 (2010): 606–624. Zebrack, Brad, and Sinéad Isaacson. “Psychosocial Care of Adolescent and Young Adult Patients with Cancer and Survivors.” Journal of Clinical Oncology 30 (2012): 1221–1226.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography