Journal articles: 'Meaningful offers (affordance)' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / Meaningful offers (affordance) / Journal articles

To see the other types of publications on this topic, follow the link: Meaningful offers (affordance).

Author: Grafiati

Published: 4 June 2021

Last updated: 14 February 2022

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 30 journal articles for your research on the topic 'Meaningful offers (affordance).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chiarello, Filippo, Ilenia Cirri, Nicola Melluso, Gualtiero Fantoni, Andrea Bonaccorsi, and Tommaso Pavanello. "Approaches to Automatically Extract Affordances from Patents." Proceedings of the Design Society: International Conference on Engineering Design 1, no.1 (July 2019): 2487–96. http://dx.doi.org/10.1017/dsi.2019.255.

Full text

Abstract:

AbstractThe importance of affordance in Engineering design is well established. Artifacts that are able to activate spontaneous and immediate users’ reactions are considered the outcome of good design practice.A huge effort has been made by researchers for understanding affordances: yet these efforts have been somewhat elusive. In particular, they have been limited to case studies and experimental studies, usually involving a small subset of affordances. No systematic effort has been carried out to list all known affordance effects. This paper offers preliminary steps for such an ambitious effort.We propose a set of three different approaches of Natural Language Processing techniques to be used to extract meaningful affordance information from the full text of patents: 1) a simple word search, 2) a lexicon of affordances and 3) a rule-based system.The results give in-depth measures of how rare affordances in patents are, and a fine grain analysis of the linguistical construction of affordances. Finally, we show an interesting output of our method, that has detected affordances for disabled people, showing the ability of our system to automatically collect design-relevant knowledge.

APA, Harvard, Vancouver, ISO, and other styles

2

Shin, Donghee, and Yujong Hwang. "The effects of security and traceability of blockchain on digital affordance." Online Information Review 44, no.4 (May23, 2020): 913–32. http://dx.doi.org/10.1108/oir-01-2019-0013.

Full text

Abstract:

PurposeThis study takes an affordance approach to explain how users perceive the affordance of user action within blockchain and examines how it influences the subsequent user experience. Focusing on the effect of trust on cognitive processes, the authors analyze how affordances in blockchains affect the user experience.Design/methodology/approachThe blockchain affordances are examined through a two-stage process. The authors employ a qualitative analysis based on insights gained from the current literature and interviews. The authors then apply a quantitative survey to examine the role of trust in interactions with blockchain services. A structural user model was tested in which their appreciation of affordances of blockchain predicted the trust and satisfaction.FindingsUsers' appreciation for transparency and reliability explained to what extent they trust and are satisfied, thereby suggesting the heuristic roles of trust in blockchains. The study findings indicate a heuristic role for trust regarding underlying links to technological and affective affordances. A user's cognitive heuristics affect their attitudes toward blockchain, in which technological features are processed through users' perceptions and experience.Research limitations/implicationsThe model contributes to the conceptualization of security, privacy and traceability along with trust, which is then linked to transparency and reliability. The findings show how the frame of affordances gains explanatory power by being linked to the concepts of affect and emotion. The heuristics of direct perception of security–traceability–privacy (STP) can be used to understand the trajectory of heuristics and ongoing choices of blockchain.Practical implicationsThe study results offer a lens through which to address the technology's most common problems by pairing user experience principles and heuristics to blockchain technologies. This study offers insights into the understanding of user actions related to blockchains and into practical implications for developing trust-based services. The results guide the application and tailoring of motivational affordances in blockchain.Originality/valueWhile blockchain technology has gained popularity and momentum, there has been little research on how specific features of blockchain technology create value. This study contributes to the research gap by highlighting the role and dimension of trust in relation to STP in blockchains and provides meaningful implications for theory and practice.

APA, Harvard, Vancouver, ISO, and other styles

3

Dahlman, Sara, IbT.Gulbrandsen, and SineN.Just. "Algorithms as organizational figuration: The sociotechnical arrangements of a fintech start-up." Big Data & Society 8, no.1 (January 2021): 205395172110267. http://dx.doi.org/10.1177/20539517211026702.

Full text

Abstract:

Building on critical approaches that understand algorithms in terms of communication, culture and organization, this paper offers the supplementary conceptualization of algorithms as organizational figuration, defined as material and meaningful sociotechnical arrangements that develop in spatiotemporal processes and are shaped by multiple enactments of affordance–agency relations. We develop this conceptualization through a case study of a Danish fintech start-up that uses machine learning to create opportunities for sustainable pensions investments. By way of ethnographic and literary methodology, we provide an in-depth analysis of the dynamic trajectory in and through which the organization gives shape to and takes shape from its key algorithmic tool, mapping the shifting sociotechnical arrangements of the start-up, from its initial search for a viable business model through the development of the algorithm to the public launch of its product. On this basis, we argue that conceptualizing algorithms as organizational figuration enables us to detail not only what algorithms do but also what they are.

APA, Harvard, Vancouver, ISO, and other styles

4

Stelitano, Laura, Jennifer Lin Russell, and LauraE.Bray. "Organizing for Meaningful Inclusion: Exploring the Routines That Shape Student Supports in Secondary Schools." American Educational Research Journal 57, no.2 (July4, 2019): 535–75. http://dx.doi.org/10.3102/0002831219859307.

Full text

Abstract:

School organization is a key driver for meaningful inclusion for students with disabilities. While there are promising examples of how schools organize for inclusion with intensive technical assistance, little is known about how high schools organize without such supports. In a case study of two high schools, we compare school organization by looking at their formal design and teachers’ daily routines. While both schools incorporated models for supporting students into their formal design, their daily routines revealed practices that were at odds with the spirit of inclusion. Routines involved special educators helping students pass their classes, though often not through meaningful learning opportunities. We offer insight into the affordances and constraints of school organization, revealing implications for meaningful inclusion.

APA, Harvard, Vancouver, ISO, and other styles

5

Spilberg, Gabriela, GregoryN.Nicola, AndrewB.Rosenkrantz, Ezequiel Silva III, ClemensM.Schirmer, BrianB.Ghoshhajra, Nirmal Choradia, Rose Do, and JoshuaA.Hirsch. "Understanding the impact of ‘cost’ under MACRA: a neurointerventional imperative!" Journal of NeuroInterventional Surgery 10, no.10 (July23, 2018): 1005–11. http://dx.doi.org/10.1136/neurintsurg-2018-013972.

Full text

Abstract:

The cost of providing healthcare in the United States continues to rise. The Affordable Care Act created systems to test value-based alternative payments models. Traditionally, procedure-based specialists such as neurointerventionalists have largely functioned in, and are thus familiar with, the traditional Fee for Service system. Administrative charge data would suggest that neurointerventional surgery is an expensive specialty. The Medicare Access and CHIP Reauthorization Act consolidated pre-existing federal performance programs in the Merit-based Incentive Payments System (MIPS), including a performance category called ‘cost’. Understanding cost as a dimension that contributes to the value of care delivered is critical for succeeding in MIPS and offers a meaningful route for favorably bending the cost curve.

6

Greenberg, Miriam, RebeccaA.London, and StevenC.McKay. "Community-Initiated Student-Engaged Research: Expanding Undergraduate Teaching and Learning through Public Sociology." Teaching Sociology 48, no.1 (September11, 2019): 13–27. http://dx.doi.org/10.1177/0092055x19875794.

Full text

Abstract:

Drawing on a multiyear local research project on the affordable housing crisis, this article outlines a pedagogical approach we call Community-Initiated Student-Engaged Research, or CISER. The CISER model brings together three key groups of actors—undergraduate students, university researchers, and community organizations—drawing on and extending the powers of cooperative “dyads” between them. This model aims to improve pedagogical and sociological practice by constituting undergraduate students as both knowledge producers and an active public while at the same time creating meaningful partnerships between university researchers and community-based organizations. Based on assessments of the program from the vantage points of all three groups, our findings indicate that CISER is a powerful pedagogical tool and mode of community-engaged scholarship and that it offers both challenges and rewards to the involved students, faculty, and community organizations.

APA, Harvard, Vancouver, ISO, and other styles

7

Trottier, Daniel. "Confronting the digital mob: Press coverage of online justice seeking." European Journal of Communication 35, no.6 (June9, 2020): 597–612. http://dx.doi.org/10.1177/0267323120928234.

Full text

Abstract:

This article offers an exploratory account of press coverage of digitally mediated vigilantism. It considers how the UK press renders these events visible in a sustained and meaningful way. News reports and editorials add visibility to these events, and also make them more tangible when integrating content from social media platforms. In doing so, this coverage directs attention to a range of social actors, who may be perceived as responsible for these kinds of developments. In considering how other social actors are presented in relation to digital vigilantism, this study focusses on press accounts of those either initiating or being targeted by online denunciations, and also on a broader and often amorphous range of spectators to such events, often referred to as ‘internet mobs’. Relatedly, this article explores how specific practices related to digital vigilantism such as denunciation are expressed in press coverage, as well as coverage of motivations by the public to either participate or facilitate such practices. Reflecting on how the press represent mediated denunciation will illustrate not only how tabloids and broadsheets frame such practices, but also how they take advantage of connective and data-generating affordances associated with social platforms.

APA, Harvard, Vancouver, ISO, and other styles

8

Litinski, Veronika. "Games for Health." International Journal of Gaming and Computer-Mediated Simulations 5, no.3 (July 2013): 108–15. http://dx.doi.org/10.4018/jgcms.2013070108.

Full text

Abstract:

How to reduce cost, improve quality, and improve customer engagement are top of mind for healthcare leaders. Healthcare organizations are developing and testing comprehensive engagement strategies to support consumers across the care continuum. In this environment some form of priority setting must occur, and it requires establishing connections between proposed innovation to a process of care and the outcomes. Digital tools offer a promise of meaningful measures that are affordable, embedded in the care delivery system and truly reflect patients’ experiences through the patient journey. This paper proposes a pragmatic path for building a business case for innovative digital health tools in community care settings. It overlays value model for healthcare IT investments with patient activation measures and innovation management techniques. It proposes that the intersection of system-generated measures and psychometric methods for data collection and analysis may lead to development of feasible patient engagement measures for healthcare.

APA, Harvard, Vancouver, ISO, and other styles

9

Mifflin, Erin, and Robert Wilton. "No Place like Home: Rooming Houses in Contemporary Urban Context." Environment and Planning A: Economy and Space 37, no.3 (March 2005): 403–21. http://dx.doi.org/10.1068/a36119.

Full text

Abstract:

In this paper we connect existing work on rooming houses to literature dealing with the meaningful nature of ‘home’ and its impact on individuals' health and social well-being. We then examine the extent to which rooming houses provide low-income tenants with ‘homes’, drawing from in-depth interviews with rooming-house tenants living in Hamilton, a city of 450 000 people in southern Ontario, Canada. Our analysis raises concerns about the capacity of rooming houses to provide affordable and stable accommodation. Poor living conditions and poor relations with rooming-house landlords worked directly against the capacity of rooms to offer private, controllable spaces and a degree of ontological security. Analysis also raised concerns about rooming houses as sites for social relations. Many respondents saw rooming houses as unpredictable and sometimes unhealthy social spaces, forcing them to seek other environments to cultivate and sustain relationships with friends and family. In general, respondents' experiences point to the shortcomings of rooming houses as ‘home’ environments, with implications for the health and social lives of the tenant population. Conceptual and policy implications are discussed in conclusion.

APA, Harvard, Vancouver, ISO, and other styles

10

Early, Jody, and Alyssa Hernandez. "Digital Disenfranchisem*nt and COVID-19: Broadband Internet Access as a Social Determinant of Health." Health Promotion Practice 22, no.5 (May6, 2021): 605–10. http://dx.doi.org/10.1177/15248399211014490.

Full text

Abstract:

According to the Pew Research Center, approximately one quarter of American adults do not have access to broadband internet. This number does not account for the millions of people who are underconnected or lacking a stable internet connection. Although digital disparity in America is not new, the COVID-19 (coronavirus disease 2019) pandemic has increased our societal dependence on the internet and widened the digital divide. Access to broadband internet has become a basic need in this connected society, linking people to vital resources, such as jobs, education, health care, food, and information. However, it is still an overlooked and understudied issue in public health. In this article, we highlight five key points for why advocating for the expansion of affordable and accessible internet for all should be a priority issue for public health and health promotion. Recent studies offer evidence that digital disenfranchisem*nt contributes to negative health outcomes, economic oppression, and racial injustice. Now more than ever, health advocacy to promote digital equity and inclusion is critical to our meaningful progress toward health equity.

APA, Harvard, Vancouver, ISO, and other styles

11

Ramaley,JudithA. "Working Together Differently: Addressing the Housing Crisis in Oregon." Metropolitan Universities 28, no.2 (May17, 2017): 22–36. http://dx.doi.org/10.18060/21513.

Full text

Abstract:

Universities are being asked to prepare our students to navigate successfully in a complex and interconnected world and to contribute to the solution of difficult problems at work and in the communities where they live. Our universities must do the same. We must adapt our approaches to education, scholarship and community involvement in order to play a meaningful role in addressing the increasingly complex and wicked problems that our communities face. The housing crisis in Portland, Oregon offers an especially important example of a wicked problem that has developed slowly, will be very costly to resolve and involves a lot of uncertainty due to unpredictable social, economic and environmental factors. In 2015, policymakers in communities throughout Oregon began talking about a housing crisis as people searching for affordable housing found themselves competing with both the growing popularity of Oregon as a place to live and a real estate investment boom. Rents rose at a rate of $100/month and over 24,000 units were needed to meet the demand in 2015. The problem remains acute in 2016. This article uses community efforts to understand and address the housing crisis as a focus to explore the changing roles of the university in participating in and contributing to these new social networks, multi-stakeholder initiatives and collaborations.

APA, Harvard, Vancouver, ISO, and other styles

12

Dalal, Hasnain, and Rod Taylor. "Home-based rehabilitation for heart failure with reduced ejection fraction: the REACH HF multicentre RCT." British Journal of General Practice 69, suppl 1 (June 2019): bjgp19X703181. http://dx.doi.org/10.3399/bjgp19x703181.

Full text

Abstract:

BackgroundCardiac rehabilitation (CR) improves health-related quality of life (HRQOL) and reduces hospitalisations in patients with heart failure (HF), but international uptake of CR for HF remains low.AimTo compare the REACH-HF (Rehabilitation EnAblement EnAblement in CHronic Heart Failure) intervention: a facilitated self-care and home-based CR programme to usual care (UC) for adults with HF with reduced ejection fraction (HFrEF) and to assess the long-term cost-effectiveness of the intervention. The primary hypothesis was that the addition of the REACH-HF intervention to UC would improve disease-specific HRQOL (Minnesota Living with Heart Failure questionnaire [MLHFQ]) at 12 months compared with UC alone.MethodMulticentre randomised trial.ResultsThere were 216 participants: 78% male, average age 70 years, and mean left ventricular ejection fraction of 34%. Overall, 185 (86%) participants provided data for the primary outcome. At 12 months, there was a significant and clinically meaningful between-group difference in the MLHFQ score of −5.7 points (95% CI = −10.6 to −0.7) in favour of the REACH-HF intervention group (P = 0.025). The mean cost of the REACH-HF intervention was £418 per participant, which was associated with a per patient mean quality-adjusted life year (QALY) gain of 0.23 and an increased mean cost of £400 compared with usual care, resulting in a cost per QALY gained of £1720.ConclusionThe REACH-HF facilitated intervention was clinically superior in disease-specific HRQoL at 12 months and economic modelling shows that it is cost-effective. REACH-HF offers an affordable alternative to traditional centre-based programmes to address current low CR uptake rates for HF.

APA, Harvard, Vancouver, ISO, and other styles

13

Dalal,HasnainM., RodS.Taylor, Kate Jolly, RussellC.Davis, Patrick Doherty, Jackie Miles, Robin van Lingen, et al. "The effects and costs of home-based rehabilitation for heart failure with reduced ejection fraction: The REACH-HF multicentre randomized controlled trial." European Journal of Preventive Cardiology 26, no.3 (October10, 2018): 262–72. http://dx.doi.org/10.1177/2047487318806358.

Full text

Abstract:

Background Cardiac rehabilitation improves health-related quality of life (HRQoL) and reduces hospitalizations in patients with heart failure, but international uptake of cardiac rehabilitation for heart failure remains low. Design and methods The aim of this multicentre randomized trial was to compare the REACH-HF (Rehabilitation EnAblement in CHronicHeart Failure) intervention, a facilitated self-care and home-based cardiac rehabilitation programme to usual care for adults with heart failure with reduced ejection fraction (HFrEF). The study primary hypothesis was that the addition of the REACH-HF intervention to usual care would improve disease-specific HRQoL (Minnesota Living with Heart Failure questionnaire (MLHFQ)) at 12 months compared with usual care alone. Results The study recruited 216 participants, predominantly men (78%), with an average age of 70 years and mean left ventricular ejection fraction of 34%. Overall, 185 (86%) participants provided data for the primary outcome. At 12 months, there was a significant and clinically meaningful between-group difference in the MLHFQ score of –5.7 points (95% confidence interval –10.6 to –0.7) in favour of the REACH-HF intervention group ( p = 0.025). With the exception of patient self-care ( p < 0.001) there was no significant difference in other secondary outcomes, including clinical events ( p > 0.05) at follow-up compared with usual care. The mean cost of the REACH-HF intervention was £418 per participant. Conclusions The novel REACH-HF home-based facilitated intervention for HFrEF was clinically superior in disease-specific HRQoL at 12 months and offers an affordable alternative to traditional centre-based programmes to address current low cardiac rehabilitation uptake rates for heart failure.

APA, Harvard, Vancouver, ISO, and other styles

14

Vivienne, Son. "‘Little Islands of Empathy’: networked stories of gender diversity and multiple selves’." Media International Australia 168, no.1 (June29, 2018): 19–30. http://dx.doi.org/10.1177/1329878x18783019.

Full text

Abstract:

This article draws on a methodologically interesting case study called ‘Stories Beyond Gender’, in which a small group of trans* people collaborates in social media storytelling. Building on the possibilities manifest in other more explicitly personal-as-political genres like digital storytelling, I explore the potential of this facilitated workshop practice to establish meaningful connections across difference, forging affinities that may continue to flourish online. Furthermore, I offer some specific examples of the ways in which my own networked story-sharing online, in a zine and in an exhibition affirmed emergent complexity. I address the theme of this Special Issue by examining the ways in which social media, despite paradoxical fragmentation, can be used creatively to mobilise interest in public aspects of gender expression. However, sharing stories, especially those linked to stigmatised identities, whether online or off, is not without its complications. In the face of highly valued privacy, a lack of familiarity with ever-changing privacy settings or the affordances of specific platforms can pose an obstacle to online self-representation that stands in the way of visible civic engagement. While acknowledging that the trans-phobic consequences of online misadventures continue to be dire, I address the self-protective skills and sophisticated ways in which gender-diverse people curate emergent and past selves across intersecting social networks both on and offline. I argue that, at the intersections of post-digital and post-gender ways of being, we can observe emergent acceptance of multiple selves that are capable of being inconsistent without being incoherent. These representations exist in stark opposition to pop psychology’s premise of a singular authentic ‘inner truth’.

APA, Harvard, Vancouver, ISO, and other styles

15

Carmo, Waldirene Ribeiro do, and Carla Cristina Reinaldo Gimenes de Sena. "Tactile Cartography Courses in the Continued Education of Teachers from Latin America." Abstracts of the ICA 2 (October8, 2020): 1–2. http://dx.doi.org/10.5194/ica-abs-2-17-2020.

Full text

Abstract:

Abstract. One of the objectives of the International Cartographic Association (ICA) is facilitating the transfer of new cartographic knowledge inside and among nations, especially in developing countries, by providing specialists to lead workshops and courses when requested. In this sense, the Commission on Maps and Graphics for Blind and Partially Sighted People offers diverse courses in partnership with researchers from the Centro de Cartografia Tátil (Tactile Cartographic Center) at Universidad Tecnológica Metropolitana de Santiago de Chile. The faculty is multidisciplinary, formed by cartographers, geographers, special education teachers, designers, among others.Approaching theoretical questions related to the Introduction to Cartography and Tactile Cartography, and also the development of practical activities, such as the construction of tactile instructional materials (in collage and aluminum) which prioritize the use of low-cost materials to assure they are affordable to all groups, but also demonstrating alternatives based on digital technologies like 3D printers and the use dynamics of these materials in schools. The main goal of the courses is to demonstrate construction techniques of tactile graphic representations inside an inclusive educational policy, as well as to make participants aware of the importance of tactile graphic representations for the teaching/learning of geography and other areas in an interdisciplinary perspective. In general, they are presented to heterogeneous groups (teachers of students with special educational needs, teachers of “regular” groups (of geography and other subjects), cartographers, etc.).The courses, which are one-week long, started to be presented in Santiago de Chile in 2003, and there were other editions in 2004, 2005, 2006, 2007, 2009, 2012, 2013 and 2018, and they always had participants from several countries from Latin America (Argentina, Bolivia, Brazil, Colombia, Costa Rica, Chile, Ecuador, El Salvador, Guatemala, Honduras, Mexico, Nicaragua, Panama, Paraguay, Peru, Dominican Republic, Uruguay, and Venezuela), and later the team was invited to run the courses in Argentina (2004), Mexico (2004), Costa Rica (2016), Ecuador and Dominican Republic (2019).The experience with the courses demonstrated the importance of continuing education for teachers in the different education stages and for professionals who assist people with special needs, and the possibility of exchanging experiences, highlighting the inclusion of disabled students in the regular classroom. Primarily in what concerns geography teachers, it was noticed that there is little or no knowledge about the specificities of visually impaired students and their needs in relation to geography teaching and the use of graphic representations.On the other hand, teachers who had specific education to teach students with special educational needs and are located in multifunctional resources’ rooms or some of the remaining special needs’ schools lack specific knowledge about geography and cartography. These teachers need to assist the demands of all subjects and, many times, despite their efforts, they end up making inappropriate adaptations of materials, because they ignore the principles which must be observed in the transposition of visual/digital/printed materials into the tactile format.The organizing team developed a basic structure of themes that are approached to meet the participants’ expectations, and the themes are organized in the modules: Geo-cartographic concepts, techniques for preparation and reproduction of maps and relief illustrations, application of maps and tactile instructional materials to education.With a figure of about 300 participants, it was noticed how the practices stimulate the teachers’ creativity and encourage them to create activities and group exercises for the classroom. Besides, the courses provide the reflection on how cartography can help geography teaching when it is done in a way that is more dynamic and meaningful for the students.

APA, Harvard, Vancouver, ISO, and other styles

16

Murgia, Mauro, and Alessandra Galmonte. "Editorial: The Role of Sound in Motor Perception and Execution." Open Psychology Journal 8, no.1 (December31, 2015): 171–73. http://dx.doi.org/10.2174/1874350101508010171.

Full text

Abstract:

“Perception and action” is one of the main research fields in which experimental psychologists work together with experts of other disciplines, such as medicine, physiotherapy, engineering, and sport. Traditionally, researchers have mainly focused on visual perception and on its influences on motor processes, while less attention has been dedicated to the role of auditory perception. However, in the last decade, the interest towards the influence of sounds on both action perception and motor execution has increased significantly. On the one hand, researchers have been interested in determining how humans can represent motor actions through the sounds associated with movements, as well as which auditory cues are salient for recognizing and discriminating different features of movement [1-10]. On the other hand, researchers have studied how auditory stimuli affect the production of complex movements in different domains [11-21]. The general aim of this special issue is to provide an overview of the relationship between sounds and movements by addressing theoretical, methodological, and applied issues from a multidisciplinary perspective. ORGANIZATION OF THE VOLUME At the beginning of this special issue we report the contributions that deal with theoretical (Steenson & Rodger; Pizzera & Hohmann) and methodological (Dyer, Stapleton & Rodger) issues regarding auditory perception and action. After providing a theoretical and methodological background, we report those contributions that focus on possible applications of auditory training in the domain of sport and exercise psychology (O, Law & Rymal; Sors, Murgia, Santoro & Agostini), rehabilitation (Murgia, Corona, Pili, Sors, Agostini, Casula, Pau & Guicciardi), and motor learning (Effenberg, Schmitz, Baumann, Rosenhahn & Kroeger). In the first article, Steenson and Rodger highlight that despite the fact that sounds are helpful in executing many dayto- day and context-specific movements and skills in everyday life, there is a surprising lack of exploration of this topic in psychological studies. In fact, the authors review the auditory perception literature and note that auditory perception theories mainly describe the rules governing the processing and representation of sounds in memory, and largely disregard the meaning that sounds have to individuals engaged in movement and the subsequent use of movement sounds in movement priming and execution. Steenson and Rodger’s work can be framed in the context of Gibson’s ecological psychology, as they emphasize the role of sound as a very important affordance that we use to interact with our environment. In the second contribution, Pizzera and Hohmann extensively review studies that address the relevance of the mutual interactions between perception and motor control. Again, these authors highlight the scarcity of research on acoustic information, especially when comparing it with the amount of evidence available in the visual domain. Pizzera and Hohmann offer their perspective on the role of auditory information in controlling and integrating the perception and action cycle. The authors present both behavioral and neurophysiological evidence in support of the importance of auditory information in perception and action, and propose valuable suggestions that future investigators should consider in order to advance the state of knowledge in this domain. The methodological contribution of Dyer, Stapleton and Rodger highlights the feasibility of movement sonification as an effective feedback tool for enhancing motor skill learning and performance, particularly in novices. The authors critically discuss the strengths and weaknesses of movement sonification in the context of providing efficient perceptual feedback information to learners. Dyer, Stapleton and Rodger conclude that a well-defined framework for sonification mapping has yet to be established and that there is still need for controlled trials in motor learning. However, the authors do suggest that new technologies relevant to movement sound recording, mapping, and sonification are available to researchers and can facilitate meaningful and much-needed future research on this promising perceptual feedback method. With regards to the possible applications of audio-based interventions, the fourth article of the issue by O, Law, and Rymal provides an overview of imagery and modeling research in sport psychology and motor learning, documenting evidence supporting the cognitive processing similarities between imagery and modeling. Within this background, the authors critically examine the role of the auditory sense in modeling and imagery, analyzing both theoretical issues and empirical evidence. From a bio-informational theory perspective, O, Law, and Rymal offer several examples of potential applications of the deliberate integration of the auditory sense in movement teaching and instruction, but also offer a strong caveat regarding the severe lack of applied research on the auditory sense focused on sport populations, especially in the domain of imagery. In their conclusions the authors propose detailed recommendations for future research. A second contribution on audio-based interventions in sports is provided by Sors, Murgia, Santoro and Agostini. The authors extensively define the concepts of augmented feedback and modeling, and review studies demonstrating the effectiveness of sounds in improving the execution of simple rhythmic motor tasks. Then, Sors and colleagues describe both a theoretical background and neurophysiological evidence illustrating the mechanisms that are possibly influenced by audio-based interventions. Finally, they provide a complete description of the literature on auditory modeling and auditory augmented feedback in sports, specifying the methodological details of previous studies and proposing future directions for both, application and research. In the sixth article, Murgia, Corona, Pili, Sors, Agostini, Casula, Pau and Guicciardi illustrate the perceptual-motor impairments of patients affected by Parkinsons’ disease and new frontiers in assessment and interventions. They extensively review the empirical evidence concerning the Rhythmic Auditory Stimulation (RAS) method, describing the mechanisms underpinning its effectiveness. The authors propose possible methods for integrating auditory cues into physical therapy interventions as well as assessments. Last, Murgia and colleagues describe the biomechanical advantages of three-dimensional quantitative gait analysis, and discuss the potential impact of the incorporation of ecological footstep sounds in the modulation of patients’ gait. In the seventh and last contribution of this special issue, Effenberg, Schmitz, Baumann, Rosenhahn and Kroeger present a new method based on sonification called “Sound- Script”, which is aimed to facilitate the acquisition of writing. This method consists of the sonification of handwriting, that is, the conversion of physical parameters (i.e., position of the pen, pressure) into movement sounds, which provides children with auditory information which correlates with visual information of their handwriting performance. The authors report pilot data, showing that the multisensory integration elicited by SoundScript leads to a more adequate reproduction of writing kinematics. Effenberg and colleagues conclude by highlighting the potential of this new method and suggesting future steps for research. In sum, we hope that the papers presented in this special issue constitute a useful reference for movement researchers in the field of auditory perception and action, as well as for practitioners in the domains of sport, rehabilitation, and motor learning.

APA, Harvard, Vancouver, ISO, and other styles

17

Goldkind, Lauri, and Lea Wolf. "“That’s the Beauty of it”: Practitioners Describe the Affordances of Direct to Consumer Tele-Mental Health." Families in Society: The Journal of Contemporary Social Services, June17, 2021, 104438942199779. http://dx.doi.org/10.1177/1044389421997796.

Full text

Abstract:

Tele-mental health, or the provision of remote counseling services, has been available for decades. This qualitative study uses the framework of affordances, derived from Gibson, to examine what social work practitioners working on direct to consumer tele-mental health (DTCTMH) platforms are discovering about the features, benefits, and constraints of virtual therapy. An interpretive phenomenological approach was employed to document the lived experiences of social workers who practice in this manner. According to the practitioners interviewed, for a subset of individuals seeking treatment, DTCTMH can offer meaningful interpersonal interaction that confers benefit. Key affordances include accessibility, anonymity, meaningful work, autonomy, lifelong learning, and access by new populations. Practitioners simultaneously acknowledge the ethical complexities and structural challenges of DTCTMH practice. The article concludes with suggestions for future research, policy, and practice.

APA, Harvard, Vancouver, ISO, and other styles

18

Dizon, Gilbert. "Affordances and Constraints of Intelligent Personal Assistants for Second-Language Learning." RELC Journal, July24, 2021, 003368822110205. http://dx.doi.org/10.1177/00336882211020548.

Full text

Abstract:

This paper provides a research synthesis of intelligent personal assistants (IPAs) – that is, cloud-based virtual assistants such as Alexa, Google Assistant, and Siri – for second language (L2) learning. The article also offers a theoretical justification for the use of IPAs in language learning and outlines the affordances and constraints of the technology. Finally, the article proposes directions for future research on the topic of IPAs based on the aforementioned review of L2 literature. While research indicates that IPAs increase opportunities for meaningful communication in the target language, enhance speaking ability, and provide indirect pronunciation feedback, they also present some challenges for L2 learners – namely, IPAs struggle to reliably understand L2 speech, which may limit the usability of virtual assistants among heavily accented learners.

APA, Harvard, Vancouver, ISO, and other styles

19

Borghini, Stefania, JohnF.Sherry, and Annamma Joy. "Attachment to and Detachment from Favorite Stores: An Affordance Theory Perspective." Journal of Consumer Research, September1, 2020. http://dx.doi.org/10.1093/jcr/ucaa044.

Full text

Abstract:

Abstract Like homes, neighborhoods, and cities, retail locations offer significant opportunities for attachment far from domestic spheres. In commercial settings, consumers construct personal geographies, and find stable references for their lives. Our work advances previous consumer research by showing how these relationalities are situated, implicitly unstable and often impermanent. Individuals attach to commercial spaces in multiple ways, through both immediate and slow processes. We theorize that multiple affordances of spaces—whether sensual, symbolic, or cerebral—trigger meaningful ties, stimulate new affective and practice repertoires and may exert a transformative power in personal biographies. Bonds evolve in tandem with individuals’ life courses and are also impacted by events beyond consumers’ control, such as store closures. Whether disruptive or constructive, detachments can precipitate constructive change, allowing individuals to mobilize the emotional and cognitive resources at the base of their affective bond with treasured places, and redirect these assets more effectively. Forced and voluntary detachment from retail spaces are thus interpreted as integral and complementary components of attachment.

APA, Harvard, Vancouver, ISO, and other styles

20

Yang, Qianwen, and Xiang Gong. "The engagement–addiction dilemma: an empirical evaluation of mobile user interface and mobile game affordance." Internet Research ahead-of-print, ahead-of-print (March17, 2021). http://dx.doi.org/10.1108/intr-11-2020-0622.

Full text

Abstract:

PurposeThe engagement–addiction dilemma has been commonly observed in the information technology (IT) industry. However, this issue has received limited research attention in the information system (IS) discipline. Drawing on the stimulus–organism–response (SOR) framework, this study explores the engagement–addiction dilemma in the use of mobile games and highlights the impacts of game design features, namely, mobile user interface and mobile game affordance.Design/methodology/approachThe research model was empirically validated using a longitudinal survey data from 410 mobile game users in China.FindingsThe empirical results offer several key findings. First, mobile user interface and mobile game affordance positively affect telepresence and social presence, which lead to meaningful engagement and mobile game addiction. Second, a high-quality of mobile user interface positively moderates the effects of mobile game affordance on telepresence and social presence.Originality/valueThis study contributes to the literature by theorizing and empirically testing the impacts of game design features on the engagement-addiction dilemma.

APA, Harvard, Vancouver, ISO, and other styles

21

Griffin, Hollis. "The Politics of Merely Following: Witnessing AIDS on Instagram." New Media & Society, September25, 2020, 146144482096138. http://dx.doi.org/10.1177/1461444820961388.

Full text

Abstract:

Using an illustrative sample of posts to an Instagram account devoted to commemorating lives lost to AIDS, this article articulates a less-than-intense form of engagement with lesbian, gay, bisexual, transgender, and queer (LGBTQ+) politics on social media. Merely following particular accounts on social media networks enables an encounter with an Other that is shaped by the affordances of digital technologies and the specificities of particular platforms. A site of political engagement that is further contoured by hierarchies of sex, race, and gender, @theaidsmemorial offers evidence of user experiences that are less focused and intentional than those typically associated with progressive sexual politics. Nevertheless, the author argues that they are meaningful because of how they expose users to bodies, lives, and desires they may not encounter if not for social media.

APA, Harvard, Vancouver, ISO, and other styles

22

Rajamani, Sripriya, Aaron Bieringer, and Miriam Muscoplat. "Characterizing the Access of Clinical Decision Support Offered by Immunization Information System in Minnesota." Online Journal of Public Health Informatics 7, no.3 (December28, 2015). http://dx.doi.org/10.5210/ojphi.v7i3.6282.

Full text

Abstract:

Background: Healthy People 2020 aims to improve population health by increasing immunization rates to decrease vaccine-preventable infectious diseases. Amongst the many strategies, role of immunization information systems (IIS) are recognized by studies and taskforce reports. IIS are unique in their offering of clinical decision support for immunizations (CDSi) which are utilized by healthcare providers. Federal initiatives such as Meaningful Use (MU) and Affordable Care Act (ACA) aim to improve immunization rates through use of technology and expanding access to immunization services respectively. MU, the Electronic Health Record (EHR) incentive program includes use of IIS CDSi functionality as part of Stage 3. It is essential to understand access and use patterns of IIS CDSi, so as to utilize it better to improve immunization services.Objectives: To understand the utilization of clinical decision support for immunizations (CDSi) offered by immunization information system in Minnesota and to analyze the variability of its use across providers and EHR implementations.Methods: IIS in Minnesota (Minnesota Immunization Information Connection: MIIC) offers CDSi that is accessed through EHRs and branded as Alternate Access (AA). Data from MIIC and technical documents were reviewed to create details on organizations which implemented AA functionality. Data on EHR adoption in clinics and local health departments was obtained from Minnesota eHealth assessment reports. Data on access were tracked from January 2015 through mid-October 2015 through weekly specialized reports to track the queries by organization, volume and day of the week. Data were analyzed, findings were synthesized and reviewed with subject matter experts.Conclusion: High EHR adoption offers a great opportunity to promote use of IIS CDSi at point of care. Analysis did not track use at individual clinic level and how the queries were being generated. Additional research is needed to understand the provider level use of this CDSi and other organizational and technical factors which influence access to IIS. This is essential for IIS as they execute projects to improve population-level immunization rates, plan provider outreach and prioritize their system enhancements to meet federal requirements.

APA, Harvard, Vancouver, ISO, and other styles

23

Leaver, Tama. "The Social Media Contradiction: Data Mining and Digital Death." M/C Journal 16, no.2 (March8, 2013). http://dx.doi.org/10.5204/mcj.625.

Full text

Abstract:

Introduction Many social media tools and services are free to use. This fact often leads users to the mistaken presumption that the associated data generated whilst utilising these tools and services is without value. Users often focus on the social and presumed ephemeral nature of communication – imagining something that happens but then has no further record or value, akin to a telephone call – while corporations behind these tools tend to focus on the media side, the lasting value of these traces which can be combined, mined and analysed for new insight and revenue generation. This paper seeks to explore this social media contradiction in two ways. Firstly, a cursory examination of Google and Facebook will demonstrate how data mining and analysis are core practices for these corporate giants, central to their functioning, development and expansion. Yet the public rhetoric of these companies is not about the exchange of personal information for services, but rather the more utopian notions of organising the world’s information, or bringing everyone together through sharing. The second section of this paper examines some of the core ramifications of death in terms of social media, asking what happens when a user suddenly exists only as recorded media fragments, at least in digital terms. Death, at first glance, renders users (or post-users) without agency or, implicitly, value to companies which data-mine ongoing social practices. Yet the emergence of digital legacy management highlights the value of the data generated using social media, a value which persists even after death. The question of a digital estate thus illustrates the cumulative value of social media as media, even on an individual level. The ways Facebook and Google approach digital death are examined, demonstrating policies which enshrine the agency and rights of living users, but become far less coherent posthumously. Finally, along with digital legacy management, I will examine the potential for posthumous digital legacies which may, in some macabre ways, actually reanimate some aspects of a deceased user’s presence, such as the Lives On service which touts the slogan “when your heart stops beating, you'll keep tweeting”. Cumulatively, mapping digital legacy management by large online corporations, and the affordances of more focussed services dealing with digital death, illustrates the value of data generated by social media users, and the continued importance of the data even beyond the grave. Google While Google is universally synonymous with search, and is the world’s dominant search engine, it is less widely understood that one of the core elements keeping Google’s search results relevant is a complex operation mining user data. Different tools in Google’s array of services mine data in different ways (Zimmer, “Gaze”). Gmail, for example, uses algorithms to analyse an individual’s email in order to display the most relevant related advertising. This form of data mining is comparatively well known, with most Gmail users knowingly and willingly accepting more personalised advertising in order to use Google’s email service. However, the majority of people using Google’s search engine are unaware that search, too, is increasingly driven by the tracking, analysis and refining of results on the basis of user activity (Zimmer, “Externalities”). As Alexander Halavais (160–180) quite rightly argues, recent focus on the idea of social search – the deeper integration of social network information in gauging search results – is oxymoronic; all search, at least for Google, is driven by deep analysis of personal and aggregated social data. Indeed, the success of Google’s mining of user data has led to concerns that often invisible processes of customisation and personalisation will mean that the supposedly independent or objective algorithms producing Google’s search results will actually yield a different result for every person. As Siva Vaidhyanathan laments: “as users in a diverse array of countries train Google’s algorithms to respond to specialized queries with localised results, each place in the world will have a different list of what is important, true, or ‘relevant’ in response to any query” (138). Personalisation and customisation are not inherently problematic, and frequently do enhance the relevance of search results, but the main objection raised by critics is not Google’s data mining, but the lack of transparency in the way data are recorded, stored and utilised. Eli Pariser, for example, laments the development of a ubiquitous “filter bubble” wherein all search results are personalised and subjective but are hidden behind the rhetoric of computer-driven algorithmic objectivity (Pariser). While data mining informs and drives many of Google’s tools and services, the cumulative value of these captured fragments of information is best demonstrated by the new service Google Now. Google Now is a mobile app which delivers an ongoing stream of search results but without the need for user input. Google Now extrapolates the rhythms of a person’s life, their interests and their routines in order to algorithmically determine what information will be needed next, and automatically displays it on a user’s mobile device. Clearly Google Now is an extremely valuable and clever tool, and the more information a user shares, the better the ongoing customised results will be, demonstrating the direct exchange value of personal data: total personalisation requires total transparency. Each individual user will need to judge whether they wish to share with Google the considerable amount of personal information needed to make Google Now work. The pressing ethical question that remains is whether Google will ensure that users are sufficiently aware of the amount of data and personal privacy they are exchanging in order to utilise such a service. Facebook Facebook began as a closed network, open only to students at American universities, but has transformed over time to a much wider and more open network, with over a billion registered users. Facebook has continually reinvented their interface, protocols and design, often altering both privacy policies and users’ experience of privacy, and often meeting significant and vocal resistance in the process (boyd). The data mining performed by social networking service Facebook is also extensive, although primarily aimed at refining the way that targeted advertising appears on the platform. In 2007 Facebook partnered with various retail loyalty services and combined these records with Facebook’s user data. This information was used to power Facebook’s Beacon service, which added details of users’ retail history to their Facebook news feed (for example, “Tama just purchased a HTC One”). The impact of all of these seemingly unrelated purchases turning up in many people’s feeds suddenly revealed the complex surveillance, data mining and sharing of these data that was taking place (Doyle and Fraser). However, as Beacon was turned on, without consultation, for all Facebook users, there was a sizable backlash that meant that Facebook had to initially switch the service to opt-in, and then discontinue it altogether. While Beacon has been long since erased, it is notable that in early 2013 Facebook announced that they have strengthened partnerships with data mining and profiling companies, including Datalogix, Epsilon, Acxiom, and BlueKai, which harness customer information from a range of loyalty cards, to further refine the targeting ability offered to advertisers using Facebook (Hof). Facebook’s data mining, surveillance and integration across companies is thus still going on, but no longer directly visible to Facebook users, except in terms of the targeted advertisem*nts which appear on the service. Facebook is also a platform, providing a scaffolding and gateway to many other tools and services. In order to use social games such as Zynga’s Farmville, Facebook users agree to allow Zynga to access their profile information, and use Facebook to authenticate their identity. Zynga has been unashamedly at the forefront of user analytics and data mining, attempting to algorithmically determine the best way to make virtual goods within their games attractive enough for users to pay for them with real money. Indeed, during a conference presentation, Zynga Vice President Ken Rudin stated outright that Zynga is “an analytics company masquerading as a games company” (Rudin). I would contend that this masquerade succeeds, as few Farmville players are likely to consider how their every choice and activity is being algorithmically scrutinised in order to determine what virtual goods they might actually buy. As an instance of what is widely being called ‘big data’, the data miing operations of Facebook, Zynga and similar services lead to a range of ethical questions (boyd and Crawford). While users may have ostensibly agreed to this data mining after clicking on Facebook’s Terms of Use agreement, the fact that almost no one reads these agreements when signing up for a service is the Internet’s worst kept secret. Similarly, the extension of these terms when Facebook operates as a platform for other applications is a far from transparent process. While examining the recording of user data leads to questions of privacy and surveillance, it is important to note that many users are often aware of the exchange to which they have agreed. Anders Albrechtslund deploys the term ‘social surveillance’ to usefully emphasise the knowing, playful and at times subversive approach some users take to the surveillance and data mining practices of online service providers. Similarly, E.J. Westlake notes that performances of self online are often not only knowing but deliberately false or misleading with the aim of exploiting the ways online activities are tracked. However, even users well aware of Facebook’s data mining on the site itself may be less informed about the social networking company’s mining of offsite activity. The introduction of ‘like’ buttons on many other Websites extends Facebook’s reach considerably. The various social plugins and ‘like’ buttons expand both active recording of user activity (where the like button is actually clicked) and passive data mining (since a cookie is installed or updated regardless of whether a button is actually pressed) (Gerlitz and Helmond). Indeed, because cookies – tiny packets of data exchanged and updated invisibly in browsers – assign each user a unique identifier, Facebook can either combine these data with an existing user’s profile or create profiles about non-users. If that person even joins Facebook, their account is connected with the existing, data-mined record of their Web activities (Roosendaal). As with Google, the significant issue here is not users knowingly sharing their data with Facebook, but the often complete lack of transparency in terms of the ways Facebook extracts and mines user data, both on Facebook itself and increasingly across applications using Facebook as a platform and across the Web through social plugins. Google after Death While data mining is clearly a core element in the operation of Facebook and Google, the ability to scrutinise the activities of users depends on those users being active; when someone dies, the question of the value and ownership of their digital assets becomes complicated, as does the way companies manage posthumous user information. For Google, the Gmail account of a deceased person becomes inactive; the stored email still takes up space on Google’s servers, but with no one using the account, no advertising is displayed and thus Google can earn no revenue from the account. However, the process of accessing the Gmail account of a deceased relative is an incredibly laborious one. In order to even begin the process, Google asks that someone physically mails a series of documents including a photocopy of a government-issued ID, the death certificate of the deceased person, evidence of an email the requester received from the deceased, along with other personal information. After Google have received and verified this information, they state that they might proceed to a second stage where further documents are required. Moreover, if at any stage Google decide that they cannot proceed in releasing a deceased relative’s Gmail account, they will not reveal their rationale. As their support documentation states: “because of our concerns for user privacy, if we determine that we cannot provide the Gmail content, we will not be able to share further details about the account or discuss our decision” (Google, “Accessing”). Thus, Google appears to enshrine the rights and privacy of individual users, even posthumously; the ownership or transfer of individual digital assets after death is neither a given, nor enshrined in Google’s policies. Yet, ironically, the economic value of that email to Google is likely zero, but the value of the email history of a loved one or business partner may be of substantial financial and emotional value, probably more so than when that person was alive. For those left behind, the value of email accounts as media, as a lasting record of social communication, is heightened. The question of how Google manages posthumous user data has been further complicated by the company’s March 2012 rationalisation of over seventy separate privacy policies for various tools and services they operate under the umbrella of a single privacy policy accessed using a single unified Google account. While this move was ostensibly to make privacy more understandable and transparent at Google, it had other impacts. For example, one of the side effects of a singular privacy policy and single Google identity is that deleting one of a recently deceased person’s services may inadvertently delete them all. Given that Google’s services include Gmail, YouTube and Picasa, this means that deleting an email account inadvertently erases all of the Google-hosted videos and photographs that individual posted during their lifetime. As Google warns, for example: “if you delete the Google Account to which your YouTube account is linked, you will delete both the Google Account AND your YouTube account, including all videos and account data” (Google, “What Happens”). A relative having gained access to a deceased person’s Gmail might sensibly delete the email account once the desired information is exported. However, it seems less likely that this executor would realise that in doing so all of the private and public videos that person had posted on YouTube would also permanently disappear. While material possessions can be carefully dispersed to specific individuals following the instructions in someone’s will, such affordances are not yet available for Google users. While it is entirely understandable that the ramification of policy changes are aimed at living users, as more and more online users pass away, the question of their digital assets becomes increasingly important. Google, for example, might allow a deceased person’s executor to elect which of their Google services should be kept online (perhaps their YouTube videos), which traces can be exported (perhaps their email), and which services can be deleted. At present, the lack of fine-grained controls over a user’s digital estate at Google makes this almost impossible. While it violates Google’s policies to transfer ownership of an account to another person, if someone does leave their passwords behind, this provides their loved ones with the best options in managing their digital legacy with Google. When someone dies and their online legacy is a collection of media fragments, the value of those media is far more apparent to the loved ones left behind rather than the companies housing those media. Facebook Memorialisation In response to users complaining that Facebook was suggesting they reconnect with deceased friends who had left Facebook profiles behind, in 2009 the company instituted an official policy of turning the Facebook profiles of departed users into memorial pages (Kelly). Technically, loved ones can choose between memorialisation and erasing an account altogether, but memorialisation is the default. This entails setting the account so that no one can log into it, and that no new friends (connections) can be made. Existing friends can access the page in line with the user’s final privacy settings, meaning that most friends will be able to post on the memorialised profile to remember that person in various ways (Facebook). Memorialised profiles (now Timelines, after Facebook’s redesign) thus become potential mourning spaces for existing connections. Since memorialised pages cannot make new connections, public memorial pages are increasingly popular on Facebook, frequently set up after a high-profile death, often involving young people, accidents or murder. Recent studies suggest that both of these Facebook spaces are allowing new online forms of mourning to emerge (Marwick and Ellison; Carroll and Landry; Kern, Forman, and Gil-Egui), although public pages have the downside of potentially inappropriate commentary and outright trolling (Phillips). Given Facebook has over a billion registered users, estimates already suggest that the platform houses 30 million profiles of deceased people, and this number will, of course, continue to grow (Kaleem). For Facebook, while posthumous users do not generate data themselves, the fact that they were part of a network means that their connections may interact with a memorialised account, or memorial page, and this activity, like all Facebook activities, allows the platform to display advertising and further track user interactions. However, at present Facebook’s options – to memorialise or delete accounts of deceased people – are fairly blunt. Once Facebook is aware that a user has died, no one is allowed to edit that person’s Facebook account or Timeline, so Facebook literally offers an all (memorialisation) or nothing (deletion) option. Given that Facebook is essentially a platform for performing identities, it seems a little short-sighted that executors cannot clean up or otherwise edit the final, lasting profile of a deceased Facebook user. As social networking services and social media become more ingrained in contemporary mourning practices, it may be that Facebook will allow more fine-grained control, positioning a digital executor also as a posthumous curator, making the final decision about what does and does not get kept in the memorialisation process. Since Facebook is continually mining user activity, the popularity of mourning as an activity on Facebook will likely mean that more attention is paid to the question of digital legacies. While the user themselves can no longer be social, the social practices of mourning, and the recording of a user as a media entity highlights the fact that social media can be about interactions which in significant ways include deceased users. Digital Legacy Services While the largest online corporations have fairly blunt tools for addressing digital death, there are a number of new tools and niche services emerging in this area which are attempting to offer nuanced control over digital legacies. Legacy Locker, for example, offers to store the passwords to all of a user’s online services and accounts, from Facebook to Paypal, and to store important documents and other digital material. Users designate beneficiaries who will receive this information after the account holder passes away, and this is confirmed by preselected “verifiers” who can attest to the account holder’s death. Death Switch similarly provides the ability to store and send information to users after the account holder dies, but tests whether someone is alive by sending verification emails; fail to respond to several prompts and Death Switch will determine a user has died, or is incapacitated, and executes the user’s final instructions. Perpetu goes a step further and offers the same tools as Legacy Locker but also automates existing options from social media services, allowing users to specify, for example, that their Facebook, Twitter or Gmail data should be downloaded and this archive should be sent to a designated recipient when the Perpetu user dies. These tools attempt to provide a more complex array of choices in terms of managing a user’s digital legacy, providing similar choices to those currently available when addressing material possessions in a formal will. At a broader level, the growing demand for these services attests to the ongoing value of online accounts and social media traces after a user’s death. Bequeathing passwords may not strictly follow the Terms of Use of the online services in question, but it is extremely hard to track or intervene when a user has the legitimate password, even if used by someone else. More to the point, this finely-grained legacy management allows far more flexibility in the utilisation and curation of digital assets posthumously. In the process of signing up for one of these services, or digital legacy management more broadly, the ongoing value and longevity of social media traces becomes more obvious to both the user planning their estate and those who ultimately have to manage it. The Social Media Afterlife The value of social media beyond the grave is also evident in the range of services which allow users to communicate in some fashion after they have passed away. Dead Social, for example, allows users to schedule posthumous social media activity, including the posting of tweets, sending of email, Facebook messages, or the release of online photos and videos. The service relies on a trusted executor confirming someone’s death, and after that releases these final messages effectively from beyond the grave. If I Die is a similar service, which also has an integrated Facebook application which ensures a user’s final message is directly displayed on their Timeline. In a bizarre promotional campaign around a service called If I Die First, the company is promising that the first user of the service to pass away will have their posthumous message delivered to a huge online audience, via popular blogs and mainstream press coverage. While this is not likely to appeal to everyone, the notion of a popular posthumous performance of self further complicates that question of what social media can mean after death. Illustrating the value of social media legacies in a quite different but equally powerful way, the Lives On service purports to algorithmically learn how a person uses Twitter while they are live, and then continue to tweet in their name after death. Internet critic Evgeny Morozov argues that Lives On is part of a Silicon Valley ideology of ‘solutionism’ which casts every facet of society as a problem in need of a digital solution (Morozov). In this instance, Lives On provides some semblance of a solution to the problem of death. While far from defeating death, the very fact that it might be possible to produce any meaningful approximation of a living person’s social media after they die is powerful testimony to the value of data mining and the importance of recognising that value. While Lives On is an experimental service in its infancy, it is worth wondering what sort of posthumous approximation might be built using the robust data profiles held by Facebook or Google. If Google Now can extrapolate what a user wants to see without any additional input, how hard would it be to retool this service to post what a user would have wanted after their death? Could there, in effect, be a Google After(life)? Conclusion Users of social media services have differing levels of awareness regarding the exchange they are agreeing to when signing up for services provided by Google or Facebook, and often value the social affordances without necessarily considering the ongoing media they are creating. Online corporations, by contrast, recognise and harness the informatic traces users generate through complex data mining and analysis. However, the death of a social media user provides a moment of rupture which highlights the significant value of the media traces a user leaves behind. More to the point, the value of these media becomes most evident to those left behind precisely because that individual can no longer be social. While beginning to address the issue of posthumous user data, Google and Facebook both have very blunt tools; Google might offer executors access while Facebook provides the option of locking a deceased user’s account as a memorial or removing it altogether. Neither of these responses do justice to the value that these media traces hold for the living, but emerging digital legacy management tools are increasingly providing a richer set of options for digital executors. While the differences between material and digital assets provoke an array of legal, spiritual and moral issues, digital traces nevertheless clearly hold significant and demonstrable value. For social media users, the death of someone they know is often the moment where the media side of social media – their lasting, infinitely replicable nature – becomes more important, more visible, and casts the value of the social media accounts of the living in a new light. For the larger online corporations and service providers, the inevitable increase in deceased users will likely provoke more fine-grained controls and responses to the question of digital legacies and posthumous profiles. It is likely, too, that the increase in online social practices of mourning will open new spaces and arenas for those same corporate giants to analyse and data-mine. References Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/article/view/2142/1949›. boyd, danah. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence 14.1 (2008): 13–20. ———, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662–679. Carroll, Brian, and Katie Landry. “Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn.” Bulletin of Science, Technology & Society 30.5 (2010): 341–349. Doyle, Warwick, and Matthew Fraser. “Facebook, Surveillance and Power.” Facebook and Philosophy: What’s on Your Mind? Ed. D.E. Wittkower. Chicago, IL: Open Court, 2010. 215–230. Facebook. “Deactivating, Deleting & Memorializing Accounts.” Facebook Help Center. 2013. 7 Mar. 2013 ‹http://www.facebook.com/help/359046244166395/›. Gerlitz, Carolin, and Anne Helmond. “The Like Economy: Social Buttons and the Data-intensive Web.” New Media & Society (2013). Google. “Accessing a Deceased Person’s Mail.” 25 Jan. 2013. 21 Apr. 2013 ‹https://support.google.com/mail/answer/14300?hl=en›. ———. “What Happens to YouTube If I Delete My Google Account or Google+?” 8 Jan. 2013. 21 Apr. 2013 ‹http://support.google.com/youtube/bin/answer.py?hl=en&answer=69961&rd=1›. Halavais, Alexander. Search Engine Society. Polity, 2008. Hof, Robert. “Facebook Makes It Easier to Target Ads Based on Your Shopping History.” Forbes 27 Feb. 2013. 1 Mar. 2013 ‹http://www.forbes.com/sites/roberthof/2013/02/27/facebook-makes-it-easier-to-target-ads-based-on-your-shopping-history/›. Kaleem, Jaweed. “Death on Facebook Now Common as ‘Dead Profiles’ Create Vast Virtual Cemetery.” Huffington Post. 7 Dec. 2012. 7 Mar. 2013 ‹http://www.huffingtonpost.com/2012/12/07/death-facebook-dead-profiles_n_2245397.html›. Kelly, Max. “Memories of Friends Departed Endure on Facebook.” The Facebook Blog. 27 Oct. 2009. 7 Mar. 2013 ‹http://www.facebook.com/blog/blog.php?post=163091042130›. Kern, Rebecca, Abbe E. Forman, and Gisela Gil-Egui. “R.I.P.: Remain in Perpetuity. Facebook Memorial Pages.” Telematics and Informatics 30.1 (2012): 2–10. Marwick, Alice, and Nicole B. Ellison. “‘There Isn’t Wifi in Heaven!’ Negotiating Visibility on Facebook Memorial Pages.” Journal of Broadcasting & Electronic Media 56.3 (2012): 378–400. Morozov, Evgeny. “The Perils of Perfection.” The New York Times 2 Mar. 2013. 4 Mar. 2013 ‹http://www.nytimes.com/2013/03/03/opinion/sunday/the-perils-of-perfection.html?pagewanted=all&_r=0›. Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. London: Viking, 2011. Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16.12 (2011). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/3168›. Roosendaal, Arnold. “We Are All Connected to Facebook … by Facebook!” European Data Protection: In Good Health? Ed. Serge Gutwirth et al. Dordrecht: Springer, 2012. 3–19. Rudin, Ken. “Actionable Analytics at Zynga: Leveraging Big Data to Make Online Games More Fun and Social.” San Diego, CA, 2010. Vaidhyanathan, Siva. The Googlization of Everything. 1st ed. Berkeley: University of California Press, 2011. Westlake, E.J. “Friend Me If You Facebook: Generation Y and Performative Surveillance.” TDR: The Drama Review 52.4 (2008): 21–40. Zimmer, Michael. “The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/2136/1944›. ———. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” Web Search. Eds. Amanda Spink & Michael Zimmer. Berlin: Springer, 2008. 77–99.

APA, Harvard, Vancouver, ISO, and other styles

24

Lee, Ashlin. "In the Shadow of Platforms." M/C Journal 24, no.2 (April27, 2021). http://dx.doi.org/10.5204/mcj.2750.

Full text

Abstract:

Introduction This article explores the changing relational quality of “the shadow of hierarchy”, in the context of the merging of platforms with infrastructure as the source of the shadow of hierarchy. In governance and regulatory studies, the shadow of hierarchy (or variations thereof), describes the space of influence that hierarchal organisations and infrastructures have (Héritier and Lehmkuhl; Lance et al.). A shift in who/what casts the shadow of hierarchy will necessarily result in changes to the attendant relational values, logics, and (techno)socialities that constitute the shadow, and a new arrangement of shadow that presents new challenges and opportunities. This article reflects on relevant literature to consider two different ways the shadow of hierarchy has qualitatively changed as platforms, rather than infrastructures, come to cast the shadow of hierarchy – an increase in scalability; and new socio-technical arrangements of (non)participation – and the opportunities and challenges therein. The article concludes that more concerted efforts are needed to design the shadow, given a seemingly directionless desire to enact data-driven solutions. The Shadow of Hierarchy, Infrastructures, and Platforms The shadow of hierarchy refers to how institutional, infrastructural, and organisational hierarchies create a relational zone of influence over a particular space. This commonly refers to executive decisions and legislation created by nation states, which are cast over private and non-governmental actors (Héritier and Lehmkuhl, 2). Lance et al. (252–53) argue that the shadow of hierarchy is a productive and desirable thing. Exploring the shadow of hierarchy in the context of how geospatial data agencies govern their data, Lance et al. find that the shadow of hierarchy enables the networked governance approaches that agencies adopt. This is because operating in the shadow of institutions provides authority, confers bureaucratic legitimacy and top-down power, and offers financial support. The darkness of the shadow is thus less a moral or ethicopolitical statement (such as that suggested by Fisher and Bolter, who use the idea of darkness to unpack the morality of tourism involving death and human suffering), and instead a relationality; an expression of differing values, logics, and (techno)socialities internal and external to those infrastructures and institutions that cast it (Gehl and McKelvey). The shadow of hierarchy might therefore be thought of as a field of relational influences and power that a social body casts over society, by virtue of a privileged position vis-a-vis society. It modulates society’s “light”; the resources (Bourdieu) and power relationships (Foucault) that run through social life, as parsed through a certain institutional and infrastructural worldview (the thing that blocks the light to create the shadow). In this way the shadow of hierarchy is not a field of absolute blackness that obscures, but instead a gradient of light and dark that creates certain effects. The shadow of hierarchy is now, however, also being cast by decentralised, privately held, and non-hierarchal platforms that are replacing or merging with public infrastructure, creating new social effects. Platforms are digital, socio-technical systems that create relationships between different entities. They are most commonly built around a relatively fixed core function (such as a social media service like Facebook), that then interacts with a peripheral set of complementors (advertising companies and app developers in the case of social media; Baldwin and Woodard), to create new relationships, forms of value, and other interactions (van Dijck, The Culture of Connectivity). In creating these relationships, platforms become inherently political (Gillespie), shaping relationships and content on the platform (Suzor) and in embodied life (Ajunwa; Eubanks). While platforms are often associated with optional consumer platforms (such as streaming services like Spotify), they have increasingly come to occupy the place of public infrastructure, and act as a powerful enabler to different socio-technical, economic, and political relationships (van Dijck, Governing Digital Societies). For instance, Plantin et al. argue that platforms have merged with infrastructures, and that once publicly held and funded institutions and essential services now share many characteristics with for-profit, privately held platforms. For example, Australia has had a long history of outsourcing employment services (Webster and Harding), and nearly privatised its entire visa processing data infrastructure (Jenkins). Platforms therefore have a greater role in casting the shadow of hierarchy than before. In doing so, they cast a shadow that is qualitatively different, modulated through a different set of relational values and (techno)socialities. Scalability A key difference and selling point of platforms is their scalability; since they can rapidly and easily up- and down-scale their functionalities in a way that traditional infrastructure cannot (Plantin et al.). The ability to respond “on-demand” to infrastructural requirements has made platforms the go-to service delivery option in the neo-liberalised public infrastructure environment (van Dijck, Governing Digital Societies). For instance, services providers like Amazon Web Services or Microsoft Azure provide on demand computing capacity for many nations’ most valuable services, including their intelligence and security capabilities (Amoore, Cloud Ethics; Konkel). The value of such platforms to government lies in the reduced cost and risk that comes with using rented capabilities, and the enhanced flexibility to increase or decrease their usage as required, without any of the economic sunk costs attached to owning the infrastructure. Scalability is, however, not just about on-demand technical capability, but about how platforms can change the scale of socio-technical relationships and services that are mediated through the platform. This changes the relational quality of the shadow of hierarchy, as activities and services occurring within the shadow are now connected into a larger and rapidly modulating scale. Scalability allows the shadow of hierarchy to extend from those in proximity to institutions to the broader population in general. For example, individual citizens can more easily “reach up” into governmental services and agencies as a part of completing their everyday business through platform such as MyGov in Australia (Services Australia). Using a smartphone application, citizens are afforded a more personalised and adaptive experience of the welfare state, as engaging with welfare services is no-longer tied to specific “brick-and-mortar” locations, but constantly available through a smartphone app and web portal. Multiple government services including healthcare and taxation are also connected to this platform, allowing users to reach across multiple government service domains to complete their personal business, seeking information and services that would have once required separate communications with different branches of government. The individual’s capacities to engage with the state have therefore upscaled with this change in the shadow, retaining a productivity and capacity enhancing quality that is reminiscent of older infrastructures and institutions, as the individual and their lived context is brought closer to the institutions themselves. Scale, however, comes with complications. The fundamental driver for scalability and its adaptive qualities is datafication. This means individuals and organisations are inflecting their operational and relational logics with the logic of datafication: a need to capture all data, at all times (van Dijck, Datafication; Fourcade and Healy). Platforms, especially privately held platforms, benefit significantly from this, as they rely on data to drive and refine their algorithmic tools, and ultimately create actionable intelligence that benefits their operations. Thus, scalability allows platforms to better “reach down” into individual lives and different social domains to fuel their operations. For example, as public transport services become increasingly datafied into mobility-as-a-service (MAAS) systems, ride sharing and on-demand transportation platforms like Uber and Lyft become incorporated into the public transport ecosystem (Lyons et al.). These platforms capture geospatial, behavioural, and reputational data from users and drivers during their interactions with the platform (Rosenblat and Stark; Attoh et al.). This generates additional value, and profits, for the platform itself with limited value returned to the user or the broader public it supports, outside of the transport service. It also places the platform in a position to gain wider access to the population and their data, by virtue of operating as a part of a public service. In this way the shadow of hierarchy may exacerbate inequity. The (dis)benefits of the shadow of hierarchy become unevenly spread amongst actors within its field, a function of an increased scalability that connects individuals into much broader assemblages of datafication. For Eubank, this can entrench existing economic and social inequalities by forcing those in need to engage with digitally mediated welfare systems that rely on distant and opaque computational judgements. Local services are subject to increased digital surveillance, a removal of agency from frontline advocates, and algorithmic judgement at scale. More fortunate citizens are also still at risk, with Nardi and Ekbia arguing that many digitally scaled relationships are examples of “heteromation”, whereby platforms convince actors in the platform to labour for free, such as through providing ratings which establish a platform’s reputational economy. Such labour fuels the operation of the platform through exploiting users, who become both a product/resource (as a source of data for third party advertisers) and a performer of unrewarded digital labour, such as through providing user reviews that help guide a platform’s algorithm(s). Both these examples represent a particularly disconcerting outcome for the shadow of hierarchy, which has its roots in public sector institutions who operate for a common good through shared and publicly held infrastructure. In shifting towards platforms, especially privately held platforms, value is transmitted to private corporations and not the public or the commons, as was the case with traditional infrastructure. The public also comes to own the risks attached to platforms if they become tied to public services, placing a further burden on the public if the platform fails, while reaping none of the profit and value generated through datafication. This is a poor bargain at best. (Non)Participation Scalability forms the basis for a further predicament: a changing socio-technical dynamic of (non)participation between individuals and services. According to Star (118), infrastructures are defined through their relationships to a given context. These relationships, which often exist as boundary objects between different communities, are “loosely structured in common use, and become tightly bound in particular locations” (Star, 118). While platforms are certainly boundary objects and relationally defined, the affordances of cloud computing have enabled a decoupling from physical location, and the operation of platforms across time and space through distributed digital nodes (smartphones, computers, and other localised hardware) and powerful algorithms that sort and process requests for service. This does not mean location is not important for the cloud (see Amoore, Cloud Geographies), but platforms are less likely to have a physically co-located presence in the same way traditional infrastructures had. Without the same institutional and infrastructural footprint, the modality for participating in and with the shadow of hierarchy that platforms cast becomes qualitatively different and predicated on digital intermediaries. Replacing a physical and human footprint with algorithmically supported and decentralised computing power allows scalability and some efficiency improvements, but it also removes taken-for-granted touchpoints for contestation and recourse. For example, ride-sharing platform Uber operates globally, and has expressed interest in operating in complement to (and perhaps in competition with) public transport services in some cities (Hall et al.; Conger). Given that Uber would come to operate as a part of the shadow of hierarchy that transport authorities cast over said cities, it would not be unreasonable to expect Uber to be subject to comparable advocacy, adjudication, transparency, and complaint-handling requirements. Unfortunately, it is unclear if this would be the case, with examples suggesting that Uber would use the scalability of its platform to avoid these mechanisms. This is revealed by ongoing legal action launched by concerned Uber drivers in the United Kingdom, who have sought access to the profiling data that Uber uses to manage and monitor its drivers (Sawers). The challenge has relied on transnational law (the European Union’s General Data Protection Regulation), with UK-based drivers lodging claims in Amsterdam to initiate the challenge. Such costly and complex actions are beyond the means of many, but demonstrate how reasonable participation in socio-technical and governance relationships (like contestations) might become limited, depending on how the shadow of hierarchy changes with the incorporation of platforms. Even if legal challenges for transparency are successful, they may not produce meaningful change. For instance, O’Neil links algorithmic bias to mathematical shortcomings in the variables used to measure the world; in the creation of irritational feedback loops based on incorrect data; and in the use of unsound data analysis techniques. These three factors contribute to inequitable digital metrics like predictive policing algorithms that disproportionately target racial minorities. Large amounts of selective data on minorities create myopic algorithms that direct police to target minorities, creating more selective data that reinforces the spurious model. These biases, however, are persistently inaccessible, and even when visible are often unintelligible to experts (Ananny and Crawford). The visibility of the technical “installed base” that support institutions and public services is therefore not a panacea, especially when the installed base (un)intentionally obfuscates participation in meaningful engagement like complaints handling. A negative outcome is, however, also not an inevitable thing. It is entirely possible to design platforms to allow individual users to scale up and have opportunities for enhanced participation. For instance, eGovernance and mobile governance literature have explored how citizens engage with state services at scale (Thomas and Streib; Foth et al.), and the open government movement has demonstrated the effectiveness of open data in understanding government operations (Barns; Janssen et al.), although these both have their challenges (Chadwick; Dawes). It is not a fantasy to imagine alternative configurations of the shadow of hierarchy that allow more participatory relationships. Open data could facilitate the governance of platforms at scale (Box et al.), where users are enfranchised into a platform by some form of membership right and given access to financial and governance records, in the same way that corporate shareholders are enfranchised, facilitated by the same app that provides a service. This could also be extended to decision making through voting and polling functions. Such a governance form would require radically different legal, business, and institutional structures to create and enforce this arrangement. Delacoix and Lawrence, for instance, suggest that data trusts, where a trustee is assigned legal and fiduciary responsibility to achieve maximum benefit for a specific group’s data, can be used to negotiate legal and governance relationships that meaningfully benefit the users of the trust. Trustees can be instructed to only share data to services whose algorithms are regularly audited for bias and provide datasets that are accurate representations of their users, for instance, avoiding erroneous proxies that disrupt algorithmic models. While these developments are in their infancy, it is not unreasonable to reflect on such endeavours now, as the technologies to achieve these are already in use. Conclusions There is a persistent myth that data will yield better, faster, more complete results in whatever field it is applied (Lee and Cook; Fourcade and Healy; Mayer-Schönberger and Cukier; Kitchin). This myth has led to data-driven assemblages, including artificial intelligence, platforms, surveillance, and other data-technologies, being deployed throughout social life. The public sector is no exception to this, but the deployment of any technological solution within the traditional institutions of the shadow of hierarchy is fraught with challenges, and often results in failure or unintended consequences (Henman). The complexity of these systems combined with time, budgetary, and political pressures can create a contested environment. It is this environment that moulds societies' light and resources to cast the shadow of hierarchy. Relationality within a shadow of hierarchy that reflects the complicated and competing interests of platforms is likely to present a range of unintended social consequences that are inherently emergent because they are entering into a complex system – society – that is extremely hard to model. The relational qualities of the shadow of hierarchy are therefore now more multidimensional and emergent, and experiences relating to socio-technical features like scale, and as a follow-on (non)participation, are evidence of this. Yet by being emergent, they are also directionless, a product of complex systems rather than designed and strategic intent. This is not an inherently bad thing, but given the potential for data-system and platforms to have negative or unintended consequences, it is worth considering whether remaining directionless is the best outcome. There are many examples of data-driven systems in healthcare (Obermeyer et al.), welfare (Eubanks; Henman and Marston), and economics (MacKenzie), having unintended and negative social consequences. Appropriately guiding the design and deployment of theses system also represents a growing body of knowledge and practical endeavour (Jirotka et al.; Stilgoe et al.). Armed with the knowledge of these social implications, constructing an appropriate social architecture (Box and Lemon; Box et al.) around the platforms and data systems that form the shadow of hierarchy should be encouraged. This social architecture should account for the affordances and emergent potentials of a complex social, institutional, economic, political, and technical environment, and should assist in guiding the shadow of hierarchy away from egregious challenges and towards meaningful opportunities. To be directionless is an opportunity to take a new direction. The intersection of platforms with public institutions and infrastructures has moulded society’s light into an evolving and emergent shadow of hierarchy over many domains. With the scale of the shadow changing, and shaping participation, who benefits and who loses out in the shadow of hierarchy is also changing. Equipped with insights into this change, we should not hesitate to shape this change, creating or preserving relationalities that offer the best outcomes. Defining, understanding, and practically implementing what the “best” outcome(s) are would be a valuable next step in this endeavour, and should prompt considerable discussion. If we wish the shadow of hierarchy to continue to be productive, then finding a social architecture to shape the emergence and directionlessness of socio-technical systems like platforms is an important step in the continued evolution of the shadow of hierarchy. References Ajunwa, Ifeoma. “Age Discrimination by Platforms.” Berkeley J. Emp. & Lab. L. 40 (2019): 1-30. Amoore, Louise. Cloud Ethics: Algorithms and the Attributes of Ourselves and Others. Durham: Duke University Press, 2020. ———. “Cloud Geographies: Computing, Data, Sovereignty.” Progress in Human Geography 42.1 (2018): 4-24. Ananny, Mike, and Kate Crawford. “Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability.” New Media & Society 20.3 (2018): 973–89. Attoh, Kafui, et al. “‘We’re Building Their Data’: Labor, Alienation, and Idiocy in the Smart City.” Environment and Planning D: Society and Space 37.6 (2019): 1007-24. Baldwin, Carliss Y., and C. Jason Woodard. “The Architecture of Platforms: A Unified View.” Platforms, Markets and Innovation. Ed. Annabelle Gawer. Cheltenham: Edward Elgar, 2009. 19–44. Barns, Sarah. “Mine Your Data: Open Data, Digital Strategies and Entrepreneurial Governance by Code.” Urban Geography 37.4 (2016): 554–71. Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Cambridge, MA: Harvard University Press, 1984. Box, Paul, et al. Data Platforms for Smart Cities – A Landscape Scan and Recommendations for Smart City Practice. Canberra: CSIRO, 2020. Box, Paul, and David Lemon. The Role of Social Architecture in Information Infrastructure: A Report for the National Environmental Information Infrastructure (NEII). Canberra: CSIRO, 2015. Chadwick, Andrew. “Explaining the Failure of an Online Citizen Engagement Initiative: The Role of Internal Institutional Variables.” Journal of Information Technology & Politics 8.1 (2011): 21–40. Conger, Kate. “Uber Wants to Sell You Train Tickets. And Be Your Bus Service, Too.” The New York Times, 7 Aug. 2019. 19 Jan. 2021. <https://www.nytimes.com/2019/08/07/technology/uber-train-bus-public-transit.html>. Dawes, Sharon S. “The Evolution and Continuing Challenges of E‐Governance.” Public Administration Review 68 (2008): 86–102. Delacroix, Sylvie, and Neil D. Lawrence. “Bottom-Up Data Trusts: Disturbing the ‘One Size Fits All’ Approach to Data Governance.” International Data Privacy Law 9.4 (2019): 236-252. Eubanks, Virginia. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. New York: St. Martin’s Press, 2018. Fisher, Joshua A., and Jay David Bolter. “Ethical Considerations for AR Experiences at Dark Tourism Sites”. IEEE Explore 29 April. 2019. 13 Apr. 2021 <https://ieeexplore.ieee.org/document/8699186>. Foth, Marcus, et al. From Social Butterfly to Engaged Citizen: Urban Informatics, Social Media, Ubiquitous Computing, and Mobile Technology to Support Citizen Engagement. Cambridge MA: MIT Press, 2011. Fourcade, Marion, and Kieran Healy. “Seeing like a Market.” Socio-Economic Review, 15.1 (2017): 9–29. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219–35. Gillespie, Tarleton. “The Politics of ‘Platforms.’” New Media & Society 12.3 (2010): 347–64. Hall, Jonathan D., et al. “Is Uber a Substitute or Complement for Public Transit?” Journal of Urban Economics 108 (2018): 36–50. Henman, Paul. “Improving Public Services Using Artificial Intelligence: Possibilities, Pitfalls, Governance.” Asia Pacific Journal of Public Administration 42.4 (2020): 209–21. Henman, Paul, and Greg Marston. “The Social Division of Welfare Surveillance.” Journal of Social Policy 37.2 (2008): 187–205. Héritier, Adrienne, and Dirk Lehmkuhl. “Introduction: The Shadow of Hierarchy and New Modes of Governance.” Journal of Public Policy 28.1 (2008): 1–17. Janssen, Marijn, et al. “Benefits, Adoption Barriers and Myths of Open Data and Open Government.” Information Systems Management 29.4 (2012): 258–68. Jenkins, Shannon. “Visa Privatisation Plan Scrapped, with New Approach to Tackle ’Emerging Global Threats’.” The Mandarin. 23 Mar. 2020. 19 Jan. 2021 <https://www.themandarin.com.au/128244-visa-privatisation-plan-scrapped-with-new-approach-to-tackle-emerging-global-threats/>. Jirotka, Marina, et al. “Responsible Research and Innovation in the Digital Age.” Communications of the ACM 60.6 (2016): 62–68. Kitchin, Rob. The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Thousand Oaks, CA: Sage, 2014. Konkel, Frank. “CIA Awards Secret Multibillion-Dollar Cloud Contract.” Nextgov 20 Nov. 2020. 19 Jan. 2021 <https://www.nextgov.com/it-modernization/2020/11/exclusive-cia-awards-secret-multibillion-dollar-cloud-contract/170227/>. Lance, Kate T., et al. “Cross‐Agency Coordination in the Shadow of Hierarchy: ‘Joining up’Government Geospatial Information Systems.” International Journal of Geographical Information Science, 23.2 (2009): 249–69. Lee, Ashlin J., and Peta S. Cook. “The Myth of the ‘Data‐Driven’ Society: Exploring the Interactions of Data Interfaces, Circulations, and Abstractions.” Sociology Compass 14.1 (2020): 1–14. Lyons, Glenn, et al. “The Importance of User Perspective in the Evolution of MaaS.” Transportation Research Part A: Policy and Practice 121(2019): 22-36. MacKenzie, Donald. “‘Making’, ‘Taking’ and the Material Political Economy of Algorithmic Trading.” Economy and Society 47.4 (2018): 501-23. Mayer-Schönberger, V., and K. Cukier. Big Data: A Revolution That Will Change How We Live, Work and Think. London: John Murray, 2013. Michel Foucault. Discipline and Punish. London: Penguin, 1977. Nardi, Bonnie, and Hamid Ekbia. Heteromation, and Other Stories of Computing and Capitalism. Cambridge, MA: MIT Press, 2017. O’Neil, Cathy. Weapons of Math Destruction – How Big Data Increases Inequality and Threatens Democracy. London: Penguin, 2017. Obermeyer, Ziad, et al. “Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations.” Science 366.6464 (2019): 447-53. Plantin, Jean-Christophe, et al. “Infrastructure Studies Meet Platform Studies in the Age of Google and Facebook.” New Media & Society 20.1 (2018): 293–310. Rosenblat, Alex, and Luke Stark. “Algorithmic Labor and Information Asymmetries: A Case Study of Uber’s Drivers.” International Journal of Communication 10 (2016): 3758–3784. Sawers, Paul. “Uber Drivers Sue for Data on Secret Profiling and Automated Decision-Making.” VentureBeat 20 July. 2020. 19 Jan. 2021 <https://venturebeat.com/2020/07/20/uber-drivers-sue-for-data-on-secret-profiling-and-automated-decision-making/>. Services Australia. About MyGov. Services Australia 19 Jan. 2021. 19 Jan. 2021 <https://www.servicesaustralia.gov.au/individuals/subjects/about-mygov>. Star, Susan Leigh. “Infrastructure and Ethnographic Practice: Working on the Fringes.” Scandinavian Journal of Information Systems 14.2 (2002):107-122. Stilgoe, Jack, et al. “Developing a Framework for Responsible Innovation.” Research Policy 42.9 (2013):1568-80. Suzor, Nicolas. Lawless: The Secret Rules That Govern Our Digital Lives. Cambridge: Cambridge University Press, 2019. Thomas, John Clayton, and Gregory Streib. “The New Face of Government: Citizen‐initiated Contacts in the Era of E‐Government.” Journal of Public Administration Research and Theory 13.1 (2003): 83-102. Van Dijck, José. “Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology.” Surveillance & Society 12.2 (2014): 197–208. ———. “Governing Digital Societies: Private Platforms, Public Values.” Computer Law & Security Review 36 (2020) 13 Apr. 2021 <https://www.sciencedirect.com/science/article/abs/pii/S0267364919303887>. ———. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press, 2013. Webster, Elizabeth, and Glenys Harding. “Outsourcing Public Employment Services: The Australian Experience.” Australian Economic Review 34.2 (2001): 231-42.

APA, Harvard, Vancouver, ISO, and other styles

25

Hearn, Greg, and Michelle Hall. "Zone." M/C Journal 14, no.5 (October18, 2011). http://dx.doi.org/10.5204/mcj.446.

Full text

Abstract:

Our challenge for this special issue was to describe and analyse the zones we live in and to a large extent take for granted. There are micro zones. These are small intimate spaces that are very temporary and circ*mscribe activity between two or three people. The second category of zone is we might call mezzo or mid-range zones. These are zones wherein activities that occupy us for several hours take place. These could include bars, restaurants, playgrounds, and of course the rooms in a house or workplace. Finally there is the city level macro zone. Most of us live in cities. This is an aggregation of time and space we relate to and identify with over a long period of time. We identify with city sports teams and landmarks. For various reasons to do with cultural evolution cities are symbolically important to how we live and form our identity. City zones are meaningful to us. Zones proscribe and prescribe, but usually without any visible rules. They enable and govern complex social routines without anyone being able to explicitly explain how. They encode narratives spatially. That is, zones as spaces, have material, social and symbolic layers. The material environment is the most basic layer of a zone, that is, buildings, furniture, roads and so on. However zones have two other important layers. The first is the social layer—that is, the people that are in the zone. In addition zones have a symbolic layer—that is the meanings that are found or created in the zone. This includes the aesthetic style; the actual and implicit messages in the space, as well as any personal associations the place may have or invoke. Clearly zones operate at different scales, in different time frames, and with different symbol systems. However, they no longer need be actual spaces at all, because many zones we now inhabit are purely virtual or purely discursive. Zones can be virtual too, such as Facebook. Zones can be an area of conversation as implied in the phrase “Lets not go there!” We now think and talk as if our mind was spatial. Perhaps a zone might be defined as a bounded system of agents and resources, governed by a unified and discoverable set of rules, which determine relationships that dictate how agents and resources are linked. Or perhaps you prefer the dramaturgical metaphors of front and back stage, actors, roles, scripts, and choreographies. But the truth is, there is no agreed definition or theorisation, although many disciplines use the term freely (e.g. cultural geography; urban planning; human ecology). Papers were invited therefore to interrogate the notion of zone from any disciplinary perspective, or which reflected on a particular zone, either fictional or actual, to uncover the alchemy of its operation. Jeremy Hunsinger invites us to think about a street-corner, as an “interzone,” a complex assemblage of meanings, things, and people. Here the material infrastructure, the road, the sidewalk, the streetlights with their cabling and electrical grid, the sewers, and their gutters, intermix within semiotic and governmentality politics. He argues zones are inscribed by codes and conventions to form pragmatic regimes through which we enact our lives and our roles. Though these zones are integral to our lives, we are “zoned out” about the zones in which we live. That is, dispersal of these zones has impeded our awareness of them and disguised the meanings we can assign to them. Through this dispersal they are alienated from our subjective experience within our day-to-day experiences of integrated world capitalism. The challenge of knowing an interzone is a challenge of territorialisation, and thus of subjective awareness. To operate with subjective awareness within these zones is form of semiological guerilla warfare, allowing us to interpret, and influence the governance of, our techno-semiological existence. The paper seeks to “challenge us to rethink our subjective positions in relation to zones, their aesthetics, and their legitimation as functions of semiological warfare … to find new opportunities to make a mess of these spaces, to transgress and create new spaces of autonomy for ourselves and future participants in the zones.” Suneel Jethani takes a similar point of theoretical departure and describes a new media project which does just this, by injecting various “voices” and subjectivities into a digital cartography of Bangalore. By focusing on the social relations embedded within the cartographic text(s), the project demonstrates the kind of politically oriented tactical media that Jeremy Hunsinger calls for in his paper. This “praxis-logical” approach allows for a focus on the project as a space of aggregation and the communicative processes set in motion within them. In analysing such projects we could (and should) be asking questions such as—“Who has put it forward? Who is utilising it and under what circ*mstances? Where and how has it come into being? How does discourse circulate within it? How do these spaces as sites of emergent forms of resistance within global capitalism challenge traditional social movements? How do they create self-reflexive systems?” The focus on the integration of digital affordances within the social/spatial realm continues with Adam Ruch and Steve Collins’s examination of the nature of the architecture of social media and their influence on definitions of identities and relationships. What are the effects on one’s social relations and therefore social identity of, for example, whether one chooses to use friends lists on Facebook or “circles” of different social categories as on Google+. The paper investigates the challenges involved in moving real life to the online environment and the contests in trying to designate social relational zones. They argue that in contrast to early utopia visions of social identity online, we are increasingly obligated to perform identity as it is defined by corporate monoliths such as Facebook and Google+. They suggest the new social practice of “being online” is just as pervasive as “being elsewhere”. Put another way we could ask: “Are social media an instance of the primacy of technological mediation of identity over social constructions of identity?” To remind us that identity is still thoroughly spatial—as well as digital—we next examine Michelle Hall's autoethnography of identity making in the intimate zone of a neighbourhood bar. Bars provide a shifting space where identifications are fluid, unpredictable, and thus open to opportunistic breaches. This unpredictability, and the interaction strategies we adopt to negotiate it, suggest ways in which a certain kind of third place experience can be developed and maintained in the contemporary inner city, where consumption based socialising is high, but where people are also mobile and less tied into fixed patterns of patronage. Nevertheless this process still involves a significant amount of emotional work. Establishing “a place where everybody knows your name” may not be likely. However Michelle's paper suggests that in consumption driven inner city zones, regular identification that operates at the boundaries of social realms can support a version of the easier friendship and congeniality that “third places” are hoped to offer. Giovani Semi describes and analyses the kinds of neighbourhoods in which such activities might take place, describing them as zones of authentic pleasure. His case study of gentrification of a Milanese neighbourhood—the Isola crossroads—argues that the multiple activities of small entrepreneurs and social actors can create zones of pleasure and authenticity—a softer side of gentrification. He in effect argues for a different kind of intervention to advance semiological warfare we referred to earlier, one in which local actors and passers-by contribute to the local making of atmosphere via daily consumption routines. The production of “atmosphere” in a gentrifying neighbourhood goes together with customers’ taste and preferences. The supply-side of building the aesthetic for a “pleasant” zone needs a demand-side, consumers buying, supporting, and appreciating the outcome of the activities of the entrepreneurs. Similar themes are explored by Donell Holloway and David Holloway who examine everyday routines and social relationships, when moving through and staying in liminal or atypical zones of tourist locales. Their key question is to ask how domestic zones are carried into, and maintained in tourist zones. In the case of the “grey nomads” they interview, mobile living quarters play a key role. More specifically, “the ‘everyday zone’ refers to the routines of quotidian life, or the mundane practices which make up our daily, at-home lives. These practices are closely connected with the domestic realm and include consumption practices (clothing, cooking, mass media) and everyday social interactions. The ‘tourist zone’ is similarly concerned with consumption. In this zone, however, tourists are seen to consume places; the culture, landscape, and peoples of exotic or out-of-the-ordinary tourist locales.” The next paper provides us with a link between zones which are first and foremost spatial and those which a more purely discursive. Deb Waterhouse-Watson and Adam Brown introduce Levi’s notion of “The Grey Zone” (published in 1986), based on Jewish prisoners in the Nazi-controlled camps and ghettos who obtained “privileged” positions in order to prolong their survival. Reflecting on the inherently complex power relations in such extreme settings, Levi positions the “grey zone” as a metaphor for moral ambiguity: a realm with “ill-defined outlines which both separate and join the two camps of masters and servants”. They then apply this to the issue of sexual assault within football culture in Australia and the representation of this in broadcast media. They argue that “Levi’s concept of the ‘grey zone’ helps elucidate the fraught issue of women’s potential complicity in a rape culture, a subject that challenges both understanding and representation. Despite participating in a culture that promotes the abuse, denigration, and humiliation of women, the roles of [the women involved], cannot in any way be conflated with the roles of the perpetrators of sexual assault. These and other “grey zones” need to be constantly rethought and renegotiated in order to develop a fuller understanding of human behaviour”. Our final paper similarly tackles a zone which is primarily discursive in nature namely “media spin zones” in political campaigns. In their examination of the American presidential elections Kara Stooksbury, Lori Maxwell, and Cynthia Brown usefully deploy the zone metaphor to analyse the pragmatics of a political communication system that has enormous stakes for the world. Using examples from the two most recent presidential elections, they draw attention to two separate, yet interrelated spin zones integral to understanding media/presidential relations—what they term the presidential spin zone and the media spin zone. The interplay between these zones determines the fate of elections. They discuss how the presidency can use image priming—that is ameliorating negative media portrayals and capitalising on positive portrayals, to effectively counterattack the media spin zone. From the intimate to the macro-urban; from the geographic to the discursive, the range of investigations in this issue shows that the idea of zones in social life can be applied meaningfully. They demonstrate the link between the way we think about our environment and the environments themselves. They also demonstrate the role of the media—both old and new—in refracting and morphing the operation of zones. The underlying theoretical architecture is eclectic, and the implied praxis at times, seemingly at odds, but as a whole they provide us with new insights into how the zones we live in effect our identity, community, ethics and politics. We commend these papers then, as an insightful response to our provocation to consider the concept of zone and its impact on our lives.

APA, Harvard, Vancouver, ISO, and other styles

26

Bowles, Kate. "Academia 1.0: Slow Food in a Fast Food Culture? (A Reply to John Hartley)." M/C Journal 12, no.3 (July15, 2009). http://dx.doi.org/10.5204/mcj.169.

Full text

Abstract:

"You could think of our kind of scholarship," he said, "as something like 'slow food' in a fast-food culture."— Ivan Kreilkamp, co-editor of Victorian Studies(Chronicle of Higher Education, March 2009) John Hartley’s entertaining and polemical defense of a disappearing art form (the print copy journal designed to be ripped eagerly from its envelope and read from cover to cover like a good book) came my way via the usual slightly disconcerting M/C Journal overture: I believe that your research interests and background make you a potential expert reviewer of the manuscript, "LAMENT FOR A LOST RUNNING ORDER? OBSOLESCENCE AND ACADEMIC JOURNALS," which has been submitted to the '' [sic] issue of M/C Journal. The submission's extract is inserted below, and I hope that you will consider undertaking this important task for us. Automated e-mails like these keep strange company, with reminders about overdue library items and passwords about to expire. Inevitably their tone calls to mind the generic flattery of the internet scam that announces foreign business opportunities or an unexpectedly large windfall from a deceased relative. At face value, this e-mail confirms John Hartley’s suspicions about the personalised craft of journal curation. Journal editing, he implies, is going the way of drywalling and smithying—by the time we realise these ancient and time-intensive skills have been lost, it’ll be too late. The usual culprit is to the fore—the internet—and the risk presented by obsolescence is very significant. At stake is the whole rich and messy infrastructure of academic professional identity: scholarly communication, goodwill, rank, trust, service to peers, collegiality, and knowledge itself. As a time-poor reader of journals both online and in print I warmed to this argument, and enjoyed reading about the particularities of journal editing: the cultivation and refinement of a specialised academic skill set involving typefaces, cover photographs and running order. Journal editors are our creative directors. Authors think selfishly and not always consistently about content, position and opportunity, but it’s the longer term commitment of editors to taking care of their particular shingle in the colourful and crowded bazaar of scholarly publishing, that keeps the market functioning in a way that also works for inspectors and administrators. Thinking of all the print journals I’ve opened and shut and put on shelves (sometimes still in their wrappers) and got down again, and photocopied, and forgotten about, I realised that I do retain a dim sense of their look and shape, and that in practical ways this often helps me remember what was in them. Nevertheless, even having been through the process he describes, whereby “you have to log on to some website and follow prompts in order to contribute both papers and the assessment of papers; interactions with editors are minimal,” I came to the conclusion that he had underestimated the human in the practice of refereeing. I wasn’t sure made me an expert reviewer for this piece, except perhaps that in undertaking the review itself I was practising a kind of expertise that entitled me to reflect on what I was doing. So as a way of wrestling with the self-referentiality of the process of providing an anonymous report on an article whose criticism of blind refereeing I shared, I commented on the corporeality and collegiality of the practice: I knew who I was writing about (and to), and I was conscious of both disagreeing and wondering how to avoid giving offence. I was also cold in my office, and wondering about a coffee. “I suspect the cyborg reviewer is (like most cyborgs) a slightly romantic, or at least rhetorical, fantasy,” I added, a bit defensively. “Indeed, the author admits to practising editorship via a form of human intersubjectivity that involves email, so the mere fact that the communication in some cases is via a website doesn’t seem to render the human obsolete.” The cyborg reviewer wasn’t the only thing bothering me about the underlying assumptions concerning electronic scholarly publishing, however. The idea that the electronic disaggregation of content threatens the obsolescence of the print journal and its editor is a little disingenuous. Keyword searches do grab articles independently of issues, it’s true, but it’s a stretch to claim that this functionality is what’s turning diligent front-to-back readers and library flaneurs into the kinds of online mercenaries we mean when we say “users”. Quite the opposite: journal searches are highly seductive invitations to linger and explore. Setting out from the starting point of a single article, readers can now follow a citation trail, or chase up other articles by the same author or on similar topics, all the while keeping in plain sight the running order that was designed by the editors as an apt framework for the piece when it first appeared. Journal publishers have the keenest investment in nurturing the distinctive brand of each of their titles, and as a result the journal name is never far from view. Even the cover photo and layout is now likely to be there somewhere, and to crop up often as readers retrace their steps and set out again in another direction. So to propose that online access makes the syntactical form of a journal issue irrelevant to readers is to underestimate both the erotics of syntax, and the capacity of online readers to cope with a whole new libidinous economy of searching characterised by multiple syntactical options. And if readers are no longer sequestered within the pages of an individual hard copy journal—there really is a temptation to mention serial monogamy here—their freedom to operate more playfully only draws attention to the structural horizontalities of the academic public sphere, which is surely the basis of our most durable claims to profess expertise. Precisely because we are hyperlinked together across institutions and disciplines, we can justly argue that we are perpetually peer-reviewing each other, in a fairly disinterested fashion, and no longer exclusively in the kinds of locally parochial clusters that have defined (and isolated) the Australian academy. So although disaggregation irritates journal editors, a more credible risk to their craft comes from the disintermediation of scholarly communication that is one of the web’s key affordances. The shift towards user generated content, collaboratively generated, openly accessible and instantly shareable across many platforms, does make traditional scholarly publishing, with its laborious insistence on double blind refereeing, look a bit retro. How can this kind of thing not become obsolete given how long it takes for new ideas to make their way into print, what with all that courtly call and response between referees, editors and authors, and the time consumed in arranging layout and running order and cover photos? Now that the hegemons who propped up the gold standard journals are blogging and podcasting their ideas, sharing their bookmarks, and letting us know what they’re doing by the hour on Twitter, with presumably no loss of quality to their intellectual presence, what kind of premium or scarcity value can we place on the content they used to submit to print and online journals? So it seems to me that the blogging hegemon is at least as much of a problem for the traditional editor as the time challenged browser hoping for a quick hit in a keyword search. But there are much more complicated reasons why the journal format itself is not at risk, even from www.henryjenkins.org. Indeed, new “traditional” journals are being proposed and launched all the time. The mere award of an A* for the International Journal of Cultural Studies in the Australian journal rankings (Australian Research Council) confirms that journals are persistently evaluated in their own right, that the brand of the aggregating instrument still outranks the bits and pieces of disaggregated content, and that the relative standing of different journals depends precisely on the quantification of difficulty in meeting the standards (or matching the celebrity status) of their editors, editorial boards and peer reviewing panels. There’s very little indication in this process that either editors or reviewers are facing obsolescence; too many careers still depend on their continued willingness to stand in the way of the internet’s capacity to let anyone have a go at presenting ideas and research in the public domain. As the many inputs to the ERA exercise endlessly, and perhaps a bit tediously, confirmed, it’s the reputation of editors and their editorial practices that signals the exclusivity of scholarly publishing: in the era of wikis and blogs, an A* journal is one club that’s not open to all. Academia 1.0 is resilient for all these straightforward reasons. Not only in Australia, tenure and promotion depend on it. As a result, since the mid 1990s, editors, publishers, librarians and other stakeholders in scholarly communication have been keeping a wary eye on the pace and direction of change to either its routines or its standards. Their consistent attention has been on the proposition the risk comes from something loosely defined as “digital”. But as King, Tenopir and Clark point out in their study of journal readership in the sciences, the relevance of journal content itself has been extensively disputed and investigated across the disciplines since the 1960s. Despite the predictions of many authors in the 1990s that electronic publishing and pre-publishing would challenge the professional supremacy of the print journal, it seems just as likely that the simple convenience of filesharing has made more vetted academic material available, more easily, to more readers. As they note in a waspish foonote, even the author of one of the most frequently cited predictions that scholarly journals were on the way out had to modify his views, “perhaps due to the fact that his famous 1996 [sic] article "Tragic Loss or Good Riddance? The Impending Demise of Traditional Scholarly Journals" has had thousands of hits or downloads on his server alone.” (King et al,; see also Odlyzko, " Tragic Loss" and "Rapid Evolution"). In other words, all sides now seem to agree that “digital” has proved to be both opportunity and threat to scholarly publication. Odlyzko’s prediction of the disappearance of the print journal and its complex apparatus of self-perpetuation was certainly premature in 1996. So is John Hartley right that it’s time to ask the question again? Earlier this year, the Chronicle of Higher Education’s article “Humanities Journals Confront Identity Crisis”, which covered much of the same ground, generated brisk online discussion among journal editors in the humanities (Howard; see also the EDITOR-L listserv archive). The article summarised the views of a number of editors of “traditional” journals, and offset these with the views of a group representing the Council of Editors of Learned Journals, canvassing the possibility that scholarly publishing could catch up to the opportunities that we tend to shorthand as “web 2.0”. The short-lived CELJ blog discussion led by Jo Guldi in February 2009 proposed four principles we might expect to shape the future of scholarly publishing in the humanities: technical interoperability, which is pretty uncontroversial; the expansion of scholarly curation to a role in managing and making sense of “the noise of the web”; diversification of content types and platforms; and a more inclusive approach to the contribution of non-academic experts. (Guldi et al.) Far from ceding the inexorability of their own obsolescence, the four authors of this blog (each of them journal editors) have re-imagined the craft of editing, and have drafted an amibitious but also quite achievable manifesto for the renovation of scholarly communication. This is focused on developing a new and more confident role for the academy in the next phase of the development of the knowledge-building capacity of the web. Rather than confining themselves to being accessed only by their professional peers (and students) via university libraries in hardcopy or via institutional electronic subscription, scholars should be at the forefront of the way knowledge is managed and developed in the online public sphere. This would mean developing metrics that worked as well for delicious and diigo as they do for journal rankings; and it would mean a more upfront contribution to quality assurance and benchmarking of information available on the web, including information generated from outside the academy. This resonates with John Hartley’s endorsem*nt of wiki-style open refereeing, which as an idea contains a substantial backwards nod to Ginsparg’s system of pre-publication of the early 1990s (see Ginsparg). It also suggests a more sophisticated understanding of scholarly collaboration than the current assumption that this consists exclusively of a shift to multiply-authored content, the benefit of which has tended to divide scholars in the humanities (Young). But it was not as a reviewer or an author that this article really engaged me in thinking about the question of human obsolescence. Recently I’ve been studying the fragmentation, outsourcing and automation of work processes in the fast food industry or, as it calls itself, the Quick Service Restaurant trade. I was drawn into this study by thinking about the complex reorganisation of time and communication brought about by the partial technologisation of the McDonalds drive-thru in Australia. Now that drive-thru orders are taken through a driveway speaker, the order window (and its operator) have been rendered obsolete, and this now permanently closed window is usually stacked high with cardboard boxes. Although the QSR industry in the US has experimented with outsourcing ordering to call centres at other locations (“May I take your order?”), in Australia the task itself has simply been added to the demands of customer engagement at the paying window, with the slightly odd result that the highest goal of customer service at this point is to be able to deal simultaneously with two customers at two different stages of the drive-thru process—the one who is ordering three Happy Meals and a coffee via your headset, and the one who is sitting in front of you holding out money—without offending or confusing either. This formal approval of a shift from undivided customer attention to the time-efficiency of multitasking is a small but important reorientation of everyday service culture, making one teenager redundant and doubling the demands placed on the other. The management of quick service restaurant workers and their productivity offers us a new perspective on the pressures we are experiencing in the academic labour market. Like many of my colleagues, I have been watching with a degree of ambivalence the way in which the national drive to quantify excellence in research in Australia has resulted in some shallow-end thinking about how to measure what it is that scholars do, and how to demonstrate that we are doing it competitively. Our productivity is shepherded by the constant recalibration of our workload, conceived as a bundle of discrete and measurable tasks, by anxious institutions trying to stay ahead in the national game of musical chairs, which only offers a limited number of seats at the research table—while still keeping half an eye on their enterprise bargaining obligations. Or, as the Quick Service Restaurant sector puts it: Operational margins are narrowing. While you need to increase the quality, speed and accuracy of service, the reality is that you also need to control labor costs. If you reduce unnecessary labor costs and improve workforce productivity, the likelihood of expanding your margins increases. Noncompliance can cost you. (Kronos) In their haste to increase quality, speed and accuracy of academic work, while lowering labor costs and fending off the economic risk of noncompliance, our institutions have systematically overlooked the need to develop meaningful ways to accommodate the significant scholarly work of reading, an activity that takes real time, and that in its nature is radically incompatible with the kinds of multitasking we are all increasingly using to manage the demands placed on us. Without a measure of reading, we fall back on the exceptionally inadequate proxy of citation. As King et al. point out, citation typically skews towards a small number of articles, and the effect of using this as a measure of reading is to suggest that the majority of articles are never read at all. Their long-term studies of what scientists read, and why, have been driven by the need to challenge this myth, and they have demonstrated that while journals might not be unwrapped and read with quite the Christmas-morning eagerness that John Hartley describes, their content is eventually read more than once, and often more than once by the same person. Both electronic scholarly publishing, and digital redistribution of material original published in print, have greatly assisted traditional journals in acquiring something like the pass-on value of popular magazines in dentists’ waiting rooms. But for all this to work, academics have to be given time to sit and read, and as it would be absurd to try to itemise and remunerate this labour specifically, then this time needs to be built into the normative workload for anyone who is expected to engage in any of the complex tasks involved in the collaborative production of knowledge. With that in mind, I concluded my review on what I hoped was a constructive note of solidarity. “What’s really under pressure here—forms of collegiality, altruism and imaginative contributions to a more outward-facing type of scholarship—is not at risk from search engines, it seems to me. What is being pressured into obsolescence, risking subscriptions to journals as much as purchases of books, is the craft and professional value placed on reading. This pressure is not coming from the internet, but from all the other bureaucratic rationalities described in this paper, that for the time being do still value journals selectively above other kinds of public contribution, but fail to appreciate the labour required to make them appear in any form, and completely overlook the labour required to absorb their contents and respond.” For obvious reasons, my warm thanks are due to John Hartley and to the two editors of this M/C Journal issue for their very unexpected invitation to expand on my original referee’s report.References Australian Research Council. “The Excellence in Research for Australia (ERA) Initiative: Journal Lists.” 2009. 3 July 2009 ‹http://www.arc.gov.au/era/era_journal_list.htm›. Ginsparg, Paul. “Can Peer Review be Better Focused?” 2003. 1 July 2009 ‹http://people.ccmr.cornell.edu/~ginsparg/blurb/pg02pr.html›. Guldi, Jo, Michael Widner, Bonnie Wheeler, and Jana Argersinger. The Council of Editors of Learned Journals Blog. 2009. 1 July 2009 ‹http://thecelj.blogspot.com›. Howard, Jennifer. “Humanities Journals Confront Identity Crisis.” The Chronicle of Higher Education 27 Mar. 2009. 1 July 2009 ‹http://chronicle.com/free/v55/i29/29a00102.htm›. King, Donald, Carol Tenopir, and Michael Clarke. "Measuring Total Reading of Journal Articles." D-Lib Magazine 12.10 (2006). 1 July 2009 ‹http://www.dlib.org/dlib/october06/king/10king.html›. Kronos Incorporated. “How Can You Reduce Your Labor Costs without Sacrificing Speed of Service?” (2009). 1 July 2009 ‹http://www.qsrweb.com/white_paper.php?id=1738&download=1›.“May I Take Your Order? Local McDonald's Outsources to a Call Center.” Billings Gazette, Montana, 5 July 2006. SharedXpertise Forum. 1 July 2009 ‹http://www.sharedxpertise.org/file/3433/mcdonalds-outsourcing-to-call-center.html›.Odlyzko, Andrew. “The Rapid Evolution of Scholarly Publishing.” Learned Publishing 15.1 (2002): 7-19. ———. “Tragic Loss or Good Riddance? The Impending Demise of Traditional Scholarly Journals.” International Journal of Human-Computer Studies 42 (1995): 71-122. Young, Jeffrey. “Digital Humanities Scholars Collaborate More on Journal Articles than 'Traditional' Researchers.” The Chronicle of Higher Education 27 April 2009. 1 July 2009 ‹http://chronicle.com/wiredcampus/article/3736/digital-humanities-scholars-collaborate-more-on-journal-articles-than-on-traditional-researchers›.

APA, Harvard, Vancouver, ISO, and other styles

27

Franks, Rachel. "A Taste for Murder: The Curious Case of Crime Fiction." M/C Journal 17, no.1 (March18, 2014). http://dx.doi.org/10.5204/mcj.770.

Full text

Abstract:

Introduction Crime fiction is one of the world’s most popular genres. Indeed, it has been estimated that as many as one in every three new novels, published in English, is classified within the crime fiction category (Knight xi). These new entrants to the market are forced to jostle for space on bookstore and library shelves with reprints of classic crime novels; such works placed in, often fierce, competition against their contemporaries as well as many of their predecessors. Raymond Chandler, in his well-known essay The Simple Art of Murder, noted Ernest Hemingway’s observation that “the good writer competes only with the dead. The good detective story writer […] competes not only with all the unburied dead but with all the hosts of the living as well” (3). In fact, there are so many examples of crime fiction works that, as early as the 1920s, one of the original ‘Queens of Crime’, Dorothy L. Sayers, complained: It is impossible to keep track of all the detective-stories produced to-day [sic]. Book upon book, magazine upon magazine pour out from the Press, crammed with murders, thefts, arsons, frauds, conspiracies, problems, puzzles, mysteries, thrills, maniacs, crooks, poisoners, forgers, garrotters, police, spies, secret-service men, detectives, until it seems that half the world must be engaged in setting riddles for the other half to solve (95). Twenty years after Sayers wrote on the matter of the vast quantities of crime fiction available, W.H. Auden wrote one of the more famous essays on the genre: The Guilty Vicarage: Notes on the Detective Story, by an Addict. Auden is, perhaps, better known as a poet but his connection to the crime fiction genre is undisputed. As well as his poetic works that reference crime fiction and commentaries on crime fiction, one of Auden’s fellow poets, Cecil Day-Lewis, wrote a series of crime fiction novels under the pseudonym Nicholas Blake: the central protagonist of these novels, Nigel Strangeways, was modelled upon Auden (Scaggs 27). Interestingly, some writers whose names are now synonymous with the genre, such as Edgar Allan Poe and Raymond Chandler, established the link between poetry and crime fiction many years before the publication of The Guilty Vicarage. Edmund Wilson suggested that “reading detective stories is simply a kind of vice that, for silliness and minor harmfulness, ranks somewhere between crossword puzzles and smoking” (395). In the first line of The Guilty Vicarage, Auden supports Wilson’s claim and confesses that: “For me, as for many others, the reading of detective stories is an addiction like tobacco or alcohol” (406). This indicates that the genre is at best a trivial pursuit, at worst a pursuit that is bad for your health and is, increasingly, socially unacceptable, while Auden’s ideas around taste—high and low—are made clear when he declares that “detective stories have nothing to do with works of art” (406). The debates that surround genre and taste are many and varied. The mid-1920s was a point in time which had witnessed crime fiction writers produce some of the finest examples of fiction to ever be published and when readers and publishers were watching, with anticipation, as a new generation of crime fiction writers were readying themselves to enter what would become known as the genre’s Golden Age. At this time, R. Austin Freeman wrote that: By the critic and the professedly literary person the detective story is apt to be dismissed contemptuously as outside the pale of literature, to be conceived of as a type of work produced by half-educated and wholly incompetent writers for consumption by office boys, factory girls, and other persons devoid of culture and literary taste (7). This article responds to Auden’s essay and explores how crime fiction appeals to many different tastes: tastes that are acquired, change over time, are embraced, or kept as guilty secrets. In addition, this article will challenge Auden’s very narrow definition of crime fiction and suggest how Auden’s religious imagery, deployed to explain why many people choose to read crime fiction, can be incorporated into a broader popular discourse on punishment. This latter argument demonstrates that a taste for crime fiction and a taste for justice are inextricably intertwined. Crime Fiction: A Type For Every Taste Cathy Cole has observed that “crime novels are housed in their own section in many bookshops, separated from literary novels much as you’d keep a child with measles away from the rest of the class” (116). Times have changed. So too, have our tastes. Crime fiction, once sequestered in corners, now demands vast tracts of prime real estate in bookstores allowing readers to “make their way to the appropriate shelves, and begin to browse […] sorting through a wide variety of very different types of novels” (Malmgren 115). This is a result of the sheer size of the genre, noted above, as well as the genre’s expanding scope. Indeed, those who worked to re-invent crime fiction in the 1800s could not have envisaged the “taxonomic exuberance” (Derrida 206) of the writers who have defined crime fiction sub-genres, as well as how readers would respond by not only wanting to read crime fiction but also wanting to read many different types of crime fiction tailored to their particular tastes. To understand the demand for this diversity, it is important to reflect upon some of the appeal factors of crime fiction for readers. Many rules have been promulgated for the writers of crime fiction to follow. Ronald Knox produced a set of 10 rules in 1928. These included Rule 3 “Not more than one secret room or passage is allowable”, and Rule 10 “Twin brothers, and doubles generally, must not appear unless we have been duly prepared for them” (194–6). In the same year, S.S. Van Dine produced another list of 20 rules, which included Rule 3 “There must be no love interest: The business in hand is to bring a criminal to the bar of justice, not to bring a lovelorn couple to the hymeneal altar”, and Rule 7 “There simply must be a corpse in a detective novel, and the deader the corpse the better” (189–93). Some of these directives have been deliberately ignored or have become out-of-date over time while others continue to be followed in contemporary crime writing practice. In sharp contrast, there are no rules for reading this genre. Individuals are, generally, free to choose what, where, when, why, and how they read crime fiction. There are, however, different appeal factors for readers. The most common of these appeal factors, often described as doorways, are story, setting, character, and language. As the following passage explains: The story doorway beckons those who enjoy reading to find out what happens next. The setting doorway opens widest for readers who enjoy being immersed in an evocation of place or time. The doorway of character is for readers who enjoy looking at the world through others’ eyes. Readers who most appreciate skilful writing enter through the doorway of language (Wyatt online). These doorways draw readers to the crime fiction genre. There are stories that allow us to easily predict what will come next or make us hold our breath until the very last page, the books that we will cheerfully lend to a family member or a friend and those that we keep close to hand to re-read again and again. There are settings as diverse as country manors, exotic locations, and familiar city streets, places we have been and others that we might want to explore. There are characters such as the accidental sleuth, the hardboiled detective, and the refined police officer, amongst many others, the men and women—complete with idiosyncrasies and flaws—who we have grown to admire and trust. There is also the language that all writers, regardless of genre, depend upon to tell their tales. In crime fiction, even the most basic task of describing where the murder victim was found can range from words that convey the genteel—“The room of the tragedy” (Christie 62)—to the absurd: “There it was, jammed between a pallet load of best export boneless beef and half a tonne of spring lamb” (Maloney 1). These appeal factors indicate why readers might choose crime fiction over another genre, or choose one type of crime fiction over another. Yet such factors fail to explain what crime fiction is or adequately answer why the genre is devoured in such vast quantities. Firstly, crime fiction stories are those in which there is the committing of a crime, or at least the suspicion of a crime (Cole), and the story that unfolds revolves around the efforts of an amateur or professional detective to solve that crime (Scaggs). Secondly, crime fiction offers the reassurance of resolution, a guarantee that from “previous experience and from certain cultural conventions associated with this genre that ultimately the mystery will be fully explained” (Zunshine 122). For Auden, the definition of the crime novel was quite specific, and he argued that referring to the genre by “the vulgar definition, ‘a Whodunit’ is correct” (407). Auden went on to offer a basic formula stating that: “a murder occurs; many are suspected; all but one suspect, who is the murderer, are eliminated; the murderer is arrested or dies” (407). The idea of a formula is certainly a useful one, particularly when production demands—in terms of both quality and quantity—are so high, because the formula facilitates creators in the “rapid and efficient production of new works” (Cawelti 9). For contemporary crime fiction readers, the doorways to reading, discussed briefly above, have been cast wide open. Stories relying upon the basic crime fiction formula as a foundation can be gothic tales, clue puzzles, forensic procedurals, spy thrillers, hardboiled narratives, or violent crime narratives, amongst many others. The settings can be quiet villages or busy metropolises, landscapes that readers actually inhabit or that provide a form of affordable tourism. These stories can be set in the past, the here and now, or the future. Characters can range from Edgar Allan Poe’s C. Auguste Dupin to Dashiell Hammett’s Sam Spade, from Agatha Christie’s Miss Jane Marple to Kerry Greenwood’s Honourable Phryne Fisher. Similarly, language can come in numerous styles from the direct (even rough) words of Carter Brown to the literary prose of Peter Temple. Anything is possible, meaning everything is available to readers. For Auden—although he required a crime to be committed and expected that crime to be resolved—these doorways were only slightly ajar. For him, the story had to be a Whodunit; the setting had to be rural England, though a college setting was also considered suitable; the characters had to be “eccentric (aesthetically interesting individuals) and good (instinctively ethical)” and there needed to be a “completely satisfactory detective” (Sherlock Holmes, Inspector French, and Father Brown were identified as “satisfactory”); and the language descriptive and detailed (406, 409, 408). To illustrate this point, Auden’s concept of crime fiction has been plotted on a taxonomy, below, that traces the genre’s main developments over a period of three centuries. As can be seen, much of what is, today, taken for granted as being classified as crime fiction is completely excluded from Auden’s ideal. Figure 1: Taxonomy of Crime Fiction (Adapted from Franks, Murder 136) Crime Fiction: A Personal Journey I discovered crime fiction the summer before I started high school when I saw the film version of The Big Sleep starring Humphrey Bogart and Lauren Bacall. A few days after I had seen the film I started reading the Raymond Chandler novel of the same title, featuring his famous detective Philip Marlowe, and was transfixed by the second paragraph: The main hallway of the Sternwood place was two stories high. Over the entrance doors, which would have let in a troop of Indian elephants, there was a broad stained-glass panel showing a knight in dark armour rescuing a lady who was tied to a tree and didn’t have any clothes on but some very long and convenient hair. The knight had pushed the visor of his helmet back to be sociable, and he was fiddling with the knots on the ropes that tied the lady to the tree and not getting anywhere. I stood there and thought that if I lived in the house, I would sooner or later have to climb up there and help him. He didn’t seem to be really trying (9). John Scaggs has written that this passage indicates Marlowe is an idealised figure, a knight of romance rewritten onto the mean streets of mid-20th century Los Angeles (62); a relocation Susan Roland calls a “secular form of the divinely sanctioned knight errant on a quest for metaphysical justice” (139): my kind of guy. Like many young people I looked for adventure and escape in books, a search that was realised with Raymond Chandler and his contemporaries. On the escapism scale, these men with their stories of tough-talking detectives taking on murderers and other criminals, law enforcement officers, and the occasional femme fatale, were certainly a sharp upgrade from C.S. Lewis and the Chronicles of Narnia. After reading the works written by the pioneers of the hardboiled and roman noir traditions, I looked to other American authors such as Edgar Allan Poe who, in the mid-1800s, became the father of the modern detective story, and Thorne Smith who, in the 1920s and 1930s, produced magical realist tales with characters who often chose to dabble on the wrong side of the law. This led me to the works of British crime writers including Arthur Conan Doyle, Agatha Christie, and Dorothy L. Sayers. My personal library then became dominated by Australian writers of crime fiction, from the stories of bushrangers and convicts of the Colonial era to contemporary tales of police and private investigators. There have been various attempts to “improve” or “refine” my tastes: to convince me that serious literature is real reading and frivolous fiction is merely a distraction. Certainly, the reading of those novels, often described as classics, provide perfect combinations of beauty and brilliance. Their narratives, however, do not often result in satisfactory endings. This routinely frustrates me because, while I understand the philosophical frameworks that many writers operate within, I believe the characters of such works are too often treated unfairly in the final pages. For example, at the end of Ernest Hemingway’s A Farewell to Arms, Frederick Henry “left the hospital and walked back to the hotel in the rain” after his son is stillborn and “Mrs Henry” becomes “very ill” and dies (292–93). Another example can be found on the last page of George Orwell’s Nineteen Eighty-Four when Winston Smith “gazed up at the enormous face” and he realised that he “loved Big Brother” (311). Endings such as these provide a space for reflection about the world around us but rarely spark an immediate response of how great that world is to live in (Franks Motive). The subject matter of crime fiction does not easily facilitate fairy-tale finishes, yet, people continue to read the genre because, generally, the concluding chapter will show that justice, of some form, will be done. Punishment will be meted out to the ‘bad characters’ that have broken society’s moral or legal laws; the ‘good characters’ may experience hardships and may suffer but they will, generally, prevail. Crime Fiction: A Taste For Justice Superimposed upon Auden’s parameters around crime fiction, are his ideas of the law in the real world and how such laws are interwoven with the Christian-based system of ethics. This can be seen in Auden’s listing of three classes of crime: “(a) offenses against God and one’s neighbor or neighbors; (b) offenses against God and society; (c) offenses against God” (407). Murder, in Auden’s opinion, is a class (b) offense: for the crime fiction novel, the society reflected within the story should be one in “a state of grace, i.e., a society where there is no need of the law, no contradiction between the aesthetic individual and the ethical universal, and where murder, therefore, is the unheard-of act which precipitates a crisis” (408). Additionally, in the crime novel “as in its mirror image, the Quest for the Grail, maps (the ritual of space) and timetables (the ritual of time) are desirable. Nature should reflect its human inhabitants, i.e., it should be the Great Good Place; for the more Eden-like it is, the greater the contradiction of murder” (408). Thus, as Charles J. Rzepka notes, “according to W.H. Auden, the ‘classical’ English detective story typically re-enacts rites of scapegoating and expulsion that affirm the innocence of a community of good people supposedly ignorant of evil” (12). This premise—of good versus evil—supports Auden’s claim that the punishment of wrongdoers, particularly those who claim the “right to be omnipotent” and commit murder (409), should be swift and final: As to the murderer’s end, of the three alternatives—execution, suicide, and madness—the first is preferable; for if he commits suicide he refuses to repent, and if he goes mad he cannot repent, but if he does not repent society cannot forgive. Execution, on the other hand, is the act of atonement by which the murderer is forgiven by society (409). The unilateral endorsem*nt of state-sanctioned murder is problematic, however, because—of the main justifications for punishment: retribution; deterrence; incapacitation; and rehabilitation (Carter Snead 1245)—punishment, in this context, focuses exclusively upon retribution and deterrence, incapacitation is achieved by default, but the idea of rehabilitation is completely ignored. This, in turn, ignores how the reading of crime fiction can be incorporated into a broader popular discourse on punishment and how a taste for crime fiction and a taste for justice are inextricably intertwined. One of the ways to explore the connection between crime fiction and justice is through the lens of Emile Durkheim’s thesis on the conscience collective which proposes punishment is a process allowing for the demonstration of group norms and the strengthening of moral boundaries. David Garland, in summarising this thesis, states: So although the modern state has a near monopoly of penal violence and controls the administration of penalties, a much wider population feels itself to be involved in the process of punishment, and supplies the context of social support and valorization within which state punishment takes place (32). It is claimed here that this “much wider population” connecting with the task of punishment can be taken further. Crime fiction, above all other forms of literary production, which, for those who do not directly contribute to the maintenance of their respective legal systems, facilitates a feeling of active participation in the penalising of a variety of perpetrators: from the issuing of fines to incarceration (Franks Punishment). Crime fiction readers are therefore, temporarily at least, direct contributors to a more stable society: one that is clearly based upon right and wrong and reliant upon the conscience collective to maintain and reaffirm order. In this context, the reader is no longer alone, with only their crime fiction novel for company, but has become an active member of “a moral framework which binds individuals to each other and to its conventions and institutions” (Garland 51). This allows crime fiction, once viewed as a “vice” (Wilson 395) or an “addiction” (Auden 406), to be seen as playing a crucial role in the preservation of social mores. It has been argued “only the most literal of literary minds would dispute the claim that fictional characters help shape the way we think of ourselves, and hence help us articulate more clearly what it means to be human” (Galgut 190). Crime fiction focuses on what it means to be human, and how complex humans are, because stories of murders, and the men and women who perpetrate and solve them, comment on what drives some people to take a life and others to avenge that life which is lost and, by extension, engages with a broad community of readers around ideas of justice and punishment. It is, furthermore, argued here that the idea of the story is one of the more important doorways for crime fiction and, more specifically, the conclusions that these stories, traditionally, offer. For Auden, the ending should be one of restoration of the spirit, as he suspected that “the typical reader of detective stories is, like myself, a person who suffers from a sense of sin” (411). In this way, the “phantasy, then, which the detective story addict indulges is the phantasy of being restored to the Garden of Eden, to a state of innocence, where he may know love as love and not as the law” (412), indicating that it was not necessarily an accident that “the detective story has flourished most in predominantly Protestant countries” (408). Today, modern crime fiction is a “broad church, where talented authors raise questions and cast light on a variety of societal and other issues through the prism of an exciting, page-turning story” (Sisterson). Moreover, our tastes in crime fiction have been tempered by a growing fear of real crime, particularly murder, “a crime of unique horror” (Hitchens 200). This has seen some readers develop a taste for crime fiction that is not produced within a framework of ecclesiastical faith but is rather grounded in reliance upon those who enact punishment in both the fictional and real worlds. As P.D. James has written: [N]ot by luck or divine intervention, but by human ingenuity, human intelligence and human courage. It confirms our hope that, despite some evidence to the contrary, we live in a beneficent and moral universe in which problems can be solved by rational means and peace and order restored from communal or personal disruption and chaos (174). Dorothy L. Sayers, despite her work to legitimise crime fiction, wrote that there: “certainly does seem a possibility that the detective story will some time come to an end, simply because the public will have learnt all the tricks” (108). Of course, many readers have “learnt all the tricks”, or most of them. This does not, however, detract from the genre’s overall appeal. We have not grown bored with, or become tired of, the formula that revolves around good and evil, and justice and punishment. Quite the opposite. Our knowledge of, as well as our faith in, the genre’s “tricks” gives a level of confidence to readers who are looking for endings that punish murderers and other wrongdoers, allowing for more satisfactory conclusions than the, rather depressing, ends given to Mr. Henry and Mr. Smith by Ernest Hemingway and George Orwell noted above. Conclusion For some, the popularity of crime fiction is a curious case indeed. When Penguin and Collins published the Marsh Million—100,000 copies each of 10 Ngaio Marsh titles in 1949—the author’s relief at the success of the project was palpable when she commented that “it was pleasant to find detective fiction being discussed as a tolerable form of reading by people whose opinion one valued” (172). More recently, upon the announcement that a Miles Franklin Award would be given to Peter Temple for his crime novel Truth, John Sutherland, a former chairman of the judges for one of the world’s most famous literary awards, suggested that submitting a crime novel for the Booker Prize would be: “like putting a donkey into the Grand National”. Much like art, fashion, food, and home furnishings or any one of the innumerable fields of activity and endeavour that are subject to opinion, there will always be those within the world of fiction who claim positions as arbiters of taste. Yet reading is intensely personal. I like a strong, well-plotted story, appreciate a carefully researched setting, and can admire elegant language, but if a character is too difficult to embrace—if I find I cannot make an emotional connection, if I find myself ambivalent about their fate—then a book is discarded as not being to my taste. It is also important to recognise that some tastes are transient. Crime fiction stories that are popular today could be forgotten tomorrow. Some stories appeal to such a broad range of tastes they are immediately included in the crime fiction canon. Yet others evolve over time to accommodate widespread changes in taste (an excellent example of this can be seen in the continual re-imagining of the stories of Sherlock Holmes). Personal tastes also adapt to our experiences and our surroundings. A book that someone adores in their 20s might be dismissed in their 40s. A storyline that was meaningful when read abroad may lose some of its magic when read at home. Personal events, from a change in employment to the loss of a loved one, can also impact upon what we want to read. Similarly, world events, such as economic crises and military conflicts, can also influence our reading preferences. Auden professed an almost insatiable appetite for crime fiction, describing the reading of detective stories as an addiction, and listed a very specific set of criteria to define the Whodunit. Today, such self-imposed restrictions are rare as, while there are many rules for writing crime fiction, there are no rules for reading this (or any other) genre. People are, generally, free to choose what, where, when, why, and how they read crime fiction, and to follow the deliberate or whimsical paths that their tastes may lay down for them. Crime fiction writers, past and present, offer: an incredible array of detective stories from the locked room to the clue puzzle; settings that range from the English country estate to city skyscrapers in glamorous locations around the world; numerous characters from cerebral sleuths who can solve a crime in their living room over a nice, hot cup of tea to weapon wielding heroes who track down villains on foot in darkened alleyways; and, language that ranges from the cultured conversations from the novels of the genre’s Golden Age to the hard-hitting terminology of forensic and legal procedurals. Overlaid on these appeal factors is the capacity of crime fiction to feed a taste for justice: to engage, vicariously at least, in the establishment of a more stable society. Of course, there are those who turn to the genre for a temporary distraction, an occasional guilty pleasure. There are those who stumble across the genre by accident or deliberately seek it out. There are also those, like Auden, who are addicted to crime fiction. So there are corpses for the conservative and dead bodies for the bloodthirsty. There is, indeed, a murder victim, and a murder story, to suit every reader’s taste. References Auden, W.H. “The Guilty Vicarage: Notes on The Detective Story, By an Addict.” Harper’s Magazine May (1948): 406–12. 1 Dec. 2013 ‹http://www.harpers.org/archive/1948/05/0033206›. Carter Snead, O. “Memory and Punishment.” Vanderbilt Law Review 64.4 (2011): 1195–264. Cawelti, John G. Adventure, Mystery and Romance: Formula Stories as Art and Popular Culture. Chicago: U of Chicago P, 1976/1977. Chandler, Raymond. The Big Sleep. London: Penguin, 1939/1970. ––. The Simple Art of Murder. New York: Vintage Books, 1950/1988. Christie, Agatha. The Mysterious Affair at Styles. London: HarperCollins, 1920/2007. Cole, Cathy. Private Dicks and Feisty Chicks: An Interrogation of Crime Fiction. Fremantle: Curtin UP, 2004. Derrida, Jacques. “The Law of Genre.” Glyph 7 (1980): 202–32. Franks, Rachel. “May I Suggest Murder?: An Overview of Crime Fiction for Readers’ Advisory Services Staff.” Australian Library Journal 60.2 (2011): 133–43. ––. “Motive for Murder: Reading Crime Fiction.” The Australian Library and Information Association Biennial Conference. Sydney: Jul. 2012. ––. “Punishment by the Book: Delivering and Evading Punishment in Crime Fiction.” Inter-Disciplinary.Net 3rd Global Conference on Punishment. Oxford: Sep. 2013. Freeman, R.A. “The Art of the Detective Story.” The Art of the Mystery Story: A Collection of Critical Essays. Ed. Howard Haycraft. New York: Simon & Schuster, 1924/1947. 7–17. Galgut, E. “Poetic Faith and Prosaic Concerns: A Defense of Suspension of Disbelief.” South African Journal of Philosophy 21.3 (2002): 190–99. Garland, David. Punishment and Modern Society: A Study in Social Theory. Chicago: U of Chicago P, 1993. Hemingway, Ernest. A Farewell to Arms. London: Random House, 1929/2004. ––. in R. Chandler. The Simple Art of Murder. New York: Vintage Books, 1950/1988. Hitchens, P. A Brief History of Crime: The Decline of Order, Justice and Liberty in England. London: Atlantic Books, 2003. James, P.D. Talking About Detective Fiction. New York: Alfred A. Knopf, 2009. Knight, Stephen. Crime Fiction since 1800: Death, Detection, Diversity, 2nd ed. New York: Palgrave Macmillian, 2010. Knox, Ronald A. “Club Rules: The 10 Commandments for Detective Novelists, 1928.” Ronald Knox Society of North America. 1 Dec. 2013 ‹http://www.ronaldknoxsociety.com/detective.html›. Malmgren, C.D. “Anatomy of Murder: Mystery, Detective and Crime Fiction.” Journal of Popular Culture Spring (1997): 115–21. Maloney, Shane. The Murray Whelan Trilogy: Stiff, The Brush-Off and Nice Try. Melbourne: Text Publishing, 1994/2008. Marsh, Ngaio in J. Drayton. Ngaio Marsh: Her Life in Crime. Auckland: Harper Collins, 2008. Orwell, George. Nineteen Eighty-Four. London: Penguin Books, 1949/1989. Roland, Susan. From Agatha Christie to Ruth Rendell: British Women Writers in Detective and Crime Fiction. London: Palgrave, 2001. Rzepka, Charles J. Detective Fiction. Cambridge: Polity, 2005. Sayers, Dorothy L. “The Omnibus of Crime.” The Art of the Mystery Story: A Collection of Critical Essays. Ed. Howard Haycraft. New York: Simon & Schuster, 1928/1947. 71–109. Scaggs, John. Crime Fiction: The New Critical Idiom. London: Routledge, 2005. Sisterson, C. “Battle for the Marsh: Awards 2013.” Black Mask: Pulps, Noir and News of Same. 1 Jan. 2014 http://www.blackmask.com/category/awards-2013/ Sutherland, John. in A. Flood. “Could Miles Franklin turn the Booker Prize to Crime?” The Guardian. 1 Jan. 2014 ‹http://www.guardian.co.uk/books/2010/jun/25/miles-franklin-booker-prize-crime›. Van Dine, S.S. “Twenty Rules for Writing Detective Stories.” The Art of the Mystery Story: A Collection of Critical Essays. Ed. Howard Haycraft. New York: Simon & Schuster, 1928/1947. 189-93. Wilson, Edmund. “Who Cares Who Killed Roger Ackroyd.” The Art of the Mystery Story: A Collection of Critical Essays. Ed. Howard Haycraft. New York: Simon & Schuster, 1944/1947. 390–97. Wyatt, N. “Redefining RA: A RA Big Think.” Library Journal Online. 1 Jan. 2014 ‹http://lj.libraryjournal.com/2007/07/ljarchives/lj-series-redefining-ra-an-ra-big-think›. Zunshine, Lisa. Why We Read Fiction: Theory of Mind and the Novel. Columbus: Ohio State UP, 2006.

APA, Harvard, Vancouver, ISO, and other styles

28

Cardell, Kylie. "Is a Fitbit a Diary? Self-Tracking and Autobiography." M/C Journal 21, no.2 (April25, 2018). http://dx.doi.org/10.5204/mcj.1348.

Full text

Abstract:

Data becomes something of a mirror in which people see themselves reflected. (Sorapure 270)In a 2014 essay for The New Yorker, the humourist David Sedaris recounts an obsession spurred by the purchase of a Fitbit, a wearable activity-tracker that sends a celebratory “tingle” to his wrist every 10, 000 steps. He starts “stepping out” modestly but is soon working hard, steadily improving on the manufacturer’s recommended baseline. “But why?” asks Sedaris’ partner Hugh: “Why isn’t twelve thousand enough?” “Because,” I told him, “my Fitbit thinks I can do better” (n.p.).The record of daily, incidental activity that the Fitbit collects and visualises is important to Sedaris as a record of his (increasing) bodily fitness but it is also evidence in another way, a testament to virtue and a correlate of self-improvement: “The tingle feels so good,” Sedaris says, “not just as a sensation but also as a mark of accomplishment” (n.p.). Improvement is presented as both traceable and quantifiable; data and self are inextricably, though also ironically, linked. With his Fitbit, Sedaris accesses new and precise degrees of bodily information and he connects himself to a visible community of wearers. At first, Sedaris is smug and optimistic; by the time he begins “rambling” compulsively, however, and achieving his “first sixty-thousand-step day,” he has also had an epiphany: “I staggered home with my flashlight knowing that I’d advance to sixty-five thousand, and that there will be no end to it until my feet snap off at the ankles. Then it’ll just be my jagged bones stabbing into the soft ground” (n.p.). When the device finally “dies,” Sedaris experiences an immediate feeling of freedom; within five hours he has “ordered a replacement, express delivery” (n.p.).In their book Self-Tracking, Gina Neff and Dawn Nafus note that both digital technology and a turn to biomedicalisation in the broader culture have amplified the capacity and reach of quantification practices in everyday life. Wearable activity trackers, of which the Fitbit is arguably the most iconic, offer individuals the ability to track minute or previously imperceptible permutations of bodily sensation within an everyday and non-medical context. It is a technological capacity, however, thoroughly embedded in a mobilising rhetoric of “health,” a term which itself has “become a loaded word, not merely a description of a bodily state but also a euphemism for what the speaker believes is desirable” (Neff and Nafus 19). The Fitbit measures movement, but it also signals something about the wearer’s identity that is framed, in the device’s marketing at least, in positive and desirable terms as an indication of character, as a highly desirable aspect of self.In a recent discussion of new forms of online life writing, Madeline Sorapure argues that acts of interpretation and representation in relation to biometric data are “something very similar to autobiographical practice. As in autobiography, subject and object, measurer and measured, are collapsed” (270). In its capacity to track and document over time and its affective role in forming a particular experience of self, the Fitbit bears a formal resemblance to autobiographical practice and specifically to modes of serial self-representation like diaries, journals, or almanacs. The discursive context is crucial here too. Early self-trackers use the pre-formatted almanac diary or calendar to better organise their time and to account for expenditure or gain. The pocket calendar was an innovation that had mass-market appeal and its rapid circulation in the early twentieth century directly shaped diary and account-keeping habits amongst historical populations, and to this day (McCarthy). Such forms are not simply passive repositories but bear cultural ideology. As popular templates for practices of accounting, self-documentation, and affecting, pocket calendars shape what content an individual across their individual day or week is coaxed to attend to or record, and effects what might then be relegated “marginal” or less consequential in relation.How do the technological affordances of the Fitbit similarly coax and shape self-knowledge or ideas of value and worth in relation to personal experience? What kinds of formal and discursive and resonance might there be drawn between wearable personal devices like the Fitbit and historical forms of tracking self-experience, like the diary? Is a Fitbit a diary? In this discussion, I consider pre-formatted diaries, like the almanac or pocket calendar, as discursive and technological precursors or adjuncts to wearable personal trackers like the Fitbit and I explore some assertions around the kinds of subject that digital forms and modes of self-tracking and personal data might then seem to coax or imagine.Tracking SelvesSelf-tracking is a human activity, one far more interesting than the gadgets that have made it easier and far more widespread. (Neff and Nafus 2)In 1726, at the age of 20, the inventor and polymath Benjamin Franklin recorded in his journal the inception of a plan to improve his character. In a chart created to track goals of virtue and progress in character, “black marks” are literal and symbolic, denoting when he has failed to live up to his expectations—two black marks represent a particularly bad effort (Rettberg 438). At age 79, Franklin was still tracking his progress when he wrote about the project in his Autobiography:It was about this time I conceived the bold and arduous project of arriving at moral perfection. I wished to live without committing any fault at any time; I would conquer all that either natural inclination, custom, or company might lead me into. (89)Franklin’s desire to document and chronicle the self-conscious development of his character drives his interest in the form. He was as an almanac devotee and an innovative publisher of the form, which gained immense popularity at this time. Franklin added blank pages to the almanacs he helped produce in the mid eighteenth century and this addition expanded the possibilities for the kinds of data that might be recorded, particularly personal and anecdotal material. The innovation also earned the publishers a good deal more money (McCarthy 49). The mass production of printed almanacs thus had a profound effect on how individuals engaged in various kinds of daily and temporal and social regulation and documentation, including of the self:At the same time as it kept readers aware of the outside world, the almanac could also direct them to the state of their own being. Almanacs were all about regulation, inside and out. Almanacs displayed a regulated universe governed by the laws of planetary motion, by the church calendar, by the zodiac. It seemed natural, then, that some readers might turn to an almanac to regulate themselves. What better way to do that than in a text that already possessed its own system? All one had to do was insert one’s own data in that printed form, like connecting the dots. (McCarthy 53)Mass-market forms that engender habits of accounting are also cultural templates: pre-formatted journals are systems for private documentation that reflect broader cultural and social ideologies. Rebecca Connor observes that historical gender assumptions in relation to time “well-spent” are frequently visible in eighteenth-century mass-market journals explicitly aimed at women, which tended to allocate more space for “social” engagements versus, for example, financial accounting (18).In the twenty-first century, technologies like the Fitbit promise access to data in relation to personal experience but they also reveal dominant cultural and social attitudes to bodies and selves. Deborah Lupton argues that self-tracking as a phenomenon is essentially connected to specific ideological imperatives: “Underlying many accounts of self-tracking is a barely hidden discourse of morality, which takes the form of championing those who take action to improve themselves” (74). Within these influential discourses, acts of self-tracking, no less than Franklin’s virtue chart, acquire significance as moral activities and as the outward sign of good character.Neither self-tracking nor the ideology of virtue that underwrites it are new phenomena. In their cultural study of weight measurement devices, Kate Crawford, Jessa Lingl, and Tero Karpii have explored how both weight scales and wearable devices “emphasize self-knowledge and control through external measurements” (479). Similarly, Lupton has noted that, the “metrics” generated by personal self-tracking devices are “invested with significance” because “data visualisation” is “viewed as more credible and accurate by participants than the ‘subjective’ assessments of their bodily sensations” ("Personal Data" 345).In various historical cultures, objectivity about one’s self is seen as a desire (if not a fact) in relation to conscious self-examination; externalisation, through written or oral confession, is both a virtue and a discipline. While diary writing is, particularly in popular culture, often derided as an overly subjective and narcissistic mode, the diary is also framed within contexts of therapy, or spiritual development, as a possible methodology for self-improvement. For Puritans, though, the act was also understood to entail risks; recording one’s thoughts into a written journal could enable the individual to see patterns or faults in everyday behaviour, and so to identify and rectify habits of mind holding back personal spiritual development. In the twentieth century, “how-to write a diary” self-help guidebooks remediate the discourse of self-knowledge as self-improvement, and promised to refine the method, advising adherents on the kinds of writing practices that might best circumvent problems of individual bias or subjectivity (a claim of an ever-more objective methodology that reverberates to the current moment). Invariably, the more “unconscious” the diary writing practice, the greater the assumed potential for “objective” knowledge (Cardell 34).Contemporary practices of self-tracking extend the prioritisation of external, objective measurement in relation to documenting personal experience. Crawford, Lingel, and Karppi observe that “the discourse around wearable devices gives the impression of radical new technology offering precise and unambiguous physical assessment: devices that reflect back the ‘real’ state of the body” (480). The technology, of course, is not new but it is “improved.” The ideal of a better, more accurate (because externalised and so auditable by the community) self-knowledge sought by Puritans in their journals, or by Benjamin Franklin in his charts and almanacs, resurfaces in the contemporary context, in which wearables like the Fitbit assume powerful discursive status in relation to ideals of truth and objectivity and where the individual is decentred from the position of as “the most authoritative source of data about themselves” (Crawford, Lingel, and Karppi 479).Data SelvesWhat kind of selves do people develop in relation to the technology they use to record or visualise their experience? “There is no doubt,” writes Jill Walker Rettberg, in Seeing Our Selves through Technology, “that people develop ‘affective ties’ to the data they track, just as diaries, blogs, photo albums and other material archives are meaningful to those who keep them” (87). That the data is numerical, or digital, does not lessen this connection:Apps which allow us to see our data allow us to see ourselves. We look at our data doubles as we gazed into the mirror as teenagers wondering who we were and who we might be. We look at our data in much the same way as you might flick through your selfies to find the one that shows you the way you want to be seen. (Rettberg 87)Crucially, Rettberg sees data as both affective and agential and she observes that data can also be edited and shaped by the individual. Some of this practice is deliberate, taking the form of an engagement with narrative as a “story” of self that underpins the practice of writing autobiography, for example. However, the representation of self can also be more oblique. “The first writing” says Rettberg, “was developed not to record words and sentences but to keep accounts. Arguably, recording quantities of grain or other valuables can be a form of self-representation, or at least representation of what belongs to the self” (10).Like log-books or field notebooks, like calendars or almanacs—prosaic forms of daily sequential recording that are understood to prioritise information capture over self-reflection—the Fitbit is usually presented as a method for accruing and representing personal data. In contemporary digital culture, “data” is a complex and fraught term and recent debates around “big data,” which describes the capacity of machines to make connections and perform calculations that a human might not necessarily notice or be able to perform, has crystallised this. What Melissa Gregg calls the power and “spectacle” of data is an ideological pivot in digital cultures of the twenty-first century, one that turns in conjunction to discourses of evidence and authority that emerge in relation to the visual: “sharing the same root as ‘evidence,’ vision is the word that aligns truth and knowledge in different historical moments” (3).For autobiography scholars exploring how formal modes of capture might also be genres, or how a Fitbit might coax a narrative of self, these questions are formative. Sorapure says: Information graphics that visually represent personal data; collaboratively constructed and template-based self-representations in social media and networking sites; the non-narrative nature of aggregated life writing: in these and other new practices we see selves emerging and being represented through interactions with technologies. (271)In the twenty-first century, self-quantification and tracking technologies like the Fitbit are ever more present in individual spheres of everyday activity. These devices prompt behaviour, affect self-knowledge, and signal identity: I am a fit person, or trying to be, or was. A Fitbit cannot record how it feels to spend 34 minutes in the “peak zone,” but it can prompt recollection, it is a mnemonic, and it provides an account of time spent, how, and by whom. Is a Fitbit a diary? The diary in the twenty-first century is already vastly different to many of its formal historical counterparts, yet there are discursive resonances. The Fitbit is a diary if we think of a diary as a chronological record of data, which it can be. However, contemporary uses of the diary, just like their historical antecedents, are also far more diverse and complex than this.Crucially, the Fitbit, like the diary, signals identity in relation to experience and so it reflects various and shifting cultural values or anxieties over what is worth measuring or documenting, and conversely, over what is not. “The private diary,” as Lejeune asserts, is a way of life: “the text itself is a mere by-product, a residue” (31). Historical diary keeping practices unfold from and emerge within cultures that position self-expression and its documentation of this as a means to self-improvement. Seeing the Fitbit within this tradition draws attention to the discursive ideology behind self-tracking as a personal practice that nonetheless positions itself in relation to cultural norms and to ideals (such as health, or fitness, or conscientiousness, or goodness).ConclusionWhat kind of self-representation is produced by practices of self-quantification, where personal data is amassed continuously and contiguously to individual experience? The legacy of centuries of historical diary-practice has been evident to various scholars exploring the cultures of self-tracking that are evolving in response to wearable technologies like the Fitbit. In her book length study of self-tracking cultures, The Quantified Self, Lupton observes that “self-tracking tools” are inevitably “biographical and personal” and that “contemporary self-tracking tools and records are the latter-day versions of the paper diary or journal, photo album, keepsake and memento box or personal dossier” (73). While, in Self-Tracking, Neff and Nafus argue that new technologies “intersect with the way that people have self-tracked for centuries like keeping diaries or logs. The growth of these digital traces raises new questions about this old practice” (2).What does it mean to think of wearable technology like Fitbits in relation to diaries, and what are the implications of such a conception? Privacy settings allow the Fitbit to comply with popular stereotypes of diaries that exist in popular culture; that is, as a locked or secret record. However, in the case of wearable technology the content is in the form of data. While data often poses as neutral and objective information, seeing this instead as diaristic can draw valuable attention to dominant cultural ideals that shape value in relation to self and technology in the twenty-first century. Crucially, “while self-knowledge may be the rhetoric of wearable device advertising, it is just as much a technology of being known by others” (Crawford, Lingel, and Karppi 493-494).Is my Fitbit a diary? It tracks my body’s movements and gestures and reports them to the conscious self. It stores chronologically accumulated data over time. It enables self-reflection and the visualisation of a set of daily habits, and it may produce or coax new behaviour. Diaries have long performed this function: tracking, recording and, documenting for making sense of later, on reflection, or after enough time has passed. Contemporary advances in technology related to self-tracking and personal data collection make possible a new range of previously unimaginable information in relation to individual experience. However, the diary’s cultural status as a “confessional” form intersects with exigencies around “health” and “self-improvement” that corporations producing devices like Fitbit promote to their customers in ways that will demand further attention.ReferencesCardell, Kylie. Dear World: Contemporary Uses of the Diary. Wisconsin UP, 2014.Connor, Rebecca Elisabeth. Women, Accounting and Narrative: Keeping Books in Eighteenth-Century England. London: Routledge, 2011.Crawford, Kate, Jessa Lingel, and Tero Karppi. “Our Metrics, Ourselves: A Hundred Years of Self-Tracking From the Weight Scale to the Wrist Wearable Device.” European Journal of Cultural Studies 18.4-5 (2015): 470-96.Franklin, Benjamin. The Autobiography of Benjamin Franklin: The Complete Illustrated History. Minneapolis: MN Voyageur Press, 2016.Gregg, Melissa. “Inside the Data Spectacle.” Television & New Media 16.1 (2014): 1-15.Lejeune, Philippe. On Diary. Eds. Jeremy D. Popkin and Julie Rak. Trans. Katherine Durnin. Honolulu: U of Hawai’i P, 2009.Lupton, Deborah. “Personal Data Practices in the Age of Lively Data.” Digital Sociologies. Eds. Jessie Daniels, Tressie McMillan Cottom, and Karen Gregory. Bristol: Policy P, 2016. 339-54.———. The Quantified Self. Cambridge: Polity, 2016.McCarthy, Molly A. The Accidental Diarist: A History of the Daily Planner in America. Chicago: U of Chicago P, 2013.Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge: The MIT P, 2016.Rettberg, Jill Walker. Seeing Our Selves through Technology: How We Use Selfies, Blogs and Wearable Technology to Shape Ourselves. Basingstoke: Palgrave Macmillan, 2014.———. “Self-Representation in Social Media.” The Sage Handbook of Social Media, Eds. Jean Burgess, Alice E. Marwick, and Thomas Poell. London: Sage, 2017. 429-43.Sedaris, David. “Stepping Out.” The New Yorker 30 Jun. 2014. 18 Apr. 2018 <https://www.newyorker.com/magazine/2014/06/30/stepping-out-3>.Sorapure, Madeleine. “Autobiography Scholarship 2.0?: Understanding New Forms of Online Life Writing.” Biography 38.2 (2015): 267-72.

APA, Harvard, Vancouver, ISO, and other styles

29

McQuigg, Karen. "Becoming Deaf." M/C Journal 13, no.3 (June30, 2010). http://dx.doi.org/10.5204/mcj.263.

Full text

Abstract:

It seems clear that people who are deaf ... struggle continually against the meanings that others impose on their experience, and the way that this separates them from others. They struggle for acknowledgement of the way they see their lives and wish to live them, and aspire to connection?with other people, to share and belong. (David Moorhead. Knowing Who I Am. 1995. 85.) Nga Tapuwae and Before I am deaf but, before that part of my life started, I was hearing and worked for many years as a librarian in New Zealand. My first job was in a public library located within a secondary school Nga Tapuwae Secondary College in South Auckland. Its placement was a 1970’s social experiment to see if a public library could work within the grounds of a community college (and the answer was no, it could not). The experience was a great introduction for me to the Maori and Polynesian cultures that I had not previously encountered. Until then, I was wary of both groups, and so it was a revelation to realise that although there were many social problems in the area including low literacy, many of the children and teenagers were bright, talented individuals. They simply did not connect to the Anglo-Saxon reading materials we offered. Years later, my interest in the social dynamics of literacy led to my enrolment in a post-graduate literacy degree in Melbourne. This action may have saved my life because at the end of this course, a minor ailment resulted in a visit to the university doctor who diagnosed me with the life-threatening medical condition, Neurofibromatosis Type 2 (NF 2). NF2 is a late onset genetic condition in which one’s body grows tumours, always on both hearing nerves, sometimes elsewhere as well. The tumours usually cause deafness and can cause death. I was told I needed to have my tumours removed and would probably become fully deaf as a result. This is how my life as I knew it changed direction and I started the long journey towards becoming deaf. Diagnosis and Change Predictably, once diagnosed, friends and colleagues rallied to comfort me. I was told things probably weren’t as bad as they sounded. Helen Keller was mentioned several times as an example of someone who had succeeded despite being deaf and blind. ‘Really,’ my friends asked, ‘how bad can it be? ‘Inside myself however, it couldn’t have been worse. A day later the enormity of it all hit me and I became inconsolable. A friend drove me back to the doctor and she did two things that were to change my life. She referred me to the University’s counselling services where, happily, I was counselled by Elizabeth Hastings who later went on to become Australia’s first Disability Services Commissioner. Secondly, the doctor organised for me to visit the HEAR Service at the Victorian Deaf Society (VDS). Again by happy accident, my friend and I stumbled into the ‘wrong building’ where I ended up meeting John Lovett, who was Deaf and the CEO there, via an interpreter. When I met John Lovett I was distraught but, unlike other people, he made no attempt to stop me crying. He simply listened carefully until I realised he understood what I was saying and stopped crying myself. He said my fears that I could end up alone and lonely were valid and he suggested the best thing I could do for myself was to join the ‘Deaf community’; a community. I had never heard of. He explained it was made up of people like him who used Australian sign language (Auslan) to communicate. He was so engaging and supportive that this plan sounded fine to me. By the time we finished talking and he walked me over to the HEAR Service, I was so in his thrall that I had enrolled for a Deaf awareness workshop, an Auslan class, and had plans to join the Deaf community. Had I stayed on and learned Auslan, my life may well have followed a different path, but this was not to be at that time. Becoming Hearing Impaired (HI) Across at the HEAR service, an alternate view of my potential future was put to me. Instead of moving away from everything familiar and joining the Deaf community, I could learn to lip-read and hopefully use it to stay in the workforce and amongst my hearing friends. I had a cousin and aunt who were late deafened; my cousin in particular was doing well communicating with lip-reading. I discussed this with friends and the idea of staying with the people I already knew sounded far less confronting than joining the Deaf community and so I chose this path. My surgeon was also optimistic. He was confident he could save some of my hearing. Suddenly learning Auslan seemed superfluous. I phoned John Lovett to explain, and his response was that I should do what suited me, but he asked me to remember one thing: that it was me who decided to leave the Deaf Community, not that the Deaf community had not wanted me. He told me that, if I changed my mind, I could always go back because the door to the Deaf community would always be open and he would be still be there. It would be a decade before I decided that I wanted to go back through that door, and around that time this great man passed away, but I never forgot my promise to remember our conversation. It, and a few other exchanges I had with him in the following years, stayed at the back of my mind, especially as my residual hearing sank over the years, and the prospect of total deafness hung over me. When I had the surgery, my surgeon’s optimism proved unfounded. He could not save any hearing on my left side and my facial and balance nerves were damaged as well. The hospital then decided not to operate again, and would only attempt to remove the second tumour if it grew and threatened my health again. Consequently, for close to a decade, my life was on hold in many ways. I feared deafness—for me it signalled that my life as I knew it would end and I would be isolated. Every hearing test was a tense time for me as I watched my remaining hearing decline in a slow, relentless downward path on the graph. It was like watching the tide go out knowing it was never going to come in as fully again. My thinking started to change too. Within a week of my diagnosis I experienced discrimination for the first time. A library school that had offered me a place in its post graduate librarianship course the following year made it clear that they no longer wanted me. In the end it did not matter as I was accepted at another institution but it was my first experience of being treated less favourably in the community and it was a shock. After the surgery my life settled down again. I found work in public libraries again, rekindled an old relationship and in 1994 had a baby boy. However, living with a hearing loss is hard work. Everything seemed tiring, especially lip-reading. My ears rejected my hearing aid and became itchy and inflamed. I became aware that my continual hearing problems were sometimes seen as a nuisance in work situations. Socialising lost a lot of its appeal so my social world also contracted. Around this time something else started happening. Outside work, people started expressing admiration for me—words like ‘role model’ and ‘inspiring’ started entering the conversation. Any other time I might have enjoyed it but for me, struggling to adapt to my new situation, it felt odd. The whole thing reminded me of being encouraged to be like Helen Keller; as if there is a right way to behave when one is deaf in which you are an inspiration, and a wrong way in which one is seen as being in need of a role model. I discussed this with Elizabeth Hastings who had helped me prepare mentally for the surgery and afterwards. I explained I felt vulnerable and needy in my new situation and she gave me some useful advice. She thought feeling needy was a good thing as realising one needs people keeps one humble. She observed that, after years of intellectualising, educated people sometimes started believing they could use intellectualisation as a way to avoid painful emotions such as sadness. This behaviour then cut them off from support and from understanding that none of us can do it alone. She believed that, in always having to ask for help, people with disabilities are kept aware of the simple truth that all people depend on others to survive. She said I could regard becoming deaf as a disability, or I could choose to regard it as a privilege. Over the years the truth of her words became increasingly more evident to me as I waded through all the jargon and intellectualisation that surrounds discussion of both deafness and the disability arena, compared to the often raw emotion expressed by those on the receiving end of it. At a personal level I have found that talking about emotions helps especially in the face of the ubiquitous ‘positive thinking’ brigade who would have us all believe that successful people do not feel negative emotions regardless of what is happening. The Lie Elizabeth had initially sympathised with my sadness about my impending deafness. One day however she asked why, having expressed positive sentiments both about deaf people and people with disabilities, I was saying I would probably be better off dead than deaf? Up until that conversation I was unaware of the contradictions between what I felt and what I was saying. I came to realise I was living a lie because I did not believe what I was telling myself; namely, that deaf people and people with disabilities are as good as other people. Far from believing this, what I really thought was that being deaf, or having a disability, did lessen one’s worth. It was an uncomfortable admission, particularly sharing it with someone sitting in a wheelchair, and especially as up until then I had always seen myself as a liberal thinker. Now, faced with the reality of becoming deaf, I had been hoist by my own petard, as I could not come to terms with the idea of myself as a deaf person. The Christian idea of looking after the ‘less fortunate’ was one I had been exposed to, but I had not realised the flip side of it, which is that the ‘less fortunate’ are also perceived as a ‘burden’ for those looking after them. It reminded me of my initial experiences years earlier at Nga Tapuwae when I came face to face with cultures I thought I had understood but did not. In both cases it was only when I got to know people that I began to question my own attitudes and assumptions and broadened my thinking. Unfortunately for deaf people, and people with disabilities, I have not been the only person lying to myself. These days it is not common for people to express their fears about deaf people or people with disabilities. People just press on without fully communicating or understanding the other person’s attitude or perspectives. When things then do not work out, these failures reinforce the misconceptions and these attitudes persist. I believe it is one of the main reasons why true community inclusion for deaf and people with disabilities is moving so slowly. Paying for access is another manifestation of this. Everyone is supportive of access in principle but there is continuous complaint about paying for things such as interpreting. The never-ending discussions between deaf people and the wealthy movie industry about providing more than token access to captioned cinema demonstrate that the inclusion lie is alive and well. Until it can be effectively addressed through genuine dialogue, deaf people, hard of hearing people and people with disabilities will always be largely relegated to life outside the mainstream. Collectively we will also continue to have to endure this double message that we are of equal value to the community while simultaneously being considered a financial burden if we try to access it in ways that are meaningful to us. Becoming Deaf In 2002 however all this thinking still lay ahead of me. I still had some hearing and was back living in New Zealand to be close to my family. My relationship had ended and I was a solo mother. My workplace had approved leave of absence, and so I still had my job to go back to in Melbourne if I wanted it. However, I suspected that I would soon need the second tumour removed because I was getting shooting pains down my face. When my fears were confirmed I could not decide whether to move back to Melbourne or let the job go, and risk having trouble finding one if I went back later. I initially chose to stay longer as my father was sick but eventually I decided Melbourne was where I wanted to be especially if I was deaf. I returned, found temporary employment, and right up to the second surgery I was able to work as I could make good use of the small amount of hearing I still had. I thought that I would still be able to cope when I was made fully deaf as a result of the surgery. It was, after all, only one notch down on the audiogram and I was already ‘profoundly deaf’ and still working. When I woke up after the surgery completely deaf, it felt anti-climactic. The world seemed exactly the same, just silent. At home where I was surrounded by my close family and friends everything initially seemed possible. However, when my family left, it was just my seven-year-old son and myself again, and on venturing back into the community, it quickly became clear to me that at some level my status had changed. Without any cues, I struggled to follow speech and few people wanted to write things down. Although my son was only seven, people communicated with him in preference to me. I felt as if we had changed roles: I was now the child and he was the adult. Worse was soon to follow when I tried to re-enter the workforce. When I had the surgery, the hospital had installed a gadget called an auditory brainstem implant, (ABI) which they said would help me hear. An ABI is similar to a cochlear implant but it is attached to the brainstem instead of the cochlear nerve. My cochlear nerve was removed. I hoped my ABI would enable me to hear enough to find work but, aside from clinical conditions in which there was no background noise and the staff knew how to assist, it did not work. My most humiliating moment with it came when it broke down mid job interview and I spent half the time left trying to get it going again in full view of the embarrassed interview panel, and the other half trying to maintain my composure whilst trying to lip-read the questions. The most crushing blow came from the library where I had happily worked for seven years at middle management level. This library was collaborating with another institution to set up a new library and they needed new staff. I hopefully applied for a job at the same level I had worked at prior to becoming deaf but was unsuccessful. When I asked for feedback, I was told that I was not seen as having the skills to work at that level. My lowest point came when I was refused a job unpacking boxes of books. I was told I did not have experience in this area even though, as any librarian will attest, unpacking boxes is part of any librarian’s work. When I could not find unskilled work, it occurred to me that possibly I would never work again. While this was unfolding, my young son and I went from being comfortable financially to impoverished. My ex-partner also decided he would now make childcare arrangements directly with my son as he was annoyed at being expected to write things down for me. My relationship with him, some family members, and my friends were all under strain at that time. I was lost. It also became clear that my son was not coping. Although he knew the rudiments of Auslan, it was not enough for us to communicate sufficiently. His behaviour at school deteriorated and one night he became so frustrated trying to talk to me that he started to pull out his own hair. I calmed him and asked him to write down for me what he was feeling and he wrote down ‘It is like you died. It is like I don’t have a Mum now’. It was now clear to me that although I still had my friends, nobody including myself knew what to do. I realised I had to find someone who could understand my situation and I knew now it had to be a Deaf person. Fortunately, by this stage I was back learning Auslan again at La Trobe University. The week after the conversation with my son, I told my Auslan teacher what had happened. To my relief she understood my situation immediately. She told me to bring my son to class, at no cost, and she would teach him herself. I did and my life started to turn around. My son took to Auslan with such speed and application that he was able to not only converse with her in one month but immediately started using Auslan with me at home to get the things he wanted. We were able to re-establish the mother/son relationship that we both needed. I was also able to help my son talk through and deal with all the changes that me becoming deaf had foisted upon him. He still uses Auslan to talk to me and supplements it using speech, copious finger spelling, notes and diagrams. More than anything else, this relationship has kept me anchored to my long-term goal of becoming a clear signer. Encouraged by my son’s success, I put all my energy into learning Auslan and enrolled in a full time TAFE Auslan course. I also joined a chat group called ‘Here to Hear’ (H2H). The perspectives in the group ranged from strongly oral to strongly Deaf but for me, trying to find a place to fit in any of it, it was invaluable. Almost daily I chatted with the group, asking questions and invariably someone responded. The group acted as a safety net and sounding board for me as I worked out the practicalities of living life deaf. The day of my fateful interview and the ABI humiliation, I came home so shaken that I used the Irish remedy of a couple of swigs of whisky, and then went online and posted an account of it all. I can still remember the collective indignation of the group and, as I read the responses, beginning to see the funny side of it . . . something I could not have done alone. I also made use of easy access to Deaf teachers at TAFE and used that to listen to them and ask advice on situations. I found out for example, that if I instructed my son to stand behind me when people in shops insisted on addressing him, they had no alternative but to talk to me; it was a good clear message to all concerned that my son was the child in this relationship. About this time, I discovered the Disability Discrimination Act (DDA) that Elizabeth Hastings had worked so hard on, filed my first DDA complaint, and received my first apology at the mediation session that followed. My personal life also improved, relationship by relationship as everyone adjusted. Slowly the ice melted in most of my relationships; some relationships faded and were replaced with new ones with signing people, and eventually hearing people again. My life moved forward. Through a member of ‘Here to Hear’, I was invited to apply for my first post deaf job—covering holiday leave at a Deaf sports organisation. I practically finger-spelt my way through the interview but not only did they offer me the job, they were delighted to have me. I was able to buy a few things with the money I earned, and suddenly it felt as if everything was possible again. This acceptance of me by Deaf people had a profound impact on me. I mixed with people more, and it was not too long before I was able to use my basic signing skills to use Auslan interpreters and re-enter the workplace. I have discovered over time that living in silence also has advantages—no more noisy parties or rubbish trucks clanging at dawn and in its place a vastly heightened visual awareness that I enjoy. Before I was deaf I thought it would be lonely in the silence but in fact many of life’s best moments—watching rain hit and then run down a window, swimming in the sea, cooking and being with good friends—do not rely upon sound at all; they feel the same way they always did. Sometimes I have felt somewhat of an outsider in the Deaf community. I have sometimes been taken aback by people’s abruptness but I have learned over time that being succinct is valued in Auslan, and some people like to come straight to the point. At crisis points, such as when I asked for help at the Victorian Deaf Society and my Auslan class, it has been a huge relief to talk to Deaf people and know immediately that they understand just from reading their eyes. Having access to an additional world of deaf people has made my life more enjoyable. I feel privileged to be associated with the Deaf community. I can recall a couple of Christmases ago making dinner for some signing friends and suddenly realising that, without noticing, everything had become alright in my world again. Everyone was signing really fast – something I still struggle with; but every now and then someone would stop and summarise so I felt included. It was really relaxed and simply felt like old times, just old times without the sound thrown in. Le Page and Tabouret-Keller, two ethnographers, have this to say about why people communicate the ways they do: The individual ... creates for himself the patterns of his linguistic behaviour so as to resemble those of the group or groups with which from time to time he wishes to be identified, or so as to be unlike those from whom he wishes to be distinguished ... . We see speech acts as acts of projection; the speaker is projecting his inner universe, implicitly with the invitation to others to share it ... he is seeking to reinforce his models of the world, and hopes for solidarity from those with whom he wishes to identify. (181) This quote neatly sums up why I choose to communicate the ways I do. I use Auslan and speech in different situations because I am connected to people in both groups and I want them in my life. I do not feel hugely different from anyone these days. If it is accepted that I have as much to contribute to the community as anyone else, becoming deaf has also meant for me that I expect to see other people treated well and accepted. For me that means contributing my time and thoughts, and advocating. It also means expecting a good level of access to interpreters, to some thought provoking captioned movies in English, and affordable assistive technologies so I can participate. I see this right to participate and engage in genuine dialogue with the rest of the community as central to the aspirations and identity of us all, regardless of who we are or where others think we belong. References Le Page, R.B., and Andree Tabouret-Keller. Acts of Identity: Creole-Based Approaches to Language and Ethnicity. London: Cambridge University Press, 1985. Moorhead, D. “Knowing Who I Am.” In S. Gregory, ed., Deaf Futures Revisited. Block 3, Unit 10, D251 Issues in Deafness. Open University, 1995.

APA, Harvard, Vancouver, ISO, and other styles

30

Burgess, Jean, and Axel Bruns. "Twitter Archives and the Challenges of "Big Social Data" for Media and Communication Research." M/C Journal 15, no.5 (October11, 2012). http://dx.doi.org/10.5204/mcj.561.

Full text

Abstract:

Lists and Social MediaLists have long been an ordering mechanism for computer-mediated social interaction. While far from being the first such mechanism, blogrolls offered an opportunity for bloggers to provide a list of their peers; the present generation of social media environments similarly provide lists of friends and followers. Where blogrolls and other earlier lists may have been user-generated, the social media lists of today are more likely to have been produced by the platforms themselves, and are of intrinsic value to the platform providers at least as much as to the users themselves; both Facebook and Twitter have highlighted the importance of their respective “social graphs” (their databases of user connections) as fundamental elements of their fledgling business models. This represents what Mejias describes as “nodocentrism,” which “renders all human interaction in terms of network dynamics (not just any network, but a digital network with a profit-driven infrastructure).”The communicative content of social media spaces is also frequently rendered in the form of lists. Famously, blogs are defined in the first place by their reverse-chronological listing of posts (Walker Rettberg), but the same is true for current social media platforms: Twitter, Facebook, and other social media platforms are inherently centred around an infinite, constantly updated and extended list of posts made by individual users and their connections.The concept of the list implies a certain degree of order, and the orderliness of content lists as provided through the latest generation of centralised social media platforms has also led to the development of more comprehensive and powerful, commercial as well as scholarly, research approaches to the study of social media. Using the example of Twitter, this article discusses the challenges of such “big data” research as it draws on the content lists provided by proprietary social media platforms.Twitter Archives for ResearchTwitter is a particularly useful source of social media data: using the Twitter API (the Application Programming Interface, which provides structured access to communication data in standardised formats) it is possible, with a little effort and sufficient technical resources, for researchers to gather very large archives of public tweets concerned with a particular topic, theme or event. Essentially, the API delivers very long lists of hundreds, thousands, or millions of tweets, and metadata about those tweets; such data can then be sliced, diced and visualised in a wide range of ways, in order to understand the dynamics of social media communication. Such research is frequently oriented around pre-existing research questions, but is typically conducted at unprecedented scale. The projects of media and communication researchers such as Papacharissi and de Fatima Oliveira, Wood and Baughman, or Lotan, et al.—to name just a handful of recent examples—rely fundamentally on Twitter datasets which now routinely comprise millions of tweets and associated metadata, collected according to a wide range of criteria. What is common to all such cases, however, is the need to make new methodological choices in the processing and analysis of such large datasets on mediated social interaction.Our own work is broadly concerned with understanding the role of social media in the contemporary media ecology, with a focus on the formation and dynamics of interest- and issues-based publics. We have mined and analysed large archives of Twitter data to understand contemporary crisis communication (Bruns et al), the role of social media in elections (Burgess and Bruns), and the nature of contemporary audience engagement with television entertainment and news media (Harrington, Highfield, and Bruns). Using a custom installation of the open source Twitter archiving tool yourTwapperkeeper, we capture and archive all the available tweets (and their associated metadata) containing a specified keyword (like “Olympics” or “dubstep”), name (Gillard, Bieber, Obama) or hashtag (#ausvotes, #royalwedding, #qldfloods). In their simplest form, such Twitter archives are commonly stored as delimited (e.g. comma- or tab-separated) text files, with each of the following values in a separate column: text: contents of the tweet itself, in 140 characters or less to_user_id: numerical ID of the tweet recipient (for @replies) from_user: screen name of the tweet sender id: numerical ID of the tweet itself from_user_id: numerical ID of the tweet sender iso_language_code: code (e.g. en, de, fr, ...) of the sender’s default language source: client software used to tweet (e.g. Web, Tweetdeck, ...) profile_image_url: URL of the tweet sender’s profile picture geo_type: format of the sender’s geographical coordinates geo_coordinates_0: first element of the geographical coordinates geo_coordinates_1: second element of the geographical coordinates created_at: tweet timestamp in human-readable format time: tweet timestamp as a numerical Unix timestampIn order to process the data, we typically run a number of our own scripts (written in the programming language Gawk) which manipulate or filter the records in various ways, and apply a series of temporal, qualitative and categorical metrics to the data, enabling us to discern patterns of activity over time, as well as to identify topics and themes, key actors, and the relations among them; in some circ*mstances we may also undertake further processes of filtering and close textual analysis of the content of the tweets. Network analysis (of the relationships among actors in a discussion; or among key themes) is undertaken using the open source application Gephi. While a detailed methodological discussion is beyond the scope of this article, further details and examples of our methods and tools for data analysis and visualisation, including copies of our Gawk scripts, are available on our comprehensive project website, Mapping Online Publics.In this article, we reflect on the technical, epistemological and political challenges of such uses of large-scale Twitter archives within media and communication studies research, positioning this work in the context of the phenomenon that Lev Manovich has called “big social data.” In doing so, we recognise that our empirical work on Twitter is concerned with a complex research site that is itself shaped by a complex range of human and non-human actors, within a dynamic, indeed volatile media ecology (Fuller), and using data collection and analysis methods that are in themselves deeply embedded in this ecology. “Big Social Data”As Manovich’s term implies, the Big Data paradigm has recently arrived in media, communication and cultural studies—significantly later than it did in the hard sciences, in more traditionally computational branches of social science, and perhaps even in the first wave of digital humanities research (which largely applied computational methods to pre-existing, historical “big data” corpora)—and this shift has been provoked in large part by the dramatic quantitative growth and apparently increased cultural importance of social media—hence, “big social data.” As Manovich puts it: For the first time, we can follow [the] imaginations, opinions, ideas, and feelings of hundreds of millions of people. We can see the images and the videos they create and comment on, monitor the conversations they are engaged in, read their blog posts and tweets, navigate their maps, listen to their track lists, and follow their trajectories in physical space. (Manovich 461) This moment has arrived in media, communication and cultural studies because of the increased scale of social media participation and the textual traces that this participation leaves behind—allowing researchers, equipped with digital tools and methods, to “study social and cultural processes and dynamics in new ways” (Manovich 461). However, and crucially for our purposes in this article, many of these scholarly possibilities would remain latent if it were not for the widespread availability of Open APIs for social software (including social media) platforms. APIs are technical specifications of how one software application should access another, thereby allowing the embedding or cross-publishing of social content across Websites (so that your tweets can appear in your Facebook timeline, for example), or allowing third-party developers to build additional applications on social media platforms (like the Twitter user ranking service Klout), while also allowing platform owners to impose de facto regulation on such third-party uses via the same code. While platform providers do not necessarily have scholarship in mind, the data access affordances of APIs are also available for research purposes. As Manovich notes, until very recently almost all truly “big data” approaches to social media research had been undertaken by computer scientists (464). But as part of a broader “computational turn” in the digital humanities (Berry), and because of the increased availability to non-specialists of data access and analysis tools, media, communication and cultural studies scholars are beginning to catch up. Many of the new, large-scale research projects examining the societal uses and impacts of social media—including our own—which have been initiated by various media, communication, and cultural studies research leaders around the world have begun their work by taking stock of, and often substantially extending through new development, the range of available tools and methods for data analysis. The research infrastructure developed by such projects, therefore, now reflects their own disciplinary backgrounds at least as much as it does the fundamental principles of computer science. In turn, such new and often experimental tools and methods necessarily also provoke new epistemological and methodological challenges. The Twitter API and Twitter ArchivesThe Open API was a key aspect of mid-2000s ideas about the value of the open Web and “Web 2.0” business models (O’Reilly), emphasising the open, cross-platform sharing of content as well as promoting innovation at the margins via third-party application development—and it was in this ideological environment that the microblogging service Twitter launched and experienced rapid growth in popularity among users and developers alike. As José van Dijck cogently argues, however, a complex interplay of technical, economic and social dynamics has seen Twitter shift from a relatively open, ad hoc and user-centred platform toward a more formalised media business: For Twitter, the shift from being primarily a conversational communication tool to being a global, ad-supported followers tool took place in a relatively short time span. This shift did not simply result from the owner’s choice for a distinct business model or from the company’s decision to change hardware features. Instead, the proliferation of Twitter as a tool has been a complex process in which technological adjustments are intricately intertwined with changes in user base, transformations of content and choices for revenue models. (van Dijck 343)The specifications of Twitter’s API, as well as the written guidelines for its use by developers (Twitter, “Developer Rules”) are an excellent example of these “technological adjustments” and the ways they are deeply interwined with Twitter’s search for a viable revenue model. These changes show how the apparent semantic openness or “interpretive flexibility” of the term “platform” allows its meaning to be reshaped over time as the business models of platform owners change (Gillespie).The release of the API was first announced on the Twitter blog in September 2006 (Stone), not long after the service’s launch but after some popular third-party applications (like a mashup of Twitter with Google Maps creating a dynamic display of recently posted tweets around the world) had already been developed. Since then Twitter has seen a flourishing of what the company itself referred to as the “Twitter ecosystem” (Twitter, “Developer Rules”), including third-party developed client software (like Twitterific and TweetDeck), institutional use cases (such as large-scale social media visualisations of the London Riots in The Guardian), and parasitic business models (including social media metrics services like HootSuite and Klout).While the history of Twitter’s API rules and related regulatory instruments (such as its Developer Rules of the Road and Terms of Use) has many twists and turns, there have been two particularly important recent controversies around data access and control. First, the company locked out developers and researchers from direct “firehose” (very high volume) access to the Twitter feed; this was accompanied by a crackdown on free and public Twitter archiving services like 140Kit and the Web version of Twapperkeeper (Sample), and coincided with the establishment of what was at the time a monopoly content licensing arrangement between Twitter and Gnip, a company which charges commercial rates for high-volume API access to tweets (and content from other social media platforms). A second wave of controversy among the developer community occurred in August 2012 in response to Twitter’s release of its latest API rules (Sippey), which introduce further, significant limits to API use and usability in certain circ*mstances. In essence, the result of these changes to the Twitter API rules, announced without meaningful consultation with the developer community which created the Twitter ecosystem, is a forced rebalancing of development activities: on the one hand, Twitter is explicitly seeking to “limit” (Sippey) the further development of API-based third-party tools which support “consumer engagement activities” (such as end-user clients), in order to boost the use of its own end-user interfaces; on the other hand, it aims to “encourage” the further development of “consumer analytics” and “business analytics” as well as “business engagement” tools. Implicit in these changes is a repositioning of Twitter users (increasingly as content consumers rather than active communicators), but also of commercial and academic researchers investigating the uses of Twitter (as providing a narrow range of existing Twitter “analytics” rather than engaging in a more comprehensive investigation both of how Twitter is used, and of how such uses continue to evolve). The changes represent an attempt by the company to cement a certain, commercially viable and valuable, vision of how Twitter should be used (and analysed), and to prevent or at least delay further evolution beyond this desired stage. Although such attempts to “freeze” development may well be in vain, given the considerable, documented role which the Twitter user base has historically played in exploring new and unforeseen uses of Twitter (Bruns), it undermines scholarly research efforts to examine actual Twitter uses at least temporarily—meaning that researchers are increasingly forced to invest time and resources in finding workarounds for the new restrictions imposed by the Twitter API.Technical, Political, and Epistemological IssuesIn their recent article “Critical Questions for Big Data,” danah boyd and Kate Crawford have drawn our attention to the limitations, politics and ethics of big data approaches in the social sciences more broadly, but also touching on social media as a particularly prevalent site of social datamining. In response, we offer the following complementary points specifically related to data-driven Twitter research relying on archives of tweets gathered using the Twitter API.First, somewhat differently from most digital humanities (where researchers often begin with a large pre-existing textual corpus), in the case of Twitter research we have no access to an original set of texts—we can access only what Twitter’s proprietary and frequently changing API will provide. The tools Twitter researchers use rely on various combinations of parts of the Twitter API—or, more accurately, the various Twitter APIs (particularly the Search and Streaming APIs). As discussed above, of course, in providing an API, Twitter is driven not by scholarly concerns but by an attempt to serve a range of potentially value-generating end-users—particularly those with whom Twitter can create business-to-business relationships, as in their recent exclusive partnership with NBC in covering the 2012 London Olympics.The following section from Twitter’s own developer FAQ highlights the potential conflicts between the business-case usage scenarios under which the APIs are provided and the actual uses to which they are often put by academic researchers or other dataminers:Twitter’s search is optimized to serve relevant tweets to end-users in response to direct, non-recurring queries such as #hashtags, URLs, domains, and keywords. The Search API (which also powers Twitter’s search widget) is an interface to this search engine. Our search service is not meant to be an exhaustive archive of public tweets and not all tweets are indexed or returned. Some results are refined to better combat spam and increase relevance. Due to capacity constraints, the index currently only covers about a week’s worth of tweets. (Twitter, “Frequently Asked Questions”)Because external researchers do not have access to the full, “raw” data, against which we could compare the retrieved archives which we use in our later analyses, and because our data access regimes rely so heavily on Twitter’s APIs—each with its technical quirks and limitations—it is impossible for us to say with any certainty that we are capturing a complete archive or even a “representative” sample (whatever “representative” might mean in a data-driven, textualist paradigm). In other words, the “lists” of tweets delivered to us on the basis of a keyword search are not necessarily complete; and there is no way of knowing how incomplete they are. The total yield of even the most robust capture system (using the Streaming API and not relying only on Search) depends on a number of variables: rate limiting, the filtering and spam-limiting functions of Twitter’s search algorithm, server outages and so on; further, because Twitter prohibits the sharing of data sets it is difficult to compare notes with other research teams.In terms of epistemology, too, the primary reliance on large datasets produces a new mode of scholarship in media, communication and cultural studies: what emerges is a form of data-driven research which tends towards abductive reasoning; in doing so, it highlights tensions between the traditional research questions in discourse or text-based disciplines like media and communication studies, and the assumptions and modes of pattern recognition that are required when working from the “inside out” of a corpus, rather than from the outside in (for an extended discussion of these epistemological issues in the digital humanities more generally, see Dixon).Finally, even the heuristics of our analyses of Twitter datasets are mediated by the API: the datapoints that are hardwired into the data naturally become the most salient, further shaping the type of analysis that can be done. For example, a common process in our research is to use the syntax of tweets to categorise it as one of the following types of activity: original tweets: tweets which are neither @reply nor retweetretweets: tweets which contain RT @user… (or similar) unedited retweets: retweets which start with RT @user… edited retweets: retweets do not start with RT @user…genuine @replies: tweets which contain @user, but are not retweetsURL sharing: tweets which contain URLs(Retweets which are made using the Twitter “retweet button,” resulting in verbatim passing-along without the RT @user syntax or an opportunity to add further comment during the retweet process, form yet another category, which cannot be tracked particularly effectively using the Twitter API.)These categories are driven by the textual and technical markers of specific kinds of interactions that are built into the syntax of Twitter itself (@replies or @mentions, RTs); and specific modes of referentiality (URLs). All of them focus on (and thereby tend to privilege) more informational modes of communication, rather than the ephemeral, affective, or ambiently intimate uses of Twitter that can be illuminated more easily using ethnographic approaches: approaches that can actually focus on the individual user, their social contexts, and the broader cultural context of the traces they leave on Twitter. ConclusionsIn this article we have described and reflected on some of the sociotechnical, political and economic aspects of the lists of tweets—the structured Twitter data upon which our research relies—which may be gathered using the Twitter API. As we have argued elsewhere (Bruns and Burgess)—and, hopefully, have begun to demonstrate in this paper—media and communication studies scholars who are actually engaged in using computational methods are well-positioned to contribute to both the methodological advances we highlight at the beginning of this paper and the political debates around computational methods in the “big social data” moment on which the discussion in the second part of the paper focusses. One pressing issue in the area of methodology is to build on current advances to bring together large-scale datamining approaches with ethnographic and other qualitative approaches, especially including close textual analysis. More broadly, in engaging with the “big social data” moment there is a pressing need for the development of code literacy in media, communication and cultural studies. In the first place, such literacy has important instrumental uses: as Manovich argues, much big data research in the humanities requires costly and time-consuming (and sometimes alienating) partnerships with technical experts (typically, computer scientists), because the free tools available to non-programmers are still limited in utility in comparison to what can be achieved using raw data and original code (Manovich, 472).But code literacy is also a requirement of scholarly rigour in the context of what David Berry calls the “computational turn,” representing a “third wave” of Digital Humanities. Berry suggests code and software might increasingly become in themselves objects of, and not only tools for, research: I suggest that we introduce a humanistic approach to the subject of computer code, paying attention to the wider aspects of code and software, and connecting them to the materiality of this growing digital world. With this in mind, the question of code becomes increasingly important for understanding in the digital humanities, and serves as a condition of possibility for the many new computational forms that mediate our experience of contemporary culture and society. (Berry 17)A first step here lies in developing a more robust working knowledge of the conceptual models and methodological priorities assumed by the workings of both the tools and the sources we use for “big social data” research. Understanding how something like the Twitter API mediates the cultures of use of the platform, as well as reflexively engaging with its mediating role in data-driven Twitter research, promotes a much more materialist critical understanding of the politics of the social media platforms (Gillespie) that are now such powerful actors in the media ecology. ReferencesBerry, David M. “Introduction: Understanding Digital Humanities.” Understanding Digital Humanities. Ed. David M. Berry. London: Palgrave Macmillan, 2012. 1-20.boyd, danah, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662-79.Bruns, Axel. “Ad Hoc Innovation by Users of Social Networks: The Case of Twitter.” ZSI Discussion Paper 16 (2012). 18 Sep. 2012 ‹https://www.zsi.at/object/publication/2186›.Bruns, Axel, and Jean Burgess. “Notes towards the Scientific Study of Public Communication on Twitter.” Keynote presented at the Conference on Science and the Internet, Düsseldorf, 4 Aug. 2012. 18 Sep. 2012 http://snurb.info/files/2012/Notes%20towards%20the%20Scientific%20Study%20of%20Public%20Communication%20on%20Twitter.pdfBruns, Axel, Jean Burgess, Kate Crawford, and Frances Shaw. “#qldfloods and @QPSMedia: Crisis Communication on Twitter in the 2011 South East Queensland Floods.” Brisbane: ARC Centre of Excellence for Creative Industries and Innovation, 2012. 18 Sep. 2012 ‹http://cci.edu.au/floodsreport.pdf›Burgess, Jean E. & Bruns, Axel (2012) “(Not) the Twitter Election: The Dynamics of the #ausvotes Conversation in Relation to the Australian Media Ecology.” Journalism Practice 6.3 (2012): 384-402Dixon, Dan. “Analysis Tool Or Research Methodology: Is There an Epistemology for Patterns?” Understanding Digital Humanities. Ed. David M. Berry. London: Palgrave Macmillan, 2012. 191-209.Fuller, Matthew. Media Ecologies: Materialist Energies in Art and Technoculture. Cambridge, Mass.: MIT P, 2005.Gillespie, Tarleton. “The Politics of ‘Platforms’.” New Media & Society 12.3 (2010): 347-64.Harrington, Stephen, Highfield, Timothy J., & Bruns, Axel (2012) “More than a Backchannel: Twitter and Television.” Ed. José Manuel Noguera. Audience Interactivity and Participation. COST Action ISO906 Transforming Audiences, Transforming Societies, Brussels, Belgium, pp. 13-17. 18 Sept. 2012 http://www.cost-transforming-audiences.eu/system/files/essays-and-interview-essays-18-06-12.pdfLotan, Gilad, Erhardt Graeff, Mike Ananny, Devin Gaffney, Ian Pearce, and danah boyd. “The Arab Spring: The Revolutions Were Tweeted: Information Flows during the 2011 Tunisian and Egyptian Revolutions.” International Journal of Communication 5 (2011): 1375-1405. 18 Sep. 2012 ‹http://ijoc.org/ojs/index.php/ijoc/article/view/1246/613›.Manovich, Lev. “Trending: The Promises and the Challenges of Big Social Data.” Debates in the Digital Humanities. Ed. Matthew K. Gold. Minneapolis: U of Minnesota P, 2012. 460-75.Mejias, Ulises A. “Liberation Technology and the Arab Spring: From Utopia to Atopia and Beyond.” Fibreculture Journal 20 (2012). 18 Sep. 2012 ‹http://twenty.fibreculturejournal.org/2012/06/20/fcj-147-liberation-technology-and-the-arab-spring-from-utopia-to-atopia-and-beyond/›.O’Reilly, Tim. “What is Web 2.0? Design Patterns and Business Models for the Next Generation of Software.” O’Reilly Network 30 Sep. 2005. 18 Sep. 2012 ‹http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html›.Papacharissi, Zizi, and Maria de Fatima Oliveira. “Affective News and Networked Publics: The Rhythms of News Storytelling on #Egypt.” Journal of Communication 62.2 (2012): 266-82.Sample, Mark. “The End of Twapperkeeper (and What to Do about It).” ProfHacker. The Chronicle of Higher Education 8 Mar. 2011. 18 Sep. 2012 ‹http://chronicle.com/blogs/profhacker/the-end-of-twapperkeeper-and-what-to-do-about-it/31582›.Sippey, Michael. “Changes Coming in Version 1.1 of the Twitter API.” 16 Aug. 2012. Twitter Developers Blog. 18 Sep. 2012 ‹https://dev.Twitter.com/blog/changes-coming-to-Twitter-api›.Stone, Biz. “Introducing the Twitter API.” Twitter Blog 20 Sep. 2006. 18 Sep. 2012 ‹http://blog.Twitter.com/2006/09/introducing-Twitter-api.html›.Twitter. “Developer Rules of the Road.” Twitter Developers Website 17 May 2012. 18 Sep. 2012 ‹https://dev.Twitter.com/terms/api-terms›.Twitter. “Frequently Asked Questions.” 18 Sep. 2012 ‹https://dev.twitter.com/docs/faq›.Van Dijck, José. “Tracing Twitter: The Rise of a Microblogging Platform.” International Journal of Media and Cultural Politics 7.3 (2011): 333-48.Walker Rettberg, Jill. Blogging. Cambridge: Polity, 2008.Wood, Megan M., and Linda Baughman. “Glee Fandom and Twitter: Something New, or More of the Same Old Thing?” Communication Studies 63.3 (2012): 328-44.

APA, Harvard, Vancouver, ISO, and other styles

We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography
Journal articles: 'Meaningful offers (affordance)' – Grafiati (2024)
Top Articles
Did They Nerf Aim Assist in Halo Infinite?
Super Motherload Ps3 Iso Download
Durr Burger Inflatable
55Th And Kedzie Elite Staffing
Pet For Sale Craigslist
Craigslist Cars Augusta Ga
Tyson Employee Paperless
Mrh Forum
Obor Guide Osrs
The Daily News Leader from Staunton, Virginia
Arkansas Gazette Sudoku
Martha's Vineyard Ferry Schedules 2024
How to know if a financial advisor is good?
Noaa Swell Forecast
2022 Apple Trade P36
J Prince Steps Over Takeoff
Bed Bath And Body Works Hiring
Nonuclub
Connexus Outage Map
Best Food Near Detroit Airport
Craigslist Farm And Garden Cincinnati Ohio
Itziar Atienza Bikini
Lawson Uhs
Delaware Skip The Games
Robin D Bullock Family Photos
Jeff Now Phone Number
ABCproxy | World-Leading Provider of Residential IP Proxies
Menards Eau Claire Weekly Ad
Popular Chinese Restaurant in Rome Closing After 37 Years
Unionjobsclearinghouse
How to Grow and Care for Four O'Clock Plants
Dtlr Duke St
Www Craigslist Madison Wi
The Creator Showtimes Near R/C Gateway Theater 8
Miles City Montana Craigslist
Wku Lpn To Rn
In hunt for cartel hitmen, Texas Ranger's biggest obstacle may be the border itself (2024)
Word Trip Level 359
THE 10 BEST Yoga Retreats in Konstanz for September 2024
Kvoa Tv Schedule
Ksu Sturgis Library
Gary Lezak Annual Salary
Final Fantasy 7 Remake Nexus
Gt500 Forums
Craigslist Freeport Illinois
Live Delta Flight Status - FlightAware
Umd Men's Basketball Duluth
Lucyave Boutique Reviews
Noga Funeral Home Obituaries
Christie Ileto Wedding
Used Sawmill For Sale - Craigslist Near Tennessee
Who We Are at Curt Landry Ministries
Latest Posts
Article information

Author: Carlyn Walter

Last Updated:

Views: 6521

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.