To see the other types of publications on this topic, follow the link: Intruder and hold-up alarm system.

Journal articles on the topic 'Intruder and hold-up alarm system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 journal articles for your research on the topic 'Intruder and hold-up alarm system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Unabor, Philip O., and Michael S. Okundamiya. "Implementation of an Embedded Microcontroller-Based Intrusion Detection System." Journal of Advances in Science and Engineering 1, no. 1 (April 30, 2018): 27–32. http://dx.doi.org/10.37121/jase.v1i1.3.

Full text
Abstract:
This paper highlights the implementation of an embedded microcontroller-based intrusion detection system. The PIC16F84A microcontroller embedded in the system was programmed using the MikroC Language for the microcontrollers, to pick up an intrusion signal from the motion sensor, (which interprets the signal to be an electrical signal e.g. voltage), process it and then give a command to the display or output units. The output includes a 16x2 ALPHA liquid crystal display (LCD) and a buzzer (alarm unit), which in turn implement the command thereby notifying the environment of the presence of an intruder by displaying “Intruder Detected!” on the LCD and by a beeping sound with an interval of 0.5s delay by the alarm unit. The system was tested and was found to be efficient and suitable for solving myriad of security issues that confront us in modern times.
APA, Harvard, Vancouver, ISO, and other styles
2

F. Hussein, Loay, Anis Ben Aissa, Islam Abdalla Mohamed, Saed Alruwaili, and Abdalazi Alanzi. "Development of a Secured Vehicle Spot Detection System Using GSM." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 04 (February 26, 2021): 85. http://dx.doi.org/10.3991/ijim.v15i04.19267.

Full text
Abstract:
The number of vehicles stolen is increasing annually. The alarm system for vehicles is commonly used to expose the burglars publicly to make a scene. If the vehicle owner is far away, it will be hard to distinguish the threat to the vehicle from the intruder. To deter such crime, there should be a safer protection mechanism for vehicles around the globe. Moreover, overcrowd parking lot problems have always been an issue. Nevertheless, it became even worse with the progressing urbanization and population expansion. Anyone may have experienced that moment of panic when you realize you have no idea where you parked your vehicle. Note that, the keyless remote control of vehicles has a short-range radio transmitter. It usually can reach up 5–20 meters. Therefore, this paper develops a proposed system that is used for detecting vehicle location using Global System for Mobile Communications (GSM). It is basically capable to switch ON and OFF vehicle alarm system to detect the location of the vehicle in a crowded area. PIC microcontroller that has been embedded in the system programmed using C language. The intelligent proposed system also designs to enhance the security feature for the transportation era. The proposed system offers better service and cost-effective for the vehicle owners.
APA, Harvard, Vancouver, ISO, and other styles
3

Hart, Jan, and Veronika Nídlová. "The Risks of Data Transmissions in Intrusion and Hold-Up Alarm Systems and Solutions Thereto." Advanced Materials Research 905 (April 2014): 570–74. http://dx.doi.org/10.4028/www.scientific.net/amr.905.570.

Full text
Abstract:
With regard to the resulting security of the guarded building, the issue of data transmissions in intrusion and hold-up alarm systems is highly important. Several risk factors of operation impact upon intrusion and hold-up alarm systems, influencing the resulting running of the system. Whether this concerns incorrect installation, external influences impacting upon the devices, improper maintenance or an improperly trained user, all can lead to fatal consequences. Amongst the most fundamental risks which may arise are risks in data transmissions. When the alarm information is affected, the system can no longer be relied upon. On the basis of measurements and the results thereof, a number of innovations have been created, which should help better protect data transmissions.
APA, Harvard, Vancouver, ISO, and other styles
4

Paś, Jacek. "Teaching Methodology of Diagnosis Process on the Example of Intrusion and Hold-Up Alarm System." Journal of KONBiN 46, no. 1 (June 1, 2018): 215–34. http://dx.doi.org/10.2478/jok-2018-0031.

Full text
Abstract:
Abstract The article presents a teaching methodology of the diagnosis process of the technical and functional condition of intrusion and hold-up alarm system (SSWiN). Laboratory model SSWiN is a representation of a real intrusion and hold-up system. The lecturer has the opportunity to ask a dozen different independent damages. The aim of the laboratory exercises is to familiarize students with the methodology and structure of the diagnosis SSWiN.
APA, Harvard, Vancouver, ISO, and other styles
5

Pędzierska, Małgorzata, and Adam Rosiński. "Analysis of reliability power supply intrusion and hold-up systems presented in the standard PN-EN 50131-1:2009." Journal of KONBiN 42, no. 1 (June 1, 2017): 165–90. http://dx.doi.org/10.1515/jok-2017-0024.

Full text
Abstract:
Abstract The intrusion and hold-up system is one of the electronic security systems. The purpose of its application is to increase the level of safety for persons and property. This kind of solutions are used in all types of objects belonging to the critical infrastructure of the State. The article presents considerations for analysis reliability of intrusion and hold-up systems. Characterize them, taking into account the guidance contained in the standard “PN-EN50131-1:2009:Alarm systems-Intrusion and hold-up systems-part 1: System requirements”. Then performed an analysis of reliability that enable their comparison. In further research of this issue is planned to carry out similar analyses, but for systems of access control and video surveillance systems (also distributed structures).
APA, Harvard, Vancouver, ISO, and other styles
6

Gorbenko, I. D., and D. Fesenko. "Using BLOCKCHAIN in automotive security." Radiotekhnika, no. 203 (December 23, 2020): 97–108. http://dx.doi.org/10.30837/rt.2020.4.203.09.

Full text
Abstract:
The analysis of problems of using authentication systems for automobile systems is carried out. It is shown that criminals are increasingly interested in modern car protection systems, cars are becoming more technological, which in turn opens up new opportunities for compromising the operation of vehicle components and systems, so security systems are increasingly required to ensure efficiency and safety. Modern systems of protection against illegal seizure of vehicles, better known as "alarms" try to deter attacks by intruders, but in turn can bring additional backdoors for intruders completely unintentionally, for example by adding an interesting feature to the car system, and then this feature can be dual due to problems with the authentication system. Therefore, based on this, car security systems must have the highest level of authentication security, which requires the use of a decentralized blockchain network with nodes for each car, authenticating the user in groups, this will move away from the standard client-server architecture, which is not sufficiently secure. . The main ways to solve this problem are to build a comprehensive security system, which in turn includes an improved and reliable authentication measure based on a decentralized blockchain network and two comprehensive schemes to update the critical data transmission system of the car – CAN network. The use of these systems will improve the security of the identification system and information flowing between critical units, which will improve the safety of the car from theft, as well as from the ability of attackers to create emergencies remotely.
APA, Harvard, Vancouver, ISO, and other styles
7

Ida Seraphim, B., E. Poovammal, Kadiyala Ramana, Natalia Kryvinska, and N. Penchalaiah. "A hybrid network intrusion detection using darwinian particle swarm optimization and stacked autoencoder hoeffding tree." Mathematical Biosciences and Engineering 18, no. 6 (2021): 8024–44. http://dx.doi.org/10.3934/mbe.2021398.

Full text
Abstract:
<abstract> <p>Cybersecurity experts estimate that cyber-attack damage cost will rise tremendously. The massive utilization of the web raises stress over how to pass on electronic information safely. Usually, intruders try different attacks for getting sensitive information. An Intrusion Detection System (IDS) plays a crucial role in identifying the data and user deviations in an organization. In this paper, stream data mining is incorporated with an IDS to do a specific task. The task is to distinguish the important, covered up information successfully in less amount of time. The experiment focuses on improving the effectiveness of an IDS using the proposed Stacked Autoencoder Hoeffding Tree approach (SAE-HT) using Darwinian Particle Swarm Optimization (DPSO) for feature selection. The experiment is performed in NSL_KDD dataset the important features are obtained using DPSO and the classification is performed using proposed SAE-HT technique. The proposed technique achieves a higher accuracy of 97.7% when compared with all the other state-of-art techniques. It is observed that the proposed technique increases the accuracy and detection rate thus reducing the false alarm rate.</p> </abstract>
APA, Harvard, Vancouver, ISO, and other styles
8

Simon, O. A., U. I. Bature, K. I. Jahun, and N. M. Tahir. "Electronic doorbell system using keypad and GSM." International Journal of Informatics and Communication Technology (IJ-ICT) 9, no. 3 (December 1, 2020): 212. http://dx.doi.org/10.11591/ijict.v9i3.pp212-220.

Full text
Abstract:
<p><span lang="EN-US">In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
9

Lazo, Edwin O., Stephen Antonelli, Jun Aishima, Herbert J. Bernstein, Dileep Bhogadi, Martin R. Fuchs, Nicolas Guichard, et al. "Robotic sample changers for macromolecular X-ray crystallography and biological small-angle X-ray scattering at the National Synchrotron Light Source II." Journal of Synchrotron Radiation 28, no. 5 (August 23, 2021): 1649–61. http://dx.doi.org/10.1107/s1600577521007578.

Full text
Abstract:
Here we present two robotic sample changers integrated into the experimental stations for the macromolecular crystallography (MX) beamlines AMX and FMX, and the biological small-angle scattering (bioSAXS) beamline LiX. They enable fully automated unattended data collection and remote access to the beamlines. The system designs incorporate high-throughput, versatility, high-capacity, resource sharing and robustness. All systems are centered around a six-axis industrial robotic arm coupled with a force torque sensor and in-house end effectors (grippers). They have the same software architecture and the facility standard EPICS-based BEAST alarm system. The MX system is compatible with SPINE bases and Unipucks. It comprises a liquid nitrogen dewar holding 384 samples (24 Unipucks) and a stay-cold gripper, and utilizes machine vision software to track the sample during operations and to calculate the final mount position on the goniometer. The bioSAXS system has an in-house engineered sample storage unit that can hold up to 360 samples (20 sample holders) which keeps samples at a user-set temperature (277 K to 300 K). The MX systems were deployed in early 2017 and the bioSAXS system in early 2019.
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Yan Hui, and Dan Tong Zhang. "Research on One Kind of Intellectualization High Accuracy Digital Adjustment Direct Source." Applied Mechanics and Materials 599-601 (August 2014): 608–11. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.608.

Full text
Abstract:
The power source uses the digital adjustment, the closed loop real-time monitoring.The output precision is vary high. It also has both the dual over-load protection and alarm, which is suitable especially in each kind situation of the high accuracy request.This design intellectualization direct-current power supply uses the self-restraint keyboard entry. The system of intellectualization high accuracy digital adjustmen direct source contains D/A module and A/D module . D/A module adopts low-priced 8 bits DA chip. DAC0832 is a electric current exports type 8 bits D/A converter , adopting to reversing T type resistor network. The ADC0809 chip,with 8 bits AD changes ,accomplishes the data collect function and makes up into the closed cycle circuit. The inside of ADC0809 has output lock-memory implement , it can link up with AT89C51 monolithic machine directly. The stabilivolt outputed and over-stream protection module adopts the in-line stabilivolt circuit which has used three end integrated stabilivolt chip , adopting LM317 and LM337 series three hold adjustable stabilivolt tube., LM317 is a three end adjustable voltage stabilizer integrated circuit of USA country semiconductor company.The single-chip microcomputer receives voltage value information of keyboard input, and carries on processing.
APA, Harvard, Vancouver, ISO, and other styles
11

Cotton, Anne-Marie, and Agnès D'Arripe. "Enjeux identitaires et sociétaires : à la recherche d’une adéquation entre discours et attentes dans la construction des représentations sociales du sénior." Revue Communication & professionnalisation, no. 6 (July 10, 2018): 129–51. http://dx.doi.org/10.14428/rcompro.v0i6.3473.

Full text
Abstract:
L'étude de cas d'un système de téléalarme permet d'aborder l'adéquation entre les attentes du sénior actif et les discours du communicant jouant un rôle dans la construction des représentations sociales autour du sénior. Dans une société axée sur la productivité, où l’injonction d’autonomie est centrale, le sénior se voit soumis à une norme du « bien vieillir ». En resituant le sénior dans son histoire personnelle et collective, nous étudions le discours du communicant de la start-up belge Zembro à son égard et les constructions symboliques engendrées ou mobilisées. Tantôt représenté positivement dans une "horizontalité des pairs", retraité aux multiples activités, tantôt négativement dans une "verticalité des pères", vieillard dépendant, comment s’adresser à la fois au sénior et à ses proches qui participent à son autonomie conçue comme solidaire ou relationnelle ? Comment intégrer les proches souvent prescripteurs sans faire du sénior un « individu collectif ») sans réelle prise sur ce qui est important pour lui ? Une approche thématique reposant sur l'adéquation « discours-cible » a permis de définir la place qu’un système de téléalarme prend ou pourrait prendre dans la vie d’un sénior et sa position par rapport au discours d'une entreprise. The case study of a remote alarm system addresses the adequacy between the expectations of the active senior and the communication director’s discourse having a role in the construction of social representations around the senior. In a productivity-driven society focusing on autonomy, the senior is strongly invited to adopt the “age well” standards. Contextualising the senior in his personal and collective history, we study this discourse of the Belgian start-up Zembro and the symbolic constructions it engenders or mobilizes. Sometimes represented positively in a "peer horizontality", the retired with multiple activities, sometimes negatively in a "verticality of the fathers", the dependent old man, how to address both the senior and his relatives who participate in its autonomy conceived as solidary or relational? How to integrate the close relatives often prescribers without making the senior a "collective individual" that would no longer have real hold on what is important for him? A thematic approach of this case study based on the “discourse-public” adequacy, allowed us to define the place a remote alarm system takes or could take in the senior’s life and his position toward the discourse emanating from a profit organisation.
APA, Harvard, Vancouver, ISO, and other styles
12

Хашумов, И. У., М. Р. Хаджиев, and Х. Х. Мальцагов. "FORMATION SECURITY TECHNOLOGY AND VULNERABILITYOF IOT." Вестник ГГНТУ. Технические науки, no. 2(20) (June 29, 2020): 15–20. http://dx.doi.org/10.34708/gstou.2020.49.16.009.

Full text
Abstract:
В данной статье рассматривается проблема информационной безопасности IoT и уязвимость в различных областях использования интернета вещей. В настоящее время мы можем найти статьи о том, как находят уязвимости, например, в такой технике, как автомобиль, холодильник или системах домашней сигнализации. Все эти вещи могут быть объединены одним термином IoT (Интернет вещей), и на сегодняшний день данная тема и данная технология является одной из самых популярных. Само название Интернет вещей (IoT) вызывает в воображении две противоречивые мысли: с одной стороны, это доступность и удобство управления любой техникой, с другой стороны, это опасность со стороны злоумышленников и хакеров, опасение за то, что, если все подключено к интернету, любой хакер может подключиться и навредить, изобретая множество способов проникновения в вашу жизнь с помощью ваших же гаджетов. В статье исследуются потенциальные риски и способы их снижения, необходимые учесть, прежде чем эксплуатировать устройства с поддержкой IoT. This article addresses the issue of IoT information security and vulnerability in various areas of the use of the Internet of things. Currently, we can find articles on how to find vulnerabilities, for example, in such techniques as a car, a refrigerator or home alarm systems. All these things that can be united by one term IoT (Internet of things), and today this topic and this technology is one of the most popular. The very name of the Internet of Things (IoT) conjures up two conflicting thoughts on the one hand, it is the accessibility and convenience of controlling any technology on the other hand, it is a danger from intruders and hackers, the fear that everything is connected to the Internet, any hacker can connect and harm by inventing millions of ways to enter your life with your gadgets. The article examines the potential risks, and the likelihood of their reduction, before using devices with IoT support.
APA, Harvard, Vancouver, ISO, and other styles
13

Hashim, Norlezah, Mohd Amir Hafifi Abdul Razak, and Fakrulradzi Idris. "HOME SECURITY SYSTEM USING ZIGBEE." Jurnal Teknologi 74, no. 10 (June 21, 2015). http://dx.doi.org/10.11113/jt.v74.4830.

Full text
Abstract:
This paper explains the design and implementation of home security systems using the most widely deployed enhancement to the 802.15.4 standard, which is better known as Zigbee. Home security systems nowadays are expensive and complicated to install. Two types of sensors were used in this project, motion sensor and magnetic door sensor. These sensors were used as the end device to detect any intruder. If any intruder bypasses the motion sensor or the magnetic door sensor, a signal will be sent to the system and the alarm will be triggered together with Graphical User Interface (GUI) display on a personal computer. The performance of the designed system was analyzed in terms of detectable range and delay. Result shows that the designed system is capable of detecting up to 22 meters of distance for indoor use at maximum delays of 15 seconds. The home security system using Zigbee has been successfully designed, implemented and analyzed.
APA, Harvard, Vancouver, ISO, and other styles
14

Caluya, Gilbert. "The Architectural Nervous System." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2689.

Full text
Abstract:
If the home is traditionally considered to be a space of safety associated with the warm and cosy feeling of the familial hearth, it is also continuously portrayed as a space under threat from the outside from which we must secure ourselves and our families. Securing the home entails a series of material, discursive and performative strategies, a host of precautionary measures aimed at regulating and ultimately producing security. When I was eleven my family returned home from the local fruit markets to find our house had been ransacked. Clothes were strewn across the floor, electrical appliances were missing and my parents’ collection of jewellery – wedding rings and heirlooms – had been stolen. Few things remained untouched and the very thought of someone else’s hands going through our personal belongings made our home feel tainted. My parents were understandably distraught. As Filipino immigrants to Australia the heirlooms were not only expensive assets from both sides of my family, but also signifiers of our homeland. Added to their despair was the fact that this was our first house – we had rented prior to that. During the police interviews, we discovered that our area, Sydney’s Western suburbs, was considered ‘high-risk’ and we were advised to install security. In their panic my parents began securing their home. Grills were installed on every window. Each external wooden door was reinforced by a metal security door. Movement detectors were installed at the front of the house, which were set to blind intruders with floodlights. Even if an intruder could enter the back through a window a metal grill security door was waiting between the backroom and the kitchen to stop them from getting to our bedrooms. In short, through a series of transformations our house was made into a residential fortress. Yet home security had its own dangers. A series of rules and regulations were drilled into me ‘in case of an emergency’: know where your keys are in case of a fire so that you can get out; remember the phone numbers for an emergency and the work numbers of your parents; never let a stranger into the house; and if you need to speak to a stranger only open the inside door but leave the security screen locked. Thus, for my Filipino-migrant family in the 1990s, a whole series of defensive behaviours and preventative strategies were produced and disseminated inside and around the home to regulate security risks. Such “local knowledges” were used to reinforce the architectural manifestations of security at the same time that they were a response to the invasion of security systems into our house that created a new set of potential dangers. This article highlights “the interplay of material and symbolic geographies of home” (Blunt and Varley 4), focusing on the relation between urban fears circulating around and within the home and the spatial practices used to negotiate such fears. In exploring home security systems it extends the exemplary analysis of home technologies already begun in Lynn Spigel’s reading of the ‘smart home’ (381-408). In a similar vein, David Morley’s analysis of mediated domesticity shows how communications technology has reconfigured the inside and outside to the extent that television actually challenges the physical boundary that “protects the privacy and solidarity of the home from the flux and threat of the outside world” (87). Television here serves as a passage in which the threat of the outside is reframed as news or entertainment for family viewing. I take this as a point of departure to consider the ways that this mediated fear unfolds in the technology of our homes. Following Brian Massumi, I read the home as “a node in a circulatory network of many dimensions (each corresponding to a technology of transmission)” (85). For Massumi, the home is an event-space at the crossroads of media technologies and political technologies. “In spite of the locks on the door, the event-space of the home must be seen as one characterized by a very loose regime of passage” (85). The ‘locked door’ is not only a boundary marker that defines the inside from the outside but another technology that leads us outside the home into other domains of inquiry: the proliferation of security technologies and the mundane, fearful intimacies of the home. In this context, we should heed Iris Marion Young’s injunction to feminist critics that the home does provide some positives including a sense of privacy and the space to build relationships and identities. Yet, as Colomina argues, the traditional domestic ideal “can only be produced by engaging the home in combat” (20). If, as Colomina’s comment suggests, ontological security is at least partially dependent on physical security, then this article explores the ontological effects of our home security systems. Houses at War: Targeting the Family As Beatriz Colomina reminds us, in times of war we leave our homelands to do battle on the front line, but battle lines are also being drawn in our homes. Drawing inspiration from Virilio’s claim that contemporary war takes place without fighting, Colomina’s article ‘Domesticity at War’ contemplates the domestic interior as a “battlefield” (15). The house, she writes, is “a mechanism within a war where the differences between defense [sic] and attack have become blurred” (17). According to the Home Security Precautions, New South Wales, October 1999 report conducted by the Australian Bureau of Statistics, 47% of NSW dwellings were ‘secure’ (meaning that they either had a burglar alarm, or all entry points were secured or they were inside a security block) while only 9% of NSW households had no home security devices present (Smith 3). In a similar report for Western Australia conducted in October 2004, an estimated 71% of WA households had window security of some sort (screens, locks or shutters) while 67% had deadlocks on at least one external door (4). An estimated 27% had a security alarm installed while almost half (49%) had sensor lights (Hubbard 4-5). This growing sense of insecurity means big business for those selling security products and services. By the end of June 1999, there were 1,714 businesses in Australia’s security services industry generating $1,395 million of income during 1998-99 financial year (McLennan 3; see also Macken). This survey did not include locksmith services or the companies dealing with alarm manufacturing, wholesaling or installing. While Colomina’s article focuses on the “war with weather” and the attempts to control environmental conditions inside the home through what she calls “counterdomesticity” (20), her conceptualisation of the house as a “military weapon” (17) provides a useful tool for thinking the relation between the home, architecture and security. Conceiving of the house as a military weapon might seem like a stretch, but we should recall that the rhetoric of war has already leaked into the everyday. One hears of the ‘war on drugs’ and the ‘war on crime’ in the media. ‘War’ is the everyday condition of our urban jungles (see also Diken and Lausten) and in order to survive, let alone feel secure, one must be able to defend one’s family and home. Take, for example, Signal Security’s website. One finds a panel on the left-hand side of the screen to all webpages devoted to “Residential Products”. Two circular images are used in the panel with one photograph overlapping the other. In the top circle, a white nuclear family (stereotypical mum, dad and two kids), dressed in pristine white clothing bare their white teeth to the internet surfer. Underneath this photo is another photograph in which an arm clad in a black leather jacket emerges through a smashed window. In the foreground a black-gloved hand manipulates a lock, while a black balaclava masks an unrecognisable face through the broken glass. The effect of their proximity produces a violent juxtaposition in which the burglar visually intrudes on the family’s domestic bliss. The panel stages a struggle between white and black, good and bad, family and individual, security and insecurity, recognisability and unidentifiability. It thus codifies the loving, knowable family as the domestic space of security against the selfish, unidentifiable intruder (presumed not to have a family) as the primary reason for insecurity in the family home – and no doubt to inspire the consumption of security products. Advertisements of security products thus articulate the family home as a fragile innocence constantly vulnerable from the outside. From a feminist perspective, this image of the family goes against the findings of the National Homicide Monitoring Program, which shows that 57% of the women killed in Australia between 2004 and 2005 were killed by an intimate partner while 17% were killed by a family member (Mouzos and Houliaras 20). If, on the one hand, the family home is targeted by criminals, on the other, it has emerged as a primary site for security advertising eager to exploit the growing sense of insecurity – the family as a target market. The military concepts of ‘target’ and ‘targeting’ have shifted into the benign discourse of strategic advertising. As Dora Epstein writes, “We arm our buildings to arm ourselves from the intrusion of a public fluidity, and thus our buildings, our architectures of fortification, send a very clear message: ‘avoid this place or protect yourself’” (1997: 139). Epstein’s reference to ‘architectures of fortification’ reminds us that the desire to create security through the built environment has a long history. Nan Ellin has argued that fear’s physical manifestation can be found in the formation of towns from antiquity to the Renaissance. In this sense, towns and cities are always already a response to the fear of foreign invaders (Ellin 13; see also Diken and Lausten 291). This fear of the outsider is most obviously manifested in the creation of physical walls. Yet fortification is also an effect of spatial allusions produced by the configuration of space, as exemplified in Fiske, Hodge and Turner’s semiotic reading of a suburban Australian display home without a fence. While the lack of a fence might suggest openness, they suggest that the manicured lawn is flat so “that eyes can pass easily over it – and smooth – so that feet will not presume to” (30). Since the front garden is best viewed from the street it is clearly a message for the outside, but it also signifies “private property” (30). Space is both organised and lived, in such a way that it becomes a medium of communication to passers-by and would-be intruders. What emerges in this semiotic reading is a way of thinking about space as defensible, as organised in a way that space can begin to defend itself. The Problematic of Defensible Space The incorporation of military architecture into civil architecture is most evident in home security. By security I mean the material systems (from locks to electronic alarms) and precautionary practices (locking the door) used to protect spaces, both of which are enabled by a way of imagining space in terms of risk and vulnerability. I read Oscar Newman’s 1972 Defensible Space as outlining the problematic of spatial security. Indeed, it was around that period that the problematic of crime prevention through urban design received increasing attention in Western architectural discourse (see Jeffery). Newman’s book examines how spaces can be used to reinforce human control over residential environments, producing what he calls ‘defensible space.’ In Newman’s definition, defensible space is a model for residential environments which inhibits crime by creating the physical expression of a social fabric that defends itself. All the different elements which combine to make a defensible space have a common goal – an environment in which latent territoriality and sense of community in the inhabitants can be translated into responsibility for ensuring a safe, productive, and well-maintained living space (3). Through clever design space begins to defend itself. I read Newman’s book as presenting the contemporary problematic of spatialised security: how to structure space so as to increase control; how to organise architecture so as to foster territorialism; how to encourage territorial control through amplifying surveillance. The production of defensible space entails moving away from what he calls the ‘compositional approach’ to architecture, which sees buildings as separate from their environments, and the ‘organic approach’ to architecture, in which the building and its grounds are organically interrelated (Newman 60). In this approach Newman proposes a number of changes to space: firstly, spaces need to be multiplied (one no longer has a simple public/private binary, but also semi-private and semi-public spaces); secondly, these spaces must be hierarchised (moving from public to semi-public to semi-private to private); thirdly, within this hierarchy spaces can also be striated using symbolic or material boundaries between the different types of spaces. Furthermore, spaces must be designed to increase surveillance: use smaller corridors serving smaller sets of families (69-71); incorporate amenities in “defined zones of influence” (70); use L-shaped buildings as opposed to rectangles (84); use windows on the sides of buildings to reveal the fire escape from outside (90). As he puts it, the subdivision of housing projects into “small, recognisable and comprehensible-at-a-glance enclaves is a further contributor to improving the visual surveillance mechanism” (1000). Finally, Newman lays out the principle of spatial juxtaposition: consider the building/street interface (positioning of doors and windows to maximise surveillance); consider building/building interface (e.g. build residential apartments next to ‘safer’ commercial, industrial, institutional and entertainment facilities) (109-12). In short, Newman’s book effectively redefines residential space in terms of territorial zones of control. Such zones of influence are the products of the interaction between architectural forms and environment, which are not reducible to the intent of the architect (68). Thus, in attempting to respond to the exigencies of the moment – the problem of urban crime, the cost of housing – Newman maps out residential space in what Foucault might have called a ‘micro-physics of power’. During the mid-1970s through to the 1980s a number of publications aimed at the average householder are printed in the UK and Australia. Apart from trade publishing (Bunting), The UK Design Council released two small publications (Barty, White and Burall; Design Council) while in Australia the Department of Housing and Construction released a home safety publication, which contained a small section on security, and the Australian Institute of Criminology published a small volume entitled Designing out Crime: Crime prevention through environmental design (Geason and Wilson). While Newman emphasised the responsibility of architects and urban planners, in these publications the general concerns of defensible space are relocated in the ‘average homeowner’. Citing crime statistics on burglary and vandalism, these publications incite their readers to take action, turning the homeowner into a citizen-soldier. The householder, whether he likes it or not, is already in a struggle. The urban jungle must be understood in terms of “the principles of warfare” (Bunting 7), in which everyday homes become bodies needing protection through suitable architectural armour. Through a series of maps and drawings and statistics, the average residential home is transformed into a series of points of vulnerability. Home space is re-inscribed as a series of points of entry/access and lines of sight. Simultaneously, through lists of ‘dos and don’ts’ a set of precautionary behaviours is inculcated into the readers. Principles of security begin codifying the home space, disciplining the spatial practices of the intimate, regulating the access and mobility of the family and guests. The Architectural Nervous System Nowadays we see a wild, almost excessive, proliferation of security products available to the ‘security conscious homeowner’. We are no longer simply dealing with security devices designed to block – such as locks, bolts and fasteners. The electronic revolution has aided the production of security devices that are increasingly more specialised and more difficult to manipulate, which paradoxically makes it more difficult for the security consumer to understand. Detection systems now include continuous wiring, knock-out bars, vibration detectors, breaking glass detectors, pressure mats, underground pressure detectors and fibre optic signalling. Audible alarm systems have been upgraded to wire-free intruder alarms, visual alarms, telephone warning devices, access control and closed circuit television and are supported by uninterruptible power supplies and control panels (see Chartered Institution of Building Service Engineers 19-39). The whole house is literally re-routed as a series of relays in an electronic grid. If the house as a security risk is defined in terms of points of vulnerability, alarm systems take these points as potential points of contact. Relays running through floors, doors and windows can be triggered by pressure, sound or dislocation. We see a proliferation of sensors: switching sensors, infra-red sensors, ultrasonic sensors, microwave radar sensors, microwave fence sensors and microphonic sensors (see Walker). The increasing diversification of security products attests to the sheer scale of these architectural/engineering changes to our everyday architecture. In our fear of crime we have produced increasingly more complex security products for the home, thus complexifying the spaces we somehow inherently feel should be ‘simple’. I suggest that whereas previous devices merely reinforced certain architectural or engineering aspects of the home, contemporary security products actually constitute the home as a feeling, architectural body capable of being affected. This recalls notions of a sensuous architecture and bodily metaphors within architectural discourse (see Thomsen; Puglini). It is not simply our fears that lead us to secure our homes through technology, but through our fears we come to invest our housing architecture with a nervous system capable of fearing for itself. Our eyes and ears become detection systems while our screams are echoed in building alarms. Body organs are deterritorialised from the human body and reterritorialised on contemporary residential architecture, while our senses are extended through modern security technologies. The vulnerable body of the family home has become a feeling body conscious of its own vulnerability. It is less about the physical expression of fear, as Nan Ellin has put it, than about how building materialities become capable of fearing for themselves. What we have now are residential houses that are capable of being more fully mobilised in this urban war. Family homes become bodies that scan the darkness for the slightest movements, bodies that scream at the slightest possibility of danger. They are bodies that whisper to each other: a house can recognise an intrusion and relay a warning to a security station, informing security personnel without the occupants of that house knowing. They are the newly produced victims of an urban war. Our homes are the event-spaces in which mediated fear unfolds into an architectural nervous system. If media plug our homes into one set of relations between ideologies, representations and fear, then the architectural nervous system plugs that back into a different set of relations between capital, fear and the electronic grid. The home is less an endpoint of broadcast media than a node in an electronic network, a larger nervous system that encompasses the globe. It is a network that plugs architectural nervous systems into city electronic grids into mediated subjectivities into military technologies and back again, allowing fear to be disseminated and extended, replayed and spliced into the most banal aspects of our domestic lives. References Barty, Euan, David White, and Paul Burall. Safety and Security in the Home. London: The Design Council, 1980. Blunt, Alison, and Ann Varley. “Introduction: Geographies of Home.” Cultural Geographies 11.1 (2004): 3-6. Bunting, James. The Protection of Property against Crime. Folkestone: Bailey Brothers & Sinfen, 1975. Chartered Institution of Building Service Engineers. Security Engineering. London: CIBSE, 1991. Colomina, Beatriz. “Domesticity at War.” Assemblage 16 (1991): 14-41. Department of Housing and Construction. Safety in and around the Home. Canberra: Australian Government Publishing Service, 1981. Design Council. The Design Centre Guide to Domestic Safety and Security. London: Design Council, 1976. Diken, Bülent, and Carsten Bagge Lausten. “Zones of Indistinction: Security and Terror, and Bare Life.” Space and Culture 5.3 (2002): 290-307. Ellin, Nan. “Shelter from the Storm or Form Follows Fear and Vice Versa.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Epstein, Dora. “Abject Terror: A Story of Fear, Sex, and Architecture.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Fiske, John, Bob Hodge, and Graeme Turner. Myths of Oz: Reading Australian Popular Culture. Sydney: Allen & Unwin, 1987. Geason, Susan, and Paul Wilson. Designing Out Crime: Crime Prevention through Environmental Design. Canberra: Australian Institute of Criminology, 1989. Hubbard, Alan. Home Safety and Security, Western Australia. Canberra: Australian Bureau of Statistics, 2005. Jeffery, C. Ray. Crime Prevention through Environmental Design. Beverley Hills: Sage, 1971. Macken, Julie. “Why Aren’t We Happier?” Australian Financial Review 26 Nov. 1999: 26. Mallory, Keith, and Arvid Ottar. Architecture of Aggression: A History of Military Architecture in North West Europe, 1900-1945. Hampshire: Architectural Press, 1973. Massumi, Brian. Parables of the Virtual: Movement, Affect, Sensation. Durham: Duke University Press, 2002. McLennan, W. Security Services, Australia, 1998-99. Canberra: Australian Bureau of Statistics, 2000. Morley, David. Home Territories: Media, Mobility and Identity. London and New York: Routledge, 2000. Mouzos, Jenny, and Tina Houliaras. Homicide in Australia: 2004-05 National Homicide Monitoring Program (NHMP) Annual Report. Research and Public Policy Series 72. Canberra: Australian Institute of Criminology, 2006. Newman, Oscar. Defensible Space: Crime Prevention through Urban Design. New York: Collier, 1973. Puglini, Luigi. HyperArchitecture: Space in the Electronic Age. Basel: Bikhäuser, 1999. Signal Security. 13 January 2007 http://www.signalsecurity.com.au/securitysystems.htm>. Smith, Geoff. Home Security Precautions, New South Wales, October 1999. Canberra: Australian Bureau of Statistics, 2000. Spigel, Lynn. Welcome to the Dreamhouse: Popular Media and Postwar Suburbs. Durham and London: Duke University Press, 2001. Thomsen, Christian W. Sensuous Architecture: The Art of Erotic Building. Munich and New York: Prestel, 1998. Walker, Philip. Electronic Security Systems: Better Ways to Crime Prevention. London: Butterworths, 1983. Young, Iris Marion. “House and Home: Feminist Variations on a Theme.” Feminist Interpretations of Martin Heidegger. Eds. Nancy J. Holland and Patricia Huntington. University Park, Pennsylvania: Pennsylvania State UP, 2001. Citation reference for this article MLA Style Caluya, Gilbert. "The Architectural Nervous System: Home, Fear, Insecurity." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/05-caluya.php>. APA Style Caluya, G. (Aug. 2007) "The Architectural Nervous System: Home, Fear, Insecurity," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/05-caluya.php>.
APA, Harvard, Vancouver, ISO, and other styles
15

Guiawa, Mathurine, Temidayo J. Ofusori, Kehinde O. Olusuyi, Hilary U. Ezea, and Adedayo K. Babarinde. "Design and Implementation of a Compact Home Security System." FUOYE Journal of Engineering and Technology 2, no. 2 (September 30, 2017). http://dx.doi.org/10.46792/fuoyejet.v2i2.70.

Full text
Abstract:
This paper presents the design and implementation of a compact home security system. The use of security systems in today’s home where safety is an important issue cannot be over emphasized. The high crime rates and domestic hazards has brought up the need to take proper measures to prevent intrusions and hazards. It is in this regard that the design and implementation of a compact home security system based on the Global System for Mobile communication (GSM) comes in. Previous designs have used finger print protection, password protection, speech recognition, sensors with buzzer alarms, SMS and e-mail alerts but the designs were with so much complexities as well as at a cost disadvantage. The system presented here is of a minimal cost and simple design, it consists of one motion sensor, one temperature sensor, and one gas sensor. The system was designed using the ATMEGA 8 microcontroller which controls the sending of SMS to the authorized number. The motion sensor (infrared) detects the movement of people entering the house and when there is a detection of an intruder the owner is notified through an SMS. The temperature sensor in this system also initiates an SMS to the owner when the temperature exceeds a particular value. The gas sensor also works in similar manner when it detects smoke and gas thereby sending SMS alert to the owner of the house. The respective sensors detected the compromise in each situation and sent the corresponding SMS to the user. This device therefore helps to prevent intruders, accidents arising from harmful gases and fire outbreaks in homes, offices and industries.
APA, Harvard, Vancouver, ISO, and other styles
16

"Automatic Driver Drowsiness Detection and Accident Prevention System using Image Processing." International Journal of Innovative Technology and Exploring Engineering 8, no. 12 (October 10, 2019): 4614–17. http://dx.doi.org/10.35940/ijitee.l3845.1081219.

Full text
Abstract:
Sleep is a primary need for human beings. The individual desires at least eight hours of sleep to hold on his day by day routine. When someone lacks in take enough relaxation his or her frame does not characteristic(function) properly. First of all, drivers need enough sleep to boost up their work. When we don't have enough sleep, we may become drowsy and falls asleep. Sometimes a few seconds of drowsiness can cost the lives of both driver and passengers as well. So, this gadget proposes a lively monitoring assistant that analyzes drivers' eye blinking action and additionally, mouth portion which exams whether driving is yawning. The system monitors the inputs from the camera located in the driving area and the pictures are captured continuously. These pictures are made into frames that assist the machine to discover d r o w s i n e s s o f f t h e d r i v e r . It is programmed with a time limit for eye blinking operatio n, if the driver extends the time limit, then a standard warni ng warns the driver for daily intervals until the driver retur ns to an active state and also when the driver yawns the dev ice senses yawning movement and the alarm starts beeping. . With the outcomes obtained from the frames, they are categorised into one-of-akind paperwork like a normal driver, driving force with dark skin and motive force having severe lights behind. This device overcomes the drawbacks of formerly present systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
18

Phillipov, Michelle. "“Just Emotional People”? Emo Culture and the Anxieties of Disclosure." M/C Journal 12, no. 5 (December 13, 2009). http://dx.doi.org/10.5204/mcj.181.

Full text
Abstract:
In an article in the Sunday Tasmanian shortly after the deaths of Melbourne teenagers Jodie Gater and Stephanie Gestier in 2007, Tasmanian Catholic Schools Parents and Friends Federation president Bill Button claimed: “Parents are concerned because all of a sudden their child, if they have access to a computer, can turn into an Emo” (qtd. in Vowles 1).For a few months in 2007, the dangers of emo and computer use were significant themes in Australian newspaper coverage. Emo, an abbreviation of the terms “emocore” or “emotional hardcore”, is a melodic subgenre of punk rock music, characterised by “emotional” or personal themes. Its followers, who adopt a look that includes black stovepipe jeans, dyed black hair and side-parted long fringes, might merely have been one of the many “tribes” (Bennett 605) that characterise contemporary youth culture. However, over an approximately five-month period in 2007, the deaths of three teenagers in two separate incidents—the murder Carly Ryan in February and the suicides of Jodie Gater and Stephanie Gestier in April—were linked to the emo subculture and to the social networking site MySpace, both of which were presented as dangerous and worrying developments in contemporary youth culture.This paper explores the media discourse surrounding emo and social networking technologies via a textual analysis of key reports and commentary pieces published in major metropolitan and national newspapers around the times of the three deaths. Although only a small selection of the 140-odd articles published Australia-wide is discussed here, those selected are indicative of broader trends in the newspaper coverage, and offer a means of examining how these incidents were constructed and understood within mainstream media discourse.Moral panics in relation to youth music and subculture are not uncommon in the news and other media (Cohen; Goode and Ben-Yehuda; Redhead; Rose 124-145; Weinstein 245-263; Wright). Moral panics related to social networking technologies have also been subject to academic study (Hinduja and Patchin 126; Livingstone 395; Marwick). In these cases, moral panic is typically understood as a force of normalisation and social control. The media discourses surrounding the deaths of the three young women possessed many of the features of moral panic described in this literature, including a build-up of concern disproportionate to “real” risk of harm (see Goode and Ben-Yehuda 33-41). But while emo youth were sometimes constructed as a straightforward “folk devil” (Cohen 11) or “enemy” (Goode and Ben-Yehuda 31) in need of clear sanctions—or, alternatively, as victims of a clear folk devil or enemy—the “problem” of emo was also framed as a product of much broader problems of youth culture.Connections between emo, MySpace, the deaths of the three young women were only ever tenuously established in the news reports and commentaries. That the stories appeared to be ultimately concerned with a broader group of (non-subculturally affiliated) young people suggests that this coverage can be seen as symptomatic of what John Hartley describes—in the context of reporting on young people more generally—as a “profound uncertainty in the textual system of journalism about where the line that defines the boundary of the social should be drawn” (17). The result is a “cultural thinking-out-loud” (Hartley 17) in which broader cultural anxieties are expressed and explored, although they are not always clearly articulated. While there were some attempts in these reports and commentaries on the three “emo deaths” to both mobilise and express specific fears (such as the concern that computer access can turn a child “into an Emo”), the newspaper coverage also expressed broader anxieties about contemporary youth culture. These can be described as anxieties about disclosure.In the cases of Carly Ryan, Jodie Gater and Stephanie Gestier, these were disclosures that were seen as simultaneously excessive and inadequate. Specifically, the newspaper coverage focused on both the dangers of young people’s disclosures of traditionally private material, and the ways in which the apparent secrecy of these disclosures made them inaccessible to adult authorities who could otherwise have “done something” to prevent the tragedies from occurring.Although some of these concerns were connected to the specificities of emo subcultural expression—the “excessive” emotionality on display and the impenetrability of subcultural imagery respectively—they were on the whole linked to a broader problem in contemporary youth culture that was seen to apply to all young people, whether or not they were emo-identified. Specifically, the deaths of Carly Ryan, Jodie Gater and Stephanie Gestier provided opportunities for the expression of anxieties that the private lives of young people were becoming increasingly “unknowable” to adult authorities, and, hence, that youth culture itself was increasingly “unknowable”.The Case of Carly RyanIn February 2007, the body of 15-year-old Carly Ryan was found in Horseshoe Bay at Port Elliot, just south of Adelaide. Several weeks later, a 48-year-old man and his 17-year-old son were arrested for her murder. The murder trial began January 2009, with the case still continuing at the time of writing. In the early reports of her death, particularly in Adelaide’s Advertiser, Ryan’s MySpace page was the focus of much discussion, since the teenager was understood to have presented an image of herself on the site that left her vulnerable to predators, including to one of her alleged killers with whom she had been regularly communicating in the weeks leading up to her murder (Littlely, Salter, and Wheatley 4; Hunt 2; Wheatley 4).The main report in The Advertiser, described Ryan’s MySpace page as “bizarre” and as “paint[ing] a disturbing picture of a world of drugs and sex” (Littlely, Salter and Wheatley 4). Ryan was reported as listing her interests as “drugs, smoking, music and sex”, to have described herself as “bisexual”, and to have uploaded images of a “girl injecting herself, a woman with a crucifix rammed down her throat and a woman with her lips stitched together” (Littlely, Salter, and Wheatley 4).Attempts were made to link such “graphic” imagery to the emo subculture (Littlely, Salter, and Wheatley 1; see also O’Donohue 5). The imagery was seen as subcultural insofar as it was seen to reflect a “bizarre teenage ‘goth’ and ‘emo’ world” (Littlely, Salter, and Wheatley 1), a world constructed both as dangerous (in the sense that her apparent involvement in subcultural activities was presented as “disturbing” and something that put her at risk of harm) and impenetrable (in the sense that subcultural imagery was understood not simply as harmful but also as “bizarre”). This linking of Ryan’s death to the emo and goth subcultures was done despite the fact that it was never clearly substantiated that the teenager did indeed classify herself as either “emo” or “goth”, and despite the fact that such links were contested by Ryan’s friends and family (see: “Gothic Images” 15; Riches 15).The repeated linking, then, of Ryan’s death to her (largely unconfirmed) subcultural involvement can be seen as one way of containing the anxieties surrounding her apparently “graphic” and “inappropriate” online disclosures. That is, if such disclosures can be seen as the expressions of a minority subcultural membership, rather than a tendency characteristic of young people more generally, then the risks they pose may be limited only to subcultural youth. Such a view is expressed in comments like Bill Button’s about computer use and emo culture, cited above. Research, however, suggests that with or without subcultural affiliation, some young users of MySpace use the site to demonstrate familiarity with adult-oriented behaviours by “posting sexually charged comments or pictures to corroborate their self-conception of maturity”—irrespective of whether these reflect actual behaviours offline (Hinduja and Patchin 136, 138). As such, this material is inevitably a construction rather than a straightforward reflection of identity (Liu).On the whole, Ryan’s death was presented as simultaneously the product of a dangerous subcultural affiliation, and an extreme case of the dangers posed by unsupervised Internet use to all young people, not just to those emo-identified. For example, the Sunday Mail article “Cyber Threat: The New Place Our Kids Love to Play” warned of the risks of disclosing too much personal information online, suggesting that all young people should restrict access to private information only to people that they know (Novak 12).Such reports reflect a more widespread concern, identified by Marwick, that social networking sites lower cultural expectations around privacy and encourage young people to expose more of their lives online, hence making them vulnerable to potential harm (see also De Souza and Dick; Hinduja and Patchin). In the case of Carly Ryan, the concern that too much (and inappropriate) online disclosure poses dangers for young people is also subtended by anxieties that the teenager and her friends also did not disclose enough information—or, at least, did not disclose in a way that could be made comprehensible and accessible to adult authorities.As a result, the so-called “graphic” material on Ryan’s MySpace page (and on the pages of her friends) was described as both inappropriately public and inappropriately hidden from public view. For example, a report in The Advertiser spoke of a “web of secret internet message boards” that “could potentially hold vital clues to investigating detectives” but which “have been blocked by their creators to everyone but [Ryan’s] tight-knit group of friends” (Littlely, Salter, and Wheatley 1). This “web of secret internet message boards” was, in fact, MySpace pages set to “private”: that is, pages accessible to approved friends only.The privacy settings on profiles are thus presented as an obfuscatory mechanism, a refusal on the part of young people to disclose information that might be of assistance to the murder case. Yet these young people were conforming to the very advice about online safety provided in many of the news reports (such as the article by Novak) and echoed in material released by the Australian Government (such as the Cybersmart Guide for Families): that is, in order to protect their privacy online, they should restrict access to their social networking profiles only to friends that they know.This contradictory message—that too much disclosure online poses safety risks, while conservative approaches to online privacy are evidence of secrecy and obfuscation—expresses a rather tangled set of anxieties about contemporary youth culture. This is part of the “cultural thinking-out-loud” that Hartley characterises as a feature of news reporting on youth more generally. The attempt to make sense of an (apparently motiveless) murder of a young woman with reference to a set of contemporary youth cultural practices that are described as both dangerous and incomprehensible not only constructs technology, subculture and young people as problems to be “fixed”, but also highlights the limited ways through which mainstream news coverage comes to “know” and understand youth culture.Jodie Gater and Stephanie Gestier: The “MySpace Suicide Girls” News reporting on Carly Ryan’s death presented youth culture as a disturbing and dangerous underworld hidden from adult view and essential “unknowable” by adult authorities. In contrast, the reports and commentaries on the deaths of Jodie Gater and Stephanie Gestier only a few months later sought to subsume events that may otherwise have been viewed as inexplicable into categories of the already-known. Gater and Gestier were presented not as victims of a disturbing and secret underground subculture, but a more fully knowable mainstream bullying culture. As a result, the dangers of disclosure were presented differently in this case.In April 2007, the bodies of 16-year-old friends Jodie Gater and Stephanie Gestier were found in bushland on the outskirts of Melbourne. The pair was understood to have hanged themselves as part of a suicide pact. Like the reporting on Carly Ryan’s death, anxieties were raised, particularly in the Melbourne papers, about “teenagers’ secret world” in which “introspective, lonely, misunderstood and depressed” young people sought solace in the communities of emo and MySpace (Dubecki 3).Also similar was that the dangers posed by emo formed part of the way this story was reported, particularly with respect to emo’s alleged connection to self-harming practices. The connections between the emo subculture and the girls’ suicides were often vague and non-specific: Gater and Gestier’s MySpace pages were described as “odes to subculture” (Dowsley 73) and their suicides “influenced by youth subcultures” (Dubecki and Oakes 1), but it was not clearly substantiated in the reports that either Gater or Gestier identified with the emo (or any) subculture (see: Dubecki 3).It was similarly the case that the stories connected the deaths of Gater and Gestier to personal disclosures on MySpace. In contrast to the reporting on Carly Ryan’s murder, however, there were fewer concerns about inappropriate and overly personal disclosures online, and more worries that the teenagers’ online disclosures had been missed by both the girls’ friends and by adult authorities. The apparent suicide warning messages left on the girls’ MySpace pages in the months leading up to the their deaths, including “it’s over for me, I can’t take it!” and “let Steph and me be free” (qtd. in Oakes 5), were seen as evidence of the inaccessibility of young people’s cries for help in an online environment. Headlines such as “Teen Cries for Help Lost in Cyberspace” (Nolan 4) suggest that the concern in this case was less about the “secrecy” of youth culture, and more about an inability of parents (and other adult authorities) to penetrate online youth culture in order to hear disclosures made.As a consequence, parents were encouraged to access these disclosures in other ways: Andrea Burns in an opinion column for the Sunday Herald Sun, for example, urged parents to open the lines of communication with their teenagers and not “leave the young to suffer in silence” (108). An article in the Sunday Age claimed developmental similarities between toddlers and teenagers necessitated increased parental involvement in the lives of teens (Susan Sawyer qtd. in Egan 12). Of course, as Livingstone notes, part of the pleasure of social networking sites for young people is the possibility of escape from the surveillance of parental authority (396). Young people’s status as a social category “to be watched” (Davis 251), then, becomes challenged by the obvious difficulties of regular parental access to teenagers’ online profiles. Perhaps acknowledging the inherent difficulties of fully “knowing” online youth culture, and in turn seeking to make the Gater/Gestier tragedy more explicable and comprehensible, many of the articles attempted to make sense of the apparently unknowable in terms of the familiar and already-known. In this case, the complexities of Gater and Gestier’s deaths were presented as a response to something far more comprehensible to adult authorities: school bullying.It is important to note that many of the articles did not follow government recommendations on the reporting of suicide as they often did not consider the teenagers’ deaths in the context of depression or other mental health risks (see: Blood et al. 9). Instead, some reports, such as the Neil McMahon’s story for The Sydney Morning Herald, claimed that the girls’ deaths could be linked to bullying—according to one friend Stephanie Gestier was “being bullied really badly” at school (1). Others simply assumed, but did not substantiate, a connection between the deaths of the two teenagers and the experience of bullying.For instance, in an opinion piece for The Australian, Gater and Gestier’s deaths are a segue for discussing teenage bullying more generally: “were Gater and Gestier bullied?” writer Jack Sargeant asks. “I do not know but I imagine they were” (10). Similarly, in an opinion piece for the Herald Sun entitled “Why Kids Today Feel so ‘Emo’”, Labor MP Lindsay Tanner begins by questioning the role of the emo subculture in the deaths of Gater and Gestier, but quickly shifts to a broader discussion of bullying. He writes: “Emos sound a lot like kids who typically get bullied and excluded by other kids [...] I’m not really in a position to know, but I can’t help wondering” (Tanner 21).Like Sargeant, Tanner does not make a conclusive link between emo, MySpace, suicide and bullying, and so instead shifts from a discussion of the specifics of the Gater/Gestier case to a discussion of the broader problems their suicides were seen to be symptomatic of. This was assisted by Tanner’s claims that emo is simply a characteristic of “kids today” rather than as a specific subcultural affiliation. Emo, he argued, “now seems to reflect quite a bit more than just particular music and fashion styles”: it is seen to represent a much wider problem in youth culture (Tanner 21).Emo thus functioned as a “way in” for critics who perhaps found it easier to (initially) talk about suicide as a risk for those on the cultural fringe, rather than the adolescent mainstream. As a result, the news coverage circled between the risks posed by subcultural involvement and the idea that any or all young people could be at risk of suicide. By conceiving explicit displays of emotionality online as the expression of bullied young people at risk of suicide, otherwise ambiguous disclosures and representations of emotion could be made knowable as young people’s cries for (parental and adult) help.ConclusionIn the newspaper reporting and commentary on the deaths of Carly Ryan, Jodie Gater and Stephanie Gestier, young people are thought to disclose both too much and not enough. The “cultural thinking-out-loud” (Hartley 17) that characterised this type of journalism presented young people’s disclosures as putting them at risk of harm by others, or as revealing that they are at risk of self harm or suicide. At the same time, however, these reports and commentaries also expressed anxieties that young people do not disclose in ways that can be rendered easily knowable, controllable or resolvable by adult authorities. Certainly, the newspaper coverage works to construct and legitimise ideals of parental surveillance of teenagers that speak to the broader discourses of Internet safety that have become prominent in recent years.What is perhaps more significant about this material, however, is that by constructing young people as a whole as “emotional people” (Vowles 1) in need of intervention, surveillance and supervision, and thereby subsuming the specific concerns about the emo subculture and social networking technologies into an expression of more generalised concerns about the “unknowability” of young people as a whole, the newspaper coverage is, in John Hartley’s words, “almost always about something else” (16). Emo and social networking, then, are not so much classic “folk devils”, but are “ways in” for expressing anxieties that are not always clearly and consistently articulated. In expressing anxieties about the “unknowability” of contemporary youth culture, then, the newspaper coverage ultimately also contributed to it. This highlights both the complexity in which moral panic discourse functions in media reporting, and the ways in which more complete understandings of emo, social networking technologies and youth culture became constrained by discourses that treated them as essentially interchangeable.ReferencesAdamson, Kate. “Emo Death Arrest.” Sunday Herald Sun 4 Mar. 2007: 12.Bennett, Andy. “Subcultures or Neo-Tribes? Rethinking the Relationship between Youth, Style and Musical Taste.” Sociology 33 (1999): 599–617.Blood, Warwick R., Andrew Dare, Kerry McCallum, Kate Holland, and Jane Pirkis. “Enduring and Competing News Frames: Australian Newspaper Coverage of the Deaths by Suicides of Two Melbourne Girls.” ANZCA08: Power and Place: Refereed Proceedings, 2008. 1 Sep. 2009 ‹http://anzca08.massey.ac.nz/›.Burns, Andrea. “Don’t Leave the Young to Suffer in Silence.” Sunday Herald Sun 17 Jun. 2007: 108.Cohen, Stanley. Folk Devils and Moral Panics: The Creation of the Mods and Rockers. St Albans: Paladin, 1973.Cubby, Ben, and Larissa Dubecki. “‘It’s Over for Me, I Can’t Take It!’ The Tragic Last Words of MySpace Suicide Girls.” Sydney Morning Herald 24 Apr. 2007: 1.Cybersmart Guide for Families: Safe Internet Use in the Library and at Home. Australian Communications and Media Authority, 2009. 24 Sep. 2009 ‹http://www.cybersmart.gov.au/Parents/Family safety resources/information for you to download.aspx›.Davis, Mark. Gangland: Cultural Elites and the New Generationalism. St Leonards: Allen and Unwin, 1997.De Souza, Zaineb, and Geoffrey N. Dick. “Disclosure of Information by Children in Social Networking: Not Just a Case of ‘You Show Me Yours and I’ll Show You Mine.’” International Journal of Information Management 29 (2009): 255–61.Dowsley, Anthony. “Websites Hold Key to Teens’ Suicides.” The Daily Telegraph 28 March 2007: 73.Dubecki, Larissa. “Teenagers’ Secret World.” The Age 28 April 2007: 3.Dubecki, Larissa, and Dan Oakes. “Lost in Cyberspace: Fears That New Networks Are Breeding Grounds for Real-Life Tragedies.” The Age 24 April: 1.Egan, Carmel. “Being 16.” Sunday Age 29 Mar. 2007: 12.Goode, Erich, and Nachman Ben-Yehuda. Moral Panics: The Social Construction of Deviance. Oxford: Blackwell, 2002.“Gothic Images Appealed to Artistic Soul.” The Advertiser 24 Feb. 2007: 15.Hartley, John. “‘When Your Child Grows Up Too Fast’: Juvenation and the Boundaries of the Social in the News Media.” Continuum: Journal of Media and Cultural Studies 12.1 (1998): 9–30.Hinduja, Sameer, and Justin W. Patchin. “Personal Information of Adolescents on the Internet: A Qualitative Content Analysis of MySpace.” Journal of Adolescence 31 (2008): 125-46. Hunt, Nigel. “Teen Murder Breakthrough.” Sunday Mail 4 Mar. 2007: 1-2.Littlely, Brian, Chris Salter, and Kim Wheatley. “Net Hunt for Murder Clues.” The Advertiser 23 Feb. 2007: 1, 4.Livingstone, Sonia. “Taking Risky Opportunities in Youthful Content Creation: Teenagers’ Use of Social Networking Sites for Intimacy, Privacy and Self-Expression.” New Media & Society 10.3 (2008): 393-411.Liu, Hugo. “Social Network Profiles as Taste Performances.” Journal of Computer-Mediated Communication 13 (2008): 252-275.Marwick, Alice. “To Catch a Predator? The MySpace Moral Panic.” First Monday 13.6 (2008). 31 Aug. 2009 ‹http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2152/1966›.McMahon, Neil. “School Bullies on Girls’ Sad Road to Oblivion.” Sydney Morning Herald 28 Mar. 2007: 1.Nolan, Kellee. “Teen Cries for Help Lost in Cyberspace.” The Courier Mail 24 Mar. 2007: 4.Novak, Lauren. “Cyber Threat: The New Place Our Kids Love to Play.” Sunday Mail 11 Mar. 2007: 12.Oakes, Dan. “Let Us Be Free: Web Clues to Teen Death Pact.” Sydney Morning Herald 23 Mar. 2007: 5.O’Donohue, Danielle. “Pain and Darkness in ‘Emo’ Dwellers’ World.” The Advertiser 23 Feb. 2007: 5.Redhead, Steve (ed). Rave Off: Politics and Deviance in Contemporary Youth Culture. Aldershot: Ashgate, 1999.Riches, Sam. “Farewell to My Love, My World, My Precious Baby Girl.” The Advertiser 10 March 2007: 15.Rose, Tricia. Black Noise: Rap Music and Black Culture in Contemporary America. Middletown: Wesleyan University Press, 1994.Sargeant, Jack. “It’s Hard to Be Emo and Be Respected.” The Australian 3 May 2007: 10.Tanner, Lindsay. “Why Kids Today Feel So ‘Emo’.” Herald Sun 12 June 2007: 21.Vowles, Gill. “Shock Figures on Emo Culture: Alarm at Teens’ Self-Harm.” Sunday Tasmanian 20 May 2007: 1.Weinstein, Deena. Heavy Metal: The Music and Its Culture. Boulder: Da Capo, 2000.Wheatley, Kim. “How Police Tracked Carly Suspects.” The Advertiser 5 Mar. 2007: 1, 4.Wright, Robert. “‘I’d Sell You Suicide’: Pop Music and Moral Panic in the Age of Marilyn Manson.” Popular Music 19.3 (2000): 365–385.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography