To see the other types of publications on this topic, follow the link: Self- generated pseudonym.

Journal articles on the topic 'Self- generated pseudonym'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 journal articles for your research on the topic 'Self- generated pseudonym.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

He, Bintao, and Shangping Wang. "A Traceable Self-Generated Pseudonym Scheme in VANETs." Journal of Physics: Conference Series 2384, no. 1 (2022): 012020. http://dx.doi.org/10.1088/1742-6596/2384/1/012020.

Full text
Abstract:
Abstract The generation of the pseudonym in vehicular ad hoc networks (VANETs) usually requires the participation of a trusted center (TA), and it needs multiple interactions with the TA. To address these problems, we propose a novel traceable self-generated pseudonym based on the non-interactive zero-knowledge proof (NIZK) and consortium blockchain in VANETs. In our scheme, a self-generated pseudonyms method is introduced to eliminate excessive communication burden, and a consortium blockchain is composed of multiple roadside units (RSUs) to replace the TA. RSUs in the consortium blockchain verify the effectiveness of OBU’s self-generated pseudonyms through the consensus mechanism. Multiple trace authorities (TRAs) are designed to jointly tracking of the real identity of the OBU, which effectively prevents the abuse of supervision by the only supervisor.
APA, Harvard, Vancouver, ISO, and other styles
2

Liew, Hattie. "Anti-fandom in the Xiaxue empire: A celebrity blogger and her haters." Journal of Fandom Studies 7, no. 3 (2019): 261–77. http://dx.doi.org/10.1386/jfs_00004_1.

Full text
Abstract:
The advent of the Internet and user-generated platforms has facilitated the rise of a new breed of celebrity. Bloggers, YouTubers and Instagram stars, armed with their laptops and smartphones, represent an important part of the contemporary media landscape. This article will investigate Singaporean social media influencer Wendy Cheng, known by her pseudonym, Xiaxue. Starting her Internet career as a blogger in 2003, Xiaxue has built a massive online presence over multiple platforms and is arguably one of the most commercially successful Internet celebrities in her country. Her thriving Internet career implies the presence of a large follower and fan base. However, we will look at the other side of the coin ‐ the anti-fans ‐ an often-neglected segment of users in the study of Internet celebrity. These anti-fans, individuals who strongly dislike Xiaxue, can be just as engaged and committed as fans, albeit in different ways. This article will analyse user comments on Xiaxue’s online video channel Xiaxue’s Guide to Life, and anti-fan platform Guru Gossip’s Abhorred Bloggers (Xiaxue) forum. Findings show that Xiaxue’s anti-fandom is driven by a moral economy related to her self-presentation, femininity and nature of her celebrity.
APA, Harvard, Vancouver, ISO, and other styles
3

Sucasas, Víctor, Georgios Mantas, Saud Althunibat, et al. "A Privacy-Enhanced OAuth 2.0 based Protocol for Smart City Mobile Applications." Elsevier Computers & Security 74, no. C (2018): 258–74. https://doi.org/10.1016/j.cose.2018.01.014.

Full text
Abstract:
In the forthcoming Smart City scenario, Service Providers will require users to authenticate themselves and authorize their mobile applications to access their remote accounts. In this scenario, OAuth 2.0 has been widely adopted as a de facto authentication and authorization protocol. However, the current OAuth 2.0 protocol specification does not consider the user privacy issue and presents several vulnerabilities that can jeopardize users' privacy rights. Therefore, in this paper we propose an OAuth 2.0 based protocol for Smart City mobile applications that addresses the user privacy issue by integrating a pseudonym-based signature scheme and a signature delegation scheme into the OAuth 2.0 protocol flow. The proposed solution allows users to self-generate user-specific and app-specific pseudonyms on-demand and ensure privacy-enhanced user authentication at the Service Provider side. The proposed protocol has been validated with Proverif and its performance has been evaluated in terms of time and space complexity. Results show that the proposed protocol can provide users with efficient and effective means to authenticate towards service providers while preventing user tracking and impersonation from malicious entities located in the network side or in the users' mobile device.
APA, Harvard, Vancouver, ISO, and other styles
4

Vine, Tom. "Women, bullying and the construction industry: Twisted gender dynamics in a male-dominated environment." puntOorg International Journal 1, no. 1 (2018): 23–27. http://dx.doi.org/10.19245//25.05.wpn.1.1.5.

Full text
Abstract:
To the extent that it can be construed as harassment, bullying within the workplace is illegal (Gov.uk, 2013). Despite this, evidence suggests that the phenomenon remains widespread, and often proliferates in obscure and ambiguous ways (Miner and Eischeid, 2012). The Advisory, Conciliation and Arbitration Service (Acas) (2013) define bullying as “unwanted behaviour that makes someone feel intimidated, degraded, humiliated or offended”, with examples ranging from “spreading malicious rumours, or insulting someone, to exclusion or victimisation”. We present a subject that has received limited attention within the literature: bullying between women. In fact, this paper focuses on workplace bullying inflicted on women, by women, but in a male-dominated environment. It is against this background that we identify and explore the phenomenon at British Construction (a pseudonym) (BC). The following empirical data reflects the experiences described in the diary of a woman at BC (Tina, one of the authors of this paper). While such experience certainly includes the barriers to recruitment encountered, the emphasis here is on the specific challenges women encounter once working within the male-dominated industry. In fact, Tina was an employee at the company for 15 years and subsequently resigned following sustained bullying by a female colleague together with an employer that would not acknowledge its seriousness, or apply its policies to protect her in the absence of statutory law. On one level the story told in this paper will be one familiar to many of us: daily frustrations at work, resentment and self-doubt. Indeed, most of us accept such occurrences as inevitable. But on another level, the story reveals a dysfunctional behaviour which scholars working in the field of work and organization can actively help ameliorate. The narrative focuses on the phenomenon of bullying between women, and the cultural and leadership mechanisms through which male-dominated workforces apparently facilitate it. By way of analysis, this research uses the framework developed by MacIntosh et al. (2010). The framework suggests women typically experience workplace bullying through a four stage process. The four stages are defined as Being Conciliatory, Reconsidering, Reducing Interference and Redeveloping Balance. Such bullying is here conceptualised as part of what has become known in recent decades as the “Queen Bee Syndrome” (Staines et al., 1973). It is seen to have a detrimental effect not only on those involved directly, but on the broader relations between employee and employer. Whereas the vast majority of existing studies on workplace bullying rely on survey or other quantitative data, we here impart a first-hand experience by means of retrospective autoethnography (sometimes referred to as “autoethnography a posteriori”; see for example Boncori 2013: xvii). We go on to argue that, unaddressed, there are far-reaching implications for organisations, particularly in male-dominated industries. Organisations can mitigate this phenomenon by raising awareness, providing training, establishing and maintaining robust workplace policies, and – perhaps most pertinently - by actively championing gender balance in hitherto male-dominated industries. Additionally, in reflecting on the findings generated we speculate that although the Queen Bee Syndrome implies superficially that women are their own worst enemies (see, for example, findings reported by Rindfleish, 2000), we argue that this phenomenon is deeply entrenched in behavioural norms, the parameters for which have been defined by societal forces more generally. Finally, we delineate recommendations to expand research in this area to encompass the experiences of other women, in other industries.
APA, Harvard, Vancouver, ISO, and other styles
5

Pitts, Frederick Harry, Paolo Borghi, and Annalisa Murgia. "Organising the self-employed: combining community unionism, coworking and cooperativism across contexts." Open Research Europe 3 (May 16, 2023): 80. http://dx.doi.org/10.12688/openreseurope.15798.1.

Full text
Abstract:
The growing insecurity, flexibilisation and fragmentation of labour markets goes hand-in-hand with the decrease of social protection levels and collective representation for workers in non-standard employment relationships, such as the hybrid category of ‘solo self-employed workers’. In response, on the one hand, trade unions attempt to approach and organise this heterogenous category of workers. On the other, new freelancer organisations are emerging to improve worker rights and safety, and overcome their social and professional isolation. Reporting the findings of long-term, slow ethnography, we describe a failed collaboration between three new collective actors in the representation and organisation of self-employed workers. In the second half of the 2010s, two UK organisations, Coworking (all names pseudonyms), a coworking space operator working in a deprived ex-industrial area, and Union, a former industrial union, created Coworking.Union, a cooperative trade union offering services and advocacy for the self-employed. Coworking.Union collaborated with Cooperative, a freelancer cooperative based in Northern Europe, with a view to emulate aspects of its model in the UK. We present a detailed reconstruction of the interactions of the three actors over time, including their context, expectations, and visions, starting from the motivations that generated the first contacts, through to the development of operational agreements, up to the failure of these agreements as relations cooled. The case study, and the failed experiment it captures, constitutes an important opportunity to understand the dynamism, complexity, and contradiction manifest in organising the self-employed. While the strategic ingredients of significant organisational innovation were in evidence between the three actors, it generated instead a failure. The case study thus demonstrates the importance of an in-depth analysis of failed attempts at organising the self-employed and their meaning for broader struggles by old and new actors to alter the terrain of the hybrid areas of employment more generally.
APA, Harvard, Vancouver, ISO, and other styles
6

J., Jenefa, and A. Mary Anita E. "A Signature-Based Secure Authentication Framework for Vehicular Ad Hoc Networks." February 4, 2016. https://doi.org/10.5281/zenodo.1123795.

Full text
Abstract:
Vehicular Ad hoc NETwork (VANET) is a kind of Mobile Ad hoc NETwork (MANET). It allows the vehicles to communicate with one another as well as with nearby Road Side Units (RSU) and Regional Trusted Authorities (RTA). Vehicles communicate through On-Board Units (OBU) in which privacy has to be assured which will avoid the misuse of private data. A secure authentication framework for VANETs is proposed in which Public Key Cryptography (PKC) based adaptive pseudonym scheme is used to generate self-generated pseudonyms. Self-generated pseudonyms are used instead of real IDs for privacy preservation and non-repudiation. The ID-Based Signature (IBS) and ID-Based Online/Offline Signature (IBOOS) schemes are used for authentication. IBS is used to authenticate between vehicle and RSU whereas IBOOS provides authentication among vehicles. Security attacks like impersonation attack in the network are resolved and the attacking nodes are rejected from the network, thereby ensuring secure communication among the vehicles in the network. Simulation results shows that the proposed system provides better authentication in VANET environment.
APA, Harvard, Vancouver, ISO, and other styles
7

J., Jenefa, and A. Mary Anita E. "A Signature-Based Secure Authentication Framework for Vehicular Ad Hoc Networks." International Journal of Information, Control and Computer Sciences 9.0, no. 2 (2016). https://doi.org/10.5281/zenodo.1339213.

Full text
Abstract:
Vehicular Ad hoc NETwork (VANET) is a kind of Mobile Ad hoc NETwork (MANET). It allows the vehicles to communicate with one another as well as with nearby Road Side Units (RSU) and Regional Trusted Authorities (RTA). Vehicles communicate through On-Board Units (OBU) in which privacy has to be assured which will avoid the misuse of private data. A secure authentication framework for VANETs is proposed in which Public Key Cryptography (PKC) based adaptive pseudonym scheme is used to generate self-generated pseudonyms. Self-generated pseudonyms are used instead of real IDs for privacy preservation and non-repudiation. The ID-Based Signature (IBS) and ID-Based Online/Offline Signature (IBOOS) schemes are used for authentication. IBS is used to authenticate between vehicle and RSU whereas IBOOS provides authentication among vehicles. Security attacks like impersonation attack in the network are resolved and the attacking nodes are rejected from the network, thereby ensuring secure communication among the vehicles in the network. Simulation results shows that the proposed system provides better authentication in VANET environment.
APA, Harvard, Vancouver, ISO, and other styles
8

MacDougall, Alan. "'And the Word Was Made Flesh and Dwelt among Us...'." M/C Journal 2, no. 3 (1999). http://dx.doi.org/10.5204/mcj.1751.

Full text
Abstract:
And the Word was made flesh, and dwelt amongst us, ... full of grace and truth. -- John 1, 14. So you use the Internet. Perhaps during the course of today you have interacted with an individual with whom you have had no direct real life experience. In email, on ICQ, or within one of the Activeworlds, you may have come to understand and recognise the personality of someone with whom you interact regularly. Even though you've never met them in the flesh, they have a presence in your life. They may give no clues as to their location or hints at any form of personal identifier. You even accept what they show of themselves as a sort of truth, although it may be unverifiable. What else can you do? In effect, you have been dealing with a pseudonymous individual. The use of pseudonyms "creates a context of 'managed ambiguity', permitting relationship, while offering an opportunity to actively conceal or reveal elements of real-life identity" (Chester & Gwynne). Pseudonymity differs from anonymity in that an alias is bestowed upon or chosen by the user, and used consistently over time. New technologies will allow this idea to be taken even further, with users able to construct untraceable identities for use online. These identities will be the "bodies", the new flesh, the vehicle in which users will conduct their online lives. Like Baudrillard's simulacra, this new flesh may even be a representation of something that does not exist in the real world. The driving forces for Internet pseudonymity may include users' desires to play with the concept of identity and explore their own personalities. As Sherry Turkle notes, "computer-mediated communications can serve as a place for the construction and reconstruction of identities" (Turkle 14). With more and more of our everyday activities occurring online the opportunities increase for creation of an online identity that may be different to that presented in real life. Even in choosing a name for use online, we are creating the new flesh in embryonic form. For example on Internet Relay Chat, like many communication forms on the Internet, there is a lack of visual cues associated with participants. To overcome the lack of information which would otherwise be obtained by viewing participants face to face, a self-chosen name becomes the "only initial way of saying who we are, in literally one word or one expression" (Bechar-Israeli). Thus the chosen name becomes a very important token of identity, and may communicate a quite different picture of its owner than exists in reality. However some Internet users lack the opportunity or inclination for this sort of "play". In particular, for many professional, academic and business users, "their institutional connection is a highly relevant fact" (Wynn & Katz). Conducting themselves pseudonymously would require a long period of reputation and credential building that would interfere with their purpose in using the Internet. Pseudonymity is thus unlikely to be an attractive option for these users. However, out in the wider Internet community, another driver for the development of technological solutions to pseudonymity is a broadly felt concern for privacy on the Internet. In October last year a major survey of Internet users found that respondents ranked privacy as the "single most critical issue facing the Internet" (Graphic, Visualization, & Usability Center). Internet users need assurance that they may conduct online activities without fear of surveillance. The concerns about Internet privacy have expanded beyond the traditional fears of government intrusion to include fears about commercial interests reaching further into our private lives. This latter concern may be best expressed in terms of the commoditisation of private information. Information about the behaviour and patterns of individuals is becoming increasingly valuable in our societies. If information about ourselves is becoming valuable, we hope to respond by controlling access to that information and even requiring something in exchange for its use. Think of a customer loyalty card on which you are collecting "points". In effect, the user has swapped their demographic details and a full purchase history for a prize, or a discount on some future purchase. This allows a commercially useful correlation between the individual and their personal situation, likes, dislikes, wants and needs, and behaviour as a consumer. At the same time the user has (hopefully) gained something from the exchange. For commercial interests on the Internet, such an arrangement is unnecessary because the correlation of individuals with their online behaviour patterns is easier to uncover. One example of this is the recent move of database marketers onto the Internet. Last year IntelliQuest, owners of a large database comprising "over 50% of Internet-enabled households" (IntelliQuest), announced a plan to join forces with 24/7, an Internet advertising firm. Unless the user indicates otherwise, Intelliquest will collect demographic data when a software product is registered online. An identifying file (a "cookie") is placed on the user's hard-drive which can be "read" by Websites visited subsequently. 24/7, in cooperation with the visited Website, are then able to serve advertisements targeted to the specific user. 24/7 will track the movements of specific users, and can then "supply IntelliQuest with online surfing habits to supplement [Intelliquest's] demographic information" (Bicknell). In effect, the Internet user has given away their demographic data and a full browsing history for nothing in return. In response to issues of this nature, researchers around the world are developing methods to separate the content of online communications from association with individual senders and receivers. An example is "Crowds", which "operates by grouping users into a large and geographically diverse group (crowd) that collectively issues requests on behalf of its members" (Reiter & Rubin). This prevents a Webserver from identifying the original user requesting a Web page. At the same time, the user could also employ the "Lucent Personal Web Page Assistant" which inserts randomly generated pseudonyms "into Web forms that request a user's name". The system is designed to "consistently use the same pseudonyms every time a particular user returns to the same site, but use a different pseudonym at each Web site" (Cranor). Although each Website may gain information about the browsing habits of a particular pseudonymous user on their own site, it is unable to cross-reference that information with other sites and databases. Taking these and related ideas further is Zero-Knowledge Systems, whose unreleased "Freedom" product reportedly allows the user to create multiple untraceable digital pseudonyms. The company even states that using Freedom to create different pseudonyms gives the user the "opportunity to separately explore completely different areas of the Internet and avoid being profiled by Internet marketers" (Zero-Knowledge Systems). As yet, all of these technologies are immature and often require a motivation and degree of proficiency possibly beyond that of many Internet users. But increasingly the trend is for the technologies to be built invisibly into the lower levels of Internet infrastructure, so that the user may only need to overtly choose who or what they want to be today. The technical details of presenting a consistent and pseudonymous identity will be taken care of automatically. Pseudonymity, and especially anonymity, on the Internet are subject to abuse. Several anonymous remailers, forerunners of systems like Freedom, have had to shut down or restrict their services. In most cases this was not because of criminal or libellous abuse (which would be difficult to prove given the nature of the systems concerned), but because of mass email spam being routed through them. Authorities worldwide are naturally concerned that anonymising and pseudonymising systems may shield the activities of serious criminals. The Cypherpunks, a loose grouping of Internet cryptography and anonymity advocates, term this the "Four Horsemen of the Infocalypse" scenario. Cypherpunks see authorities exaggerating the spectres of "terrorists, paedophiles, drug dealers, and money launderers" ("Adam") in their arguments for greater regulation of the Internet. Despite the hyperbole on both sides, these are serious issues over which debate will intensify. Up until now a deterrent to crime has been the possibility that a criminal might be held responsible for their actions and be bodily removed from society by being taken to prison. With a real life crime committed under conditions of untraceable pseudonymity, only the criminal's pseudonym may be identified. The pseudonymous identity may be removed from society by perhaps somehow being prevented from using the network. But the actual criminal is still free to create another pseudonym and resume activities. Thus, the pseudonymous identity is not subject to the same physical controls or constraints on behaviour as the bodies we use in real life. Perhaps even more alarmingly, the new flesh may still be subject to what could arguably be seen as derivations of real life crimes, such as rape. By the same token this freedom from constraint could also be a positive thing. A person could choose to shape a pseudonymous identity quite different from their real life identity. They might choose a different name, gender, age, body or personality type; and if they are unsatisfied with their experiment, they may try another. Here, the new flesh allows changes in appearence and personality without therapy or surgery. Explorations of the possibilities inherent in the new flesh might help reconcile people to their problems with the old. The improvement and eventual transparency of pseudonymity enhancing technologies will have wide ranging effects. David Post, of the Cyberspace Law Institute, believes pseudonymous speech "is valuable in a way that anonymous speech is not and cannot be, because it permits the accumulation of reputational capital and 'goodwill' over time in the pseudonym itself, while simultaneously serving as a liability limitation insulating the speaker's 'true identity' from exposure" (Post). Given enough time, we may come to accept and trust a pseudonymous identity without needing to question its real life owner. An individual may ultimately be judged less on who or what they are and more on what they are actually seen to do. Pseudonymous life will permit individuals to take part in all aspects of Internet society, to build communities, participate in electronic commerce, and explore aspects of human existence independently and without compromising their real life identities. As the use of the Internet broadens we shall likely see not only pseudonyms in use, but also avatars, representations of a physical form that the user has chosen as their outward appearance. These may be seen now in some three-dimensional interactive spaces, such as Activeworlds, where the user can construct their own body. The avatar is "seen" by other users as the form and location of a pseudonymous individual. One wonders if the new flesh will be a replacement for the old, rather than a sort of supplement. Certainly there is not the technology available now or in the near future for pseudonymous life as a full replacement for the real, The Matrix notwithstanding. Would anyone really want a full replacement which is technically inferior to the real thing? But perhaps without wanting to divorce themselves from the real world, users will still take up pseudonyms for varied reasons -- among them a desire for experiment, privacy, or simply because their Internet Service provider offers the facility. Stewart Brand once said "we are as gods and might as well get good at it". In terms of the Internet, the potential for an almost godlike power to create identities and appearances could lead to a virtual world of the word made flesh. This new flesh may not necessarily be full of grace and truth, but it will dwell amongst us. References "Adam". "The Four Horsemen of the Infocalyse." 1995. 16 Apr. 1999 <http://www.decode.com/fourhorsemen.php>. Bechar-Israeli, Haya. "From <Bonehead&gt to <cLoNehEAd&gt: Nicknames, Play, and Identity on Internet Relay Chat." 1995. 3 May 1999 <http://www.ascusc.org/jcmc/vol1/issue2/bechar.php>. Bicknell, Craig. "Database Marketing on the Web." 1998. 8 Apr. 1999 <http://www.wired.com/news/news/business/story/15456.php>. Chester, Andrea, and Gillian Gwynne. "Online Teaching: Encouraging Collaboration through Anonymity." Journal of Computer Mediated Communication 4.2 (1998). 12 Apr. 1999 <http://www.ascusc.org/jcmc/vol4/issue2/chester.php>. Cranor, Lorrie. "Internet Privacy: A Public Concern." 1998. 7 Apr. 1999 <http://www.research.att.com/~lorrie/pubs/networker-privacy.php>. Graphic, Visualization, & Usability Center. "10th WWW User Survey." 1999. 7 Apr. 1999 <http://www.gvu.gatech.edu/gvu/user_surveys/survey-1998-10/>. IntelliQuest. "IntelliQuest's Rapidly Growing High-Tech Household Database Now Identifies More Than 11.5 Million Internet-User Households." 1999. 8 Apr. 1999 <http://www.iq2.net/news/hthh.htm>. Post, David. "Pooling Intellectual Capital: Thoughts on Anonymity, Pseudonymity, and Limited Liability in Cyberspace." 1996. 14 Apr. 1999 <http://www.cli.org/DPost/paper8.htm>. Reiter, Mike, and Avi Rubin. "Anonymity Loves Company." 1999. 14 Apr. 1999 <http://www.research.att.com/projects/crowds/>. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Touchstone, 1995. Wynn, Eleanor, and James Katz. "Hyperbole over Cyberspace: Self-presentation & Social Boundaries in Internet Home Pages and Discourse." The Information Society 13.4 (1998). 13 Apr. 1999 <http://www.slis.indiana.edu/TIS/hyperbole.php>. Zero-Knowledge Systems. "What is Freedom?" 1999. 14 Apr. 1999 <http://www.zeroknowledge.com/products/what.asp>. Citation reference for this article MLA style: Alan Macdougall. "'And the Word Was Made Flesh and Dwelt among Us...': Towards Pseudonymous Life on the Internet." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/life.php>. Chicago style: Alan Macdougall, "'And the Word Was Made Flesh and Dwelt among Us...': Towards Pseudonymous Life on the Internet," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/life.php> ([your date of access]). APA style: Alan Macdougall. (1999) 'And the word was made flesh and dwelt among us...': towards pseudonymous life on the Internet. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/life.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
9

Nafisul Kiron, Ifeoma Adaji, Jeff long, and Julita Vassileva. "Engaging Students in a Peer‑Quizzing Game to Encourage Active Learning and Building a Student‑Generated Question Bank." Electronic Journal of e-Learning 18, no. 3 (2020). http://dx.doi.org/10.34190/ejel.18.3.1906.

Full text
Abstract:
Games are a great source of entertainment and are used by people of all ages; they motivate and engage people and affect their behavior. Therefore, games have been widely studied in many non‑game contexts. Education is one of those areas where gamified, and game‑based learning strategies have been implemented and explored. To engage and motivate students to quiz each other, and as a side effect, build a question bank, as well as to study the gaming and learning behavior of students, we used a peer‑quizzing game called "Tower of Questions" (ToQ). The game uses some themes and mechanics found in tower defense (TD) games. The students received points for posing and answering the questions in the game in the form of gems. Students played the game with pseudonyms for one academic term and were told not to disclose their identities to anyone. We conducted a 3‑month long study for two consecutive years in the same first‑year undergraduate computer science course. In this paper, we present the findings from our studies using ToQ, specifically findings related to the students’ self‑monitoring and quizzing activities based on the game logs and two self‑reported surveys from data collected in the second year of the study.
APA, Harvard, Vancouver, ISO, and other styles
10

Pitts, Frederick Harry, Paolo Borghi, and Annalisa Murgia. "Organising the self-employed: combining community unionism, coworking and cooperativism across contexts." Open Research Europe, May 16, 2023. https://doi.org/10.12688/openreseurope.15798.1.

Full text
Abstract:
The growing insecurity, flexibilisation and fragmentation of labour markets goes hand-in-hand with the decrease of social protection levels and collective representation for workers in non-standard employment relationships, such as the hybrid category of 'solo self-employed workers'. In response, on the one hand, trade unions attempt to approach and organise this heterogenous category of workers. On the other, new freelancer organisations are emerging to improve worker rights and safety, and overcome their social and professional isolation. Reporting the findings of long-term, slow ethnography, we describe a failed collaboration between three new collective actors in the representation and organisation of self-employed workers. In the second half of the 2010s, two UK organisations, Coworking (all names pseudonyms), a coworking space operator working in a deprived ex-industrial area, and Union, a former industrial union, created Coworking.Union, a cooperative trade union offering services and advocacy for the self-employed. Coworking.Union collaborated with Cooperative, a freelancer cooperative based in Northern Europe, with a view to emulate aspects of its model in the UK. We present a detailed reconstruction of the interactions of the three actors over time, including their context, expectations, and visions, starting from the motivations that generated the first contacts, through to the development of operational agreements, up to the failure of these agreements as relations cooled. The case study, and the failed experiment it captures, constitutes an important opportunity to understand the dynamism, complexity, and contradiction manifest in organising the self-employed. While the strategic ingredients of significant organisational innovation were in evidence between the three actors, it generated instead a failure. The case study thus demonstrates the importance of an in-depth analysis of failed attempts at organising the self-employed and their meaning for broader struggles by old and new actors to alter the terrain of the hybrid areas of employment more generally.
APA, Harvard, Vancouver, ISO, and other styles
11

Chateau, Lucie. "“Damn I Didn’t Know Y’all Was Sad? I Thought It Was Just Memes”: Irony, Memes and Risk in Internet Depression Culture." M/C Journal 23, no. 3 (2020). http://dx.doi.org/10.5204/mcj.1654.

Full text
Abstract:
Depression memes are a widespread phenomenon across all social media platforms. To get your hit of depression memes, you can go to any number of pages on Facebook, the subreddit “2me4meirl”, where the posts that are “too real” for more mainstream subreddits go, but nevertheless counting over one million subscribers or, on Instagram, and find innumerable accounts dedicated to “sad memes”, many with tens to hundreds of thousands of followers. In a recent study, depression memes were found to be responsible for 35 per cent of the content researchers analysed in the “#depressed” hashtag on Instagram (McCosker and Gerrard). As a subculture, it is one that has truly embraced the polyvocality of memes, allowing many voices to speak at once through their lack of fixed meaning (Milner). In depression memes, polyvocality allows the user to identify with any number of anxieties affectively represented by the memes without being authentically tied to them, under the guise of irony. Therefore, depression memes find themselves being used in a myriad of ways that do not refer to a stable structure of meaning. This allows me to problematise their roles as both masks and intimate texts within an ironic meme culture.Drawing on traditional readings of irony such as Wayne C. Booth but also contemporary approaches to authenticity, mask cultures and meme culture (de Zeeuw; Tuters), this article situates depression memes specifically within neoliberal regimes of feeling, manifested both in online practices of authenticity and the subject of value (Skeggs and Yuill) and in discourses of resilience and accountability surrounding mental health (Fullagar et al.; James; McCosker). It argues that an internet depression culture based on the principles of dissimulation serves both the purpose of protection from recuperation by dominant narratives but paradoxically creates an ambiguity that generates that risk. In this way, I speak to current anxieties surrounding memes, including ambiguity, irony, and identity formation.Internet Depression Culture Intrinsic to their nature as memes, depression memes can be found in a variety of spaces, formats and platforms. The ones below (Figure 1) circulate on mainstream social media platforms like Facebook and Instagram through accounts dedicated to “sadposting” or the sharing of mental illness memes. They refer to overwhelming feelings of anxiety, a lack of will to live and a desire to recover. In their recent study on hashtagging depression on Instagram, McCosker and Gerrard found memes to be responsible for a wide range of content in the “depressed” hashtag on the platform. They argue that the use of the hashtag “depressed” is primarily as a “memetic device, often with a sense of irreverence, subversiveness and pathos, but in an effort to use the connective power of the popular tag to gain attention and Likes” (McCosker & Gerrard 9). Intimacy and memes as identity performance are therefore intimately intertwined, espousing the memetic logic that there is “safety in relatability” (Ask and Abidin 844), which is dependent on “connecting to common anxieties in a pleasurable, noncompromising way” (Kanai 228).Figure 1. Depression Memes. Sources, from left to right. Top row: <https://www.instagram.com/p/Bl5p88Tg8Cw/>; <https://www.facebook.com/mentallythrillmemes/>; <https://twitter.com/animatedtext>. Bottom row: <https://lovenotlogic.tumblr.com/post/168640369069>; <https://disasterlesbian.com/post/158174792381>; <https://www.facebook.com/mentallythrillmemes>.Indeed, meme culture depends both on the notion that certain forms of content can be relied on to “gain attention and likes” and increase a user’s social capital, but can also be interpreted as intimate and private forms of expression. The popularity of depression memes is a testament to this principle, but at the heart of this culture is a usage of irony that remains ambiguous and undefined. Whether these texts can be found to reflect genuine feelings of relatability is complex, but ultimately irrelevant. As Burton remarks on the culture of Kek, “sociologically speaking”, the sharing of these memes still constitutes a cultural engagement. Therefore, what I refer to as internet depression culture must be understood not as an attitude of self-presentation, but an inter-affective network that relies on precarious and overwhelmingly ironic objects whose authenticities as intimate texts are dependent on volatile and unstable structures of meaning.Wayne C. Booth’s A Rhetoric of Irony tells us that for an expression to be understood as ironic, their meaning needs to be reconstructed by the reader and intended by the author. The reader must therefore draw from the cultural and historical context of the expression to reconstruct covert meaning that the author intended. The inferential process draws from the context of the expression to give meaning to irony. Online, the cultural context in which depression memes have risen to popularity is precisely that which gives them their reason for being. To understand this, we need to realise that, for the last decade, the symptoms that depression memes cultivate have been lying dormant under the tyranny of happiness era of social media (Freitas). I tie this notion to the doctrine of authenticity behind the identity imperative of social media platforms like Facebook (Van Dijck), and contrast it to the forms of subjectivisation anonymous or pseudonym-based cultures on platforms like 4chan embody. Within this dialectic, memes have arisen as the logic of the Internet, and irony as their social contract (Tuters; Burton). New forms of sociality that manifest within this culture are necessarily ambiguous and risk-filled ones, and need to be explored.From the Happiness Effect to a New Sensibility In The Happiness Effect, Donna Freitas investigated social media usage in young adults by surveying over 800 college students about the relationship between social media and their emotional well-being. Her results allowed her to coin the term “happiness effect”, when: “young people feel so pressured to post happy things on social media”. She writes: “most of what everyone sees on social media from their peers are happy things; as a result, they often feel inferior because they aren’t actually happy all of the time” (14). Feelings of inadequacy result when users interpret what other users post to be authentically felt, despite themselves feeling “pressured” to post a certain type of content, one they do not resonate with but fabricate for the purpose of posting. Indeed, the authenticity imperative behind identity-based social media is what defines our relationship to it.Identity-based platforms like Facebook rely on allowing the user to create an identity on their site, but demand from users that the platform be used for “‘expressing who they are’, implying that users do not “perform” their identity on Facebook; they are the selves they portray on Facebook” (Kant 34). As always, this must be situated within the commercial logic behind the seemingly “free” and “public” service the platform offers. Multiplicity and having “multiple identities” (van Dijck) does not cooperate with Facebook’s platform logic because it does not produce valuable legible data which conforms to “normative, regulatory and commercially viable frameworks” (Kant 35). As Skeggs and Yuill note, the contemporary neo-liberal imperative to perform and authorize one’s value in public is more likely to produce a curated persona rather than the “authentic” self demanded by Facebook (380). The happiness effect manifests this. Despite not being legitimate, an identity must be curated to fit in with the other performed personas on the platforms, which are taken as authentic.To many, the irony that makes depression memes such as those in Figure 1 work is in their subversion of the happiness effect and the authenticity imperative. The meaning to be reconstructed in a depression meme consists in peeling back the layer that demands from us to act as the best, happiest, version of ourselves online. Simply put, it unmasks the actual authentic self behind the curated one. Therefore, the self made visible by partaking, sharing or liking depression memes is not necessarily the best one, but, fundamentally, it is a more authentic one. Indeed, it seemed that, in the early phase of its life, users were enamoured with depression memes because it released them from the burden of identity management. What emerged in this phase of the depression memes movement was the perception of a new sensibility based on a more authentic intimacy than had ever been associated with memes. Press coverage of the topic continued to celebrate the emancipatory potential of depression memes, citing the movement as reflective of a new, more sentimental public made possible by the internet (Roffman).As has been argued before by McCosker, the forms of digital intimacy that render personalised distress visible are ones entrenched in visibility and authenticity, pillars of the face culture of Facebook. Comments on memes or reviews of depression meme pages continuously cited relatability and visibility as their reason for identification with the page. Users felt that these memes allowed them to be seen online, with their mental illness, and feel intimately connected to other viewers; “it feels good to know that other people go through the same thing as me” (Figure 2). Though it is a form of public performance, the intimacy generated here feels inherently private because it relies on unravelling certain structures of meaning. This is a skill that, users imply, can only be attained by having experienced the feelings evoked in the depression memes. In these comments, intimacy is a form of identity performance, and a discourse of accountability underpins one of authenticity. Irony, though present, is quickly reconstructed and explained away into more stable structures of meaning through these discourses.Figure 2. Reviewers of “Mentally thrill memes” on Facebook. Irony and Masked PracticesHowever, the tension produced within the user’s psyche by years of subjectivisation and the “curated self” has taken its toll. The social contract of irony in digital culture has come just in time to recuperate authenticity from the burden of management it was placing on its subjects. I’ve spoken to the use of irony as generative of new forms on intimacy, but here I turn to how irony can simultaneously be adopted for the purposes of evading that stifling regime of the self and doctrine of authenticity. In terms of platform moderation in the case of sensitive or problematic issues, subversion through irony allows an alternative discursive economy to exist by evading censorship. When it rejects models through which the self can be turned into data by turning its back on commensurable ways of displaying public emotion, it is a commentary on the authenticity culture of social media. In this, it reflects practices of dissimulation.Ideologically, anonymity and multiplicity in the “deep vernacular web” stands in antithesis to the doctrine of authenticity. Anonymised imageboard cultures such as those found on 4chan have moulded themselves as the Other to the straightforward intentionality of profile based social media (de Zeeuw, Between). Their truth is in their collectivistic rejection of authenticity, constituting an anti-personal, faceless and authorless mass, infamous for their subversion through trolling. They obey an Internet logic that can be summarised as follows; “the internet is not serious business, and anyone who thinks otherwise should be corrected and is, essentially, undeserving of pity” (Tuters). In this, the logic of dissimulation operates as their reason for being. Dissimulation entails a play with identity, one not interested in stability but more in the constant deferral of meaning and self. This negotiation is based on evading the notion of the self in order to gain further freedom through collective play. For these anonymised and anti-personal cultures, the value of dissimulation is to mediate their relationship to society at large.Indeed, as Daniel de Zeeuw notes, mask cultures’ play with identity is not simply a reactionary movement against the subjectivisation of social media but can be understood as part of a rich carnivalesque tradition which revels in the potential of the mask. In this case, the collective culture gathers around the picture of the mask as a symbol of the “dialectic between the masked mass and the authorial, personal self” (de Zeeuw, Immunity 276). The notion that a more authentic, truer self lies under a series of masks is also one taken up by psychoanalysis and various schools of thought. In this way, irony has often been compared to “peering behind a mask” (Booth 33), leading to its valorisation as an act of dissimulation by these cultures. Taking as gospel that “there is no true Self, only an endless series of interchangeable masks” (Lovink 40), for these cultures the mask “is the work of art that best exemplifies the detachment achieved through irony” (Trilling 120). However, irony “risks disaster more aggressively than any other device” (Booth 41). The potential that mask cultures value irony for also creates risk because it trains readers to expect something but never tells us when to stop interpreting its irony. The emancipatory capacity of irony then, is a tension-filled one.Ironic Depression MemesDepression memes I addressed before peel back the layers of the happiness effect and social media cultures by legitimising themselves through authenticity. I turn now to ironic memes about depression memes and their tie to the principles of dissimulation as influenced by mask cultures. Meme culture’s existence across social media platforms, and structural nature as logic of ironic undermining means that, once depression memes were praised in earnest as the new sensibility of the Internet, the next step for the depression memes movement was to be deeply disingenuous and self-aware about the promise of authenticity they were offering. Memes about depression memes are meta memes that are self-reflective about the depression meme movement, referencing using memes to combat loneliness, sadness or overthinking in an ironic way.Figure 3. Ironic memes referencing the use of depression humour. Sources, from left to right. Top row: <https://www.instagram.com/p/B3aH9cmIr1L>; <https://www.reddit.com/r/MemeEconomy/comments/8wotcn/invest/>; <https://jennyhoelzer-deactivated2016120.tumblr.com/post/153443805168/>. Bottom row: <https://twitter.com/animatedtext>; <https://www.instagram.com/p/B0ZsQAMHiAU>; <https://www.reddit.com/r/2meirl4meirl/comments/8se3l5/2meirl4meirl/>.Ironic depression memes can be found on the same platforms other depression memes circulate in, existing as a parallel discourse to, and meta-commentary on, the celebratory, cathartic engagement in depression memes as seen on Facebook. They acknowledge the use of the mask, drawing attention to the divide between one’s chosen digital self-presentation and offline identity. Through this, they re-edify boundaries that depression memes were praised as obliterating. In the ironic memes above, presenting yourself as depressed online is okay, but actually being depressed is no laughing matter (actual suicide = no), and therefore should not be memed about. Memes are a mask that depressed millennials offer to other depressed millennials, to be used against depression, sadness, and overthinking, but mostly to hide that, though the memes are “ironic”, the depression is still very much “chronic”.Ironic depression memes shed the burden of cultures of authenticity and accountability when they disavow the notion of a fixed self. The use of the meme as a mask evokes a privacy and anonymity found within irony that rejects the contemporary mediation of mental ill health through a set of discourses based in neoliberal personhood (Fullagar et al.; McCosker). The bonds being made here are supposedly private, revelling in the facelessness of collective irony, but both weak and risky. The value of the meme is defined by the acknowledgement of the usage of the mask to hide emotions still too taboo or painful to publicly gesture too. Though depression memes undermine that authenticity and accountability should be the pillars of mental health discourse, their use of irony creates unstable ground for a new structure of feeling to emanate from these memes. Irony is about expecting something to mean something else, therefore valuing one set of meaning over another (Booth 33). If the new set of meaning fundamentally cannot be identified, which is key in dissimulation and mask-cultural practices, then this new culture opens up ambiguity which can be recuperated by dominant narratives. In this way, I argue that dissimulation serves the purposes of protection from the mediation of depression through individualising discourse, but paradoxically creates an opening to do so. Wholesome Memes and Resilience I turn now to how “wholesome memes” provide non-ironic commentary on the irony of memes. I argue that, even in a logic removed from the authenticity imperative of face media, and therefore from a notion of identity and profile based interaction, narratives of accountability still recuperate the subversion of depression memes. In the case of depression memes, discourses of resilience and overcoming are promoted as the “correcting” set of values, preferential to the ambiguous multiplicity of dissimulation. Figure 4. “Fixedyourmeme” wholesome memes making use of editing and re-writing.The “wholesome memes” movement aims to edit and correct depression memes, such as examples from a Tumblr page entitled “fixed your meme”. These memes take on popular meme formats that are either neutral and open to remixing, or are known in popular meme culture to be predetermined. On the right, “My memes are ironic, my depression is [chronic]” is a popular motif whose grammar is predetermined (seen in Figure 3) but also an easily deciphered subtext, even if written over, if one is well-versed in meme culture and the mechanisms through which it replicates itself. The explicit editing and re-writing, crossing out the “toxic” message to make apparent the re-writing of the narrative, is purposeful here. The relation to resilience is built as much inside and outside the text. It serves to exemplify the overcoming of the mental illness and the move towards a radical attitude of self-love and recovery. Wholesomeness, positivity, wellness and self-care are the keywords. In these texts, the wellness industry serves as a counter-narrative, preaching a discourse that dictates: “it is within an individual’s power and even a moral obligation to be happy” (Garde-Hansenand Gorton 104).When I refer to resilience, I refer to a specific kind of discourse as coined by Robin James that follows the logic of acknowledging and overcoming damage in order to be “rewarded with increased human capital, status, and other forms of recognition and recompense” (19). Overcoming brings added human capital because it demonstrates resilience which boosts society’s resilience. When depression memes render embodied suffering visible and publicly intelligible, they perform resilience through a therapeutic narrative. In these types of narratives, we see what Fullagar et al. describe as “affective work and action which is required in efforts to be ‘happy’ and achieve ‘normality’” that “commonly evokes a particular form of introspection and surveillance” (10). In this way, wholesome memes can be thought of as an affective assemblage that recuperates narratives of subversion as embodied by ironic memes and mask cultures, thereby “re-ordering flows through capitalist relations that exploit the connection between desire and lack” (Holland 68). Conclusion Internet depression culture operates at the crux of meme culture and neoliberal subjectivisation by both enacting and overcoming mental health regimes of care through irony. The irony within depression memes to be reconstructed is dependent on two structures of meaning. The first is the one within which the memes are being read and interpreted, namely an online meme culture and its collective irony imperative, which I argue is also a parallel discursive area of the neoliberal subjectivisation of value on social media. The second is a product of years of increasing individualisation of mental health discourse, one that emphasises resilience and overcoming in line with values of authenticity and accountability. In different Internet cultures, the intersection of these two contexts manifests differently. Online, irony and polysemy are both tools of subversion and privacy. However, cultures of play are constantly challenged by social media and places where dominant narratives are ones of authenticity and accountability. Depression memes demonstrate that irony can be mobilised into authentic flows of intimacy in the context of certain dominant discourses.Figure 5. “I thought it was just memes”. Source: <https://thisiselliz.com/post/152882025410>.ReferencesAsk, Kristine, and Crystal Abidin. “My Life Is a Mess: Self-Deprecating Relatability and Collective Identities in the Memification of Student Issues.” Information, Communication & Society 21.6 (2018): 834-850.Booth, Wayne C. A Rhetoric of Irony. Chicago: U of Chicago P, 1974.Burton, Tara. “Apocalypse Whatever.” Real Life 13 Dec. 2016. <https://reallifemag.com/apocalypse-whatever/>.De Zeeuw, Daniël. "Immunity from the Image: The Right to Privacy as an Antidote to Anonymous Modernity." Ephemera 17.2 (2017): 259-281.———. Between Mass and Mask: The Profane Media Logic of Anonymous Imageboard Culture. PhD Dissertation. Amsterdam: University of Amsterdam, 2019. <https://hdl.handle.net/11245.1/c0c21e79-4842-40ef-9690-4d578cca414b>.Fullagar, Simone, Emma Rich, Jessica Francombe-Webb, Jessica and Antonia Maturo. “Digital Ecologies of Youth Mental Health: Apps, Therapeutic Publics and Pedagogy as Affective Arrangements” Soc. Sci. 6.135 (2017): 1-14.Freitas, Donna. The Happiness Effect: How Social Media Is Driving a Generation to Appear Perfect at Any Cost. New York: Oxford UP, 2017.Garde-Hansen, Joanne, and Kristyn Gorton. Emotion Online: Theorizing Affect on the Internet. Basingstoke: Palgrave Macmillan, 2013.Holland, Kate. “Biocommunicability and the Politics of Mental Health: An Analysis of Responses to the ABC’s ‘Mental As’ Media Campaign.” Communication Research and Practice 3 (2017): 176-93.James, Robin. Resilience & Melancholy: Pop Music, Feminism, Neoliberalism. John Hunt Publishing, 2015.Kanai, Akane. “On Not Taking the Self Seriously: Resilience, Relatability and Humour in Young Women’s Tumblr Blogs.” European Journal of Cultural Studies 22.1 (2019): 60-77.Kant, Tanya. "‘Spotify Has Added an Event to Your Past’: (Re)writing the Self through Facebook’s Autoposting Apps." Fibreculture Journal 25 (2015): 30-61.Lovink, Geert. Networks without a Cause: A Critique of Social Media. Cambridge: Polity, 2011.McCosker, Anthony, and Ysabel Gerrard. “Hashtagging Depression on Instagram: Towards a More Inclusive Mental Health Research Methodology.” New Media & Society (2020). <https://doi.org/10.1177/1461444820921349>.McCosker, Anthony. "Digital Mental Health and Visibility: Tagging Depression." In Digital Media: Transformations in Human Communication. Eds. Paul Messaris and Lee Humphreys. New York: Peter Lang, 2017.Milner, Ryan M. “Pop Polyvocality: Internet Memes, Public Participation, and the Occupy Wall Street Movement.” International Journal of Communication 7 (2013): 2357-2390.Rottenberg, Jonathan. “Ending Stigma by All Memes Necessary.” Huffington Post, 10 Apr. 2014. <https://www.huffingtonpost.com/jonathan-rottenberg/depression-stigma_b_5108140.html>.Skeggs, Beverley, and Simon Yuill. “Capital Experimentation with Person/a Formation: How Facebook's Monetization Refigures the Relationship between Property, Personhood and Protest.” Information, Communication & Society, 19.3 (2016): 380-396.Trilling, Lionel. Sincerity and Authenticity. Cambridge, Mass.: Harvard UP, [1974] 2009.Tuters, Marc. "LARPing & Liberal Tears: Irony, Belief and Idiocy in the Deep Vernacular Web." In Post-Digital Cultures of the Far Right. Eds. Maik Fielitz and Nick Thurston. Wetzlar: Transcript, 2019. 37-48.Van Dijck, José. "‘You Have One Identity’: Performing the Self on Facebook and LinkedIn." Media, Culture & Society 35.2 (2013): 199-215.
APA, Harvard, Vancouver, ISO, and other styles
12

Ando, Andrei, and Mihaela Ozarchevici. "AMPLIFICATION BY ANONYMITY, AN UNASSUMING TOOL OF CYBERBULLYING." International Journal of Legal and Social Order 4, no. 1 (2024). https://doi.org/10.55516/ijlso.v4i1.212.

Full text
Abstract:
The paper explores the phenomenon of amplification through anonymity as a form of cyber-bullying in the Romanian media, highlighting how online anonymity influences user behavior, through what specialists call "the effect of online disinhibition." In the absence of personal responsibility and identification, users have the possibility of posting multiple comments under different pseudonyms, inducing the perception of a broad consensus around certain opinions. This phenomenon is known as the "False Consensus Effect" and is often used to create false impressions on public opinion, manipulating readers' perceptions and increasing psychological pressure on targets. Diaz and Nilsson (2023) have shown that internet manipulation often tends to alter individuals’ behavior. By accepting their comments, by generating a group of supporters, they feel entitled to expose a point of view, to support it beyond the limits of accepted social conventions. In the 2000s, the concept of "cognitive hacking" was launched and it is detailed in the research of Thompson, Trevisani and Sisti (2004). Cognitive hacking is actually a cyber attack against an individual, likely to change the perception and behavior of others towards him. At the same time, the paper highlights how some publications contribute to this manipulation through selective editorial filters and even by involving journalists in comment sections, using a subjective tone, contrary to the editorial objectivity they should respect. Also, the comment rating systems (through upvotes or ratings) are susceptible to manipulation, allowing users to self-amplify their opinion and create the illusion of collective support. Legally, these practices raise issues related to disinformation and manipulation of public opinion, but also to the responsibility of platforms and publications towards user-generated content. According to the legislation of online communication and protection against cyberbullying, there is a need for stricter regulation of anonymity and editorial control mechanisms. The European Union, for example, has adopted a series of legislative measures in this regard, through the Digital Services Act (DSA), which requires social media platforms to limit the abuse of anonymity and make users responsible for the content posted. Also in this context, a simple and effective mechanism for moral sanitation of the online press forum is at the disposal of editors: filtering comments, as well as displaying the IP address, are ways to highlight multiple comments posted by the same user under different nicknames. Starting from these ideas, the paper proposes an interdisciplinary analysis, examining from a journalistic, sociological and legal point of view the challenges brought by online anonymity and its role in amplifying cyber-bullying phenomena.
APA, Harvard, Vancouver, ISO, and other styles
13

Stewart, Jon. "Oh Blessed Holy Caffeine Tree: Coffee in Popular Music." M/C Journal 15, no. 2 (2012). http://dx.doi.org/10.5204/mcj.462.

Full text
Abstract:
Introduction This paper offers a survey of familiar popular music performers and songwriters who reference coffee in their work. It examines three areas of discourse: the psychoactive effects of caffeine, coffee and courtship rituals, and the politics of coffee consumption. I claim that coffee carries a cultural and musicological significance comparable to that of the chemical stimulants and consumer goods more readily associated with popular music. Songs about coffee may not be as potent as those featuring drugs and alcohol (Primack; Schapiro), or as common as those referencing commodities like clothes and cars (Englis; McCracken), but they do feature across a wide range of genres, some of which enjoy archetypal associations with this beverage. m.o.m.m.y. Needs c.o.f.f.e.e.: The Psychoactive Effect of Coffee The act of performing and listening to popular music involves psychological elements comparable to the overwhelming sensory experience of drug taking: altered perceptions, repetitive grooves, improvisation, self-expression, and psychological empathy—such as that between musician and audience (Curry). Most popular music genres are, as a result, culturally and sociologically identified with the consumption of at least one mind-altering substance (Lyttle; Primack; Schapiro). While the analysis of lyrics referring to this theme has hitherto focused on illegal drugs and alcoholic beverages (Cooper), coffee and its psychoactive ingredient caffeine have been almost entirely overlooked (Summer). The most recent study of drugs in popular music, for example, defined substance use as “tobacco, alcohol, marijuana, cocaine and other stimulants, heroin and other opiates, hallucinogens, inhalants, prescription drugs, over-the-counter drugs, and nonspecific substances” (Primack 172), thereby ignoring a chemical stimulant consumed by 90 per cent of adult Americans every day (Lovett). The wide availability of coffee and the comparatively mild effect of caffeine means that its consumption rarely causes harm. One researcher has described it as a ubiquitous and unobtrusive “generalised public activity […] ‘invisible’ to analysts seeking distinctive social events” (Cooper 92). Coffee may provide only a relatively mild “buzz”—but it is now accepted that caffeine is an addictive substance (Juliano) and, due to its universal legality, coffee is also the world’s most extensively traded and enthusiastically consumed psychoactive consumer product (Juliano 1). The musical genre of jazz has a longstanding relationship with marijuana and narcotics (Curry; Singer; Tolson; Winick). Unsurprisingly, given its Round Midnight connotations, jazz standards also celebrate the restorative impact of coffee. Exemplary compositions include Burke/Webster’s insomniac torch song Black Coffee, which provided hits for Sarah Vaughan (1949), Ella Fitzgerald (1953), and Peggy Lee (1960); and Frank Sinatra’s recordings of Hilliard/Dick’s The Coffee Song (1946, 1960), which satirised the coffee surplus in Brazil at a time when this nation enjoyed a near monopoly on production. Sinatra joked that this ubiquitous drink was that country’s only means of liquid refreshment, in a refrain that has since become a headline writer’s phrasal template: “There’s an Awful Lot of Coffee in Vietnam,” “An Awful Lot of Coffee in the Bin,” and “There’s an Awful Lot of Taxes in Brazil.” Ethnographer Aaron Fox has shown how country music gives expression to the lived social experience of blue-collar and agrarian workers (Real 29). Coffee’s role in energising working class America (Cooper) is featured in such recordings as Dolly Parton’s Nine To Five (1980), which describes her morning routine using a memorable “kitchen/cup of ambition” rhyme, and Don't Forget the Coffee Billy Joe (1973) by Tom T. Hall which laments the hardship of unemployment, hunger, cold, and lack of healthcare. Country music’s “tired truck driver” is the most enduring blue-collar trope celebrating coffee’s analeptic powers. Versions include Truck Drivin' Man by Buck Owens (1964), host of the country TV show Hee Haw and pioneer of the Bakersfield sound, and Driving My Life Away from pop-country crossover star Eddie Rabbitt (1980). Both feature characteristically gendered stereotypes of male truck drivers pushing on through the night with the help of a truck stop waitress who has fuelled them with caffeine. Johnny Cash’s A Cup of Coffee (1966), recorded at the nadir of his addiction to pills and alcohol, has an incoherent improvised lyric on this subject; while Jerry Reed even prescribed amphetamines to keep drivers awake in Caffein [sic], Nicotine, Benzedrine (And Wish Me Luck) (1980). Doye O’Dell’s Diesel Smoke, Dangerous Curves (1952) is the archetypal “truck drivin’ country” song and the most exciting track of its type. It subsequently became a hit for the doyen of the subgenre, Red Simpson (1966). An exhausted driver, having spent the night with a woman whose name he cannot now recall, is fighting fatigue and wrestling his hot-rod low-loader around hairpin mountain curves in an attempt to rendezvous with a pretty truck stop waitress. The song’s palpable energy comes from its frenetic guitar picking and the danger implicit in trailing a heavy load downhill while falling asleep at the wheel. Tommy Faile’s Phantom 309, a hit for Red Sovine (1967) that was later covered by Tom Waits (Big Joe and the Phantom 309, 1975), elevates the “tired truck driver” narrative to gothic literary form. Reflecting country music’s moral code of citizenship and its culture of performative storytelling (Fox, Real 23), it tells of a drenched and exhausted young hitchhiker picked up by Big Joe—the driver of a handsome eighteen-wheeler. On arriving at a truck stop, Joe drops the traveller off, giving him money for a restorative coffee. The diner falls silent as the hitchhiker orders up his “cup of mud”. Big Joe, it transpires, is a phantom trucker. After running off the road to avoid a school bus, his distinctive ghost rig now only reappears to rescue stranded travellers. Punk rock, a genre closely associated with recreational amphetamines (McNeil 76, 87), also features a number of caffeine-as-stimulant songs. Californian punk band, Descendents, identified caffeine as their drug of choice in two 1996 releases, Coffee Mug and Kids on Coffee. These songs describe chugging the drink with much the same relish and energy that others might pull at the neck of a beer bottle, and vividly compare the effects of the drug to the intense rush of speed. The host of “New Music News” (a segment of MTV’s 120 Minutes) references this correlation in 1986 while introducing the band’s video—in which they literally bounce off the walls: “You know, while everybody is cracking down on crack, what about that most respectable of toxic substances or stimulants, the good old cup of coffee? That is the preferred high, actually, of California’s own Descendents—it is also the subject of their brand new video” (“New Music News”). Descendents’s Sessions EP (1997) featured an overflowing cup of coffee on the sleeve, while punk’s caffeine-as-amphetamine trope is also promulgated by Hellbender (Caffeinated 1996), Lagwagon (Mr. Coffee 1997), and Regatta 69 (Addicted to Coffee 2005). Coffee in the Morning and Kisses in the Night: Coffee and Courtship Coffee as romantic metaphor in song corroborates the findings of early researchers who examined courtship rituals in popular music. Donald Horton’s 1957 study found that hit songs codified the socially constructed self-image and limited life expectations of young people during the 1950s by depicting conservative, idealised, and traditional relationship scenarios. He summarised these as initial courtship, honeymoon period, uncertainty, and parting (570-4). Eleven years after this landmark analysis, James Carey replicated Horton’s method. His results revealed that pop lyrics had become more realistic and less bound by convention during the 1960s. They incorporated a wider variety of discourse including the temporariness of romantic commitment, the importance of individual autonomy in relationships, more liberal attitudes, and increasingly unconventional courtship behaviours (725). Socially conservative coffee songs include Coffee in the Morning and Kisses in the Night by The Boswell Sisters (1933) in which the protagonist swears fidelity to her partner on condition that this desire is expressed strictly in the appropriate social context of marriage. It encapsulates the restrictions Horton identified on courtship discourse in popular song prior to the arrival of rock and roll. The Henderson/DeSylva/Brown composition You're the Cream in My Coffee, recorded by Annette Hanshaw (1928) and by Nat King Cole (1946), also celebrates the social ideal of monogamous devotion. The persistence of such idealised traditional themes continued into the 1960s. American pop singer Don Cherry had a hit with Then You Can Tell Me Goodbye (1962) that used coffee as a metaphor for undying and everlasting love. Otis Redding’s version of Butler/Thomas/Walker’s Cigarettes and Coffee (1966)—arguably soul music’s exemplary romantic coffee song—carries a similar message as a couple proclaim their devotion in a late night conversation over coffee. Like much of the Stax catalogue, Cigarettes and Coffee, has a distinctly “down home” feel and timbre. The lovers are simply content with each other; they don’t need “cream” or “sugar.” Horton found 1950s blues and R&B lyrics much more sexually explicit than pop songs (567). Dawson (1994) subsequently characterised black popular music as a distinct public sphere, and Squires (2002) argued that it displayed elements of what she defined as “enclave” and “counterpublic” traits. Lawson (2010) has argued that marginalised and/or subversive blues artists offered a form of countercultural resistance against prevailing social norms. Indeed, several blues and R&B coffee songs disregard established courtship ideals and associate the product with non-normative and even transgressive relationship circumstances—including infidelity, divorce, and domestic violence. Lightnin’ Hopkins’s Coffee Blues (1950) references child neglect and spousal abuse, while the narrative of Muddy Waters’s scorching Iodine in my Coffee (1952) tells of an attempted poisoning by his Waters’s partner. In 40 Cups of Coffee (1953) Ella Mae Morse is waiting for her husband to return home, fuelling her anger and anxiety with caffeine. This song does eventually comply with traditional courtship ideals: when her lover eventually returns home at five in the morning, he is greeted with a relieved kiss. In Keep That Coffee Hot (1955), Scatman Crothers supplies a counterpoint to Morse’s late-night-abandonment narrative, asking his partner to keep his favourite drink warm during his adulterous absence. Brook Benton’s Another Cup of Coffee (1964) expresses acute feelings of regret and loneliness after a failed relationship. More obliquely, in Coffee Blues (1966) Mississippi John Hurt sings affectionately about his favourite brand, a “lovin’ spoonful” of Maxwell House. In this, he bequeathed the moniker of folk-rock band The Lovin’ Spoonful, whose hits included Do You Believe in Magic (1965) and Summer in the City (1966). However, an alternative reading of Hurt’s lyric suggests that this particular phrase is a metaphorical device proclaiming the author’s sexual potency. Hurt’s “lovin’ spoonful” may actually be a portion of his seminal emission. In the 1950s, Horton identified country as particularly “doleful” (570), and coffee provides a common metaphor for failed romance in a genre dominated by “metanarratives of loss and desire” (Fox, Jukebox 54). Claude Gray’s I'll Have Another Cup of Coffee (Then I’ll Go) (1961) tells of a protagonist delivering child support payments according to his divorce lawyer’s instructions. The couple share late night coffee as their children sleep through the conversation. This song was subsequently recorded by seventeen-year-old Bob Marley (One Cup of Coffee, 1962) under the pseudonym Bobby Martell, a decade prior to his breakthrough as an international reggae star. Marley’s youngest son Damian has also performed the track while, interestingly in the context of this discussion, his older sibling Rohan co-founded Marley Coffee, an organic farm in the Jamaican Blue Mountains. Following Carey’s demonstration of mainstream pop’s increasingly realistic depiction of courtship behaviours during the 1960s, songwriters continued to draw on coffee as a metaphor for failed romance. In Carly Simon’s You’re So Vain (1972), she dreams of clouds in her coffee while contemplating an ostentatious ex-lover. Squeeze’s Black Coffee In Bed (1982) uses a coffee stain metaphor to describe the end of what appears to be yet another dead-end relationship for the protagonist. Sarah Harmer’s Coffee Stain (1998) expands on this device by reworking the familiar “lipstick on your collar” trope, while Sexsmith & Kerr’s duet Raindrops in my Coffee (2005) superimposes teardrops in coffee and raindrops on the pavement with compelling effect. Kate Bush’s Coffee Homeground (1978) provides the most extreme narrative of relationship breakdown: the true story of Cora Henrietta Crippin’s poisoning. Researchers who replicated Horton’s and Carey’s methodology in the late 1970s (Bridges; Denisoff) were surprised to find their results dominated by traditional courtship ideals. The new liberal values unearthed by Carey in the late 1960s simply failed to materialise in subsequent decades. In this context, it is interesting to observe how romantic coffee songs in contemporary soul and jazz continue to disavow the post-1960s trend towards realistic social narratives, adopting instead a conspicuously consumerist outlook accompanied by smooth musical timbres. This phenomenon possibly betrays the influence of contemporary coffee advertising. From the 1980s, television commercials have sought to establish coffee as a desirable high end product, enjoyed by bohemian lovers in a conspicuously up-market environment (Werder). All Saints’s Black Coffee (2000) and Lebrado’s Coffee (2006) identify strongly with the culture industry’s image of coffee as a luxurious beverage whose consumption signifies prominent social status. All Saints’s promotional video is set in a opulent location (although its visuals emphasise the lyric’s romantic disharmony), while Natalie Cole’s Coffee Time (2008) might have been itself written as a commercial. Busting Up a Starbucks: The Politics of Coffee Politics and coffee meet most palpably at the coffee shop. This conjunction has a well-documented history beginning with the establishment of coffee houses in Europe and the birth of the public sphere (Habermas; Love; Pincus). The first popular songs to reference coffee shops include Jaybird Coleman’s Coffee Grinder Blues (1930), which boasts of skills that precede the contemporary notion of a barista by four decades; and Let's Have Another Cup of Coffee (1932) from Irving Berlin’s depression-era musical Face The Music, where the protagonists decide to stay in a restaurant drinking coffee and eating pie until the economy improves. Coffee in a Cardboard Cup (1971) from the Broadway musical 70 Girls 70 is an unambiguous condemnation of consumerism, however, it was written, recorded and produced a generation before Starbucks’ aggressive expansion and rapid dominance of the coffee house market during the 1990s. The growth of this company caused significant criticism and protest against what seemed to be a ruthless homogenising force that sought to overwhelm local competition (Holt; Thomson). In response, Starbucks has sought to be defined as a more responsive and interactive brand that encourages “glocalisation” (de Larios; Thompson). Koller, however, has characterised glocalisation as the manipulative fabrication of an “imagined community”—whose heterogeneity is in fact maintained by the aesthetics and purchasing choices of consumers who make distinctive and conscious anti-brand statements (114). Neat Capitalism is a more useful concept here, one that intercedes between corporate ideology and postmodern cultural logic, where such notions as community relations and customer satisfaction are deliberately and perhaps somewhat cynically conflated with the goal of profit maximisation (Rojek). As the world’s largest chain of coffee houses with over 19,400 stores in March 2012 (Loxcel), Starbucks is an exemplar of this phenomenon. Their apparent commitment to environmental stewardship, community relations, and ethical sourcing is outlined in the company’s annual “Global Responsibility Report” (Vimac). It is also demonstrated in their engagement with charitable and environmental non-governmental organisations such as Fairtrade and Co-operative for Assistance and Relief Everywhere (CARE). By emphasising this, Starbucks are able to interpellate (that is, “call forth”, “summon”, or “hail” in Althusserian terms) those consumers who value environmental protection, social justice and ethical business practices (Rojek 117). Bob Dylan and Sheryl Crow provide interesting case studies of the persuasive cultural influence evoked by Neat Capitalism. Dylan’s 1962 song Talkin’ New York satirised his formative experiences as an impoverished performer in Greenwich Village’s coffee houses. In 1995, however, his decision to distribute the Bob Dylan: Live At The Gaslight 1962 CD exclusively via Starbucks generated significant media controversy. Prominent commentators expressed their disapproval (Wilson Harris) and HMV Canada withdrew Dylan’s product from their shelves (Lynskey). Despite this, the success of this and other projects resulted in the launch of Starbucks’s in-house record company, Hear Music, which released entirely new recordings from major artists such as Ray Charles, Paul McCartney, Joni Mitchell, Carly Simon and Elvis Costello—although the company has recently announced a restructuring of their involvement in this venture (O’Neil). Sheryl Crow disparaged her former life as a waitress in Coffee Shop (1995), a song recorded for her second album. “Yes, I was a waitress. I was a waitress not so long ago; then I won a Grammy” she affirmed in a YouTube clip of a live performance from the same year. More recently, however, Crow has become an avowed self-proclaimed “Starbucks groupie” (Tickle), releasing an Artist’s Choice (2003) compilation album exclusively via Hear Music and performing at the company’s 2010 Annual Shareholders’s Meeting. Songs voicing more unequivocal dissatisfaction with Starbucks’s particular variant of Neat Capitalism include Busting Up a Starbucks (Mike Doughty, 2005), and Starbucks Takes All My Money (KJ-52, 2008). The most successful of these is undoubtedly Ron Sexsmith’s Jazz at the Bookstore (2006). Sexsmith bemoans the irony of intense original blues artists such as Leadbelly being drowned out by the cacophony of coffee grinding machines while customers queue up to purchase expensive coffees whose names they can’t pronounce. In this, he juxtaposes the progressive patina of corporate culture against the circumstances of African-American labour conditions in the deep South, the shocking incongruity of which eventually cause the old bluesman to turn in his grave. Fredric Jameson may have good reason to lament the depthless a-historical pastiche of postmodern popular culture, but this is no “nostalgia film”: Sexsmith articulates an artfully framed set of subtle, sensitive, and carefully contextualised observations. Songs about coffee also intersect with politics via lyrics that play on the mid-brown colour of the beverage, by employing it as a metaphor for the sociological meta-narratives of acculturation and assimilation. First popularised in Israel Zangwill’s 1905 stage play, The Melting Pot, this term is more commonly associated with Americanisation rather than miscegenation in the United States—a nuanced distinction that British band Blue Mink failed to grasp with their memorable invocation of “coffee-coloured people” in Melting Pot (1969). Re-titled in the US as People Are Together (Mickey Murray, 1970) the song was considered too extreme for mainstream radio airplay (Thompson). Ike and Tina Turner’s Black Coffee (1972) provided a more accomplished articulation of coffee as a signifier of racial identity; first by associating it with the history of slavery and the post-Civil Rights discourse of African-American autonomy, then by celebrating its role as an energising force for African-American workers seeking economic self-determination. Anyone familiar with the re-casting of black popular music in an industry dominated by Caucasian interests and aesthetics (Cashmore; Garofalo) will be unsurprised to find British super-group Humble Pie’s (1973) version of this song more recognisable. Conclusion Coffee-flavoured popular songs celebrate the stimulant effects of caffeine, provide metaphors for courtship rituals, and offer critiques of Neat Capitalism. Harold Love and Guthrie Ramsey have each argued (from different perspectives) that the cultural micro-narratives of small social groups allow us to identify important “ethnographic truths” (Ramsey 22). Aesthetically satisfying and intellectually stimulating coffee songs are found where these micro-narratives intersect with the ethnographic truths of coffee culture. Examples include the unconventional courtship narratives of blues singers Muddy Waters and Mississippi John Hurt, the ritualised storytelling tradition of country performers Doye O’Dell and Tommy Faile, and historicised accounts of the Civil Rights struggle provided by Ron Sexsmith and Tina Turner. References Argenti, Paul. “Collaborating With Activists: How Starbucks Works With NGOs.” California Management Review 47.1 (2004): 91–116. Althusser, Louis. “Ideology and Ideological State Apparatuses.” Lenin and Philosophy and Other Essays. London: Monthly Review Press, 1971. Bridges, John, and R. Serge Denisoff. “Changing Courtship Patterns in the Popular Song: Horton and Carey revisited.” Popular Music and Society 10.3 (1986): 29–45. Carey, James. “Changing Courtship Patterns in the Popular Song.” The American Journal of Sociology 74.6 (1969): 720–31. Cashmere, Ellis. The Black Culture Industry. London: Routledge, 1997. “Coffee.” Theme Time Radio Hour hosted by Bob Dylan, XM Satellite Radio. 31 May 2006. Cooper, B. Lee, and William L. Schurk. “You’re the Cream in My Coffee: A Discography of Java Jive.” Popular Music and Society 23.2 (1999): 91–100. Crow, Sheryl. “Coffee Shop.” Beacon Theatre, New York City. 17 Mar. 1995. YouTube 1 Feb. 2012 ‹http://www.youtube.com/watch?v=j_-bDAjASQI ›. Curry, Andrew. “Drugs in Jazz and Rock Music.” Clinical Toxicology 1.2 (1968): 235–44. Dawson, Michael C. “A Black Counterpublic?: Economic Earthquakes, Racial Agenda(s) and Black Politics.” Public Culture 7.1 (1994): 195–223. de Larios, Margaret. “Alone, Together: The Social Culture of Music and the Coffee Shop.” URC Student Scholarship Paper 604 (2011). 1 Feb. 2012 ‹http://scholar.oxy.edu/urc_student/604›. Englis, Basil, Michael Solomon and Anna Olofsson. “Consumption Imagery in Music Television: A Bi-Cultural Perspective.” Journal of Advertising 22.4 (1993): 21–33. Fox, Aaron. Real Country: Music and Language in Working-Class Culture. Durham: Duke UP, 2004. Fox, Aaron. “The Jukebox of History: Narratives of Loss and Desire in the Discourse of Country Music.” Popular Music 11.1 (1992): 53–72. Garofalo, Reebee. “Culture Versus Commerce: The Marketing of Black Popular Music.” Public Culture 7.1 (1994): 275–87. Habermas, Jurgen. The Structural Transformation of the Public Sphere: An Inquiry Into a Category of Bourgeois Society. Cambridge: Polity Press, 1989. Hamilton, Andy. Aesthetics and Music. London: Continuum, 2007. Harris, Craig. “Starbucks Opens Hear Music Shop in Bellevue.” Seattle Post Intelligencer 23 Nov. 2006. 1 Feb. 2012 ‹http://www.seattlepi.com/business/article/Starbucks-opens-Hear-Music-shop-in-Bellevue-1220637.php›. Harris, John. “Lay Latte Lay.” The Guardian 1 Jul. 2005. 1 Feb. 2012 ‹http://www.guardian.co.uk/music/2005/jul/01/2?INTCMP=SRCH›. Holt, Douglas. “Why Do Brands Cause Trouble? A Dialectical Theory of Consumer Culture and Branding.” Journal of Consumer Research 29 (2002): 70–90. Horton, Donald. “The Dialogue of Courtship in Popular Songs.” American Journal of Sociology 62.6 (1957): 569–78. Jameson, Fredric. Postmodernism, or the Cultural Logic of Late Capitalism. Durham: Duke UP, 1991. Juliano, Laura, and Roland Griffiths. “A Critical Review of Caffeine Withdrawal: Empirical Validation of Symptoms and Signs, Incidence, Severity, and Associated Features.” Psychopharmacology 176 (2004): 1–29. Koller, Veronika. “‘The World’s Local Bank’: Glocalisation as a Strategy in Corporate Branding Discourse.” Social Semiotics 17.1 (2007): 111–31. Lawson, Rob A. Jim Crow’s Counterculture: The Blues and Black Southerners, 1890-1945 (Making the Modern South). Baton Rouge: Louisiana State UP, 2010. Love, Harold. “How Music Created A Public.” Criticism 46.2 (2004): 257–72. “Loxcel Starbucks Map”. Loxcel.com 1 Mar. 2012 ‹loxcel.com/sbux-faq.hmtl›. Lovett, Richard. “Coffee: The Demon Drink?” New Scientist 2518. 24 Sep. 2005. 1 Apr. 2012 ‹http://www.newscientist.com/article/mg18725181.700›. Lynskey, Dorian. “Stir It Up: Starbucks Has Changed the Music Industry with its Deals with Dylan and Alanis. What’s Next?”. The Guardian 6 Oct. 2005: 18. 1 Feb. 2012 ‹http://www.guardian.co.uk/music/2005/oct/06/popandrock.marketingandpr›. Lyttle, Thomas, and Michael Montagne. “Drugs, Music, and Ideology: A Social Pharmacological Interpretation of the Acid House Movement.” The International Journal of the Addictions 27.10 (1992): 1159–77. McCracken, Grant. “Culture and Consumption: A Theoretical Account of the Structure and Movement of the Cultural Meaning of Consumer Goods.” Journal of Consumer Research 13.1 (1986): 71–84. McNeil, Legs, and Gillian McCain. Please Kill Me: The Uncensored Oral History of Punk. London: Abacus, 1997. “New Music News” 120 Minutes MTV 28 Sep. 1986. 1 Feb. 2012 ‹http://www.youtube.com/watch?v=TnqjqXztc0o›. O’Neil, Valerie. “Starbucks Refines its Entertainment Strategy.” Starbucks Newsroom 24 Apr. 2008. 1 Feb. 2012 ‹http://news.starbucks.com/article_display.cfm?article_id=48›. Pincus, Steve. “‘Coffee Politicians Does Create’: Coffeehouses and Restoration Political Culture.” The Journal of Modern History 67 (1995): 807–34. Primack, Brian, Madeline Dalton, Mary Carroll, Aaron Agarwal, and Michael Fine. “Content Analysis of Tobacco, Alcohol, and Other Drugs in Popular Music.” Archives of Pediatrics & Adolescent Medicine 162.2 (2008): 169–75. 1 Feb. 2012 ‹http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3004676/›. Ramsey, Guthrie P. Race Music: Black Cultures from Bebop to Hip-Hop. Berkeley: U of California P, 2003. Rojek, Chris. Cultural Studies. Cambridge: Polity P, 2007. Rosenbaum, Jill, and Lorraine Prinsky. “Sex, Violence and Rock ‘N’ Roll: Youths’ Perceptions of Popular Music.” Popular Music and Society 11.2 (1987): 79–89. Shapiro, Harry. Waiting for the Man: The Story of Drugs and Popular Music. London: Quartet Books, 1988. Singer, Merrill, and Greg Mirhej. “High Notes: The Role of Drugs in the Making of Jazz.” Journal of Ethnicity in Substance Abuse 5.4 (2006):1–38. Squires, Catherine R. “Rethinking the Black Public Sphere: An Alternative Vocabulary for Multiple Public Spheres.” Communication Theory 12.4 (2002): 446–68. Thompson, Craig J., and Zeynep Arsel. “The Starbucks Brandscape and Consumers’ (Anticorporate) Experiences of Glocalization.” Journal of Consumer Research 31 (2004.): 631–42. Thompson, Erik. “Secret Stash Records Releases Forgotten Music in Stylish Packages: Meet Founders Cory Wong and Eric Foss.” CityPages 18 Jan. 2012. 1 Feb. 2012 ‹http://www.citypages.com/2012-01-18/music/secret-stash-records-releases-forgotten-music-in-stylish-packages/›.Tickle, Cindy. “Sheryl Crow Performs at Starbucks Annual Shareholders Meeting.” Examiner.com24 Mar. 2010. 1 Feb. 2012 ‹http://www.examiner.com/starbucks-in-national/sheryl-crow-performs-at-starbucks-annual-shareholders-meeting-photos›.Tolson, Gerald H., and Michael J. Cuyjet. “Jazz and Substance Abuse: Road to Creative Genius or Pathway to Premature Death?”. International Journal of Law and Psychiatry 30 (2007): 530–38. Varma, Vivek, and Ben Packard. “Starbucks Global Responsibility Report Goals and Progress 2011”. Starbucks Corporation 1 Apr. 2012 ‹http://assets.starbucks.com/assets/goals-progress-report-2011.pdf›. Werder, Olaf. “Brewing Romance The Romantic Fantasy Theme of the Taster’s Choice ‘Couple’ Advertising Campaign.” Critical Thinking About Sex, Love, And Romance In The Mass Media: Media Literacy Applications. Eds. Mary-Lou Galician and Debra L. Merskin. New Jersey: Taylor & Francis, 2009. 35–48. Wilson, Jeremy “Desolation Row: Dylan Signs With Starbucks.” The Guardian 29 Jun. 2005. 1 Feb. 2012 ‹http://www.guardian.co.uk/world/2005/jun/29/bobdylan.digitalmedia?INTCMP=SRCH›. Winick, Charles. “The Use of Drugs by Jazz Musicians.” Social Problems 7.3 (1959): 240–53.
APA, Harvard, Vancouver, ISO, and other styles
14

Pedersen, Isabel, and Kristen Aspevig. "Being Jacob: Young Children, Automedial Subjectivity, and Child Social Media Influencers." M/C Journal 21, no. 2 (2018). http://dx.doi.org/10.5204/mcj.1352.

Full text
Abstract:
Introduction Children are not only born digital, they are fashioned toward a lifestyle that needs them to be digital all the time (Palfrey and Gasser). They click, tap, save, circulate, download, and upload the texts of their lives, their friends’ lives, and the anonymous lives of the people that surround them. They are socialised as Internet consumers ready to participate in digital services targeted to them as they age such as Snapchat, Instagram, and YouTube. But they are also fashioned as producers, whereby their lives are sold as content on these same markets. As commodities, the minutiae of their lives become the fodder for online circulation. Paradoxically, we also celebrate these digital behaviours as a means to express identity. Personal profile-building for adults is considered agency-building (Beer and Burrows), and as a consequence, we praise children for mimicking these acts of adult lifestyle. This article reflects on the Kids, Creative Storyworlds, and Wearables project, which involved an ethnographic study with five young children (ages 4-7), who were asked to share their autobiographical stories, creative self-narrations, and predictions about their future mediated lives (Atkins et al.). For this case study, we focus on commercialised forms of children’s automedia, and we compare discussions we had with 6-year old Cayden, a child we met in the study who expresses the desire to make himself famous online, with videos of Jacob, a child vlogger on YouTube’s Kinder Playtime, who clearly influences children like Cayden. We argue that child social influencers need consideration both as autobiographical agents and as child subjects requiring a sheltered approach to their online lives.Automedia Automedia is an emergent genre of autobiography (Smith and Watson Reading 190; “Virtually Me” 78). Broadcasting one’s life online takes many forms (Kennedy “Vulnerability”). Ümit Kennedy argues “Vlogging on YouTube is a contemporary form of autobiography in which individuals engage in a process of documenting their life on a daily or weekly basis and, in doing so, construct[ing] their identity online” (“Exploring”). Sidonie Smith and Julia Watson write that “visual and digital modes are projecting and circulating not just new subjects but new notions of subjectivity through the effects of automediality” with the result that “the archive of the self in time, in space and in relation expands and is fundamentally reorganized” (Reading 190). Emma Maguire addresses what online texts “tell us about cultural understandings of selfhood and what it means to communicate ‘real’ life through media” naming one tool, “automedia”. Further, Julie Rak calls on scholars “to rethink ‘life’ and ‘writing’ as automedia” to further “characterize the enactment of a personal life story in a new media environment.” We define automedia as a genre that involves the practices of creating, performing, sharing, circulating, and (at times) preserving one’s digital life narrative meant for multiple publics. Automedia revises identity formation, embodiment, or corporealities in acts of self-creation (Brophy and Hladki 4). Automedia also emphasizes circulation. As shared digital life texts now circulate through the behaviours of other human subjects, and automatically via algorithms in data assemblages, we contend that automediality currently involves a measure of relinquishing control over perpetually evolving mediatised environments. One cannot control how a shared life narrative will meet a public in the future, which is a revised way of thinking about autobiography. For the sake of this paper, we argue that children’s automedia ought to be considered a creative, autobiographical act, in order to afford child authors who create them the consideration they deserve as agents, now and in the future. Automedial practices often begin when children receive access to a device. The need for a distraction activity is often the reason parents hand a young child a smartphone, iPad, or even a wearable camera (Nansen). Mirroring the lives of parents, children aspire to share representations of their own personal lives in pursuit of social capital. They are often encouraged to use technologies and apps as adults do–to track aspects of self, broadcast life stories and eventually “live share” them—effectively creating, performing, sharing, and at times, seeking to preserve a public life narrative. With this practice, society inculcates children into spheres of device ubiquity, “socializing them to a future digital lifestyle that will involve always carrying a computer in some form” (Atkins et al. 49). Consequently, their representations become inculcated in larger media assemblages. Writing about toddlers, Nansen describes how the “archiving, circulation and reception of these images speaks to larger assemblages of media in which software protocols and algorithms are increasingly embedded in and help to configure everyday life (e.g. Chun; Gillespie), including young children’s media lives (Ito)” (Nansen). Children, like adult citizens, are increasingly faced with choices “not structured by their own preferences but by the economic imperatives of the private corporations that have recently come to dominate the internet” (Andrejevic). Recent studies have shown that for children and youth in the digital age, Internet fame, often characterized by brand endorsements, is a major aspiration (Uhls and Greenfield, 2). However, despite the ambition to participate as celebrity digital selves, children are also mired in the calls to shield them from exposure to screens through institutions that label these activities detrimental. In many countries, digital “protections” are outlined by privacy commissioners and federal or provincial/state statutes, (e.g. Office of the Privacy Commissioner of Canada). Consequently, children are often caught in a paradox that defines them either as literate digital agents able to compose or participate with their online selves, or as subjectified wards caught up in commercial practices that exploit their lives for commercial gain.Kids, Creative Storyworlds and Wearables ProjectBoth academic and popular cultural critics continually discuss the future but rarely directly engage the people who will be empowered (or subjugated) by it as young adults in twenty years. To address children’s lack of agency in these discussions, we launched the Kids, Creative Storyworlds and Wearables project to bring children into a dialogue about their own digital futures. Much has been written on childhood agency and participation in culture and mediated culture from the discipline of sociology (James and James; Jenks; Jenkins). In previous work, we addressed the perspective of child autobiographical feature filmmakers to explore issues of creative agency and consent when adult gatekeepers facilitate children in film production (Pedersen and Aspevig “My Eyes”; Pedersen and Aspevig “Swept”). Drawing on that previous work, this project concentrates on children’s automediated lives and the many unique concerns that materialize with digital identity-building. Children are categorised as a vulnerable demographic group necessitating special policy and legislation, but the lives they project as children will eventually become subsumed in their own adult lives, which will almost certainly be treated and mediated in a much different manner in the future. We focused on this landscape, and sought to query the children on their futures, also considering the issues that arise when adult gatekeepers get involved with child social media influencers. In the Storyworlds ethnographic study, children were given a wearable toy, a Vtech smartwatch called Kidizoom, to use over a month’s timeframe to serve as a focal point for ethnographic conversations. The Kidizoom watch enables children to take photos and videos, which are uploaded to a web interface. Before we gave them the tech, we asked them questions about their lives, including What are machines going to be like in the future? Can you imagine yourself wearing a certain kind of computer? Can you tell/draw a story about that? If you could wear a computer that gave you a super power, what would it be? Can you use your imagination to think of a person in a story who would use technology? In answering, many of them drew autobiographical drawings of technical inventions, and cast themselves in the images. We were particularly struck by the comments made by one participant, Cayden (pseudonym), a 6-year-old boy, and the stories he told us about himself and his aspirations. He expressed the desire to host a YouTube channel about his life, his activities, and the wearable technologies his family already owned (e.g. a GroPro camera) and the one we gave him, the Kidizoom smartwatch. He talked about how he would be proud to publically broadcast his own videos on YouTube, and about the role he had been allowed to play in the making of videos about his life (that were not broadcast). To contextualize Cayden’s commentary and his automedial aspirations, we extended our study to explore child social media influencers who broadcast components of their personal lives for the deliberate purpose of popularity and the financial gain of their parents.We selected the videos of Jacob, a child vlogger because we judged them to be representative of the kinds that Cayden watched. Jacob reviews toys through “unboxing videos,” a genre in which a child tells an online audience her or his personal experiences using new toys in regular, short videos on a social media site. Jacob appears on a YouTube channel called Kinder Playtime, which appears to be a parent-run channel that states that, “We enjoy doing these things while playing with our kids: Jacob, Emily, and Chloe” (see Figure 1). In one particular video, Jacob reviews the Kidizoom watch, serving as a child influencer for the product. By understanding Jacob’s performance as agent-driven automedia, as well as being a commercialised, mediatised form of advertising, we get a clearer picture of how the children in the study are coming to terms with their own digital selfhood and the realisation that circulated, life-exposing videos are the expectation in this context.Children are implicated in a range of ways through “family” influencer and toy unboxing videos, which are emergent entertainment industries (Abidin 1; Nansen and Nicoll; Craig and Cunningham 77). In particular, unboxing videos do impact child viewers, especially when children host them. Jackie Marsh emphasizes the digital literacy practices at play here that co-construct viewers as “cyberflâneur[s]” and she states that “this mode of cultural transmission is a growing feature of online practices for this age group” (369). Her stress, however, is on how the child viewer enjoys “the vicarious pleasure he or she may get from viewing the playing of another child with the toy” (376). Marsh writes that her study subject, a child called “Gareth”, “was not interested in being made visible to EvanHD [a child celebrity social media influencer] or other online peers, but was content to consume” the unboxing videos. The concept of the cyberflâneur, then, is fitting as a mediatising co-constituting process of identity-building within discourses of consumerism. However, in our study, the children, and especially Cayden, also expressed the desire to create, host, and circulate their own videos that broadcast their lives, also demonstrating awareness that videos are valorised in their social circles. Child viewers watch famous children perform consumer-identities to create an aura of influence, but viewers simultaneously aspire to become influencers using automedial performances, in essence, becoming products, themselves. Jacob, Automedial Subjects and Social Media InfluencersJacob is a vlogger on YouTube whose videos can garner millions of views, suggesting that he is also an influencer. In one video, he appears to be around the age of six as he proudly sits with folded hands, bright eyes, and a beaming, but partly toothless smile (see Figure 2). He says, “Welcome to Kinder Playtime! Today we have the Kidi Zoom Smartwatch DX. It’s from VTech” (Kinder Playtime). We see the Kidi Zoom unboxed and then depicted in stylized animations amid snippets of Jacob’s smiling face. The voice and hands of a faceless parent guide Jacob as he uses his new wearable toy. We listen to both parent and child describe numerous features for recording and enhancing the wearer’s daily habits (e.g. calculator, calendar, fitness games), and his dad tells him it has a pedometer “which tracks your steps” (Kinder Playtime). But the watch is also used by Jacob to mediate himself and his world. We see that Jacob takes pictures of himself on the tiny watch screen as he acts silly for the camera. He also uses the watch to take personal videos of his mother and sister in his home. The video ends with his father mentioning bedtime, which prompts a “thank you” to VTech for giving him the watch, and a cheerful “Bye!” from Jacob (Kinder Playtime). Figure 1: Screenshot of Kinder Playtime YouTube channel, About page Figure 2: Screenshot of “Jacob,” a child vlogger at Kinder Playtime We chose Jacob for three reasons. First, he is the same age as the children in the Storyworlds study. Second, he reviews the smart watch artifact that we gave to the study children, so there was a common use of automedia technology. Third, Jacob’s parents were involved with his broadcasts, and we wanted to work within the boundaries of parent-sanctioned practices. However, we also felt that his playful approach was a good example of how social media influence overlaps with automediality. Jacob is a labourer trading his public self-representations in exchange for free products and revenue earned through the monetisation of his content on YouTube. It appears that much of what Jacob says is scripted, particularly the promotional statements, like, “Today we have the Kidizoom Smartwatch DX. It’s from VTech. It’s the smartest watch for kids” (Kinder Playtime). Importantly, as an automedial subject Jacob reveals aspects of his self and his identity, in the manner of many child vloggers on public social media sites. His product reviews are contextualised within a commoditised space that provides him a means for the public performance of his self, which, via YouTube, has the potential to reach an enormous audience. YouTube claims to have “over a billion users—almost one-third of all people on the Internet—and every day people watch hundreds of millions of hours on YouTube and generate billions of views” (YouTube). Significantly, he is not only filmed by others, Jacob is also a creative practitioner, as Cayden aspired to become. Jacob uses high-tech toys, in this case, a new wearable technology for self-compositions (the smart watch), to record himself, friends, family or simply the goings-on around him. Strapped to his wrist, the watch toy lets him play at being watched, at being quantified and at recording the life stories of others, or constructing automediated creations for himself, which he may upload to numerous social media sites. This is the start of his online automediated life, which will be increasingly under his ownership as he ages. To greater or lesser degrees, he will later be able to curate, add to, and remediate his body of automedia, including his digital past. Kennedy points out that “people are using YouTube as a transformative tool, and mirror, to document, construct, and present their identity online” (“Exploring”). Her focus is on adult vloggers who consent to their activities. Jacob’s automedia is constructed collaboratively with his parents, and it is unclear how much awareness he has of himself as an automedia creator. However, if we don’t afford Jacob the same consideration as we afford adult autobiographers, that the depiction of his life is his own, we will reduce his identity performance to pure artifice or advertisement. The questions Jacob’s videos raise around agency, consent, and creativity are important here. Sidonie Smith asks “Can there be a free, agentic space; and if so, where in the world can it be found?” (Manifesto 188). How much agency does Jacob have? Is there a liberating aspect in the act of putting personal technology into the hands of a child who can record his life, himself? And finally, how would an adult Jacob feel about his childhood self advertising these products online? Is this really automediality if Jacob does not fully understand what it means to publicly tell a mediated life story?These queries lead to concerns over child social media influence with regard to legal protection, marketing ethics, and user consent. The rise of “fan marketing” presents a nexus of stealth marketing to children by other children. Stealth marketing involves participants, in this case, fans, who do not know they are involved in an advertising scheme. For instance, the popular Minecon Minecraft conference event sessions have pushed their audience to develop the skills to become advocates and advertisers of their products, for example by showing audiences how to build a YouTube channel and sharing tips for growing a community. Targeting children in marketing ploys seems insidious. Marketing analyst Sandy Fleisher describes the value of outsourcing marketing to fan labourers:while Grand Theft Auto spent $120 million on marketing its latest release, Minecraft fans are being taught how to create and market promotional content themselves. One [example] is Minecraft YouTuber, SkydoesMinecraft. His nearly 7 million strong YouTube army, almost as big as Justin Bieber’s, means his daily videos enjoy a lot of views; 1,419,734,267 to be precise. While concerns about meaningful consent that practices like this raise have led some government bodies, and consumer and child protection groups to advocate restrictions for children, other critics have questioned the limits placed on children’s free expression by such restrictions. Tech commentator Larry Magid has written that, “In the interest of protecting children, we sometimes deny them the right to access material and express themselves.” Meghan M. Sweeney notes that “the surge in collaborative web models and the emphasis on interactivity—frequently termed Web 2.0—has meant that children are not merely targets of global media organizations” but have “multiple opportunities to be active, critical, and resistant producers”...and ”may be active agents in the production and dissemination of information” (68). Nevertheless, writes Sweeney, “corporate entities can have restrictive effects on consumers” (68), by for example, limiting imaginative play to the choices offered on a Disney website, or limiting imaginative topics to commercial products (toys, video games etc), as in YouTube review videos. Automedia is an important site from which to consider young children’s online practices in public spheres. Jacob’s performance is indeed meant to influence the choice to buy a toy, but it is also meant to influence others in knowing Jacob as an identity. He means to share and circulate his self. Julie Rak recalls Paul John Eakin’s claims about life-writing that the “process does not even occur at the level of writing, but at the level of living, so that identity formation is the result of narrative-building.” We view Jacob’s performance along these lines. Kinder Playtime offers him a constrained, parent-sanctioned (albeit commercialised) space for role-playing, a practice bound up with identity-formation in the life of most children. To think through the legality of recognising Jacob’s automedial content as his life, Rak is also useful: “In Eakin’s work in particular, we can see evidence of John Locke’s contention that identity is the expression of consciousness which is continuous over time, but that identity is also a product, one’s own property which is a legal entity”. We have argued that children are often caught in the paradox that defines them either as literate digital creators composing and circulating their online selves or as subjectified personas caught up in commercial advertising practices that use their lives for commercial gain. However, through close observation of individual children, one who we met and questioned in our study, Cayden, the other who we met through his mediated, commercialized, and circulated online persona, Jacob, we argue that child social influencers need consideration as autobiographical agents expressing themselves through automediality. As children create, edit, and grow digital traces of their lives and selves, how these texts are framed becomes increasingly important, in part because their future adult selves have such a stake in the matter: they are being formed through automedia. Moreover, these children’s coming of age may bring legal questions about the ownership of their automedial products such as YouTube videos, an enduring legacy they are leaving behind for their adult selves. Crucially, if we reduce identity performances such as unboxing, toy review videos, and other forms of children’s fan marketing to pure advertisement, we cannot afford Jacob and other child influencers the agency that their self representation is legally and artistically their own.ReferencesAbidin, Crystal. “#familygoals: Family Influencers, Calibrated Amateurism, and Justifying Young Digital Labor.” Social Media + Society 3.2 (2017): 1-15.Andrejevic, Mark. “Privacy, Exploitation, and the Digital Enclosure.” Amsterdam Law Forum 1.4 (2009). <http://amsterdamlawforum.org/article/view/94/168>.Atkins, Bridgette, Isabel Pedersen, Shirley Van Nuland, and Samantha Reid. “A Glimpse into the Kids, Creative Storyworlds and Wearables Project: A Work-in-Progress.” ICET 60th World Assembly: Teachers for a Better World: Creating Conditions for Quality Education – Pedagogy, Policy and Professionalism. 2017. 49-60.Beer, David, and Roger Burrows. “Popular Culture, Digital Archives and the New Social Life of Data.” Theory, Culture & Society 30.4 (2013): 47–71.Brophy, Sarah, and Janice Hladki. Introduction. Pedagogy, Image Practices, and Contested Corporealities. Eds. Sarah Brophy and Janice Hladki. New York, NY: Routledge, 2014. 1-6.Craig, David, and Stuart Cunningham. “Toy Unboxing: Living in a(n Unregulated) Material World.” Media International Australia 163.1 (2017): 77-86.Fleischer, Sandy. “Watch Out for That Creeper: What Minecraft Teaches Us about Marketing.” Digital Marketing Magazine. 30 May 2014. <http://digitalmarketingmagazine.co.uk/articles/watch-out-for-that-creeper-what-minecraft-teaches-us-about-marketing>.James, Allison, and Adrian James. Key Concepts in Childhood Studies. London: Sage, 2012.Jenkins, Henry. The Childhood Reader. New York: NYU P, 1998.Jenks, Chris. Childhood. 2nd ed. London: Routledge, 2015.Kennedy, Ümit. "Exploring YouTube as a Transformative Tool in the 'The Power of MAKEUP!' Movement." M/C Journal 19.4 (2016). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1127>.———. “The Vulnerability of Contemporary Digital Autobiography” a/b: Auto/Biography Studies 32.2 (2017): 409-411.Kinder Playtime. “VTech Kidizoom Smart Watch DX Review by Kinder Playtime.” YouTube, 4 Nov. 2015. <https://www.youtube.com/watch?v=JaxCSjwZjcA&t=28s>.Magid, Larry. “Protecting Children Online Needs to Allow for Their Right to Free Speech.” ConnectSafely 29 Aug. 2014. <http://www.connectsafely.org/protecting-children-online-needs-to-allow-for-their-right-to-free-speech/>.Maguire, Emma. “Home, About, Shop, Contact: Constructing an Authorial Persona via the Author Website.” M/C Journal 17.3 (2014). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/821>.Marsh, Jackie. “‘Unboxing’ Videos: Co-construction of the Child as Cyberflâneur.” Discourse: Studies in the Cultural Politics of Education 37.3 (2016): 369-380.Nansen, Bjorn. “Accidental, Assisted, Automated: An Emerging Repertoire of Infant Mobile Media Techniques.” M/C Journal 18.5 (2015). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1026>.———, and Benjamin Nicoll. “Toy Unboxing Videos and the Mimetic Production of Play.” Paper presented at the 18th Annual Conference of Internet Researchers (AoIR), Tartu, Estonia. 2017.Palfrey, John, and Urs Gasser. Born Digital: How Children Grow Up in a Digital Age. New York: Basic Books, 2016.Pedersen, Isabel, and Kristen Aspevig. “‘My Eyes Ended Up at My Fingertips, My Ears, My Nose, My Mouth’: Antoine, Autobiographical Documentary, and the Cinematic Depiction of a Blind Child Subject.” Biography: An Interdisciplinary Quarterly 34.4 (2011).Pedersen, Isabel, and Kristen Aspevig. “‘Swept to the Sidelines and Forgotten’: Cultural Exclusion, Blind Persons’ Participation, and International Film Festivals.” Canadian Journal of Disability Studies 3.3 (2014): 29-52.Rak, Julie. “First Person? Life Writing versus Automedia.” International Association for Biography and Autobiography Europe (IABA Europe). Vienna, Austria. 30 Oct. – 3 Nov. 2013.Smith, Sidonie. “The Autobiographical Manifesto.” Ed. Shirely Neuman. Autobiography and Questions of Gender. London: Frank Cass, 1991.———, and Julia Watson. Reading Autobiography. Minneapolis: U of Minnesota P, 2010.———. “Virtually Me: A Toolbox about Online Self-Presentation.” Identity Technologies: Constructing the Self Online. Eds. Anna Poletti and Julie Rak. Madison: U of Wisconsin P, 2014. 70-95.Sweeney, Meghan. “‘Where Happily Ever After Happens Every Day’: Disney's Official Princess Website and the Commodification of Play.” Jeunesse: Young People, Texts, Cultures 3.2 (2011): 66-87.Uhls, Yalda, and Particia Greenfield. “The Value of Fame: Preadolescent Perceptions of Popular Media and Their Relationship to Future Aspirations.” Developmental Psychology 48.2 (2012): 315-326.YouTube. “YouTube for Press.” 2017. <https://www.youtube.com/yt/about/press/>.
APA, Harvard, Vancouver, ISO, and other styles
15

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:

 
 
 On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. 
 
 
 
 Citation reference for this article
 
 MLA Style
 Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style
 Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>. 
APA, Harvard, Vancouver, ISO, and other styles
16

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
APA, Harvard, Vancouver, ISO, and other styles
17

Al-Natour, Ryan J. "The Impact of the Researcher on the Researched." M/C Journal 14, no. 6 (2011). http://dx.doi.org/10.5204/mcj.428.

Full text
Abstract:
Doing research is always risky, personally, emotionally, ideologically, and politically, just because we never know for sure just what results our work will have. (Becker 253) Howard Becker accurately captures the various problematic dimensions that researchers encounter. Numerous personal, emotional, ideological and political dimensions impact research projects in sometimes unpredictable ways. In this paper, I examine some of the many impacts that researchers can have on their own projects. In much of the literature on qualitative research that examines interviews, focus groups and similar methodologies, scholars identify that a variety of factors influence the interactions between researchers and their projects. The academic debates regarding the insider/outsider positions of research are significant here. I will draw attention to the complexity of the researcher/researched relationship and argue that, in light of complexity, researchers can find themselves in predicaments where they are just as much part of the research data as their participants. Ultimately, I aim to contribute to an existing rich literature that deals with these issues concerning the relationship between the researcher and the researched. In this paper, I discuss my own experiences researching the Camden controversy and conclude with a number of suggestions for researchers to consider in similar predicaments. It is from these experiences that I aim to highlight the impact researchers have on their data and the complex relationships between researchers and "the researched". Further, it is through my experiences and observations that I address the theme of "impact" of research in the wider community. Insider/Outsider Debates Scholars often debate how researchers impact their projects. In the past 30 years, academics have focused on how researchers interact as "insiders" or "outsiders" (Naples 84; Coloma 15; Smith 137). Ultimately, these debates focus on the positionalities of researchers, and how these positions impact projects. A number of thought-provoking questions surface in these debates, regarding the distance/closeness between the researcher and participant/s. Scholars interested in this relationship often ponder if this distance/closeness affects the richness and quality of the data. Commonly, issues regarding the researcher's gender, "race" and class are topical in these discourses. Young points out that an assumption grew from these debates, which concludes that researchers who do not share these categories with their participants work find it more difficult to gain their participant's trust (187). From this perspective, women interviewing men hold outsider positions as women, "non-whites" interviewing "whites" hold outsider positions as "non-whites", and so on. Such a view leads to a rigid dichotomisation of the insider vs. outsider binary, which scholars have recently challenged (190). Academics now argue that researchers experience insider/outsider placements and various signifiers mark insiders/outsiders (Young 191; Sin 479) beyond the "race"/sex/class categories. These include sexuality, "race", education, gender, ethnicity, language and class (Coloma 14) to name the most common. Further, these markers are dependent upon the socio-political context of the time of research (Naples 83); thus researchers hold fluid insider/outsider positions. As the next generation of cultural researchers, I argue that we should acknowledge the increasingly complicated positions, influences, and relationships that manifest themselves in the stories of the researchers and the researched. We are never truly outsiders, yet never wholly insiders either; however, we are always partial in examining our research results (see Clifford 7). Yet the various insider/outsider positions generate a number of challenges for researchers. I unpack some of these positions and challenges in discussing a recent project I researched called the Camden controversy. The Camden Controversy In 2007-2009, a controversy over a proposed Islamic school took place in Camden, an area located on the greater Sydney fringe. In October 2007, an Islamic charity proposed a Muslim school in the area and within weeks, a local rally against the school took place involving thousands of local residents. A second anti-school rally occurred months later, where some local residents sported the Australian flag, publicly vilified Muslims claiming the school threatened the "nation". A local anti-school group was formed and two white supremacist groups supported locals against the school. Several extreme-right politicians also campaigned against the school which included former One Nation leader, Pauline Hanson, and leader of the Christian Democrats, Fred Nile. Additionally, two pigs heads with an Australian flag and a wooden crucifix were placed on the proposed site. In the end, the Camden Council rejected the application and the Land and Environment Court rejected the Quranic Society's appeal (for more information, see Al-Natour 573-85). I began researching this controversy in 2008, watching the above events unfold. One of my research methods included interviews with local residents. As a non-local, male researcher of Arab descent (specifically, Palestinian Greek Orthodox Christian and a culturally Islamic background), some interviews were challenging. In some cases, interviewees talked of the controversy as though they responded directly to my "Arabness". In other cases, interviewees positioned me as an outsider to the area. At other times, interviewees sub-typed me from "other Muslims" and I was granted some form of insider status. In various complicated ways, my experiences reflect how researchers become the "researched". To articulate these experiences, I discuss my interactions with only two participants (due to article length restrictions) with very different positions on the school. Case Study 1: Grace Grace is a 38 year old Catholic woman of mixed European heritage who is working in a clothing store in Camden. The interview took place with two of her co-workers in the room. Grace is opposed to the idea of a school in Camden. At the beginning, Grace was understandably suspicious about talking to a stranger about the controversy. Grace: So if there is anything I don't wanna answer, I'll just say 'no comment'.[Researcher]: That's ok, that's fine.Grace: So are you a Muslim? Is that why you're doing ya project here?[Researcher]: I'm not Muslim. No.Grace: (puzzled) are you sure?[Researcher]: Umm. I am an Arab though, but not Muslim. If that's what you're asking?Grace: Oh. Well, I can be an Arab too. See! [grabs a pair of men's underwear from a nearby clothing rack and places the underwear on her head] See! Gee wiz, I am one of those Arab ladies! (Interview, 17 July 2009) While her co-workers laughed in the background, Grace began to speak in a gibberish tongue, perhaps imitating "Arabic" (perhaps the men's underwear is supposed to mock a woman's headscarf). This incident may have been a performance for her co-workers, and may not have occurred if the interview did not have an audience. In this situation, Grace's audience and the interviewer influence her "underwear performance". Perhaps there was a look of shock on my face, as Grace then began to explain that she was doing me a favour by participating in the interview and claimed that an Arab would not have agreed because Arabs "are very rude". Again, Grace discusses Arabs perhaps realising her actions were not appropriate at the time. Conceptually, this incident highlights how the interviewee responds to the researcher's ethnicity and her "joke". In the presence of Grace and her co-workers, the performance highlights their "insider" statuses. The vilifying "Arab" clothing and languages were almost like a bonding performance, something that came up as a result of Grace's interaction with an Arab researcher. The interview is a place where Grace negotiates her position on the school and a variety of other issues that she relates to the researcher. She talked about headscarves worn by Muslim women: I don't know why they wear it as they stand out, there's lots of people that wear long skirts, that's fine, but you ["Muslims"] should mingle. I feel comfortable with you [the researcher], because you are not a covering-up-Muslim, but if you're wearing a head thing, I think that I would be uncomfortable, I mean I would think you had a machine gun [laughs]. The fluidity of the researcher's insider/outsider statuses becomes defined as Grace thinks about the school and Muslims. In the case of hijab, Grace uses the "Muslim" researcher to portray Islamic headscarves as outsider items. In the interview, we talked of Catholic nuns and Grace commented that nuns rarely wear headgear anymore. She agrees with modesty, yet defines her position on hijab by expressing her feelings of the researcher. The interview is a place where Grace considers her positions on Muslims, and the researcher in this case influences Grace as she communicates her viewpoints in light of her interviewer. Case Study 2: Andrew Andrew is a 43 year old resident of Anglo-Maltese heritage. He works in the Camden area and supported the proposal for an Islamic school—which would have been only 5 minutes drive from his workplace: [Researcher]: I can see it's [Camden is] different from other areas. It's like a country town.Andrew: I wouldn't say it's a country town anymore. It's not Orange Parks or Bathurst [rural areas]. It's on the outskirts, beginning of the rural area. I have lived here for 8 years. (Interview, 5 Oct. 2009) The differences of opinion on Camden here illustrate broad positions of the insider/outsider researcher (myself). Here, the researcher states their observations of the area as an outsider to Camden. Andrew responds to the researcher and positions himself with a sense of authority as a local. In terms of the contents of the interview, it is obvious that the researcher's dialogue influences the shape of the data. In other parts of the interview, Andrew found common insider ground with the researcher: France has got the highest population of Muslims, I dunno what the statistics are here, but France holds the most Muslim immigrants, they let them in to mix. I mean, look at you, you have mixed in, you even got your ear pierced! Kids mix in, what about the footballer, El-Masri, but look at him, he has mixed in! Everyone loves him! Here, the researcher has insider status when Andrew discusses how Muslims "mix in". Also, the researcher becomes part of the project, as the interview uses the interviewer's items (ear piercing) and a Lebanese-Australian retired footballer (Hazem El-Masri) as evidence of Islamic integration into Australian society. Here, the researcher's appearance specifically impacts the research, unlike the previous instance which focuses on dialogue between the researcher and researched. Given that the literature on qualitative methodologies focuses on the impact of the researcher's "race", ethnicity and so on, it is obvious that these factors relate to the interview itself. As my quote from Becker at the beginning highlights, research results are unpredictable, often to the point where researchers have unforeseen experiences with their participants. Conceptually, we need to think about impact as a complicated process when we reflect upon our projects and make sense of the researcher/researched relationships. Dealing with "Impact" Issues In both insider/outsider positions, the interviews with Grace and Andrew epitomise some instances that show how researchers cannot be separated from their data. Though both participants held different positions on the school, both demonstrated the complicated impact that researchers have on their projects. Further, they challenge the conventional views of qualitative methodology, which see research as a one way process where researchers interview participants and merely (and "objectively") obtain data. In light of the contemporary academic debates regarding the positionality of the researcher, I suggest that the complexities facing researchers destroy the strictly "insider" vs. "outsider" understandings of qualitative research. Though I reach this point by specifically focusing on interviews as research methodologies, I will also point out that even beyond the context of an interview, merely finding research participants and documenting field notes can be challenging. In my case, my Arab identity influenced the ways some residents responded when I asked them whether they would participate in an interview about the school. In some field notes, I documented some of these hostile instances when I approached people in public places and requested their participation in my project: Anonymous Male Resident 1: Look, I don't wanna do the interview, it's not that I am racist, I just can't stand the rag heads, they aren't normal!... in fact if it were up to me, I would probably exterminate them all (laughs). (Field notes, 9 Oct. 2009)Anonymous Male Resident 2: I saw your people on TV last night... the ones that sound like turkeys, Gobble Gobble. (Field notes, 31 July 2009) In these circumstances, prospective-participants frame the researcher as an outsider. Their refusals to participate show us how residents feel towards a researcher, and how these "feelings" impact upon their project. In my case, this meant it was difficult to find some participants, making the researcher's accessibility to interview participants and the obtaining of data a result of their insider/outsider statuses. In researching "race", Duneier suggests that the researcher should hold a "humble commitment" to be open in the field and be aware of their own social position (100). Becker asks how a researcher should react to the challenges of racism. It becomes a practice of balancing two binary opposing ideals: one rejects racist views, and the other which seeks to understand a particular expression/view of racism, which ultimately benefits knowledge. Thus, the researcher is faced with remembering the purpose of the research project—the pursuit of knowledge, not the debates with participants (Becker 247-49). Similarly, Ezzy argues the task of qualitative researchers is "not to attempt to solve political and moral issues, nor to avoid them, but to be aware of and engage with the potential political and moral implications of their writings" (157). In dealing with the various challenges of the project, I had to transform into the "researcher". My role was not to accuse participants of being "racists", rather to map out how certain views, which could be categorised as "racist", made up the qualitative research experience and would impact the fieldwork journey. As a researcher, my job was to investigate the Islamic school controversy in Camden. It was as though I needed to temporarily disregard (not compromise) other parts of my identities and focus on extracting information. It was an opportunity to pinpoint how particulars of my identity—gender, ethnicity, religion, skin colour, appearance, age, and so on, impacted upon the data collection process and the content. Conclusion: Way Forward? Throughout this article, I have argued that the complicated researcher/researched relationships result in the researchers becoming part of the research itself. Given how challenging this process is for researchers, I finish this article by suggesting some thought-provoking strategies and ideas for the next generation of cultural researchers. Given that all research projects vary, the researcher's impact processes also vary. It is also worth pointing out that in some circumstances, the "outsider" researcher can work for the project, where participants might feel the need to explain and elaborate on particular topics they feel the researcher does not know much about. Thus, attributing "positive" or "negative" feelings on the "insider" or "outsider" researcher is, at times, flawed and pointless. Whether the researcher is predominantly positioned as the insider, or the outsider, or remarkably changes between the two consistently, I would suggest a number of issues to help handle the impact of such predicaments on the research project in a way that can benefit the generation of knowledge. These issues include debriefing, strengthening, positioning, limiting and self-challenging topics. These suggestions would vary from one project to another, operating as a guide that should not be "set in stone". While it is difficult at times to determine how the researcher may impact the research data, it is important for researchers to be conscious of mapping out these challenges on their fieldwork journeys. Debrief with fellow scholars: Confidential discussions with supervisors, fellow researchers and other academics are processes that can enable researchers to make sense of these challenging predicaments (as long as the researcher is mindful of the ethical details involved). Debriefing can help release any emotional baggage or frustrations attained by these experiences. Sharing opinions on these instances can be helpful, particularly in identifying any overbearing biases of the researcher in making sense of their data. Furthermore, in circumstances where the researcher is working alone on a project, debriefing can remove a sense of isolation that can be accumulated by a lonely fieldwork project (particularly in the case of a doctoral project!). View the project as an exercise in building your research skills: Any research project, no matter how challenging or demanding is an opportunity to make sense of the world around us. Fieldwork also provides a chance to build character and strengthen the researcher's skills. Being in control of certain behaviours as researchers can be seen as a strength. This is not to say that the researcher compromises their values for the sake of research. Rather, the researcher has a particular role which needs to be seen in a professional light. Be wary of your own expectations and biases: This relates to the previous topic on character building and strengthening the researcher. As Becker argues (as quoted at the beginning), we cannot predict our research results. Researchers should not walk into their fields attempting to manipulate or predict their research results. The project itself could be extremely challenging where the researcher might expect to be "insider"/"outsider" in unexpected situations. Research results may not always be as hypothesised or generally expected. Therefore, researchers should be prepared to be challenged in terms of their own understandings of racism, sexism and other issues (again, depending on the project). Also, Rosaldo points out, "social analysts can rarely, if ever, become detached observers" (Rosaldo 169). Given that scholars challenge the idea of an "objective" researcher, it is best to acknowledge any forms of biases and how they influence the process of collecting and analysing data. Identify the complicated positionality of the researcher: The complicated insider/outsider positions of the researcher need to be acknowledged when examining the data. The researcher needs to be mindful of how they are approached by participants. Furthermore, the researcher should keep in mind that such positions are not fixed but are changing constantly, sometimes instantly and other times gradually. These different positions need to be seen as interrelated. Also, the researcher should remember there are different levels of being the insider and outsider, and both these positions can work for and against the process of collecting data. Map out the limitations of the project: The research field (which does not necessarily refer to an actual physical environment), in some circumstances, can be volatile and dangerous for some researchers. In the case of my own project, an Arab female researcher would have different experiences, some of which could include violence (according to the Isma report conducted by the Australian Human Rights and Equal Opportunities Commission, Arab women are more likely to experience racially-motivated violence than Arab men—see HREOC). I would advise that researchers are mindful of their "fields". Further, I recommend that research is conducted in public places, particularly if they are about contentious issues. Do not give personal details and if a particular topic inflames the participant during the interview to the point where you feel threatened, change the topic to something a lot less "inflammatory". Notes The names of these participants in this article are pseudonyms. Also, their positions on the school do not represent opponents/supporters of the school. Nor do they represent the Camden community. Further, my experiences interviewing these participants are not reflective of all the interviews I conducted in Camden. References Al-Natour, Ryan J. "Folk Devils and the Proposed Islamic School in Camden." Continuum 24.4 (2010): 573-85. Becker, Howard. "Afterword: Racism and the Research Process." Racing Research, Researching Race: Methodological Dilemmas in Critical Race Studies. Eds. F.W.Twine and J.W. Warren. New York: New York UP, 2000. 247-54. Clifford, James. "Introduction." Writing Culture. Eds. J. Clifford and G.E. Marcus. California: U of California P, 1986.1-26. Coloma, Roland Sintos. "Border Crossing Subjectivities and Research: Through the Prism of Feminists of Color." Race, Ethnicity and Education 11.1 (2008):11-27. Duneier, Mitchell. "Three Rules I Go By in My Ethnographic Research on Race and Racism." Researching Race and Racism. Eds. M. Bulmer and J. Solomos. London: Routledge, 2004. 92-103. Ezzy, Douglas. Qualitative Analysis: Practice and Innovation. Crows Nest: Allen and Unwin, 2002. Human Rights and Equal Opportunities Commission (HREOC). Isma – Listen: National Consultations on Eliminating Prejudice against Arab and Muslim Australians. 2004. 9 Nov. 2011 ‹http://www.hreoc.gov.au/racial_discrimination/isma/report/pdf/ISMA_complete.pdf›. Naples, Nancy. "A Feminist Revisiting of the Insider/Outsider Debate: The 'Outsider Phenomenon' in Rural Iowa." Qualitative Sociology 19.1 (1996): 83-106. Rosaldo, Renato. Culture and Truth: The Remaking of Social Analysis. Boston: Beacon P. 1993. Sin, Chih Hoong. "Ethnic-Matching in Qualitative Research: Reversing the Gaze on 'White Others' and 'White' as 'Other'." Qualitative Research 7.4 (2007): 477-99. Smith, Linda T. Decolonizing Methodologies: Research and Indigenous Peoples. Dunedin: U of Otago P, 1999. Young, Alford. "Experiences in Ethnographic Interviewing about Race." Researching Race and Racism. Eds. M. Bulmer and J. Solomos. London: Routledge, 2004. 187-202.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography