Journal articles: 'COMPUTERS / Networking / Vendor Specific' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / COMPUTERS / Networking / Vendor Specific / Journal articles

To see the other types of publications on this topic, follow the link: COMPUTERS / Networking / Vendor Specific.

Author: Grafiati

Published: 4 June 2021

Last updated: 17 February 2022

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 22 journal articles for your research on the topic 'COMPUTERS / Networking / Vendor Specific.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Manzanares-Lopez, Pilar, Juan Pedro Muñoz-Gea, and Josemaria Malgosa-Sanahuja. "P4-KBR: A Key-Based Routing System for P4-Programmable Networks." Electronics 10, no.13 (June25, 2021): 1543. http://dx.doi.org/10.3390/electronics10131543.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Software-defined networking (SDN) architecture has provided well-known advantages in terms of network programmability, initially offering a standard, open, and vendor-agnostic interface (e.g., OpenFlow) to instruct the forwarding behavior of network devices from different vendors. However, in the last few years, data plane programmability has emerged as a promising approach to extend the network management allowing the definition and programming of customized and non-standardized protocols, as well as specific packet processing pipelines. In this paper, we propose an in-network key-based routing protocol called P4-KBR, in which end-points (hosts, contents or services) are identified by virtual identifiers (keys) instead of IP addresses, and where P4 network elements are programmed to be able to route the packets adequately. The proposal was implemented and evaluated using bmv2 P4 switches, verifying how data plane programmability offers a powerful tool to overcome continuing challenges that appear in SDN networks.

2

Szyrkowiec, Thomas, Achim Autenrieth, and Wolfgang Kellerer. "Optical Network Models and Their Application to Software-Defined Network Management." International Journal of Optics 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5150219.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Software-defined networking is finding its way into optical networks. Here, it promises a simplification and unification of network management for optical networks allowing automation of operational tasks despite the highly diverse and vendor-specific commercial systems and the complexity and analog nature of optical transmission. Common abstractions and interfaces are a fundamental component for software-defined optical networking. Currently, a number of models for optical networks are available. They all claim to provide open and vendor agnostic management of optical equipment. In this work, we survey and compare the most important models and propose an intent interface for creating virtual topologies which is integrated in the existing model ecosystem.

3

Ostrowski, Piotr, Stanislaw Wrycza, Damian Gajda, and Bartosz Marcinkowski. "Decision Factors behind Cisco Networking Hardware Acceptance in Business Environments." Journal of Theoretical and Applied Electronic Commerce Research 16, no.4 (March23, 2021): 1097–119. http://dx.doi.org/10.3390/jtaer16040062.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Networking hardware might be considered a relatively unexposed enabler of the enormous success of the modern digital economy, and information technology of a global reach. The COVID-19 traffic spike across e-commerce portals puts further pressure on computer network component vendors and raises the bar regarding both performance and reliability. Therefore, the authors undertake a challenge of identifying factors influencing the level of Cisco switches acceptance among network administrators in business environments. To achieve that, Structural Equation Modelling is introduced. The feedback gathered from 205 study contributors enabled the authors to evaluate the significance of two domain-specific factors—Technological Innovation (TI) and Availability of Professional Training (APT). The APT was confirmed to have a significant impact on networking hardware acceptance. The study contributes to extending the decision-making rationale regarding the procurement of networking switches and shows the added value of technology-oriented professional training for job satisfaction and working efficiency.

Lee,DanielB., Jessica Goede, and Rebecca Shryock. "Clicking for friendship: social network sites and the medium of personhood." MedieKultur: Journal of media and communication research 26, no.49 (November26, 2010): 14. http://dx.doi.org/10.7146/mediekultur.v26i49.2585.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Social networking sites such as MySpace and Facebook depend on familiar social resources, including language, reading/writing and established semantic constructs such as personhood, privacy and friends. However, the use of computers, the Web 2.0 platform, and the latest networking software are revolutionising how “personhood” and “friendship” are produced by communication. We refer to the media theory of Niklas Luhmann to identify specific differences in how communication is organised and reproduced on networking sites. The electronic medium appears to be changing the way participants selectively construct and bind expectations of personhood and communicative ties to themselves and others. Using software available on the Web, users confront each other as digital bodies, as participants in communication, available for friendship within a new “ether of interactivity”.

5

Semong, Thabo, Thabiso Maupong, Stephen Anokye, Kefalotse Kehulakae, Setso Dimakatso, Gabanthone Boipelo, and Seth Sarefo. "Intelligent Load Balancing Techniques in Software Defined Networks: A Survey." Electronics 9, no.7 (July3, 2020): 1091. http://dx.doi.org/10.3390/electronics9071091.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In the current technology driven era, the use of devices that connect to the internet has increased significantly. Consequently, there has been a significant increase in internet traffic. Some of the challenges that arise from the increased traffic include, but are not limited to, multiple clients on a single server (which can result in denial of service (DoS)), difficulty in network scalability, and poor service availability. One of the solutions proposed in literature, to mitigate these, is the use of multiple servers with a load balancer. Despite their common use, load balancers, have shown to have some disadvantages, like being vendor specific and non-programmable. To address these disadvantages and improve internet traffic, there has been a paradigm shift which resulted in the introduction of software defined networking (SDN). SDN allows for load balancers that are programmable and provides the flexibility for one to design and implement own load balancing strategies. In this survey, we highlight the key elements of SDN and OpenFlow technology and their effect on load balancing. We provide an overview of the various load balancing schemes in SDN. The overview is based on research challenges, existing solutions, and we give possible future research directions. A summary of emulators/mathematical tools commonly used in the design of intelligent load balancing SDN algorithms is provided. Finally, we outline the performance metrics used to evaluate the algorithms.

6

Goyal, Dushyant. "Ezycart: Multivendor E-Commerce Website." International Journal for Research in Applied Science and Engineering Technology 9, no.8 (August31, 2021): 2867–69. http://dx.doi.org/10.22214/ijraset.2021.37176.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract: Due to the Pandemic, we saw a rise in the use of online or digital resources. Since the lockdown was imposed, thus day to day commute was affected severely. The vendors and markets that relied on customers this commute were severely affected. Thus, it saw the necessity to shift the business to online platforms like Amazon, Snapdeal, etc. From these experiences, the idea of Ezycart came into play, with a motive to boost the online infrastructure of E-Commerce specific to the needs and demands of the population of our country (India), easy-to-use, secure, and user-friendly Multi-vendor Website helping connect the local vendors and shops with the consumer and providing on-demand good and services. The objective of this project is to develop a general-purpose e-commerce store where any product can be bought from the comfort of home through the Internet. Unlike traditional commerce that is carried out physically with the effort of a person to go & get products, eCommerce has made it easier for humans to reduce physical work and to save time. E-Commerce which was started in the early 1990s has taken a great leap in the world of computers, but the fact that has hindered the growth of ecommerce is security. Security is the challenge facing e-commerce today & there is still a lot of advancement made in the field of security.

7

Romanov, Oleksandr, Ivan Saychenko, Anton Marinov, and Serhii Skolets. "RESEARCH OF SDN NETWORK PERFORMANCE PARAMETERS USING MININET NETWORK EMULATOR." Information and Telecommunication Sciences, no.1 (June29, 2021): 24–32. http://dx.doi.org/10.20535/2411-2976.12021.24-32.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background. The implementation of the new modern services on existing networks requires replacement or modernization of the old equipment. This negatively affects the efficiency of providing users with new types of services and their cost. Therefore, the issues/tasks of implementing SDN technology in the construction of networks are in the center of attention of representatives of science-research organizations and telecom operators. SDN networks have the advantages of flexible scaling of the system without replacing existing server and network equipment, eliminating operator dependence on specific vendor solutions, and rapid implementation of the new network technologies and services. To determine the numerical values of indicators of the functioning of SDN networks and check their compliance with the requirements, it is proposed to use in working process simulation modelling. For these goals, the Open Networking Foundation consortium developed the Mininet network emulator, the elements of that are published publicly. The formation of the simulation model and the procedure for determining the performance indicators of the SDN network that uses Mininet has a number of features that are considered in the work. Objective. The purpose of the article is to build a simulation model based on the Mininet network emulator and to determine the performance indicators of SDN networks of various structures/topologies. Methods. Creation of a SDN network segment for testing process of its functioning in the overload mode of various communication routes. Results. The Mininet network emulator allows simulating SDN networks of a rather complex structure, change the performance of network branches and the amount of load in communication routes, to create a network-wide overload mode. During the simulation, it is possible to determine a number of indicators of network performance, such as the RTT (Round Trip Time) parameter for each route of communication, the bandwidth of branches and routes of communication, the amount of delay on network elements, loading of OpenFlow Switch ports/interfaces, network elements with the highest delay, the number of served and lost packets. Conclusions. Use of the Mininet network emulator is a fairly convenient tool for determining the performance indicators of SDN networks. However, there are also some problems. First of all, setting up the system's operability requires writing programs to ensure the interaction among standard elements from the Mininet library. Secondone, is when congestion occurs in the communication routes, the Floodlight Controller does not automatically balance traffic along the work-around route. This task has to be solved manually by making changes to the OpenFlow Switch routing tables. Keywords: Software Defined Networking; SDN; Mininet; OpenFlow; Floodlight Controller; OpenFlowSwitch; NFV; virtualization.

8

Sreemongkol, Kiatirat, Manoj Lohatepanont, Pannee Cheewinsiriwat, TanyalukO.Bunlikitkul, and Jirapong Supasaovapak. "GIS Mapping Evaluation of Stroke Service Areas in Bangkok Using Emergency Medical Services." ISPRS International Journal of Geo-Information 10, no.10 (September27, 2021): 651. http://dx.doi.org/10.3390/ijgi10100651.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Stroke is a major cause of death in Thailand. It requires a specific time period of 4.5 h from onset to treatment to increase recovery rates, and therefore, it can be categorized as a time-sensitive disease. The objective of this research is to identify whether the service areas of the main existing Emergency Medical Services (EMS) prehospital stroke practices cover all areas in Bangkok. This is determined by using GIS mapping. After verifying the current EMS delivery models, comparisons are drawn to find the travelling time of each model. The conditioning factors for GIS mapping were collected and verified, including the traffic speed and duration spent in each mode of the prehospital stroke process. After inputting all of the data into GIS, the service areas were visualized to show the area serviced in each delivery model. The results also show the different hospital groups, including the service areas for (1) non-network hospitals and (2) hospitals with stroke networks. Suggestions for re-networking and adding more hospitals to the existing networks were also identified using GIS. Regularly updating the service area with up-to-date data in GIS is key to improving stroke service areas.

9

"Vulnerability of SDN Network Architecture and Proposed Countermeasures on Enhancing Security." International Journal of Recent Technology and Engineering 8, no.4 (November30, 2019): 7197–201. http://dx.doi.org/10.35940/ijrte.d5266.118419.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The current problems raising as a horizon in the computational and networking sector is based on the unimaginable increase of high numbers of users which in turn results in high data traffic, limitations over products which are vendor specific, incurring high expenses in maintaining the existing network. This dilutes a major part of the beneficiaries in the sector to move towards Cloud Networks. All these happenings in the past has quietly increased the risks and challenges in the aspect of security considering both data and the infrastructure accommodating the data. In an attempt to address almost a major portion of the existing above said problems, Software Defined Networking was highly anticipated, however, it was considered as a theoretical approach. After the implementation of SDN networks by industrial giants like Google, the SDN concepts again managed to reach the safer hands of the researchers in the movement of enhancement. A very rapid and high speed research work has been initiated by researchers all around the globe in analysing the risk factors and implementation barricades stated in the Software Defined Networking architecture. The research work focus on adding values to the Quality of Service, Latency, Load Balancing and most importantly the security aspects in various metrics of the Software Defined Networking Architecture. The odd man out architecture of Software Defined Networking by decoupling data and control plane allows the network to be configured and maintained in a real time scenario pertaining to pose a complete view of the network and its flow. The fact that is considered as an advantage itself is a factor of question in the case of security in the overall SDN architecture. This paper focuses on a detailed view of SDN architecture with the existing security feature and continues with the expected threats and classifying the weak points in the SDN. This paper also briefs about the pros and cons of the existing applications in the SDN architecture.

10

Verma, Deepak, and Prem Prakash Dewani. "eWOM credibility: a comprehensive framework and literature review." Online Information Review ahead-of-print, ahead-of-print (December22, 2020). http://dx.doi.org/10.1108/oir-06-2020-0263.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

PurposeThe purpose of this paper is to provide a comprehensive review on electronic word-of-mouth (eWOM) credibility. Further, the authors propose a comprehensive and integrated model on eWOM credibility.Design/methodology/approachThe authors conducted a systematic review of the extant literature on marketing, sociology and psychology to identify the factors that affect eWOM credibility. Further, the authors developed themes and identified factors which lead to eWOM credibility.FindingsFour factors were identified, i.e. content, communicator, context and consumer, which affect eWOM credibility. Several variables associated with these four factors were identified, which result in eWOM credibility. Further, the authors developed 22 propositions to explain the causal relationship between these variables and eWOM credibility.Research limitations/implicationsThe conceptual model needs empirical validation across various eWOM platforms, i.e. social networking websites, e-commerce websites, etc.Practical implicationsManagers and e-commerce vendors can use these inputs to develop specific design elements and assessment tools which can help consumers to identify credible eWOM messages. Credible eWOM messages, in turn, will increase the “trust” and “loyalty” of the customers on e-commerce vendors.Originality/valueThis paper provides a conclusive takeaway of eWOM credibility literature by integrating multiple perspectives and arguments from the extant literature. This study also presents an integrated model, which provides a theoretical framework for researchers to further examine the interaction effect of various variables, which results in eWOM credibility.Peer reviewThe peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-06-2020-0263

11

"An Automated Testing Method for PXI Chassis Software Driver." International Journal of Innovative Technology and Exploring Engineering 8, no.11 (September10, 2019): 4064–71. http://dx.doi.org/10.35940/ijitee.k1548.0881119.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

PCI extensions for instrumentation (PXI) chassis is a multi-vendor interoperable device. It can interconnect with many chassis, module and computers. To make sure a device driver is able to function in a specific configuration, it must go through a series of tests. The complexity of PXI software testing has increased when it needs to cover multiple configurations for a single driver. Majority of the automated test systems will execute tests without having the mechanism to verify the test environment. To improve the PXI chassis driver test duration, the current trend of automated software testing only executes a single test configuration. Thus, an automated test software with the capability to execute multi-test configuration is required. In order to develop this tool, a server-client concept is adopted. The advantage of server-client is to centralize the testing when multiple tests are performed. The software tool client will start once it is booted into the operating system; the test system will connect to server and wait for further action from server. When server detects incoming client connection, it will automatically verify and fix the testing environment; if the client fulfills the test suite requirement it will start to execute the test system. All client test summary results will be updated to the server. The results show an average of 17.1% test duration reduction on the planned test configuration when the automated software tool is applied on testing. Besides, the results indicate higher controller hardware performance can reduce the test duration.

12

Kay, Robin Holding, and Sharon Lauricella. "Investigating the Benefits and Challenges of Using Laptop Computers in Higher Education Classrooms / Étude sur les avantages et les défis associés à l'utilisation d'ordinateurs portables dans les salles de classe d'enseignement supérieur." Canadian Journal of Learning and Technology / La revue canadienne de l’apprentissage et de la technologie 40, no.2 (May9, 2014). http://dx.doi.org/10.21432/t2vc76.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The purpose of this study was to investigate the benefits and challenges using laptop computers (hereafter referred to as laptops) inside and outside higher education classrooms. Quantitative and qualitative data were collected from 156 university students (54 males, 102 females) enrolled in either education or communication studies. Benefits of using laptops in class were active note taking, particularly when instructors provided materials ahead of time, searching for academic resources, use of subject-specific software, communicating and sharing information with peers, and engaging with online interactive tools. Challenges of using laptops inside the class included surfing the web for personal reasons, social networking with peers and, to a lesser extent, entertainment in the form of watching video podcasts or playing games. Benefits were reported far more often than challenges inside the classroom. Benefits of using laptops outside of class included collaboration with peers, increased productivity, and conducting research. Challenges of using laptops outside of class included surfing the web for personal reasons, social networking, and entertainment. Benefits and challenges were reported equally often outside the classroom. More research needs to be conducted on the extent to which distractions impede learning and productivity inside and outside the class. Cette étude avait pour but d’examiner les avantages et les défis associés à l'utilisation d’ordinateurs portables à l'intérieur et à l'extérieur des salles de classe d’enseignement supérieur. Des données quantitatives et qualitatives ont été recueillies auprès de 156 étudiants universitaires (54 hommes, 102 femmes) inscrits dans des programmes d’éducation ou de communication. Les avantages de l'utilisation d’ordinateurs portables en classe incluaient la prise active de notes, en particulier lorsque les instructeurs fournissaient la documentation à l'avance, la recherche de ressources universitaires, l'utilisation de logiciels spécifiques, la communication et le partage d’informations entre pairs, ainsi que l’utilisation active d’outils interactifs en ligne. Les défis incluaient le fait que les étudiants naviguent sur le web pour des raisons personnelles, utilisent les réseaux sociaux avec des pairs et, dans une moindre mesure, se divertissent en regardant des podcasts ou en jouant à des jeux vidéo. Les avantages ont été beaucoup plus souvent signalés que les défis. Les bénéfices de l'utilisation d’ordinateurs portables en dehors des cours incluaient la collaboration entre les pairs, une productivité accrue et la recherche en ligne. Les défis de l'utilisation d’ordinateurs portables en dehors des cours comprennent le fait que les étudiants naviguent sur le web pour des raisons personnelles, utilisent les réseaux sociaux et se divertissent. Dans le cas de l’utilisation des portables en dehors des salles de classe, les avantages et défis ont été signalés de manière égale. Des recherches supplémentaires doivent être menées pour déterminer dans quelle mesure les distractions entravent l'apprentissage et la productivité à l'intérieur et à l'extérieur de la salle de classe.

13

Joshi, Jagdish, Rajani Suthar, and Jill Joshi. "A STUDY OF IMPACT OF E-COMMUNICATION ON WRITTEN ENGLISH PRACTICED BY UNDERGRADUATE STUDENTS." Towards Excellence, September30, 2020, 11–26. http://dx.doi.org/10.37867/te120402.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In present time, the phenomenon of ‘globalization’ has been largely possible due to increased popularity of e-communication and digitization of information. Additionally, the ready availability of computers and internet has contributed in ‘linking’ the world together into a single whole. It has transformed human life and environment; and has fulfilled the innate human desire for speed. And by using various e-tools, such as emails, social networking sites, mobiles, blogs and others, fast paced communication has been made possible. Consequently, the modern scenario of communication has changed forever. It has helped in improving the standard of living and has enabled faster, clearer and more accurate outcome to the designated tasks. The young generation is increasing moving towards using the e-mode for communication. The youth of India are becoming more and more techno friendly. They use e-tools like smart phones, laptops, tablets etc. excessively for interaction and communication. Moreover, use by doing research on the above mentioned topic the researchers wish to get an insight into an extremely current topic, namely, the connection between use of e-communication and the change in the method of communication and language, specifically written English, due to its wide-spread use. In order to make the research more pointed, the researcher has decided to study a specific target group of youngsters, namely, undergraduate students and evaluate their writing pattern. By carrying out research in the proposed topic, the researchers attempt to analyze the impact of e-mode on the English language.Moreover, they wish to specifically investigate the kind of impact e-communication has had on written English of these students: Whether it actually has had an impact or not; and to what extent it has transformed the English used by them or is it the other way around?

14

"Reading & Writing." Language Teaching 38, no.4 (October 2005): 216–29. http://dx.doi.org/10.1017/s0261444805253144.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

05–486Balnaves, Edmund (U of Sydney, Australia; ejb@it.usyd.edu.au), Systematic approaches to long term digital collection management. Literary and Linguistic Computing (Oxford, UK) 20.4 (2005), 399–413.05–487Barwell, Graham (U of Wollongong, Australia; gbarwell@uow.edu.au), Original, authentic, copy: conceptual issues in digital texts. Literary and Linguistic Computing (Oxford, UK) 20.4 (2005), 415–424.05–488Beech, John R. & Kate A. Mayall (U of Leicester, UK; JRB@Leicester.ac.uk), The word shape hypothesis re-examined: evidence for an external feature advantage in visual word recognition. Journal of Research in Reading (Oxford, UK) 28.3 (2005), 302–319.05–489Belcher, Diane (Georgia State U, USA; dbelcher1@gsu.edu) & Alan Hirvela, Writing the qualitative dissertation: what motivates and sustains commitment to a fuzzy genre?Journal of English for Academic Purposes (Amsterdam, the Netherlands) 4.3 (2005), 187–205.05–490Bernhardt, Elisabeth (U of Minnesota, USA; ebernhar@stanford.edu), Progress and procrastination in second language reading. Annual Review of Applied Linguistics (Cambridge, UK) 25 (2005), 133–150.05–491Bishop, Dorothy (U of Oxford, UK; dorothy.bishop@psy.ox.ac.uk), Caroline Adams, Annukka Lehtonen & Stuart Rosen, Effectiveness of computerised spelling training in children with language impairments: a comparison of modified and unmodified speech input. Journal of Research in Reading (Oxford, UK) 28.2 (2005), 144–157.05–492Bowey, Judith A., Michaela McGuigan & Annette Ruschena (U of Queensland, Australia; j.bowey@psy.uq.edu.au), On the association between serial naming speed for letters and digits and word-reading skill: towards a developmental account. Journal of Research in Reading (Oxford, UK) 28.4 (2005), 400–422.05–493Bowyer-Crane, Claudine & Margaret J. Snowling (U of York, UK; c.crane@psych.york.ac.uk), Assessing children's inference generation: what do tests of reading comprehension measure?British Journal of Educational Psychology (Leicester, UK) 75.2 (2005), 189–201.05–494Bruce, Ian (U of Waikato, Hamilton, New Zealand; ibruce@waikato.ac.nz), Syllabus design for general EAP writing courses: a cognitive approach. Journal of English for Academic Purposes (Amsterdam, the Netherlands) 4.3 (2005), 239–256.05–495Burrows, John (U of Newcastle, Australia; john.burrows@netcentral.com.au), Who wroteShamela? Verifying the authorship of a parodic text. Literary and Linguistic Computing (Oxford, UK) 20.4 (2005), 437–450.05–496Clarke, Paula, Charles Hulme & Margaret Snowling (U of York, UK; CH1@york.ac.uk), Individual differences in RAN and reading: a response timing analysis. Journal of Research in Reading (Oxford, UK) 28.2 (2005), 73–86.05–497Colledge, Marion (Metropolitan U, London, UK; m.colledge@londonmet.ac.uk), Baby Bear or Mrs Bear? Young English Bengali-speaking children's responses to narrative picture books at school. Literacy (Oxford, UK) 39.1 (2005), 24–30.05–498De Pew, Kevin Eric (Old Dominion U, Norfolk, USA; Kdepew@odu.edu) & Susan Kay Miller, Studying L2 writers' digital writing: an argument for post-critical methods. Computers and Composition (Amsterdam, the Netherlands) 22.3 (2005), 259–278.05–499Dekydtspotter, Laurent (Indiana U, USA; ldekydts@indiana.edu) & Samantha D. Outcalt, A syntactic bias in scope ambiguity resolution in the processing of English French cardinality interrogatives: evidence for informational encapsulation. Language Learning (Malden, MA, USA) 55.1 (2005), 1–36.05–500Fernández Toledo, Piedad (Universidad de Murcia, Spain; piedad@um.es), Genre analysis and reading of English as a foreign language: genre schemata beyond text typologies. Journal of Pragmatics37.7 (2005), 1059–1079.05–501French, Gary (Chukyo U, Japan; french@lets.chukyo-u.ac.jp), The cline of errors in the writing of Japanese university students. World Englishes (Oxford, UK) 24.3 (2005), 371–382.05–502Green, Chris (Hong Kong Polytechnic U, Hong Kong, China), Profiles of strategic expertise in second language reading. Hong Kong Journal of Applied Linguistics (Hong Kong, China) 9.2 (2004), 1–16.05–503Groom, Nicholas (U of Birmingham, UK; nick@nicholasgroom.fsnet.co.uk), Pattern and meaning across genres and disciplines: an exploratory study. Journal of English for Academic Purposes (Amsterdam, the Netherlands) 4.3 (2005), 257–277.05–504Harris, Pauline & Barbara McKenzie (U of Wollongong, Australia; pharris@uow.edu.au), Networking aroundThe Waterholeand other tales: the importance of relationships among texts for reading and related instruction. Literacy (Oxford, UK) 39.1 (2005), 31–37.05–505Harrison, Allyson G. & Eva Nichols (Queen's U, Canada; harrisna@post.queensu.ca), A validation of the Dyslexia Adult Screening Test (DAST) in a post-secondary population. Journal of Research in Reading (Oxford, UK) 28.4 (2005), 423–434.05–506Hirvela, Alan (Ohio State U, USA; hirvela.1@osu.edu), Computer-based reading and writing across the curriculum: two case studies of L2 writers. Computers and Composition (Amsterdam, the Netherlands) 22.3 (2005), 337–356.05–507Holdom, Shoshannah (Oxford U, UK; shoshannah.holdom@oucs.ox.ac.uk), E-journal proliferation in emerging economies: the case of Latin America. Literary and Linguistic Computing (Oxford, UK) 20.3 (2005), 351–365.05–508Hopper, Rosemary (U of Exeter, UK; r.hopper@ex.ac.uk), What are teenagers reading? Adolescent fiction reading habits and reading choices. Literacy (Oxford, UK) 39.3 (2005), 113–120.05–509Jarman, Ruth & Billy McClune (Queen's U, Northern Ireland; r.jarman@qub.ac.uk), Space Science News: Special Edition, a resource for extending reading and promoting engagement with newspapers in the science classroom. Literacy (Oxford, UK) 39.3 (2005), 121–128.05–510Jia-ling Charlene Yau (Ming Chuan U, Taiwan; jyau@mcu.edu.tw), Two Mandarin readers in Taiwan: characteristics of children with higher and lower reading proficiency levels. Journal of Research in Reading (Oxford, UK) 28.2 (2005), 108–124.05–511Justice, Laura M, Lori Skibbel, Andrea Canning & Chris Lankford (U of Virginia, USA; ljustice@virginia.edu), Pre-schoolers, print and storybooks: an observational study using eye movement analysis. Journal of Research in Reading (Oxford, UK) 28.3 (2005), 229–243.05–512Kelly, Alison (Roehampton U, UK; a.m.kelly@roehampton.ac.uk), ‘Poetry? Of course we do it. It's in the National Curriculum.’ Primary children's perceptions of poetry. Literacy (Oxford, UK) 39.3 (2005), 129–134.05–513Kern, Richard (U of California, Berkeley, USA; rkern@berkeley.edu) & Jean Marie Schultz, Beyond orality: investigating literacy and the literary in second and foreign language instruction. The Modern Language Journal (Malden, MA, USA) 89.3 (2005), 381–392.05–514Kispal, Anne (National Foundation for Educational Research, UK; a.kispal@nfer.ac.uk), Examining England's National Curriculum assessments: an analysis of the KS2 reading test questions, 1993–2004. Literacy (Oxford, UK) 39.3 (2005), 149–157.05–515Kriss, Isla & Bruce J. W. Evans (Institute of Optometry, London, UK), The relationship between dyslexia and Meares-Irlen Syndrome. Journal of Research in Reading (Oxford, UK) 28.3 (2005), 350–364.05–516Lavidor, Michal & Peter J. Bailey (U of Hull, UK; M.Lavidor@hull.ac.uk), Dissociations between serial position and number of letters effects in lateralised visual word recognition. Journal of Research in Reading (Oxford, UK) 28.3 (2005), 258–273.05–517Lee, Sy-ying (Taipei, Taiwan, China; syying.lee@msa.hinet.net), Facilitating and inhibiting factors in English as a foreign language writing performance: a model testing with structural equation modelling. Language Learning (Malden, MA, USA) 55.2 (2005), 335–374.05–518Leppänen, Ulla, Kaisa Aunola & Jari-Erik Nurmi (U of Jyväskylä, Finland; uleppane@psyka.jyu.fi), Beginning readers' reading performance and reading habits. Journal of Research in Reading (Oxford, UK) 28.4 (2005), 383–399.05–519Lingard, Tony (Newquay, Cornwall, UK; tonylingard@awled.co.uk), Literacy Acceleration and the Key Stage 3 English strategy–comparing two approaches for secondary-age pupils with literacy difficulties. British Journal of Special Education32.2, 67–77.05–520Liu, Meihua (Tsinghua U, China; ellenlmh@yahoo.com) & George Braine, Cohesive features in argumentative writing produced by Chinese undergraduates. System (Amsterdam, the Netherlands) 33.4 (2005), 623–636.05–521Masterson, Jackie, Veronica Laxon, Emma Carnegie, Sheila Wright & Janice Horslen (U of Essex; mastj@essex.ac.uk), Nonword recall and phonemic discrimination in four- to six-year-old children. Journal of Research in Reading (Oxford, UK) 28.2 (2005), 183–201.05–522Merttens, Ruth & Catherine Robertson (Hamilton Reading Project, Oxford, UK; ruthmerttens@onetel.net.uk), Rhyme and Ritual: a new approach to teaching children to read and write. Literacy (Oxford, UK) 39.1 (2005), 18–23.05–523Min Wang (U of Maryland, USA; minwang@umd.edu) & Keiko Koda, Commonalities and differences in word identification skills among learners of English as a Second Language. Language Learning (Malden, MA, USA) 55.1 (2005), 71–98.05–524O'Brien, Beth A., J. Stephen Mansfield & Gordon E. Legge (Tufts U, Medford, USA; beth.obrien@tufts.edu), The effect of print size on reading speed in dyslexia. Journal of Research in Reading (Oxford, UK) 28.3 (2005), 332–349.05–525Pisanski Peterlin, Agnes (U of Ljubljana, Slovenia; agnes.pisanski@guest.arnes.si), Text-organising metatext in research articles: an English–Slovene contrastive analysis. English for Specific Purposes (Amsterdam, the Netherlands) 24.3 (2005), 307–319.05–526Rilling, Sarah (Kent State U, Kent, USA; srilling@kent.edu), The development of an ESL OWL, or learning how to tutor writing online. Computers and Composition (Amsterdam, the Netherlands) 22.3 (2005), 357–374.05–527Schacter, John & Jo Booil (Milken Family Foundation, Santa Monica, USA; schacter@sbcglobal.net), Learning when school is not in session: a reading summer day-camp intervention to improve the achievement of exiting First-Grade students who are economically disadvantaged. Journal of Research in Reading (Oxford, UK) 28.2 (2005), 158–169.05–528Shapira, Anat (Gordon College of Education, Israel) & Rachel Hertz-Lazarowitz, Opening windows on Arab and Jewish children's strategies as writers. Language, Culture and Curriculum (Clevedon, UK) 18.1 (2005), 72–90.05–529Shillco*ck, Richard C. & Scott A. McDonald (U of Edinburgh, UK; rcs@inf.ed.ac.uk), Hemispheric division of labour in reading. Journal of Research in Reading (Oxford, UK) 28.3 (2005), 244–257.05–530Singleton, Chris & Susannah Trotter (U of Hull, UK; c.singleton@hull.ac.uk), Visual stress in adults with and without dyslexia. Journal of Research in Reading (Oxford, UK) 28.3 (2005), 365–378.05–531Spelman Miller, Kristyan (Reading U, UK; k.s.miller@reading.ac.uk), Second language writing research and pedagogy: a role for computer logging?Computers and Composition (Amsterdam, the Netherlands) 22.3 (2005), 297–317.05–532Su, Susan Shiou-mai (Chang Gung College of Technology, Taiwan, China) & Huei-mei Chu, Motivations in the code-switching of nursing notes in EFL Taiwan. Hong Kong Journal of Applied Linguistics (Hong Kong, China) 9.2 (2004), 55–71.05–533Taillefer, Gail (Toulouse U, France; gail.taillefer@univ-tlse1.fr), Reading for academic purposes: the literacy practices of British, French and Spanish Law and Economics students as background for study abroad. Journal of Research in Reading (Oxford, UK) 28.4 (2005), 435–451.05–534Tardy, Christine M. (DePaul U, Chicago, USA; ctardy@depaul.edu), Expressions of disciplinarity and individuality in a multimodal genre. Computers and Composition (Amsterdam, the Netherlands) 22.3 (2005), 319–336.05–535Thatcher, Barry (New Mexico State U, USA; bathatch@nmsu.edu), Situating L2 writing in global communication technologies. Computers and Composition (Amsterdam, the Netherlands) 22.3 (2005), 279–295.05–536Topping, Keith & Nancy Ferguson (U of Dundee, UK; k.j.topping@dundee.ac.uk), Effective literacy teaching behaviours. Journal of Research in Reading (Oxford, UK) 28.2 (2005), 125–143.05–537Torgerson, Carole (U of York, UK; cjt3@york.ac.uk), Jill Porthouse & Greg Brooks, A systematic review of controlled trials evaluating interventions in adult literacy and numeracy. Journal of Research in Reading (Oxford, UK) 28.2 (2005), 87–107.05–538Willett, Rebekah (U of London, UK; r.willett@ioe.ac.uk), ‘Baddies’ in the classroom: media education and narrative writing. Literacy (Oxford, UK) 39.3 (2005), 142–148.05–539Wood, Clara, Karen Littleton & Pav Chera (Coventry U, UK; c.wood@coventry.ac.uk), Beginning readers' use of talking books: styles of working. Literacy (Oxford, UK) 39.3 (2005), 135–141.05–540Wood, Clare (The Open U, UK; c.p.wood@open.ac.uk), Beginning readers' use of ‘talking books’ software can affect their reading strategies. Journal of Research in Reading (Oxford, UK) 28.2 (2005), 170–182.05–541Yasuda, Sachiko (Waseda U, Japan), Different activities in the same task: an activity theory approach to ESL students' writing process. JALT Journal (Tokyo, Japan) 27.2 (2005), 139–168.05–542Zelniker, Tamar (Tel-Aviv U, Israel) & Rachel Hertz-Lazarowitz, School–Family Partnership for Coexistence (SFPC) in the city of Acre: promoting Arab and Jewish parents' role as facilitators of children's literacy development and as agents of coexistence. Language, Culture and Curriculum (Clevedon, UK) 18.1 (2005), 114–138.

15

Wegner, Juliane, and Julia Stüwe. "Young Cancer on Instagram." M/C Journal 23, no.6 (November28, 2020). http://dx.doi.org/10.5204/mcj.2724.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction Although our postmodern (media) society should provide room for diversity and otherness (Greer and Jewkes), some people are not integrated but rather excluded. Social exclusion can be defined as the discrepancy of the wish of being part of a society and its possibilities to be part of it and contains feelings or experiences of physically or emotionally exclusion from others (Burchardt et al.; Riva and Eck). It is not really known what or who is responsible for social exclusion (Hills et al.), but it is certain that it is not that rare phenomenon — especially in social media. Here, digital engagement characteristics (likes, follows, shares, and comments) are important to build up, renew, and strengthen different forms of relationships. But if users do not receive any feedback, the risk of feeling social excluded increases. In this context, adolescents and young adults as the primary audience are the focus of interest. They seem to be especially vulnerable when it comes to social ostracism within social media and its potential negative psychological effects (Timeo et al.). The variety of social exclusion allows multiple perspectives on the topic. Hereafter we focus on young people with cancer. This life-threatening disease can increase the risk of being excluded. Cancer as a chronic illness and its negative effects on people’s lives, such as potential death, long-term and late effects, private and social burdens (Hilgendorf et al.), show an obvious otherness compared to the healthy peer, which might push ostracism effects and social exclusion of young people within social media to a new level. We actually can see a large number of (included) young cancer patients and survivors using social media for information sharing, exchanging ideas, networking, and addressing their unmet needs of the real world (Chou et al.; Chou and Moskowitz; Ruckenstuhl et al.; Perales et al.). Especially Instagram is becoming more present in social cancer communication (Stage et al.), though it actually increasingly represents cheerful, easy-going content (Hu et al.; Waterloo et al.). Judging by the number of cancer-related hashtags, we can see more and more public cancer bloggers thematise cancer illness on Instagram. But less is known about the actual content posted by cancer bloggers on Instagram. This leads us to the question, to what extent is cancer content found and included or excluded on public Instagram profiles of German speaking cancer bloggers? And is there a difference between biography descriptions with visible cancer references and posted motifs, captions and hashtags? Chronic Illnesses, Identities, and Social Networks Chronic illnesses such as cancer not only affect the body, but also impact on the identity of those affected. It is understood as life-changing with both short-term and long-term effects on the identity-forming process and on the already developed identity (Bury; Charmaz; Leventhal et al.). With their diagnosis, adolescents and young adults face a double challenge: they have to cope with the typical developmental changes of this age group and they have to negotiate these changes against the background of a life-threatening illness (Makros and McCabe; Zebrack and Isaacso). Miller shows three levels of identity for young cancer patients (pre-cancer identity, patient identity, and post-cancer identity), which are used regularly and flexibly by those affected in their interaction with the social network in order to maintain relationships and to minimise communicative misunderstandings. Moreover, the negotiation of the self within the social network and its expectations, especially towards convalescent people, can lead to paradoxical situations and identities of young people with cancer (Jones et al.). Although therapeutic measures are completed and patients may be discharged as cured, physical, cognitive, and emotional challenges with regard to the illness (e.g. fatigue, loss of performance, difficulty concentrating) still have to be overcome. These challenges, despite recovery, cause those affected to feel they still belong to a cancer group which they have actually largely outgrown medically and therapeutically, and also continually remind them of their present difference from the healthy peer group. To minimise these differences, narratives are the means for those affected to negotiate their new illness-related identity with their network (Hyde). These processes can be digitally transformed on blogs or to age-appropriate social network sites (SNS), which enable users to record and communicate experiences and emotions in an uncomplicated, situational manner and with fewer inhibitions (Kim and Gilham). Cancer contents on SNS are called autopathography and can serve as a means of self-expression, whilst at the same time stimulating communication and networking and thus significantly influencing identity and identity development in the chronic disease process (Rettberg; Ressler et al.; Abrol et al.; Stage). The possibility of recording and archiving private moments in a digital environment through photos and texts creates a visual diary. Here, illness recordings are not just motifs, but also part of an identity process by accepting the self as being ill (Nesby and Salamonsen; Tembeck). Instagram-Exclusive Positivity Instagram is the most popular social media network amongst 14-29 year olds in Germany (Beisch et al.). It presents itself as a highly visual structured platform. Furthermore, both posts and stories are dominated by content with innocuous motifs (Hu et al.). Additionally, the visual culture on Instagram is supported by integrated image optimisations such as filters and therefore often associated with high aesthetic standards (Waterloo et al.). This encourages the exchange of idealised self-presenting and self-advertising content (Lee et al.; Lup et al.; Sheldon and Bryant). The positive tone of the shared motifs and captions can also be explained by larger, sometimes anonymous networks on Instagram. The principle of non-reciprocal following of public accounts increasingly creates weak ties, which can additionally encourage the sharing of positively connoted content due to the anonymity (Lin et al.; Waterloo et al.). The posting of negative moods or image motifs to anonymous followers does not seem to be socially standardised, due to the associated intimate thoughts and feelings (Bazarova). In addition, users are aware of the public framework in which they address intimate topics and discourses (Bazarova and Choi). Internal platform standards and technical possibilities thus create a particular posting culture: an environment that is—due to its strong visual-aesthetic structure and anonymous follower-based networks—almost exclusively positive. However, these assumptions and findings are based on a general posting culture, which is usually not focussed on niche topics like cancer. Previous studies show that SNS are used for exchange and networking, especially by young cancer patients (Chou and Moskowitz; Perales et al.). Studies from online SNS disease-related self-help groups show that weak ties in illness situations are considered beneficial when it comes to self-disclosure, seeking help, and support (Wright et al.; Love et al.; Donovan et al.). In addition, Instagram is part of the so-called “vital media” (Stage et al.), which means it is very important for young cancer patients to share cancer-related material. But despite these research findings less is known about the content shared by German-speaking bloggers who have visible cancer references in their Instagram biography. Do they include a serious, even life-threatening illness on a platform that actually stands for positivity, or do they follow the invisible platform regulations in their posted content and statements and exclude it by themselves? The specific objectives of this explorative study were (a) to obtain a descriptive analysis of the manner in which cancer bloggers post content on Instagram, and (b) to determine the extent to which most applied practices exclude the posting of certain negatively connoted motives and emotions associated with cancer. Methodology For the study, 142 German-speaking cancer bloggers (14–39 years of age) with public accounts and visible cancer references in their biography were researched on Instagram. The sample was divided into posts (7,553) and stories (4,117). The content was examined using a standardised content analysis and a code book with relevant categories (motifs, body presences, emotions, captions, emojis; ICR Cronbach’s alpha = 0.85). Measured by the value of the content posted, the story users, at 23 years of age, were comparatively much younger than the post users, at 30 years of age. The sample was predominantly female in both posts (81%) and stories (99%). The most common form of cancer was breast cancer (posts: 28%; stories: 29%), followed by brain tumors (posts: 19%; stories: 16%) and leukaemia (posts: 4%; stories: 19%). Most content was shared by people who were actively involved in treatment – 46% of posts and 54% of stories. Completed treatments were more common in posts (39%) than in stories (19%). At the time of data collection, the Instagram entries were explicitly open to the public, and no registration was required. The content, not the individual, was analysed to minimise the risk for the bloggers and to prevent them from violations of privacy and autonomy by third parties. Furthermore, the entries were assigned unidentifiable numbers to ensure that no tracing is possible (Franzke et al.). Results The sample consists of public cancer blogger accounts who document everyday experiences for their network in images and videos. The following results are shown for posts (P) and stories (S). Motifs and Bodies Looking at the evaluation of the image motifs, the selfie predominates both in posts, with 20.7 per cent, and stories, with 32.8 per cent. Other popular photo motifs are pictures of food (P: 10.2%; S: 11.0%), activities (P: 7.2%; S: 7.7%), landscapes (P: 6.3%; S: 7.1%), and of/with family and friends (P: 12.5%; S: 6.0%). Photos in medical or clinical settings are rare, with one per cent in the posts and three per cent in the stories. Looking at the bodies and faces displayed, a comparatively normal to positive image of the bloggers that were studied can be observed. Most of the people in the posts present themselves with hair (81.3%), wear make-up (53.3%) and smile at the camera (64.1%). A similar trend can also be seen in the stories. Here 63.8 per cent present themselves with hair, 62.7 per cent with make-up and 55.3 per cent with happy facial expressions. In contrast, scars (P: 1.6%; S: 4.4%) or amputations (P: 0.2%; S: 0.1%) are hardly ever shown. Thus, possible therapy-accompanying symptoms, such as alopecia, ports for chemotherapy, or amputations (e.g. mastectomy in the case of breast cancer) are rarely or hardly ever made visible by cancer bloggers. Captions, Hashtags, and Emojis Similar to the motifs, everyday themes dominate in the captions of the images, such as the description of activities (P: 23.2%; S: 18.0%), food (P: 8.2%; S: 9.3%), or beauty/fashion (P: 6.2%; S: 10.2%). However, information on the current health status of the person affected can be found under every tenth photo, both in the stories and in the posts. Hashtags are mainly found amongst the posts with 81.5 per cent. In keeping with the caption, normal themes were also chosen here, divided into the categories of activities (17.7%), beauty/fashion (7.6%), food (5.8%), and family/friends (4.8%). Illness-specific hashtags (e.g. #cancer, #survivor, or #chemo) were chosen in 15.6 per cent. In addition, the cancer bloggers in this study used emojis in 74 per cent of their posts. In the stories, however, only 28.2 per cent of the content was tagged with emojis. The most common category is smileys & people (P: 46.8%; S: 52.8%), followed by symbols (e.g. hearts, ribbons) (P: 21.1%; S: 26.5%), and animals & nature (P: 17.0%; S: 14.2%). Emotions In captions, hashtags and emojis, emotions were divided into positive (e.g. joy, fighting spirit), neutral (e.g. simple narration of the experience), and negative (e.g. fear, anger). It is noticeable that in all three categories predominantly and significantly positive or neutral words and images were used to describe emotional states or experiences. In the case of captions, 40.4 per cent of the posts and 43.9 per cent of the stories could be classified as positive. For the hashtags, the values were 18.7 per cent (P) and 43 per cent (S), and for the emojis 60 per cent (P) and 65.7 per cent (S). In contrast, there were hardly any negative moods (captions P: 5.7%, S: 5.8%; hashtags P: 4.4%, S: 0.7%; emojis P: 8.7%, S: 6.4%). Although the disease status (e.g. active in therapy or completed) had less impact on emotional messages, a significant connection with the applied thematic areas could be observed. Thus, it is apparent that medical and/or therapeutic aspects tend to be described with positive and negative words and hashtags, e.g. the current health status (χ²(3) = 795.44, p =.000, φ = 0.346) or the topics of illness/health via hashtag (χ²(3) = 797.67, p =.000, φ = 0.361). Topics such as food (χ²(3) = 20.49, p =.000, φ = 0.056) or beauty/fashion (χ²(3) = 51.52, p =.000, φ = 0.092) are recognisably more impersonal from an emotional perspective. Discussion A Digital Identity Paradox Drugs, chemotherapy, setbacks, physical impairments, or anxiety are issues that usually accompany cancer patients during treatment and also in remission. Looking at the content posted by German-speaking cancer bloggers on Instagram, illness-related images and words are comparatively rare. The bloggers show their normal, mostly cancer-free world, in which negative and illness-related content does not seem to fit. Although they clearly draw attention to their illness through their biography, this is not or only rarely addressed. Therefore, it can be stated that cancer as a topic is excluded by choice by the bloggers examined. Neither motifs, captions, nor hashtags make the illness visible. This seems paradoxical because the content and biography appear to contradict each other. And yet, the content studied only shows what Jones et al. and Miller have already described: their identity paradox, or multiple identities. The digital acceptance of one's own illness and solidarity with (anonymous) fellow sufferers is clearly given through the disclosure in the biography, but yet a normal and healthy online ego—comparable to the peer group and equal to their own illness identity—is aspired to. It seems as if those affected have to switch their identity back and forth. The awareness that they are already different in real life (in this case, ill) encourages the users examined to show a normal, age-appropriate life—at least online, which is why we speak of an identity paradox 2.0. Based on our data, the obvious otherness of being ill—and in this context the potential higher risk of digital ostracism effects (Greer and Jewkes; Timeo et al.)—can be a reason for self-exclusion of the cancer topic, in order not to be excluded by a healthy peer. The Standard Creates the Content The positive tone that can be found in almost every second post can be explained by the platform standards and practices themselves (Waterloo et al.). Thus, smiling faces in a public environment correspond more to this than sadness, anger, or despair. Although disease-related topics in captions are also provided with negatively connoted language, they do not have a determining influence on the public self-image of the blogger and their life and the illness. The strong visual culture on Instagram does not leave much scope for "other", perhaps more authentic serious content. The fact that published content has the potential to talk about cancer and to make one’s own experience with the disease transparent is proven by blogs (Kim and Gilham). Instagram does not currently seem to be particularly suitable for public profiles to make serious illness narratives about cancer. Conclusion It remains to be noted that public cancer blogs attempt to include a serious topic on Instagram. But with regard to the data, we can see a form of (maybe unconsciously) self-chosen exclusion of illness narratives. The reasons might vary. On the one hand, cancer bloggers want to belong to a healthy peer group, and expressing a visible otherness would exclude them. Therefore, they try to reduce the higher risk potential of ostracism effects. On the other hand, internal Instagram regulations and standards create an environment which can strengthen the bloggers' posting behaviours: young people, especially, post life-affirming and life-related content. This also helps them to cope with crisis situations and to avoid being dominated by a life-threatening disease. Further research on cancer on Instagram is needed to determine to what extent this is desired, and whether an awareness of this paradox exists or develops intuitively. Limitations The explorative character of this study only allows us to make statements about the bloggers investigated, not to make representative claims. References Abrol, Esha, et al. “Exploring the Digital Technology Preferences of Teenagers and Young Adults (TYA) with Cancer and Survivors: A Cross-Sectional Service Evaluation Questionnaire.” Journal of Cancer Survivorship 11 (2017): 670–682. Bazarova, Natalya N. “Public Intimacy: Disclosure Interpretation and Social Judgments on Facebook.” Journal of Communication 62 (2012): 815–832. Bazarova, Natalya N., and Yoon Hyung Choi. “Self-Disclosure in Social Media: Extending the Functional Approach to Disclosure Motivations and Characteristics on Social Network Sites.” Journal of Communication 64 (2014): 635–657. Beisch, Natalie, et al. “ARD/ZDF-Onlinestudie 2019: Mediale Internetnutzung und Video-on-Demand gewinnen weiter an Bedeutung.” Media Perspektiven 9 (2019): 374–388. Burchardt, Tania, et al. “Social Exclusion in Britain 1991-1995.” Social Policy and Administration 33 (1999): 227–244. Bury, Michael. “Chronic Illness as Biographical Disruption.” Sociology of Health and Illness 4 (1982): 167–182. Charmaz, Kathy. “The Body, Identity, and Self: Adapting to Impairment.” The Sociological Quarterly 36 (1995): 657–680. Chou, Wen-ying S., and Michal Moskowitz. “Social Media Use in Adolescent and Young Adult (AYA) Cancer Survivors.” Current Opinion in Psychology 9 (2016): 88–91. Chou, Wen-ying S., et al. “Health-Related Internet Use among Cancer Survivors: Data from the Health Information National Trends Survey, 2003-2008.” Journal of Cancer Survivorship 5 (2011): 263–270. Donovan, Erin E., et al. “Patterns of Social Support Communicated in Response to Expressions of Uncertainty in an Online Community of Young Adults with Cancer.” Journal of Applied Communication Research 42 (2014): 432–455. Franzke, Aline Shakti, et al. “Internet Research: Ethical Guidelines 3.0 Association of Internet Researchers 6.1.” Association of Internet Researchers, 2019. Greer, Chris, and Yvonne Jewkes. “Extremes of Otherness: Media Images of Social Exclusion.” Social Justice 32 (2005): 20–31. Hilgendorf, Inken, et al. “Onkologische Erkrankungen bei Jugendlichen und Jungen Erwachsenen – Zahlen aus dem Klinischen Krebsregister Rostock als Arbeitsgrundlage für eine Interdisziplinäre Herausforderung.“ TumorDiagnostik & Therapie 32 (2011): 85–92. Hills, John Robert, et al. “Understanding Social Exclusion.” CASE: Centre for Analysis of Social Exclusion (2002). Hu, Yuheng, et al. “What We Instagram: A First Analysis of Instagram Photo Content and User Types.” Proceedings of the 8th International Conference on Weblogs and Social Media, ICWSM. Ann Arbor: AAAI Press, 2014. 595–598. Hyden, Lars‐Christer. “Illness and Narrative.” Sociology of Health & Illness 19 (1997): 48–69. Jones, Barbara L., et al. “Adolescent Cancer Survivors: Identity Paradox and the Need to Belong.” Qualitative Health Research 8 (2011): 1033–1040. Kim, Bora, and David Michael Gillham. “The Experience of Young Adult Cancer Patients Described through Online Narratives.” Cancer Nursing 36 (2013): 377–384. Lee, Eunji, et al. “Pictures Speak Louder than Words: Motivations for Using Instagram.” Cyberpsychology, Behavior, and Social Networking 18 (2015): 552–556. Leventhal, Howard, et al. “The Impact of Chronic Illness on the Self System.” Self, Social Identity, and Physical Health. Ed. Richard J. Contrada, and Richard D. Ashmore. New York: Oxford UP, 1999. 185–208. Lin, Han, et al. “Emotional Disclosure on Social Networking Sites: The Role of Network Structure and Psychological Needs.” Computers in Human Behavior 41 (2014): 342–350. Love, Brad, et al. “Exploring Psychosocial Support Online: A Content Analysis of Messages in an Adolescent and Young Adult Cancer Community.” Cyberpsychology, Behavior, and Social Network 15 (2012): 555–559. Lup, Katerina, et al. “Instagram #Instasad?: Exploring Associations among Instagram Use, Depressive Symptoms, Negative Social Comparison, and Strangers Followed.” Cyberpsychology, Behavior, and Social Networking 18 (2015): 247–252. Makros, Jenny, and Marita P. McCabe. “Relationships between Identity and Self-Representations During Adolescence.” Journal of Youth and Adolescence 30 (2001): 623–639. Miller, Laura E. ‘“People Don’t Understand That It Is Not Easy Being a Cancer Survivor: Communicating and Negotiating Identity throughout Cancer Survivorship.” Southern Communication Journal 80 (2015): 1–19. Nesby, Linda, and Salamonsen, Anita. ”Youth Blogging and Serious Illness.” Medical Humanities 42 (2016): 46–51. Perales, Miguel-Angel, et al. “Social Media and the Adolescent and Young Adult (AYA) Patient with Cancer.” Current Hematologic Malignancy Reports 6 (2016): 449–455. Ressler, Pamela K., et al. “Communicating the Experience of Chronic Pain and Illness through Blogging.” Journal of Medical Internet Research 14 (2012): 240–253. Rettberg, Jill Walker. Seeing Ourselves through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape Ourselves. London: Palgrave Macmillan, 2014. Riva, Paolo, and Jennifer Eck. Social Exclusion: Psychological Approaches to Understanding and Reducing Its Impact. New York: Springer, 2016. Ruckenstuhl, Paul, et al. “Like or Dislike? Impact of Facebook on Ewing Sarcoma Treatment.” Journal of Medical Internet Research 2 (2016): 42–54. Sheldon, Pavica, and Katherine Bryant. “Instagram: Motives for Its Use and Relationship to Narcissism and Contextual Age.” Computers in Human Behavior 58 (2016): 89–97. Stage, Carsten. Networked Cancer: Affect, Narrative and Measurement. London: Palgrave Macmillan, 2017. Stage, Carsten, et al. “Vital Media: The Affective and Temporal Dynamics of Young Cancer Patients’ Social Media Practices.” Social Media + Society 6 (2020): 1–13. Tembeck, Tamar. “Selfies of Ill Health: Online Autopathographic Photography and the Dramaturgy of the Everyday.” Social Media + Society 2 (2016): 1–13. Timeo, Susanna, et al. “Being Liked or Not Being Liked: A Study on Social-Media Exclusion in a Preadolescent Population.” Journal of Adolescence 80 (2020): 173–181. Waterloo, Sophie F., et al. “Norms of Online Expressions of Emotion: Comparing Facebook, Twitter, Instagram, and WhatsApp." New Media & Society 20 (2018): 1813–1831. Wright, Kevin B., et al. “Weak-Tie Support Network Preference and Perceived Life Stress among Participants in Health-Related Computer-Mediated Support Groups.” Journal of Computer-Mediated Communication 15 (2010): 606–624. Zebrack, Brad, and Sinéad Isaacson. “Psychosocial Care of Adolescent and Young Adult Patients with Cancer and Survivors.” Journal of Clinical Oncology 30 (2012): 1221–1226.

16

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no.2 (April27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circ*mstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist p*rnography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.

17

Tseng, Emy, and Kyle Eischen. "The Geography of Cyberspace." M/C Journal 6, no.4 (August1, 2003). http://dx.doi.org/10.5204/mcj.2224.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, society, economy — often leave out this connection to “fibre”, to where and how we are physically linked to each other. Rather than signaling the “end of geography” (Mitchell 1999), the Internet reinforces its importance with “real world” physical and logical constraints shaping the geography of cyberspace. To contest the nature of the virtual world requires understanding and contesting the nature of the Internet’s architecture in the physical world. The Internet is built on a physical entity – the telecommunications networks that connect computers around the world. In order to participate on the Internet, one needs to connect to these networks. In an information society access to bandwidth determines the haves from the have-nots (Mitchell 1999), and bandwidth depends upon your location and economics. Increasingly, the new generation Internet distributes bandwidth unevenly amongst regions, cities, organizations, and individuals. The speed, type, size and quality of these networks determine the level and nature of participation available to communities. Yet these types of choices, the physical and technical aspects of the network, are the ones least understood, contested and linked to “real world” realities. The Technical is the Political Recently, the US government proposed a Total Information Awareness surveillance system for all digital communications nationally. While technically unworkable on multiple fronts, many believed that the architecture of the Internet simply prevented such data collection, because no physical access points exist through which all data flows. In reality, North America does have central access points – six to be exact – through which all data moves because it is physically impossible to create redundant systems. This simple factor of geography potentially shapes policies on speech, privacy, terrorism, and government-business relations to name just a few. These are not new issues or challenges, but merely new technologies. The geography of infrastructure – from electricity, train and telephone networks to the architectures of freeways, cities and buildings – has always been as much social and political as technical. The technology and the social norms embedded in the network geography (Eischen, 2002) are central to the nature of cyberspace. We may wish for a utopian vision, but the hidden social assumptions in mundane ‘engineering’ questions like the location of fibre or bandwidth quality will shape virtual world. The Changing Landscape of the Internet The original Internet infrastructure is being redesigned and rebuilt. The massive fibre-optic networks of the Internet backbones have been upgraded, and broadband access technologies – cable modem, Digital Subscriber Line (DSL) and now wireless Wi-Fi – are being installed closer to homes and businesses. New network technologies and protocols enable the network to serve up data even faster than before. However, the next generation Internet architecture is quite different from the popular utopian vision described above. The Internet is being restructured as an entertainment and commerce medium, driven by the convergence of telecommunications technologies and commercialization. It is moving towards a broadcast model where individual consumers have access to less upstream bandwidth than downstream, with the symmetry of vendor and customer redesigned and built to favor content depending on who provides, requests and receives content. This Internet infrastructure has both physical and logical components – the telecommunications networks that comprise the physical infrastructure and the protocols that comprise the logical infrastructure of the software that runs the Internet. We are in the process of partitioning this infrastructure, both physical and logical, into information conduits of different speeds and sizes. Access to these conduits depends on who and where you are. These emerging Internet infrastructure technologies – Broadband Access Networks, Caching and Content Delivery Networks, Quality of Service and Policy Protocols – are shaped by geographical, economic and social factors in their development, deployment and use. The Geography of Broadband These new broadband networks are being deployed initially in more privileged, densely populated communities in primary cities and their wealthy suburbs (Graham, 2000). Even though many have touted the potential of Wi-Fi networks to bring broadband to underserved areas, initial mappings of wireless deployment show correlation between income and location of hotspots (NYCWireless, 2003). Equally important, the most commonly deployed broadband technologies, cable modem and ADSL, follow a broadcast model by offering more downstream bandwidth than upstream bandwidth. Some cable companies limit upstream bandwidth even further to 256 Kbps in order to discourage subscribers from setting up home servers. The asymmetry of bandwidth leads to asymmetry of information flows where corporations produce information and users content. Internet Infrastructure: Toll Roads and the Priority of Packets The Internet originally was designed around ‘best effort’ service: data flows through the networks as packets, and all packets are treated equally. The TCP/IP protocols that comprise the Internet’s logical infrastructure (Lessig, 101) govern how data is transferred across the physical networks. In the Internet’s original design, each packet is routed to the best path known, with the transport quality level dependent on network conditions. However, network congestion and differing content locations lead to inconsistent levels of quality. In order to overcome Internet “bottlenecks”, technologies such as content caching and Quality of Service (QoS) protocols have been developed that allow large corporate customers to bypass the public infrastructure, partitioning the Internet into publicly and privately accessible data conduits or throughways. Since access is based on payment, these private throughways can be thought of as the new toll roads of the Internet. Companies such as Akamai are deploying private ‘content delivery’ networks. These networks replicate and store content in geographically dispersed servers close to the end users, reducing the distance content data needs to traverse. Large content providers pay these companies to store and serve their content on these networks. Internet Service Providers (ISPs) offer similar services for internal or hosted content. The Internet’s physical infrastructure consists of a system of interconnected networks. The major ISPs’ networks interconnect at Network Access Point (NAPs) the major intersections of the Internet backbone. Congestion at these public intersection points has resulted in InterNAP building and deploying private network access points (P-NAPs). Akamai content delivery network (Akamai, 2000) and InterNAP’s P-NAPs (InterNAP, 2000) deployment maps reveal a deployment of private infrastructure to a select group of highly-connected U.S. cities (Moss & Townsend, 2000), furthering the advantage these ‘global cities’ (Graham, 1999) have over other cities and regions. QoS protocols allow ISPs to define differing levels of service by providing preferential treatment to some amount of the network traffic. Smart routers, or policy routers, enable network providers to define policies for data packet treatment. The routers can discriminate between and prioritize the handling of packets based on destination, source, the ISP, data content type, etc. Such protocols and policies represent a departure from the original peer-to-peer architecture of data equality with ‘best-effort’. The ability to discriminate and prioritize data traffic is being built into the system, with economic and even political factors able to shape the way packets and content flow through the network. For example, during the war on Iraq, Akamai Technologies canceled its service contract with the Arabic news service Al Jazeera (CNET, 2003). Technology, Choices and Values To address the social choices underpinning seemingly benign technical choices of the next generation Internet, we need to understand the economic, geographic and social factors guiding choices about its design and deployment. Just as the current architecture of the Internet reflects the values of its original creators, this next generation Internet will reflect our choices and our values. The reality is that decisions with very long-term impacts will be made with or without debate. If any utopian vision of the Internet is to survive, it is crucial to embed the new architectures with specific values by asking difficult questions with no pre-defined or easy answers. These are questions that require social debate and consensus. Is the Internet fundamentally a public or private space? Who will have access? What information and whose information will be accessible? Which values and whose values should form the basis of the new infrastructure? Should the construction be subject to market forces alone or should ideas of social equity and fairness be embedded in the technology? Technologists, policy makers (at both national and local levels), researchers and the general public all have a part in determining the answers to these questions. Policymakers need to link future competition and innovation with equitable access for all citizens. Urban planners and local governments need to link infrastructure, economic sustainability and equity through public and public-private investments – especially in traditionally marginalized areas. Researchers need to continue mapping the complex interactions of investment in and deployment of infrastructure across the disciplines of economics, technology and urban planning. Technologists need to consider the societal implications and inform the policy debates of the technologies they build. Communities need to link technical issues with local ramifications, contesting and advocating with policymakers and corporations. The ultimate geography of cyberspace will reflect the geography of fibre. Understanding and contesting the present and future reality requires linking mundane technical questions with the questions of values in exactly these wider social and political debates. Works Cited Akamai. See <http://www.akamai.com/service/network.php> Eischen, Kyle. ‘The Social Impact of Informational Production: Software Development as an Informational Practice’. Center for Global, International and Regional Studies Working Paper #2002-1. 2002. UC Santa Cruz. <http://cgirs.ucsc.edu/publications/workingpapers/> Graham, Stephen. “Global Grids of Glass: On Global Cities, Telecommunications and Planetary Urban Networks.” Urban Studies. 1999. 36 (5-6). Graham, Stephen. “Constructing Premium Network Spaces: Reflections on Infrastructure Networks and Contemporary Urban Development.” International Journal of Urban and Regional Research. 2000. 24(1) March. InterNAP. See <http://www.internap.com/html/news_05022000.htm> Junnarkar, Sandeep. “Akamai ends Al-Jazeera server support”, CNET News.com, April 4, 2003. See <http://news.com.com/1200-1035-995546.php> Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. Mitchell, William. City of Bits. Cambridge, MA: MIT Press, 1999. Mosss, Mitchell L. and Anthony M. Townsend. “The Internet Backbone and the American Metropolis.” The Information Society Journal. 16(1): 35-47. Online at: <http://www.informationcity.org/research/internet-backbone-am... ...erican-metropolis/index.htm> Public Internet Project. “802.11b Survey of NYC.” <http://www.publicinternetproject.org/> Links http://cgirs.ucsc.edu/publications/workingpapers/ http://news.com.com/1200-1035-995546.html http://www.akamai.com/service/network.html http://www.informationcity.org/research/internet-backbone-american-metropolis/index.htm http://www.internap.com/html/news_05022000.htm http://www.publicinternetproject.org/ Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Eischen, Emy Tseng & Kyle. "The Geography of Cyberspace" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/03-geography.php>. APA Style Eischen, E. T. &. K. (2003, Aug 26). The Geography of Cyberspace. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/03-geography.php>

18

Murphie, Andrew. "When Fibre Meets Fibre." M/C Journal 6, no.4 (August1, 2003). http://dx.doi.org/10.5204/mcj.2227.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The Virtual and the Physical A wide range of ritual practices have accompanied the ‘rise of the network society’. This is witnessed in the secular and non-secular magic and mysticism that is endemic in contemporary science fiction, in war-chalking, in new forms of compulsion, neurosis and addiction, or just in the everyday use of networked technologies. Such ritual practices are often only seen as interesting diversions or attachments to the main social issues involved in networking. Indeed, some might see these diversions precisely as attempts to cope with the network society, or even to flee from its apparent technicity and reassert identity against the network (Castells). Yet many of these ritual activities suggest complex ritual engagements with the network. What happens when we consider these ‘diversions’ as central to the ongoing dynamic of networks – technical and social?I shall not be providing an anthropology of these ritual activities. Neither shall I be documenting case studies of the shamanistic, the mystical, neuroses, and so on, as all these find their accommodations with the network society. I shall only, via the work of philosopher of anthropology José Gil, give reasons for the importance of the understanding of ritual to a more general understanding of networks. For networks bring together not just copper wires, Ethernet, optic fibre and electromagnetic radiation, but also other fibres (such sinew and neurons), and other radiations (such as affects, the chemicals and hormones of the nervous system). Ritual is at the heart of this ‘bringing together’. Following Gil, I will suggest that rituals do not just facilitate network operations, they also translate and transform networks in the process. For Gil, ritual space 'has a symbolically overloaded, polysemic topography' (80) in which every site (paralleling neurons in the brain or points in the P2P network) is 'overdetermined'. This allows an over-riding of linear 'technical causality' with ritual ‘magic’, something akin to the over-riding of logical theories of cognition with theories of emergence and the superpositionality of potentials throughout the circuits of the brain or network. Within this superpositionality, symbolism is not so much a series of meanings as a series of actions. Symbols, as enacted in rituals (or in the firing of the patterns of the brain, the movement of packets through Internet), 'designate realities, they set forces into motion, they are "in the present"' (81). Gil also points out that these ritual acts are accompanied by 'particularly intense affective experience' (81). When signs are not focussed directly upon the production of meaning, but are over-determined in ritual, this is 'in order that powerful energies are released that will become the main power source for the cure'. Indeed, in ritual there is a 'regime of energies' along with the 'regimes of signs'. Moreover, the meshing of the two suggests that either term is probably inadequate to explain what is occurring. Signs form constellations of forces that partner other constellations of forces (including other signs), 'separating' or 'condensing' energy fluxes' (82), or enabling 'translation' between them (and between signs as forces). Both the flow of these forces and their translations are, of course, seldom ‘smooth’. There is rather a constant re-writing – or in the context of networks, better, re-wiring – of shifting, contingent and contesting networks of forces. The constant heterogeneous flow of forces only adds to both the intensity of networks and the drive towards more forms of active ‘translation’ found in the proliferation of rituals within networks. It is in this dialogics of intensity and translation that we find the politics of networks. This is a politics that is far from being a politics of pure information. Returning to Gil, it is not only that signs translate forces on behalf of the body. I would add that it is not only the technical nodes in general (and signs are precisely technical nodes) that translate these forces on behalf of the body. The body is itself the crucial 'operator translating signs [and forces] in the ritual'. With this devaluing of symbolic processing qua symbols (so long crucial to so many of the myths and sciences of cognition and information), the brain becomes participant in (though not director of) this bodily translation of signs - and the forces assembled and disassembled. Through, and as, networks of assembled and disassembled forces, brain/body relations and distributions are assembled and disassembled within the concatenation of brain, body and world that is technics. This occurs over the time of evolution but equally over the time of the formations of habits, in the body in general, or as weights of connection between neurons or nodes in the network. It is partnered in the formation of socio-technical evolutions, specific socio-technical assemblages and the weights according to connections between these assemblages. Of course, the more networked things are, the faster the weights of connection change. The network takes the ritual place of the gods. As Gil writes, 'the gods can do what people can't do. They can make energy circulate freely, since they embody both loose and overcoded energy, the loosest and most overcoded of all' (84). This is why we still find magic - or at least something that is effectively like magic - at the heart of any exercise of power. Indeed, the ambiguity of the relations between ‘secular’ and variations of ‘spiritualist’ magic have long been an under-recognised part of media/technological development (as recently documented with regard to the nineteenth century development of the cinema and the entertainment industries in general by Simon During, or in Chris Chesher’s notion of computers as ‘invocational media’). This is not so much a question of metaphysics versus a more directly materialist approach to technical power as a question of directing forces by the necessary means. In order for 'action to have effects…words must release forces in the body; these forces must react directly on the organs' (143). Indeed, Gil claims that it is only with the notion of 'magical-symbolic thought' that we can resolve some of the ambiguities surrounding the material operation of forces and signs, where cultural analysis quite contradictorily seems at one time to assume the priority of one, and at another time the other. Gil points out that ritual magic is precisely that which works at the border between power and discourse, force and sign. This is not an unintelligible border. Even at its apparently most disorganized in terms of its philosophical or scientific coherence (in ritual ecstasy for example), ritual magic is in reality extremely organised (although an organisation of forces and translations rather than one of stable states). As Gil writes, even the 'gestures, words, or cries of the possessed are coded' (137). Indeed, the codes involved are precisely those of possession, but of a possession by networks rather than of them (thus the legal and commercial confusion surrounding file-sharing and so on, in that networks may be undone, but they cannot be possessed). Yet if those subject to ritual – or to networks – are coded, this is not initially within a semiotic structure but within a structure of active transformations. Therefore, 'magical words are action' (84) and ritual (the rituals of science and materialist metaphysics as much as 'primitive' ritual) is an 'actual activity' (137). In ritual there is 'more than a text, more than a semiotic structure [and more than information or communication]…one had to keep in mind the link that unites forces to signs, and the investment of energy that the body imposes on symbols'. Gil's conceptual envelope for this 'more than text' is 'infralanguage'. The 'infralanguage is the [real but] abstract body' (136). I would suggest that this ‘infralanguage’ is also, at least in part, the body registering its immersion in technics – a registration that occurs before cognition, before communication. Or, it is the body – considered in the posthuman sense as any dynamic assemblage. Infralanguage is the assumed of networked engagement, perhaps the libidinal condition of the network (science fiction is clear on this – why else the fascination with plugging leads into our heads and closing our eyes to enter a different world – a different libidinal economy). Like a posture or a series of movements in rituals, infralangage is 'both learned and given' as it translates 'codes and contexts'. Moreover, as here we are talking about a networked learning (and perhaps a dynamic archive as ‘given’), we are not just talking about human learning, or the distribution of weights within the network of the brain, but also about the way that there is a distribution of weights across nodes between brain, body and world – across networks. Particularly important here are 'abstract rhythms' (Felix Guattari has labelled these 'refrains') as these are basic elements of processual structure that can cross codes and contexts, bring them together, translate them in, we could say, polyrhythms, syncopation or simple rhythmic transformation and variation. It is perhaps no wonder that computer games and music have been so central to the expansion of networks – both deal intensely with these rhythmic transformations of codes and posture at the interface of the networks of technics, brain and body. Infralanguage works with codes, bodies, the organs of the body and with a 'complicity' between 'bodily forms and the form of things'. Fibre meets fibre. The shifting investments and assemblages of the body meet a network cast precisely as the enhanced ability of technics (including technics as the human) to shift and reassemble its own investments. Again it is important to note that these investments never come together smoothly – not even, perhaps, into Baudrillard’s smooth if vapid ‘ecstasy of communication’. Rather the constant reconstitution and reassemblage of investments only adds to the intensification of the drive towards connection – and further reassemblage, translation of heterogeneous and contesting aspects of these investments. Thus reassemblage – in a parallel to ‘real-time’ media’s ongoing reformulation of time – is ongoing within networks, as the intensification of connection brought about by enhanced networking constantly reconfigures networks themselves. Infralanguage only gains more importance. It performs the necessary work with the 'condensation of energy on an exfoliated surface' (exfoliation is the opening of the body into spaces as it structurally and dynamically couples with them). Within networks surfaces are exfoliating in more and more complexity. In this ongoing reorganization there is a surprising immanence to networked cognition, situated perhaps in what Pierre Lévy has called ‘collective intelligence’. This is a technically enabled - but not technically delimited - reorganisation of cognitive forces within a heterogeneous collectivity. Lévy’s work possesses the advantage of demonstrating that, although the flow of networks is always in flux, always ‘political’, this in itself contains the positive political potential of intensity and heterogeneity. In these multi-directional flows, the collective intelligence that could emerge (but it would always be a struggle) would be a ‘fractal’ collectivity of: ‘macrosocieties, transindividual psyches of small groups, individuals, intra-individual modules (zones of the brain, unconscious ‘complexes’), agencies which traverse intra-individual modules that move between different people (sexual relations, complementary neuroses)’ (107-108). For Lévy, ‘the collective hypercortex contains … a living psychism, a sort of dynamic hypertext traversing the tensions and energies of affective qualities, conflicts, etc’. In this networked cognition, that beyond the brain seems to take up many of the functions often ascribed to the brain. And the thought that eludes the individual - the thought that for the individual is famously withdrawing in time and space even as it appears - does not elude the network or the activity of ritual magic as a working with these networks. Gil notes that in ritual, …thought coincides with being… time and space do not impede the grasping of the thing in itself - because, on the contrary, they [time and space] are organized in such as manner that they can be transformed by appropriate techniques and at the same time remain linked to their normal perception—in order to create from it the conditions of possibility and the formal framework for knowledge of the absolute. (84) What is this knowledge of the absolute through 'magic words' and rituals? It relates to 'the possibility of capturing the free forces that traverse bodies' (85). In other words, the absolute is reworked immanence rather than a totality that is given once and for all. Throughout his book Cyberculture, Lévy calls this the ethic of ‘universality without totalization’ – global coverage that is receptive to every local difference. Feedback and autopoiesis - crucial terms within many investigations of the cognitive and informational - become the very affective substance of ritual techno-magic. For Gil, ritual autopoiesis addresses the famous 'failure to understand how to know the "thing in itself"' as per Kant. For Gil, this failure is in fact a 'negative proof' of 'the success of magical-symbolic thought in capturing fleeting time in the links of its spatial representations, making it a recurrent or a cyclic system'. Perhaps it is a matter of loving the network through ritual at the junction of perceptual and world, spaces and affective or cognitive fields. I mean ‘loving’ in the sense taken up by John Scannell in M/C when he remarks that ‘graffiti writers love the city more than you ever will’. All acts of love are drenched in ritual (such as graffiti writing) because all acts of love are intense translations of forces. Perhaps those who embrace the network through ritual show others the way. Hackers, war-chalkers, technopagans utopians, perceptual experimentalists, the new techno-neurotics – all these are willing to explore the affective, intensity of the new rituals. All ‘love’ the network with all the difficulties and complexity that love implies. For them, the network is not just an information or communications conduit, but a partner in ritual becoming. Works Cited Baudrillard, Jean (1988) “L’Extase de la Communication” trans. Bernard Schutze and Caroline Schutze, in Mediamatic 3, 2:81-5. Castells, Manuel (2000) The Rise of the Network Society 2nd Edition, Oxford:Blackwell. Chesher, Chris (1996) ‘CD-ROM Multimedia's Identity Crisis’ in Media International Australia 81, August. During, Simon (2002) Modern Enchantments: The Cultural Power of Secular Magic, Cambridge MA:Harvard University Press. Gil, José (1998) Metamorphoses of the Body, trans. Stephen Muecke Minneapolis:University of Minnesota Press. Lévy, Pierre (1995) Qu’est-ce que le virtuel? La Decouverte:Paris. Lévy, Pierre (2001) Cyberculture, trans. Robert Bononno Minneapolis:University of Minnesota Press. Scannell, John (2002) 'Becoming-City: Why Graffiti Writers Love the City More than You Ever Will' in M/C: A Journal of Media and Culture 5, 2 < http://www.media-culture.org.au/0205/becoming.php> (accessed June 12th, 2002). Links http://www.media-culture.org.au/0205/becoming.html Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Murphie, Andrew. "When Fibre Meets Fibre " M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/04-fibremeetsfibre.php>. APA Style Murphie, A. (2003, Aug 26). When Fibre Meets Fibre . M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/04-fibremeetsfibre.php>

19

Weiskopf-Ball, Emily. "Experiencing Reality through Cookbooks: How Cookbooks Shape and Reveal Our Identities." M/C Journal 16, no.3 (June23, 2013). http://dx.doi.org/10.5204/mcj.650.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction In October of 2004, La Presse asked its Quebecois reading audience a very simple question: “What is your favourite cookbook and why?” As Marie Marquis reports in her essay “The Cookbooks Quebecers Prefer: More Than Just Recipes,” “two weeks later, 363 e-mail responses had been received” (214). From the answers, it was clear that despite the increase in television cooking shows, Internet cooking sites, and YouTube how-to videos, cookbooks were not only still being used, but that people had strong allegiances to their favourite ones. Marquis’s essay provides concrete evidence that cookbooks are not meaningless objects. Rather, her use of relevant quotations from the survey proves that they are associated with strong memories and have been used to create bonds between individuals and across generations. Moreover, these quotations reveal that individuals use cookbooks to construct personal narratives that they share with others. In her philosophical analysis of foodmaking as a thoughtful practice, Lisa Heldke helps move the discussion of cooking and, consequently of cookbooks, forward by explaining that the age-old dichotomy between theory and practice merges in food preparation (206). Foodmaking, she explains through her example of kneading bread, requires both a theoretical understanding of what makes bread rise and a practical knowledge of the skill required to achieve the desired results. Much as Susan Leonardi argues that recipes need “a recommendation, a context, a point, a reason-to-be” (340), Heldke advocates in “Recipes for Theory Making” that recipes offer us ideas that we need to either accept or refuse. These ideas include, but are not limited to, what makes a good meal, what it means to eat healthy, what it means to be Italian or vegan. Cookbooks can take many forms. As the cover art from academic documents on the nature, role, and value of cooking and cookbooks clearly demonstrates, a “cookbook” may be an ornate box filled with recipe cards (Floyd and Forster) or may be a bunch of random pieces of paper organised by dividers and held together by a piece of elastic (Tye). The Internet has created many new options for recipe collecting and sharing. Websites such as Allrecipes.com and Cooks.com are open access forums where people can easily upload, download, and bookmark favourite foods. Yet, Laura Shapiro argues in Something from the Oven that the mere presence of a cookbook in one’s home does not mean it is actually used. While “popular cookbooks tell us a great deal about the culinary climate of a given period [...] what they can’t convey is a sense of the day-to-day cookery as it [is] genuinely experienced in the kitchens of real life” (xxi). The same conclusion can be applied to recipe websites. Personalised and family cookbooks are much different and much more telling documents than either unpersonalised printed books or Internet options. Family cookbooks can also take any shape or form but I define them as compilations that have been created by a single person or a small group of individuals as she/he/they evolve over time. They can be handwritten or typed and inserted into either an existing cookbook, scrapbooked, or bound in some other way. The Internet may also help here as bookmaking sites such as Blurb.com allow people to make, and even sell, their own printed books. These can be personalised with pictures and scrapbook-like embellishments. The recipes in these personal collections are influenced by contact with other people as well as printed and online publications. Also impacting these works are individual realities such as gender, race, class, and work. Unfortunately, these documents have not been the focus of much academic attention as food scholars generally analyse the texts within them rather than their practical and actual use. In order to properly understand the value and role of personal and family cookbooks in our daily lives, we must move away from generalisations to specific case studies. Only by looking at people in relationship with them, who are actually using and compiling their own recipe collections or opting instead to turn to either printed books or their computers, can we see the importance and value of family cookbooks. In order to address this methodological problem, this essay analyses a number of cookbook-related experiences that I have witnessed and/or been a part of in my own home. By moving away from the theoretical and focusing on the practical, I aim to advance Heldke’s argument that recipe reading, like foodmaking, is a thoughtful practice with important lessons. Learning to Cook and Learning to Live: What Cookbooks Teach Us Once upon a time, a mother and her two, beautiful daughters decided to make chocolate chip cookies. They took out all the bowls and utensils and ingredients they needed. The mother then plopped the two girls down among all of the paraphernalia on the counter. First, they beat the butter using their super cool Kitchen Aid mixer. Then they beat in the sugar. Carefully, they cracked and beat in the eggs. Then they dumped in the flour. They dumped in the baking powder. They dumped in the vanilla. And they dumped in the chocolate chips. Together, they rolled the cookies, placed them on a baking sheet, pat them down with a fork, and placed them in a hot oven. The house smelled amazing! The mother and her daughters were looking forward to eating the cookies when, all of a sudden, a great big dog showed up at the door. The mother ran outside to shoo the dog home yelling, “Go home, now! Go away!” By the time she got back, the cookies had started to burn and the house stank! The mother and her two daughters took all the cookie-making stuff back out. They threw out the ruined cookies. And they restarted. They beat the butter using their super cool Kitchen Aid mixer. Then they beat in the sugar. Carefully, they cracked and beat in the eggs. Then they dumped in the flour. They dumped in the baking powder. They dumped in the vanilla. And they dumped in the chocolate chips. Together, they rolled the cookies, placed them on a baking sheet, pat them down with a fork, and placed them in a hot oven. This story that my oldest daughter and I invented together goes on to have the cookies ruined by a chatty neighbour before finally finding fruition in a batch of successfully baked cookies. This is a story that we tell together as we get her ready for bed. One person is always the narrator who lists the steps while the other makes the sound effects of the beating mixer and the dumping ingredients. Together, we act out the story by rolling the cookies, patting them, and waving our hands in front of our faces when the burnt cookies have stunk up the house. While she takes great pleasure in its narrative, I take greater pleasure in the fact that, at three years of age, she has a rudimentary understanding of how a basic recipe works. In fact, only a few months ago I observed this mixture of knowledge and skill merge when I had to leave her on the counter while I cleaned up a mess on the floor. By the time I got back to her, she had finished mixing the dry ingredients in with the wet ones. I watched her from across the kitchen as she turned off the Kitchen Aid mixer, slowly spooned the flour mixture into the bowl, and turned the machine back on. She watched the batter mix until the flour had been absorbed and then repeated the process. While I am very thankful that she did not try to add the vanilla or the chocolate chips, this experience essentially proves that one can learn through simple observation and repetition. It is true that she did not have a cookbook in front of her, that she did not know the precise measurements of the ingredients being put into the bowl, and that at her age she would not have been able to make this recipe without my help. However, this examples proves Heldke’s argument that foodmaking is a thoughtful process as it is as much about instinct as it is about following a recipe. Once she is able to read, my daughter will be able to use the instincts that she has developed in her illiterate years to help her better understand written recipes. What is also important to note about this scenario is that I did have a recipe and that I was essentially the one in charge. My culinary instincts are good. I have been baking and cooking since I was a child and it is very much a part of my life. We rarely buy cookies or cakes from the store because we make them from scratch. Yet, I am a working mother who does not spend her days in the kitchen. Thus, my instincts need prompting and guidance from written instructions. Significantly, the handwritten recipe I was using that day comes from the personal cookbook that has been evolving since I left home. In their recent works Eat My Words and Baking as Biography, Janet Theophano and Diane Tye analyse homemade, hand-crafted, and personal cookbooks to show that these texts are the means through which we can understand individuals at a given time and in a given place. Theophano, for example, analyses old cookbooks to understand the impact of social networking in identity making. By looking at the types of recipes and number of people who have written themselves into these women’s books, she shows that cookbook creation has always been a social activity that reveals personal and social identity. In a slightly different way, Tye uses her own mother’s recipes to better understand a person she can no longer talk to. Through recipes, she is able to recreate her deceased mother’s life and thus connect with her on a personal and emotional level. Although academics have traditionally ignored cookbooks as being mundane and unprofessional, the work of these recent critics illustrates the extent to which cookbooks provide an important way of understanding society and people’s places within it. While this essay cannot begin to analyse the large content of my cookbook, this one scenario echoes these recent scholarly claims that personal cookbooks are a significant addition to the academic world and must be read thoughtfully, as Heldke argues, for both the recipes’s theory and for the practical applications and stories embedded within them. In this particular example, Karena and I were making a chocolate a chip cake—a recipe that has been passed down from my Oma. It is a complicated recipe because it requires a weight scale rather than measuring cups and because instructions such as “add enough milk to make a soft dough” are far from precise. The recipe is not just a meaningless entry I found in a random book or on a random website but rather a multilayered narrative and an expression of my personal heritage. As Theophano and Tye have argued, recipes are a way to connect with family, friends, and specific groups of people either still living or long gone. Recipes are a way to create and relive memories. While I am lucky that my Oma is still very much alive, I imagine that I will someday use this recipe as a way to reconnect with her. When I serve this cake to my family members, we will surely be reminded of her. We will wonder where this recipe came from, how it is different from other chocolate chip cake recipes, and where she learned to make it. In fact, the recipe already varies considerably between homes. My Oma makes hers in a round pan, my mother in a loaf pan, and I in cupcake moulds. Each person has a different reason for her choice of presentation that is intrinsic to her reality and communicates a specific part of her identity. Thus by sharing this recipe with my daughter, I am not only ensuring that my memories are being passed on but I am also programming into her characteristics and values such as critical thinking, the worthiness of homemade food, and the importance of family time. Karena does not yet have her own cookbook but her preferences mean that some of the recipes in my collection are made more often than others. My cookbook continues to change and grow as I am currently prioritising foods I know my kids will eat. I am also shopping and surfing for children’s recipe books and websites in order to find kid-friendly meals we can make together. In her analysis of children and adolescent cookbooks published between the 1910s and 1950s, Sherrie Inness demonstrates that cookbooks have not only taught children how to cook, but also how to act. Through the titles and instructions (generally aimed at girls), the recipe choices (fluffy deserts for girls and meat dishes for boys), and the illustrations (of girls cooking and boys eating), these cookbooks have been a medium through which society has taught its youth about their future, gendered roles. Much research by critics such as Laura Shapiro, Sonia Cancian, and Inness, to name but a few, has documented this gendered division of labour in the home. However, the literature does not always reflect reality. As this next example demonstrates, men do cook and they also influence family cookbook creation. A while back, my husband spent quite a bit of time browsing through the World Wide Web to find a good recipe for a venison marinade. As an avid “barbecuer,” he has tried and tested a number of marinades and rubs over the years. Thus he knew what he was looking for in a good recipe. He found one, made it, and it was a hit! Just recently, he tried to find that recipe again. Rather than this being a simple process, after all he knew exactly which recipe he was looking for, it took quite a bit of searching before he found it. This time, he was sure to write it down to avoid having to repeat the frustrating experience. Ironically, when I went to put the written recipe into my personal cookbook, I found that he had, in fact, already copied it out. These two handwritten copies of the same recipe are but one place where my husband “speaks out” from, and claims a place within, what I had always considered “my” cookbook. His taste preferences and preferred cooking style is very different from my own—I would never have considered a venison marinade worth finding never mind copying out. By reading his and my recipes together, one can see an alternative to assumed gender roles in our kitchen. This cookbook proves a practice opposite from the conclusion that women cook to serve men which Inness and others have theorised from the cookbooks they have analysed and forces food and gender critics to reconsider stereotypical dichotomies. Another important example is a recipe that has not actually been written down and inserted into my cookbook but it is one my husband and I both take turns making. Years ago, we had found an excellent bacon-cheese dip online that we never managed to find again. Since then, we have been forced to adlib the recipe and it has, in my opinion, never been as good. Both these Internet-recipe examples illustrate the negative drawbacks to using the Internet to find, and store, recipes. Unfortunately, the Internet is not a book. It changes. Links are sometimes broken. Searches do not always yield the same results. Even with recipe-storing sites such as Allrecipes.com and Cooks.com, one must take the time to impute the information and there is no guarantee that the technology will work. While authors such as Anderson and Wagner bemoan that traditional cookbooks only give one version of most recipes, there are so many recipes online that it is sometimes overwhelming and difficult to make a choice. An amateur cook may find comfort in the illustrations and specific instruction, yet one still needs to either have an instinct for what makes a good recipe or needs to be willing to spend time trying them out. Of course the same can be said of regular cookbooks. Having printed texts in one’s home requires the patience to go through them and still requires a sense of suitability and manageability. In both cases, neither an abundance nor a lack of choice can guarantee results. It is true that both the Internet and printed cookbooks such as The Better Homes and Gardens provide numerous, step-by-step instructions and illustrations to help people learn to make food from scratch. Other encyclopedic volumes such as The Five Roses: A Guide to Good Cooking, like YouTube, videos break recipes down into simple steps and include visual tools to help a nervous cook. Yet there is a big difference between the theory and the practice. What in theory may appear simple still necessitates practice. A botched recipe can be the result of using different brands of ingredients, tools, or environmental conditions. Only practice can teach people how to make a recipe successfully. Furthermore, it is difficult to create an online cookbook that rivals the malleability of the personal cookbooks. It is true that recipe websites such as Cooks.com and Allrecipes.com do allow a person to store favourite recipes found on their websites. However, unless the submitter takes the time to personalise the content, recipes can lose their ties to their origins. Bookmaking sites such as Blurb.com are attractive options that do allow for personalisation. In her essay “Aunty Sylvie’s Sponge Foodmaking, Cookbooks and Nostalgia,” Sian Supski uses her aunt’s Blurb family cookbook to argue that the marvel of the Internet has ensured that important family food memories will be preserved; yet once printed, even these treasures risk becoming static documents. As Supski goes on to admit, she is a nervous cook and one can conclude that even this though this recipe collection is very special, it will never become personal because she will not add to it or modify the content. As the examples in Theophano's and Tye’s works demonstrate, the personal touches, the added comments, and the handwritten alterations on the actual recipes give people authority, autonomy, and independence. Hardcopies of recipes indicate through their tattered, dog-eared, and stained pages which recipes have been tried and have been considered to be worth keeping. While Internet sites frequently allow people to comment on recipes and so allow cooks to filter their options, commenting is not a requirement and the suggestions left by others do not necessarily reflect personal preferences. Although they do continue a social, recipe-networking trend that Theophano argues has always existed in relation to cookbook creation and personal foodways, once online, their anonymity and lack of personal connection strips them of their true potential. This is also true of printed cookbooks. Even those compiled by celebrity chefs such as Rachel Ray and Jamie Oliver cannot guarantee success as individuals still need to try them. These examples of recipe reading and recipe collecting advance Heldke’s argument that theory and practice blend in this activity. Recipes are not static. They change depending on who makes them, where they come from, and on the conditions under which they are executed. As critics, we need to recognise this blending of theory and practice and read recipe collections with this reality in mind. Conclusion Despite the growing number of blogs and recipe websites now available to the average cook, personal cookbooks are still a more useful and telling way to communicate information about ourselves and our foodways. As this reflection on actual experiences clearly demonstrates, personal cookbooks teach us about more than just food. They allow us to connect to the past in order to better understand who we are today in ways that the Internet and modern technology cannot. Just as cooking combines theory and practice, reading personal and family cookbooks allows critics to see how theories about foodmaking and gender play out in actual kitchens by actual people. The nuanced merging of voices within them illustrates that individuals alter over time as they come into contact with others. While printed cookbooks and online recipe sites do provide their own narrative possibilities, the stories that can be read in personal and family cookbooks prove that reading them is a thoughtful practice worthy of academic attention. References All Recipes.com Canada. 2013. 24 Apr. 2013. ‹http://allrecipes.com›. Anderson, L. V. “Cookbooks Are Headed for Extinction—and That’s OK.” Slate.com 18 Jun. 2012. 24 Apr. 2013 ‹http://www.slate.com/articles/technology/future_tense/2012/06/the_future_of_cookbooks_they_ll_go_extinct_and_that_s_ok_.html›. Blurb.ca. 2013. 27 May 2013. ‹http://blurb.ca›. Cancian, Sonia. "'Tutti a Tavola!' Feeding the Family in Two Generations of Italian Immigrant Households in Montreal." Edible Histories, Cultural Politics: Towards a Canadian Food History. Ed. Franca Iacovetta, Valerie J. Korinek, Marlene Epp. Toronto: U of Toronto P, 2012. 209–21. Cooks.com Recipe Search. 2013. 24 Apr. 2013. ‹http://www.cooks.com›. Darling, Jennifer Dorland. Ed. The Better Homes and Gardens New Cookbook. Des Moines: Meredith, 1996. Five Roses: A Guide to Good Cooking. North Vancouver: Whitecap, 2003. Floyd, Janet, and Laurel Forster. The Recipe Reader. Ed. Janet Floyd and Laurel Forster. Lincoln: U of Nebraska P, 2010. Heldke, Lisa."Foodmaking as a Thoughtful Practice." Cooking, Eating, Thinking: Transformative Philosophies of Food. Ed Deane W. Curtin and Lisa M. Heldke. Indiana UP, 1992. 203–29. ---. “Recipe for Theory Making.” Hypatia 3.2 (1988): 15–29. Inness, Sherrie. Dinner Roles: American Women and Culinary Culture. U of Iowa P, 2001. Leonardi, Susan. “Recipes for Reading: Pasta Salad, Lobster à la Riseholme, Key Lime Pie,” PMLA 104.3 (1989): 340–47. Marquis, Marie. "The Cookbooks Quebecers Prefer: More Than Just Recipes." What's to Eat? Entrées in Canadian Food History. Ed. Nathalie Cooke. Montreal: McGill-Queen’s UP, 2009. 213–27. Shapiro, Laura. Something from the Oven: Reinventing Dinner in 1950s America. New York: Viking, 2004. Theophano, Janet. Eat My Words: Reading Women's Lives through the Cookbooks They Wrote. Palgrave MacMillan: New York, 2002. Tye, Diane. Baking As Biography. Canada: McGill-Queen UP, 2010. Wagner, Vivian. “Cookbooks of the Future: Bye, Bye, Index Cards.” E-Commerce Times. Ecommercetimes.com. 20 Nov. 2011. 16 April 2013. ‹http://www.ecommercetimes.com/story/73842.html›.

20

Bucher, Taina. "About a Bot: Hoax, Fake, Performance Art." M/C Journal 17, no.3 (June7, 2014). http://dx.doi.org/10.5204/mcj.814.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction Automated or semi-automated software agents, better known as bots, have become an integral part of social media platforms. Reportedly, bots now generate twenty-four per cent of all posts on Twitter (Orlean “Man”), yet we know very little about who these bots are, what they do, or how to attend to these bots. This article examines one particular prominent exemplar: @Horse_ebooks, a much beloved Twitter bot that turned out not to be a “proper” bot after all. By examining how people responded to the revelations that the @Horse_ebooks account was in fact a human and not an automated software program, the intention here is not only to nuance some of the more common discourses around Twitter bots as spam, but more directly and significantly, to use the concept of persona as a useful analytical framework for understanding the relationships people forge with bots. Twitter bots tend to be portrayed as annoying parasites that generate “fake traffic” and “steal identities” (Hill; Love; Perlroth; Slotkin). According to such news media presentations, bots are part of an “ethically-questionable industry,” where they operate to provide an (false) impression of popularity (Hill). In a similar vein, much of the existing academic research on bots, especially from a computer science standpoint, tends to focus on the destructive nature of bots in an attempt to design better spam detection systems (Laboreiro et.al; Weiss and Tscheligi; Zangerle and Specht). While some notable exceptions exist (Gehl; Hwang et al; Mowbray), there is still an obvious lack of research on Twitter bots within Media Studies. By examining a case of “bot fakeness”—albeit in a somewhat different manner—this article contributes an understanding of Twitter bots as medium-specific personas. The case of @Horse_ebooks does show how people treat it as having a distinct personality. More importantly, this case study shows how the relationship people forge with an alleged bot differs from how they would relate to a human. To understand the ambiguity of the concept of persona as it applies to bots, this article relies on para-social interaction theory as developed by Horton and Wohl. In their seminal article first published in 1956, Horton and Wohl understood para-social interaction as a “simulacrum of conversational give and take” that takes place particularly between mass media users and performers (215). The relationship was termed para-social because, despite of the nonreciprocal exposure situation, the viewer would feel as if the relationship was real and intimate. Like theater, an illusory relationship would be created between what they called the persona—an “indigenous figure” presented and created by the mass media—and the viewer (Horton and Wohl 216). Like the “new types of performers” created by the mass media—”the quizmasters, announcers or ‘interviewers’” —bots too, seem to represent a “special category of ‘personalities’ whose existence is a function of the media themselves” (Horton and Wohl 216). In what follows, I revisit the concept of para-social interaction using the case of @Horse_ebooks, to show that there is potential to expand an understanding of persona to include non-human actors as well. Everything Happens So Much: The Case of @Horse_ebooks The case of the now debunked Twitter account @Horse_ebooks is interesting for a number of reasons, not least because it highlights the presence of what we might call botness, the belief that bots possess distinct personalities or personas that are specific to algorithms. In the context of Twitter, bots are pieces of software or scripts that are designed to automatically or semi-automatically publish tweets or make and accept friend requests (Mowbray). Typically, bots are programmed and designed to be as humanlike as possible, a goal that has been pursued ever since Alan Turing proposed what has now become known as the Turing test (Gehl; Weiss and Tschengeli). The Turing test provides the classic challenge for artificial intelligence, namely, whether a machine can impersonate a human so convincingly that it becomes indistinguishable from an actual human. This challenge is particularly pertinent to spambots as they need to dodge the radar of increasingly complex spam filters and detection algorithms. To avoid detection, bots masquerade as “real” accounts, trying to seem as human as possible (Orlean “Man”). Not all bots, however, pretend to be humans. Bots are created for all kinds of purposes. As Mowbray points out, “many bots are designed to be informative or otherwise useful” (184). For example, bots are designed to tweet news headlines, stock market quotes, traffic information, weather forecasts, or even the hourly bell chimes from Big Ben. Others are made for more artistic purposes or simply for fun by hackers and other Internet pundits. These bots tell jokes, automatically respond to certain keywords typed by other users, or write poems (i.e. @pentametron, @ProfJocular). Amidst the growing bot population on Twitter, @Horse_ebooks is perhaps one of the best known and most prominent. The account was originally created by Russian web developer Alexey Kouznetsov and launched on 5 August 2010. In the beginning, @Horse_ebooks periodically tweeted links to an online store selling e-books, some of which were themed around horses. What most people did not know, until it was revealed to the public on 24 September 2013 (Orlean “Horse”), was that the @Horse_ebooks account had been taken over by artist and Buzzfeed employee Jacob Bakkila in September 2011. Only a year after its inception, @Horse_ebooks went from being a bot to being a human impersonating a bot impersonating a human. After making a deal with Kouznetsov, Bakkila disabled the spambot and started generating tweets on behalf of @Horse_ebooks, using found material and text strings from various obscure Internet sites. The first tweet in Bakkila’s disguise was published on 14 September 2011, saying: “You will undoubtedly look on this moment with shock and”. For the next two years, streams of similar, “strangely poetic” (Chen) tweets were published, slowly giving rise to a devoted and growing fan base. Over the years, @Horse_ebooks became somewhat of a cultural phenomenon—an Internet celebrity of sorts. By 2012, @Horse_ebooks had risen to Internet fame; becoming one of the most mentioned “spambots” in news reports and blogs (Chen). Responses to the @Horse_ebooks “Revelation” On 24 September 2013, journalist Susan Orlean published a piece in The New Yorker revealing that @Horse_ebooks was in fact “human after all” (Orlean “@Horse_ebooks”). The revelation rapidly spurred a plethora of different reactions by its followers and fans, ranging from indifference, admiration and disappointment. Some of the sadness and disappointment felt can be seen clearly in the many of media reports, blog posts and tweets that emerged after the New Yorker story was published. Meyer of The Atlantic expressed his disbelief as follows: @Horse_ebooks, reporters told us, was powered by an algorithm. [...] We loved the horse because it was the network talking to itself about us, while trying to speak to us. Our inventions, speaking—somehow sublimely—of ourselves. Our joy was even a little voyeuristic. An algorithm does not need an audience. To me, though, that disappointment is only a mark of the horse’s success. We loved @Horse_ebooks because it was seerlike, childlike. But no: There were people behind it all along. We thought we were obliging a program, a thing which needs no obliging, whereas in fact we were falling for a plan. (Original italics) People felt betrayed, indeed fooled by @Horse_ebooks. As Watson sees it, “The internet got up in arms about the revelation, mostly because it disrupted our desire to believe that there was beauty in algorithms and randomness.” Several prominent Internet pundits, developers and otherwise computationally skilled people, quickly shared their disappointment and even anger on Twitter. As Jacob Harris, a self-proclaimed @Horse_ebooks fan and news hacker at the New York Times expressed it: Harris’ comparisons to the winning chess-playing computer Deep Blue speaks to the kind of disappointment felt. It speaks to the deep fascination that people feel towards the mysteries of the machine. It speaks to the fundamental belief in the potentials of machine intelligence and to the kind of techno-optimism felt amongst many hackers and “webbies.” As technologist and academic Dan Sinker said, “If I can’t rely on a Twitter bot to actually be a bot, what can I rely on?” (Sinker “If”). Perhaps most poignantly, Sinker noted his obvious disbelief in a blog post tellingly titled “Eulogy for a horse”: It’s been said that, given enough time, a million monkeys at typewriters would eventually, randomly, type the works of Shakespeare. It’s just a way of saying that mathematically, given infinite possibilities, eventually everything will happen. But I’ve always wanted it literally to be true. I’ve wanted those little monkeys to produce something beautiful, something meaningful, and yet something wholly unexpected.@Horse_ebooks was my monkey Shakespeare. I think it was a lot of people’s…[I]t really feels hard, like a punch through everything I thought I knew. (Sinker “Eulogy”) It is one thing is to be fooled by a human and quite another to be fooled by a “Buzzfeed employee.” More than anything perhaps, the question of authenticity and trustworthiness seems to be at stake. In this sense, “It wasn’t the identities of the feed’s writers that shocked everyone (though one of the two writers works for BuzzFeed, which really pissed people off). Rather, it was the fact that they were human in the first place” (Farago). As Sinker put it at the end of the “Eulogy”: I want to believe this wasn’t just yet another internet buzz-marketing prank.I want to believe that @Horse was as beautiful and wonderful today as it was yesterday.I want to believe that beauty can be assembled from the randomness of life all around us.I want to believe that a million monkeys can make something amazingGod.I really, really do want to believe.But I don’t think I do.And that feels even worse. Bots as Personae: Revisiting Horton and Wohl’s Concept of Para-Social Relations How then are we to understand and interpret @Horse_ebooks and peoples’ responses to the revelations? Existing research on human-robot relations suggest that machines are routinely treated as having personalities (Turkle “Life”). There is even evidence to suggest that people often imagine relationships with (sufficiently responsive) robots as being better than relationships with humans. As Turkle explains, this is because relationships with machines, unlike humans, do not demand any ethical commitments (Turkle “Alone”). In other words, bots are oftentimes read and perceived as personas, with which people forge affective relationships. The term “persona” can be understood as a performance of personhood. In a Goffmanian sense, this performance describes how human beings enact roles and present themselves in public (Goffman). As Moore puts it, “the persona is a projection, a puppet show, usually constructed by an author and enlivened by the performance, interpretation, or adaptation”. From Marcel Mauss’ classic analysis of gifts as objects thoroughly personified (Scott), through to the study of drag queens (Stru¨bel-Scheiner), the concept of persona signifies a masquerade, a performance. As a useful concept to theorise the performance and doing of personhood, persona has been used to study everything from celebrity culture (Marshall), fiction, and social networking sites (Zhao et al.). The concept also figures prominently in Human Computer Interaction and Usability Studies where the creation of personas constitutes an important design methodology (Dong et al.). Furthermore, as Marshall points out, persona figures prominently in Jungian psychoanalysis where it exemplifies the idea of “what a man should appear to be” (166). While all of these perspectives allow for interesting analysis of personas, here I want to draw on an understanding of persona as a medium specific condition. Specifically, I want to revisit Horton and Wohl’s classic text about para-social interaction. Despite the fact that it was written almost 60 years ago and in the context of the then emerging mass media – radio, television and movies – their observations are still relevant and useful to theorise the kinds of relations people forge with bots today. According to Horton and Wohl, the “persona offers, above all, a continuing relationship. His appearance is a regular and dependable event, to be counted on, planned for, and integrated into the routines of daily life” (216). The para-social relations between audiences and TV personas are developed over time and become more meaningful to the audience as it acquires a history. Not only are devoted TV audiences characterized by a strong belief in the character of the persona, they are also expected to “assume a sense of personal obligation to the performer” (Horton and Wohl 220). As Horton and Wohl note, “the “fan” - comes to believe that he “knows” the persona more intimately and profoundly than others do; that he “understands” his character and appreciates his values and motives (216). In a similar vein, fans of @Horse_ebooks expressed their emotional attachments in blog posts and tweets. For Sinker, @Horse_ebooks seemed to represent the kind of dependable and regular event that Horton and Wohl described: “Even today, I love @Horse_ebooks. A lot. Every day it was a gift. There were some days—thankfully not all that many—where it was the only thing I looked forward to. I know that that was true for others as well” (Sinker “Eulogy”). Judging from searching Twitter retroactively for @Horse_ebooks, the bot meant something, if not much, to other people as well. Still, almost a year after the revelations, people regularly tweet that they miss @Horse_ebooks. For example, Harris tweets messages saying things like: “I’m still bitter about @Horse_ebooks” (12 November 2013) or “Many of us are still angry and hurt about @Horse_ebooks” (27 December 2013). Twitter user @third_dystopia says he feels something is missing from his life, realizing “horse eBooks hasn’t tweeted since September.” Another of the many messages posted in retrospect similarly says: “I want @Horse_ebooks back. Ever since he went silent, Twitter hasn’t been the same for me” (Lockwood). Indeed, Marshall suggests that affect is at “the heart of a wider persona culture” (162). In a Deleuzian understanding of the term, affect refers to the “capacity to affect and be affected” (Steward 2). Borrowing from Marshall, what the @Horse_ebooks case shows is “that there are connections in our culture that are not necessarily coordinated with purposive and rational alignments. They are organised around clusters of sentiment that help situate people on various spectra of activity and engagement” (162). The concept of persona helps to understand how the performance of @Horse_ebooks depends on the audience to “contribute to the illusion by believing in it” (Horton and Wohl 220). “@Horse_ebooks was my monkey” as Sinker says, suggests a fundamental loss. In this case the para-social relation could no longer be sustained, as the illusion of being engaged in a relation with a machine was taken away. The concept of para-social relations helps not only to illuminate the similarities between how people reacted to @Horse_ebooks and the way in which Horton and Wohl described peoples’ reactions to TV personas. It also allows us to see some crucial differences between the ways in which people relate to bots compared to how they relate to a human. For example, rather than an expression of grief at the loss of a social relationship, it could be argued that the responses triggered by the @Horse_ebooks revelations was of a more general loss of belief in the promises of artificial intelligence. To a certain extent, the appeal of @Horse_ebooks was precisely the fact that it was widely believed not to be a person. Whereas TV personas demand an ethical and social commitment on the part of the audience to keep the masquerade of the performer alive, a bot “needs no obliging” (Meyer). Unlike TV personas that depend on an illusory sense of intimacy, bots do “not need an audience” (Meyer). Whether or not people treat bots in the same way as they treat TV personas, Horton and Wohl’s concept of para-social relations ultimately points towards an understanding of the bot persona as “a function of the media themselves” (Horton and Wohl 216). If quizmasters were seen as the “typical and indigenous figures” of mass media in 1956 (Horton and Wohl 216), the bot, I would suggest, constitutes such an “indigenous figure” today. The bot, if not exactly a “new type of performer” (Horton and Wohl 216), is certainly a pervasive “performer”—indeed a persona—on Twitter today. While @Horse_ebooks was somewhat paradoxically revealed as a “performance art” piece (Orlean “Man”), the concept of persona allows us to see the “real” performance of @Horse_ebooks as constituted in the doing of botness. As the responses to @Horse_ebooks show, the concept of persona is not merely tied to beliefs about “what man should appear to be” (Jung 158), but also to ideas about what a bot should appear to be. Moreover, what the curious case of @Horse_ebooks shows, is how bots are not necessarily interpreted and judged by the standards of the original Turing test, that is, how humanlike they are, but according to how well they perform as bots. Indeed, we might ultimately understand the present case as a successful reverse Turing test, highlighting how humans can impersonate a bot so convincingly that it becomes indistinguishable from an actual bot. References Chen, Adrian. “How I Found the Human Being Behind @Horse_ebooks, The Internet's Favorite Spambot.” Gawker 23 Feb. 2012. 20 Apr. 2014 ‹http://gawker.com/5887697/how-i-found-the-human-being-behind-horseebooks-the-internets-favorite-spambot›. Dong, Jianming, Kuldeep Kelkar, and Kelly Braun. “Getting the Most Out of Personas for Product Usability Enhancements.” Usability and Internationalization. HCI and Culture Lecture Notes in Computer Science 4559 (2007): 291-96. Farago, Jason. “Give Me a Break. @Horse_ebooks Isn’t Art.” New Republic 24 Sep. 2013. 2 Apr. 2014 ‹http://www.newrepublic.com/article/114843/horse-ebooks-twitter-hoax-isnt-art›. Gehl, Robert. Reverse Engineering Social Media: Software, Culture, and Political Economy in New Media Capitalism. Temple University Press, 2014. Goffman, Erwin. The Presentation of Self in Everyday Life. New York: Anchor Books, 1959. Harris, Jacob (harrisj). “For a programmer like me who loves whimsical code, it’s a bit like being into computer chess and finding out Deep Blue has a guy inside.” 24 Sep. 2013, 5:03. Tweet. Harris, Jacob (harrisj). “I’m still bitter about ?@Horse_ebooks.” 12 Nov. 2013, 00:15. Tweet. Harris, Jacob (harrisj). “Many of us are still angry and hurt about ?@horse_ebooks.” 27 Dec. 2013, 6:24. Tweet. Hill, Kashmir. “The Invasion of the Twitter Bots.” Forbes 9 Aug. 2012. 13 Mar. 2014 ‹http://www.forbes.com/sites/kashmirhill/2012/08/09/the-invasion-of-the-twitter-bots›. Horton, Donald, and Richard Wohl. “Mass Communication and Para-Social Interaction: Observations on Intimacy at a Distance.” Psychiatry 19 (1956): 215-29. Isaacson, Andy. “Are You Following a Bot? How to Manipulate Social Movements by Hacking Twitter.” The Atlantic 2 Apr. 2011. 13 Mar. 2014 ‹http://www.theatlantic.com/magazine/archive/2011/05/are-you-following-a-bot/308448/›. Jung, Carl. Two Essays on Analytical Psychology, 2nd ed. London: Routledge, 1992. Laboreiro, Gustavo, Luís Sarmento, and Eugénio Oliveira. “Identifying Automatic Posting Systems in Microblogs.” Progress in Artificial Intelligence. Ed. Luis Antunes and H. Sofia Pinto. Berlin: Springer Verlag, 2011. Lee, Kyumin, B. David Eoff, and James Caverlee. “Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter.” Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011. Lockwood, Alex (heislockwood). “I want @Horse_ebooks back. Ever since he went silent, Twitter hasn’t been the same for me.” 7 Jan. 2014, 15:49. Tweet. Love, Dylan. “More than One Third of Web Traffic Is Fake.” Slate 24 Mar. 2014. 20 Apr. 2014 ‹http://www.slate.com/blogs/business_insider/2014/03/24/fake_online_traffic_36_percent_of_all_web_traffic_is_fraudulent.html›. Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self”. Journalism 15.2 (2014): 153–70. Meyer, Robinson. “@Horse_ebooks Is the Most Successful Piece of Cyber Fiction, Ever.” The Atlantic 24 Sep. 2013. 2 Apr. 2014 ‹http://www.theatlantic.com/technology/archive/2013/10/an-amazing-new-twitter-account-that-sort-of-mimics-your-tweets/280400›. Moore, Chris. “Personae or Personas: the Social in Social Media.” Persona Studies 13 Oct. 2011. 20 Apr. 2014 ‹http://www.personastudies.com/2011/10/personae-or-personas-social-in-social.html›. Mowbray, Miranda. “Automated Twitter Accounts.” Twitter and Society. Eds. Katrin Weller, Axel Bruns, Jean Burgess, Merja Mahrt and Cornelius Puschmann. New York: Peter Lang, 2014. 183-94. Orlean, Susan. “Man and Machine: Playing Games on the Internet.” The New Yorker 10 Feb. 2014. 13 Mar. 2014 ‹http://www.newyorker.com/reporting/2014/02/10/140210fa_fact_orlean›. Orlean, Susan. “@Horse_ebooks Is Human after All.” The New Yorker 24 Sep. 2013. 15 Feb. 2013 ‹http://www.newyorker.com/online/blogs/elements/2013/09/horse-ebooks-and-pronunciation-book-revealed.html›. Pearce, Ian, Max Nanis, and Tim Hwang. “PacSocial: Field Test Report.” 15 Nov. 2011. 2 Apr. 2014 ‹http://pacsocial.com/files/pacsocial_field_test_report_2011-11-15.pdf›. Perlroth, Nicole. “Fake Twitter Followers Become Multimillion-Dollar Business.” The New York Times 5 Apr. 2013. 13 Mar. 2014 ‹http://bits.blogs.nytimes.com/2013/04/05/fake-twitter-followers-becomes-multimillion-dollar-business/?_php=true&_type=blogs&_php=true&_type=blogs&_r=1›. Scott, Linda. “The Troupe: Celebrities as Dramatis Personae in Advertisem*nts.” NA: Advances in Consumer Research. Vol. 18. Eds. Rebecca H. Holman and Michael R. Solomon. Provo, UT: Association for Consumer Research, 1991. 355-63. Sinker, Dan. “Eulogy for a Horse.“ dansinker.com 24 Sep. 2013. 22 Apr. 2014 ‹http://web.archive.org/web/20140213003406/http://dansinker.com/post/62183207705/eulogy-for-a-horse›. Sinker, Dan (dansinker). “If I can’t rely on a Twitter bot to actually be a bot. What can I rely on?” 24 Sep. 2013, 4:36. Tweet. Slotkin, Jason. “Twitter ‘Bots’ Steal Tweeters’ Identities.” Marketplace 27 May 2013. 20 Apr. 2014 ‹http://www.marketplace.org/topics/tech/twitter-bots-steal-tweeters-identities›. Stetten, Melissa (MelissaStetten). “Finding out @Horse_ebooks is a Buzzfeed employee’s “performance art” is like Banksy revealing that he’s Jared Leto.” 25 Sep. 2013, 4:39. Tweet. Stewart, Kathleen. Ordinary Affects. Durham: Duke University Press, 2007. Strübel-Scheiner, Jessica. “Gender Performativity and Self-Perception: Drag as Masquerade.” International Journal of Humanities and Social Science 1.13 (2011): 12-19. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. New York: Basic Books, 2011. Tea Cake (third_dystopia). “I felt like something was missing from my life, and then I realized horse eBooks hasn't tweeted since September.” 9 Jan. 2014, 18:40. Tweet. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Touchstone, 1995. Watson, Sara. “Else 9:30: The “Monkeys with Typewriter” Algorithm.” John Battelle’s searchblog 30 Sep. 2013. 23 Mar. 2014 ‹http://battellemedia.com/archives/2013/09/else-9-30-believing-in-monkeys-with-typewriters-algorithms.php›. Weiss, Astrid, and Manfred Tscheligi.”Rethinking the Human–Agent Relationship: Which Social Cues Do Interactive Agents Really Need to Have?” Believable Bots: Can Computers Play Like People? Ed. Philip Hingston. Berlin: Springer Verlag, 2012. 1-28. Zhao, Shanyang, Sherri Grasmuck, and Jason Martin. “Identity Construction on Facebook: Digital Empowerment in Anchored Relationships.” Computers in Human Behavior 24.5 (2008): 1816-36. Zangerle, Eva, and Günther Specht. “‘Sorry, I Was Hacked’: A Classification of Compromised Twitter Accounts.” Proceedings of ACM Symposium on Applied Computing, Gyeongju, Republic of Korea, 2014.

21

Robards, Brady. "Digital Traces of the Persona through Ten Years of Facebook." M/C Journal 17, no.3 (June11, 2014). http://dx.doi.org/10.5204/mcj.818.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

When I think, rarely, about the articulation of the set of traces that I am leaving, I have the immediate apprehension that it is not the real me that’s out there on the Web. I know the times when I have censored myself (oh problematic concept!) and when I have performed actions to complement—and frequently to confound—a trace. […] Taken globally, the set of traces that we leave in the world does without doubt add up to something. It is through operations on sets of traces that I understand an event that I take part in. (Bowker 23) Over the past decade, Facebook has become integrated into the everyday lives of many of its 1.28 billion active users to the point that Facebook can no longer be considered “new media.” The site is driven by the “disclosures” (Stutzman, Gross and Acquisti) users make on the site—by uploading photos, writing status updates, commenting on posts made by others, sharing news items, entering biographical details, and so on. These digital traces of life are archived by default, persisting indefinitely as etches in Facebook’s servers around the world. Especially for young users who have grown up using Facebook, significant parts of their social and cultural lives have been played out on the site. As spaces in which the persona is enacted and made visible, social network sites like Facebook also effectively capture growing up stories through a chronicle of mediated, transitional experiences: birthdays, graduations, the beginning (and end) of relationships, first jobs, travel, and so on. For these reasons, Facebook also comes to serve as a site of memorialisation for users who have passed away. To mark its tenth anniversary (2014), Facebook drew attention to the great depth and wealth of experiences users had traced upon its pages through the release of one-minute “look back“ videos, chronicling the life of individual users over their time on Facebook. These videos have become short manifestations of the personas presented on the site, crafted through an algorithmic selection of critical moments in the user’s life (as shared on the site) to tell that user’s story. To turn Bowker’s musings in the above quote into a question, what do these sets of traces that we leave in the world add up to? In this article, I undertake a critical reading of Facebook’s look back videos to argue that they serve as the strongest reminder yet about the function of Facebook as memory archive. I draw on several sources: my own analysis of the structure of the videos themselves, the Facebook corporate blog describing the roll out of the videos, and the public campaign played out on YouTube by John Berlin to have a look back video generated for his deceased son. I argue that Facebook comes to serve two critical functions for users, as both the site upon which life narratives are performed and organised, and also the site through which the variously public and private disclosures that constitute a persona are recalled and reflected upon. In setting out these arguments, I divide this paper into three parts: first, a description and reflection upon my own experience of the look back video; second, a consideration of critical moments selected for inclusion in the look back videos by algorithm as persona; and third, a discussion of death and memorialisation, as a sharp example of the significance of the digital traces we leave behind. The Look Back Video Gentle piano music rises as the “camera” pans across an assortment of photos. The flute joins the piano, and you are reminded that you started your Facebook journey in 2006. Here is your first profile picture—you with your arm around one of your good mates when you were twenty years old. Faster now, and here are “your first moments,” presented as images you have shared: March 2008, some of your closest friends who you met during your undergraduate studies, standing around sharing a drink; April 2008, a photo of a friend eating a biscuit, mid-conversation (she’d hate this one); and one last photo from April 2008, the biscuit-eating friend’s ex-boyfriend looking coy (you no longer speak to him, but he is still on your Friends list). Now enter the violins, seventeen seconds in. Things are getting nostalgic. Here are “your most liked posts”: July 2012, “thesis submitted for examination, yo” (46 likes); November 2012, “Trust me, I’m a Doctor… of Philosophy” (98 likes); February 2013, a mess of text announcing that you’ve found a job and you’ll be leaving your hometown (106 likes). Thirty-five seconds in now, and the pace of the music changes—look how far you have come. Here are some photos you have shared: December 2008, you at a bowling alley with your arm around one of your best friends who now lives overseas; October 2009, friends trying to sleep on your couch, being disturbed by the flash of your camera; June 2010, a family shot at your mother’s birthday. The pace quickens now, as we move into the final quarter of the video: September 2010, you on the beach with friends visiting from overseas; October 2011, you with some people you met in Canada whose names you don’t recall; (images now moving faster and faster) November 2011, ice skating with friends; March 2012, a wedding in Hawaii where you were the best man; December 2012, celebrating the conferral of your PhD with two colleagues; and finally July 2013, farewelling colleagues at a going away party. In the final ten seconds, the music reaches its crescendo and the camera pans backwards to reveal a bigger collage of photos of you and your nearest and dearest. Facebook’s trademark “thumbs up”/like symbol signals the end of the retrospective, looking back on the critical moments from the last eight and a half years of your life. Underneath the video, as if signing off a card accompanying a birthday present, is “Mark” (Zuckerberg, Facebook CEO, in a faux hand-written font) “and the Facebook Team.” Facebook is you, the note seems to imply; for our anniversary, we present you back to yourself (see fig. 1). On 4 February 2014, the look back video feature was made available to all Facebook users. Some 200 million watched their videos, and more than 50% shared them with their networks (Spiridonov and Bandaru). In other words, around 100 million Facebook users held up their own individually generated look back videos as a record of the persona they had crafted through the site, and shared that persona retrospective with their networks. The videos work in the same way that television news programs piece together memorial clips for celebrities who have passed away, blending emotive music with visuals that conjure up memories and reflections. The first point of difference is that Facebook’s look back videos were intended for the living (although this function shifted as I will explain in a case study towards the end of this piece) to reflect on their own personas presented through the site, and then (about half the time) shared with their networks. The second difference is the technical, automated process of piecing together, rendering, storing, and streaming these videos on a large scale. Spiridonov and Bandaru, two Facebook engineers writing on the site’s Engineering Blog, described the rapid development and rollout of the videos. They explain the enormous pool of technical resources and human capital that were brought to bear on the project, including thirty teams across the company, in just 25 days. They end their explanatory post with an homage to “the things [they] love about Facebook culture” that the project represented for them, including “helping hundreds of millions of people connect with those who are important to them” (Spiridonov and Bandaru). The look back videos also serve a deeper purpose that isn’t addressed explicitly in any explanatory notes or press releases: to demonstrate the great depth of disclosures users make and are implicated in by others on the site. In a one-minute look back video, these disclosures come to serve as the very digital traces that Bowker was interested in, forming a longitudinal record of the persona. Algorithms and Critical Moments Although the explanatory post by Spiridonov and Bandaru did not go into details, the algorithm that determines which photos and status updates go into the look back videos appears to consider the quantity of likes and (potentially) comments on posts, while also seeking to sample disclosures made across the user’s time on the site. The latter consideration works to reinforce the perception of the longitudinal nature of the site’s memory, and the extent to which the life of the user has become entangled with, enmeshed in, and mediated through Facebook. Through the logic of the look back algorithm, critical moments in the user’s life course—those experiences that mark out narratives of growing up—become measured not in terms of their value for individuals, but instead through a quantitative metric of “likes.” While after the initial release of the look back feature, Facebook did provide users with the functionality to alter their videos with some limited control over which images could be featured, the default was determined by the algorithm. Social network sites have come to serve as spaces for reflexive identity work, for the development of personas for young people (boyd; Livingstone; Hodkinson and Lincoln; Lincoln; Robards). The transition towards adulthood is punctuated and shaped by “critical moments” (Thomson et al.) such as moving out of home, dropping out of school, entering a relationship, learning to drive, a death in the family, going clubbing for the first time, and so on. In Giddens’ terms, the “fateful moment” (from which Thomson et al. borrow in conceptualising the critical moment), is “highly consequential for a person’s destiny” (121), and should be understood as distinct from but certainly affecting the inconsequential goings-on of daily life. When these critical moments are articulated and made visible on social network sites like Facebook, and then subsequently archived by way of the persistent nature of these sites, they become key markers in a mediated growing up story for young people. Livingstone points towards the role of these sites for young people who are “motivated to construct identities, to forge new social groupings, and to negotiate alternatives to given cultural meanings” (4). Sharing, discussing, and remembering these critical moments becomes an important activity on social network sites, and thus the look back video serves to neatly capture critical moments in a one minute retrospective. Facebook has also started prompting users to record critical moments through predetermined, normative categories (see fig. 2) such as romance (a first kiss), health (losing weight and not smoking), purchases (buying a house and a car), and civic duty (voting and military service). These disclosure prompts operate at a deeper level to the logic of sharing whatever you are doing right now, and instead feed into that longitudinal memory of the site. As I have argued elsewhere (see Robards) it is clear that not all critical moments are disclosed equally on social network sites. Users may choose not to disclose some critical moments – such as breakups and periods of depression or anxiety – instead preferring to present an “idealised self.” Goffman explains that idealised presentations are aspirational, and that individuals will perform the best version of themselves (44). This isn’t a fake persona or a deception, but simply a presentation of what the individual regards to be the best qualities and appearances, contingent upon what Goffman described as the standards of the region (110). What constitutes an “authentic” persona on Facebook is clearly subjective, and dependent on those region specific standards. In my earlier research on MySpace, the quantity of friends one had was an indicator of popularity, or a quantitative measure of social capital, but over time and with the shift to Facebook this appeared to change, such that smaller networks became more “authentic” (Robards). Similarly, the kinds of disclosures users make on Facebook will vary depending on the conventions of use they have established within their own networks. Importantly, the look back algorithm challenges the user’s capacity to value their own critical moments, or indeed any moments or disclosures that might mark out a narrative of self, and instead chooses moments for the user. In this scenario, at least initially, the look back algorithm co-constructs the retrospective persona summary for the user. Only with effort, and only to a certain extent, can the user exercise curatorial control over that process. Death and Other Conclusions Although the initial function of the look back videos was for users to reflect on their own personas presented through Facebook, users who had lost loved ones quickly sought look back videos for the deceased. John Berlin, a Facebook user who had lost his son Jesse in 2012, tried to access a look back video for his son but was unsuccessful. He posted his plea to YouTube, which received almost three million views, and was eventually successful, after his request “touched the hearts of everyone who heard it” including Facebook staff (Price and DiSclafani). After receiving numerous similar requests, Facebook established a form where people could make have videos for deceased users rendered. In the words of Facebook staff, this was part of the site’s commitment to “preserve legacies on Facebook” (Price and DiSclafani). There is a growing body of research on the digital traces we leave behind after death. Leaver points out that when social media users die, the “significant value of the media traces a user leaves behind” is highlighted. Certainly, this has been the case with the look back videos, further supporting Leaver’s claim. John Berlin’s plea to have his deceased son’s look back video made available to him was presented as a key factor in Facebook’s decision to make these videos available to loved ones. Although the video’s narrative was unchanged (still pitched to users themselves, rather than their loved ones) John Berlin shared his son’s look back video on YouTube to a much wider network than he or his son may have previously imagined. Indeed, Gibson has argued that “digital remains cannot easily be claimed back into a private possessive sphere of ownership” (214). Although Jesse Berlin’s look back video did not reach the millions of viewers his father’s plea reached, on YouTube it still had some 423,000 views, clearly moving beyond Gibson’s “private possessive sphere” (214) to became a very public memorial. Bowker makes the observation that his friends and acquaintances who died before 1992 are sparsely represented online. In 1992, the first widely adopted web browser Mosaic made the Internet accessible for ordinary people in an everyday context. Bowker goes on to explain that his friends who died post-Mosaic “carry on a rich afterlife [… they] still receive email messages; links to their website rot very slowly; their informal thoughts are often captured on list-serv archives, on comments they have left on a website” (23). For Bowker, the rise of the Internet has brought about a “new regime of memory practices” (34). The implications of this new “paradigm of the trace” for Facebook users are only now becoming clear, multiplied in depth and complexity compared to the forms of digital traces Bowker was discussing. The dead, of course, have always left traces—letters, bureaucratic documents, photographs, and so on. There is nothing particularly new about the social and cultural traces that the dead leave behind, only in the way these traces persist and are circulated as the Berlin case study makes clear. The look back video brings the significance of the digital trace into a new light, challenging concepts of personal histories and the longevity of everyday personas. Now that Facebook has developed the infrastructure and the processes for rolling out these look back features, there is the possibility that we will see more in the future. The site already provides annual summaries of the user’s year on Facebook in December. It is possible that look back videos could mark out other moments, too: birthdays, new relationships, potentially even the deaths of loved ones. Might Facebook look back videos – in future forms and iterations, no doubt distinct from the ten-year anniversary video described here – come to serve as a central mechanism for memory, nostalgia, and memorialisation? I don’t have the same kind of apprehension that Bowker expresses in the quote at the top of this article, where he reflects on whether or not it is the “real” him out there on the web. Through Goffman’s dramaturgical lens, I am convinced that there is no single “authentic” persona, but rather many sides to the personas we present to others and to ourselves. The Facebook look back video figures into that presentation and that reflection, albeit through an algorithm that projects a curated set of critical moments back to us. In this sense, these videos become mirrors through which Facebook users experience the personas they have mediated on the site. Facebook is surely aware of this significance, and will no doubt continue to build the importance and depth of the digital traces users inscribe on the site into their plans for the future. References Bowker, Geoffrey C. “The Past and the Internet.” Structures of Participation in Digital Culture. New York: Social Science Research Council, 2007. 20-36. boyd, danah. “Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications.” A Networked Self: Identity, Community, and Culture on Social Network Sites. New York: Routledge, 2011. 39-58. Gibson, Margaret. “Digital Objects of the Dead: Negotiating Electronic Remains.” The Social Construction of Death: Interdisciplinary Perspectives. Ed. Leen van Brussel and Nico Carpentier. Palgrave, 2014: 212-229. Giddens, Anthony. Modernity and Self-Identity: Self and Society in the Late Modern Age. London: Palgrave Macmillan, 1993. Goffman, Erving. The Presentation of Self in Everyday Life. London: Penguin, 1959. Hodkinson, Paul, and Sian Lincoln. “Online Journals as Virtual Bedrooms? Young People, Identity and Personal Space.” Young 16.1 (2008): 27-46. Leaver, Tama. “The Social Media Contradiction: Data Mining and Digital Death.” M/C Journal 16.2 (2013). Lincoln, Siân. Youth Culture and Private Space. London: Palgrave Macmillan, 2012. Stutzman, Fred, Robert Capra, and Jamila Thompson. “Factors Mediating Disclosure in Social Network Sites.” Computers in Human Behavior 27.1 (2011): 590-598. Livingstone, Sonia. “Taking Risky Opportunities in Youthful Content Creation: Teenagers' Use of Social Networking Sites for Intimacy, Privacy and Self-Expression.” New Media & Society 10.3 (2008): 393-411. Robards, Brady. “Leaving MySpace, Joining Facebook: ‘Growing Up’ on Social Network Sites.” Continuum 26.3 (2012): 385-398. Thomson, Rachel, et al. “Critical Moments: Choice, Chance and Opportunity in Young People's Narratives of Transition.” Sociology 36.2 (2002): 335-354.

22

Ellison, Elizabeth. "The #AustralianBeachspace Project: Examining Opportunities for Research Dissemination Using Instagram." M/C Journal 20, no.4 (August16, 2017). http://dx.doi.org/10.5204/mcj.1251.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

IntroductionIn late 2016, I undertook a short-term, three-month project to share some of my research through my Instagram account using the categorising hashtag #AustralianBeachspace. Much of this work emerged from my PhD thesis, which is being published in journal articles, but has yet to be published in any accessible or overarching way. I wanted to experiment with the process of using a visual social media tool for research dissemination. I felt that Instagram’s ability to combine text and image allowed for an aesthetically interesting way to curate this particular research project. My research is concerned with representations of the Australian beach, and thus the visual, image-based focus of Instagram seemed ideal. In this article, I briefly examine some of the existing research around academic practices of research dissemination, social media use, and the emerging research around Instagram itself. I then will examine my own experience of using Instagram as a tool for depicting curated, aesthetically-driven, research dissemination and reflect whether this use of Instagram is effective for representing and disseminating research. Research DisseminationResearchers, especially those backed by public funding, are always bound by the necessity of sharing the findings and transferring the knowledge gained during the research process. Research metrics are linked to workload allocations and promotion pathways for university researchers, providing clear motivation to maintain an active research presence. For most academics, the traditional research dissemination strategies involve academic publications: peer-reviewed scholarly books and journal articles.For academics working within a higher education policy climate that centres on measuring impact and engagement, peer-reviewed publications remain the gold standard. There are indicators, however, that research dissemination strategies may need to include methods for targeting non-academic outputs. Gunn and Mintrom (21), in their recent research, “anticipate that governments will increasingly question the value of publicly funded research and seek to evaluate research impact”. And this process, they argue, is not without challenges. Education Minister Simon Birmingham supports their claim by suggesting the Turnbull Government is looking to find methods for more meaningful ways of evaluating value in higher education research outcomes, “rather than only allocating funding to researchers who spend their time trying to get published in journals” (para 5).It therefore makes sense that academics are investigating ways of using social media as a way of broadening their research dissemination, despite the fact social media metrics do not yet count towards traditional citations within the university sector.Research Dissemination via Social MediaThere has been an established practice of researchers using social media, especially blogging (Kirkup) and Twitter, as ways of sharing information about their current projects, their findings, their most recent publications, or to connect with colleagues. Gruzd, Staves, and Wilk (2348) investigated social media use by academics, suggesting “scholars are turning to social media tools professionally because they are more convenient for making new connections with peers, collaboration, and research dissemination”. It is possible to see social media functioning as a new way of representing research – playing an important role in the shaping and developing of ideas, sharing those ideas, and functioning as a dissemination tool after the research has concluded.To provide context for the use of social media in research, this section briefly covers blogging and Twitter, two methods considered somewhat separated from university frameworks, and also professional platforms, such as Academia.edu and The Conversation.Perhaps the tool that has the most history in providing another avenue for academics to share their work is academic blogging. Blogging is considered an avenue that allows for discussion of topics prior to publication (Bukvova, 4; Powell, Jacob, and Chapman, 273), and often uses a more conversational tone than academic publishing. It provides opportunity to share research in long form to an open, online audience. Academic blogs have also become significant parts of online academic communities, such as the highly successful blog, The Thesis Whisperer, targeted for research students. However, many researchers in this space note the stigma attached to blogging (and other forms of social media) as useless or trivial; for instance, in Gruzd, Staves, and Wilk’s survey of academic users of social media, an overwhelming majority of respondents suggested that institutions do not recognise these activities (2343). Because blogging is not counted in publication metrics, it is possible to dismiss this type of activity as unnecessary.Twitter has garnered attention within the academic context because of its proliferation in conference engagement and linking citation practices of scholars (Marht, Weller, and Peters, 401–406). Twitter’s platform lends itself as a place to share citations of recently published material and a way of connecting with academic peers in an informal, yet meaningful way. Veletsianos has undertaken an analysis of academic Twitter practices, and there is a rise in popularity of “Tweetable Abstracts” (Else), or the practice of refining academic abstracts into a shareable Tweet format. According to Powell, Jacob, and Chapman (272), new media (including both Twitter and the academic blog) offer opportunities to engage with an increasingly Internet-literate society in a way that is perhaps more meaningful and certainly more accessible than traditional academic journals. Like blogging, the use of Twitter within the active research phase and pre-publication, means the platform can both represent and disseminate new ideas and research findings.Both academic blogs and Twitter are widely accessible and can be read by Internet users beyond academia. It appears likely, however, that many blogs and academic Twitter profiles are still accessed and consumed primarily by academic audiences. This is more obvious in the increasingly popular specific academic social media platforms such as ResearchGate or Academia.edu.These websites are providing more targeted, niche communication and sharing channels for scholars working in higher education globally, and their use appears to be regularly encouraged by institutions. These sites attempt to mediate between open access and copyright in academic publishing, encouraging users to upload full-text documents of their publications as a means of generating more attention and citations (Academia.edu cites Niyazov et al’s study that suggests articles posted to the site had improved citation counts). ResearchGate and Academia.edu function primarily as article repositories, albeit with added social networking opportunities that differentiate them from more traditional university repositories.In comparison, the success of the online platform The Conversation, with its tagline “Academic rigour, journalistic flair”, shows the growing enthusiasm and importance of engaging with more public facing outlets to share forms of academic writing. Many researchers are using The Conversation as a way of sharing their research findings through more accessible, shorter articles designed for the general public; these articles regularly link to the traditional academic publications as well.Research dissemination, and how the uptake of online social networks is changing individual and institution-wide practices, is a continually expanding area of research. It is apparent that while The Conversation has been widely accepted and utilised as a tool of research dissemination, there is still some uncertainty about using social media as representing or disseminating findings and ideas because of the lack of impact metrics. This is perhaps even more notable in regards to Instagram, a platform that has received comparatively little discussion in academic research more broadly.Instagram as Social MediaInstagram is a photo sharing application that launched in 2010 and has seen significant uptake by users in that time, reaching 700 million monthly active users as of April 2017 (Instagram “700 Million”). Recent additions to the service, such as the “Snapchat clone” Instagram Stories, appear to have helped boost growth (Constine, para 4). Instagram then is a major player in the social media user market, and the emergence of academic research into the platform reflect this. Early investigations include Manikonda, Hu and Kambhampati’s analysis social networks, demographics, and activities of users in which they identified some clear differences in usage compared to Flickr (another photo-sharing network) and Twitter (5). Hochman and Manovich and Hochman and Schwartz examined what information visualisations generated from Instagram images can reveal about the “visual rhythms” of geographical locations such as New York City.To provide context for the use of Instagram as a way of disseminating research through a more curated, visual approach, this section will examine professional uses of Instagram, the role of Influencers, and some of the functionalities of the platform.Instagram is now a platform that caters for both personal and professional accounts. The user-interface allows for a streamlined and easily navigable process from taking a photo, adding filters or effects, and sharing the photo instantly. The platform has developed to include web-based access to complement the mobile application, and has also introduced Instagram Business accounts, which provide “real-time metrics”, “insights into your followers”, and the ability to “add information about your company” (Instagram “Instagram Business”). This also comes with the option to pay for advertisem*nts.Despite its name, many users of Instagram, especially those with profiles that are professional or business orientated, do not only produce instant content. While the features of Instagram, such as geotagging, timestamping, and the ability to use the camera from within the app, lend themselves to users capturing their everyday experience in the moment, more and more content is becoming carefully curated. As such, some accounts are blurring the line between personal and professional, becoming what Crystal Abidin calls Influencers, identifying the practice as when microcelebrities are able to use the “textual and visual narration of their personal, everyday lives” to generate paid advertorials (86). One effect of this, as Abidin investigates in the context of Singapore and the #OOTD (Outfit of the Day) hashtag, is the way “everyday Instagram users are beginning to model themselves after Influences” and therefore generate advertising content “that is not only encouraged by Influences and brands but also publicly utilised without remuneration” (87). Instagram, then, can be a very powerful platform for businesses to reach wide audiences, and the flexibility of caption length and visual content provides a type of viral curation practice as in the case of the #OOTD hashtag following.Considering the focus of my #AustralianBeachspace project on Australian beaches, many of the Instagram accounts and hashtags I encountered and engaged with were tourism related. Although this will be discussed in more detail below, it is worth noting that individual Influencers exist in these fields as well and often provide advertorial content for companies like accommodation chains or related products. One example is user @katgaskin, an Influencer who both takes photos, features in photos, and provides “organic” adverts for products and services (see image). Not all her photos are adverts; some are beach or ocean images without any advertorial content in the caption. In this instance, the use of distinctive photo editing, iconic imagery (the “salty pineapple” branding), and thematic content of beach and ocean landscapes, makes for a recognisable and curated aesthetic. Figure 1: An example from user @katgaskin's Instagram profile that includes a mention of a product. Image sourced from @katgaskin, uploaded 2 June 2017.@katgaskin’s profile’s aesthetic identity is, as such, linked with the ocean and the beach. Although her physical location regularly changes (her profile includes images from, for example, Nicaragua, Australia, and the United States), the thematic link is geographical. And research suggests the visual focus of Instagram lends itself to place-based content. As Hochman and Manovich state:While Instagram eliminates static timestamps, its interface strongly emphasizes physical place and users’ locations. The application gives a user the option to publicly share a photo’s location in two ways. Users can tag a photo to a specific venue, and then view all other photos that were taken and tagged there. If users do not choose to tag a photo to a venue, they can publically share their photos’ location information on a personal ‘photo-map’, displaying all photos on a zoomable word map. (para 14)This means that the use of place in the app is anchored to the visual content, not the uploader’s location. While it is possible to consider Instagram’s intention was to anchor the content and the uploader’s location together (as in the study conducted by Weilenmann, Hillman, and Jungselius that explored how Instagram was used in the museum), this is no longer always the case. In this way, Instagram is also providing a platform for more serious photographers to share their images after they have processed and edited them and connect the image with the image content rather than the uploader’s position.This place-based focus also shares origins in tourism photography practices. For instance, Kibby’s analysis of the use of Instagram as a method for capturing the “tourist gaze” in Monument Valley notes that users mostly wanted to capture the “iconic” elements of the site (most of which were landscape formations made notable through representations in popular culture).Another area of research into Instagram use is hashtag practice (see, for example, Ferrara, Interdonato, and Tagarelli). Highfield and Leaver have generated a methodology for mapping hashtags and analysing the information this can reveal about user practices. Many Instagram accounts use hashtags to provide temporal or place based information, some specific (such as #sunrise or #newyorkcity) and some more generic (such as #weekend or #beach). Of particular relevance here is the role hashtags play in generating higher levels of user engagement. It is also worth noting the role of “algorithmic personalization” introduced by Instagram earlier in 2017 and the lukewarm user response as identified by Mahnke Skrubbeltrang, Grunnet, and Tarp’s analysis, suggesting “users are concerned with algorithms dominating their experience, resulting in highly commercialised experience” (section 7).Another key aspect of Instagram’s functionality is linked to the aesthetic of the visual content: photographic filters. Now a mainstay of other platforms such as Facebook and Twitter, Instagram popularised the use of filters by providing easily accessible options within the app interface directly. Now, other apps such as VCSO allow for more detailed editing of images that can then be imported into Instagram; however, the pre-set filters have proven popular with large numbers of users. A study in 2014 by Araújo, Corrêa, da Silva et al found 76% of analysed images had been processed in some way.By considering the professional uses of Instagram and the functionality of the app (geotagging; hashtagging; and filters), it is possible to summarise Instagram as a social media platform that, although initially perhaps intended to capture the everyday visual experiences of amateur photographers using their smart phone, has adapted to become a network for sharing images that can be for both personal and professional purposes. It has a focus on place, with its geotagging capacity and hashtag practices, and can include captions The #AustralianBeachspace ProjectIn October 2016, I began a social media project called #AustralianBeachspace that was designed to showcase content from my PhD thesis and ongoing work into representations of Australian beaches in popular culture (a collection of the project posts only, as opposed to the ongoing Instagram profile, can be found here). The project was envisaged as a three month project; single posts (including an image and caption) were planned and uploaded six times a week (every day except Sundays). Although I have occasionally continued to use the hashtag since the project’s completion (on 24 Dec. 2016), the frequency and planned nature of the posts since then has significantly changed. What has not changed is the strong thematic through line of my posts, all of which continue to rely heavily on beach imagery. This is distinct from other academic social media use which if often more focused on the everyday activity of academia.Instagram was my social media choice for this project for two main reasons: I had no existing professional Instagram profile (unlike Twitter) and thus I could curate a complete project in isolation, and the subject of my PhD thesis was representations of Australian beaches in literature and film. As such, my research was appropriate for, and in fact was augmented by, visual depiction. It is also worth noting the tendency reported by myself and others (Huntsman; Booth) of academics not considering the beach an area worthy of focus. This resonates with Bech Albrechtslund and Albrechtslund’s argument that “social media practices associated with leisure and playfulness” are still meaningful and worthy of examination.Up until this point, my research outputs had been purely textual. I, therefore, needed to generate a significant number of visual elements to complement the vast amount of textual content already created. I used my PhD thesis to provide the thematic structure (I have detailed this process in more depth here), and then used the online tool Trello to plan, organise, and arrange the intended posts (image and caption). The project includes images taken by myself, my partner, and other images with no copyright limitations attached as sourced through photo sharing sites like Unsplash.com.The images were all selected because of their visual representation of an Australian beach, and the alignment of the image with the themes of the project. For instance, one theme focused on the under-represented negative aspects of the beach. One image used in this theme was a photo of Bondi Beach ocean pool, empty at night. I carefully curated the images and arranged them according to the thematic schedule (as can be seen below) and then wrote the accompanying textual captions. Figure 2: A sample of the schedule used for the posting of curated images and captions.While there were some changes to the schedule throughout (for instance, my attendance at the 2016 Sculpture by the Sea exhibition prompted me to create a sixth theme), the process of content curation and creation remained the same.Visual curation of the images was a particularly important aspect of the project, and I did use an external photo processing application to create an aesthetic across the collection. As Kibby notes, “photography is intrinsically linked with tourism” (para 9), and although not a tourism project inherently, #AustralianBeachspace certainly engaged with touristic tropes by focusing on Australian beaches, an iconic part of Australian national and cultural identity (Ellison 2017; Ellison and Hawkes 2016; Fiske, Hodge, and Turner 1987). However, while beaches are perhaps instinctively touristic in their focus on natural landscapes, this project was attempting to illustrate more complexity in this space (which mirrors an intention of my PhD thesis). As such, some images were chosen because of their “ordinariness” or their subversion of the iconic beach images (see below). Figures 3 and 4: Two images that capture some less iconic images of Australian beaches; one that shows an authentic, ordinary summer's day and another that shows an empty beach during winter.I relied on captions to provide the textual information about the image. I also included details about the photographer where possible, and linked all the images with the hashtag #AustralianBeachspace. The textual content, much of which emerged from ongoing and extensive research into the topic, was somewhat easier to collate. However, it required careful reworking and editing to suit the desired audience and to work in conjunction with the image. I kept captions to the approximate length of a paragraph and concerned with one point. This process forced me to distil ideas and concepts into short chunks of writing, which is distinct from other forms of academic output. This textual content was designed to be accessible beyond an academic audience, but still used a relatively formal voice (especially in comparison to more personal users of the platform).I provided additional hashtags in a first comment, which were intended to generate some engagement. Notably, these hashtags were content related (such as #beach and #surf; they were not targeting academic hashtags). At time of writing, my follower count is 70. The most liked (or “favourited”) photo from the project received 50 likes, and the most comments received was 6 (on a number of posts). Some photos published since the end of the project have received higher numbers of likes and comments. This certainly does not suggest enormous impact from this project. Hashtags utilised in this project were adopted from popular and related hashtags using the analytics tool Websta.me as well as hashtags used in similar content styled profiles, such as: #seeaustralia #thisisqueensland #visitNSW #bondibeach #sunshinecoast and so on. Notably, many of the hashtags were place-based. The engagement of this project with users beyond academia was apparent: followers and comments on the posts are more regularly from professional photographers, tourism bodies, or location-based businesses. In fact, because of the content or place-based hashtagging practices I employed, it was difficult to attract an academic audience at all. However, although the project was intended as an experiment with public facing research dissemination, I did not actively adopt a stringent engagement strategy and have not kept metrics per day to track engagement. This is a limitation of the study and undoubtedly allows scope for further research.ConclusionInstagram is a platform that does not have clear pathways for reaching academic audiences in targeted ways. At this stage, little research has emerged that investigates Instagram use among academics, although it is possible to presume there are similarities with blogging or Twitter (for example, conference posting and making connections with colleagues).However, the functionality of Instagram does lend itself to creating and curating aesthetically interesting ways of disseminating, and in fact representing, research. Ideas and findings must be depicted as images and captions, and the curatorial process of marrying visual images to complement or support textual information can make for more accessible and palatable content. Perhaps most importantly, the content is freely accessible and not locked behind paywalls or expensive academic publications. It can also be easily archived and shared.The #AustralianBeachspace project is small-scale and not indicative of widespread academic practice. However, examining the process of creating the project and the role Instagram may play in potentially reaching a more diverse, public audience for academic research suggests scope for further investigation. Although not playing an integral role in publication metrics and traditional measures of research impact, the current changing climate of higher education policy provides motivations to continue exploring non-traditional methods for disseminating research findings and tracking research engagement and impact.Instagram functions as a useful platform for sharing research data through a curated collection of images and captions. Rather than being a space for instant updates on the everyday life of the academic, it can also function in a more aesthetically interesting and dynamic way to share research findings and possibly generate wider, public-facing engagement for topics less likely to emerge from behind the confines of academic journal publications. ReferencesAbidin, Crystal. “Visibility Labour: Engaging with Influencers’ Fashion Brands and #Ootd Advertorial Campaigns on Instagram.” Media International Australia 161.1 (2016): 86–100. <http://journals.sagepub.com/doi/abs/10.1177/1329878X16665177>.Araújo, Camila Souza, Luiz Paulo Damilton Corrêa, Ana Paula Couto da Silva, et al. “It is Not Just a Picture: Revealing Some User Practices in Instagram.” Proceedings of the 9th Latin American Web Congress, Ouro Preto, Brazil, 22–24 October, 2014. <http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7000167>Bech Albrechtslund, Anne-Metter, and Anders Albrechtslund. “Social Media as Leisure Culture.” First Monday 19.4 (2014). <http://firstmonday.org/ojs/index.php/fm/article/view/4877/3867>.Birmingham, Simon. “2017 Pilot to Test Impact, Business Engagement of Researchers.” Media Release. Australian Government: Australian Research Council. 21 Nov. 2016. <http://www.arc.gov.au/news-media/media-releases/2017-pilot-test-impact-business-engagement-researchers>.Booth, Douglas. Australian Beach Cultures: The History of Sun, Sand, and Surf. London, United Kingdom: F. Cass, 2001.Bukvova, Helena. “Taking New Routes: Blogs, Web Sites, and Scientific Publishing.” ScieCom Info 7.2 (2011). 20 May 2017 <http://journals.lub.lu.se/index.php/sciecominfo/article/view/5148>.Constine, Josh. “Instagram’s Growth Speeds Up as It Hits 700 Million Users.” Techcrunch, 26 Apr. 2017. 1 June 2017 <https://techcrunch.com/2017/04/26/instagram-700-million-users/>.drlizellison. “Dr Liz Ellison.” Instagram.com, 2017. 8 June 2017 <http://www.instagram.com/drlizellison>.Ellison, Elizabeth. “The Australian Beachspace: Flagging the Spaces of Australian Beach Texts.” PhD thesis. Brisbane: Queensland U of Technology, 2013. <https://eprints.qut.edu.au/63468/>.Ellison, Elizabeth. “The Gritty Urban: The Australian Beach as City Periphery in Cinema.” Filmburia: Screening the Suburbs. Eds. David Forrest, Graeme Harper and Jonathan Rayner. UK: Palgrave Macmillan, 2017. 79–94.Ellison, Elizabeth, and Lesley Hawkes. “Australian Beachspace: The Plurality of an Iconic Site”. Borderlands e-Journal: New Spaces in the Humanities 15.1 (2016). 4 June 2017 <http://www.borderlands.net.au/vol15no1_2016/ellisonhawkes_beachspace.pdf>.Else, Holly. “Tell Us about Your Paper—and Make It Short and Tweet.” Times Higher Education, 9 July 2015. 1 June 2017 <https://www.timeshighereducation.com/opinion/tell-us-about-your-paper-and-make-it-short-and-tweet>.Ferrara, Emilio, Roberto Interdonato, and Andrea Tagarelli. “Online Popularity and Topical Interests through the Lens of Instagram.” Proceedings of the 25th ACM Conference on Hypertext and Social Media, Santiago, Chile, 1–4 Sep. 2014. <http://dx.doi.org/10.1145/2631775.2631808>.Gruzd, Anatoliy, Kathleen Staves, and Amanda Wilk. “Connected Scholars: Examining the Role of Social Media in Research Practices of Faculty Using the Utaut Model.” Computers in Human Behavior 28.6 (2012): 2340–50.Gunn, Andrew, and Michael Mintrom. “Evaluating the Non-Academic Impact of Academic Research: Design Considerations.” Journal of Higher Education Policy and Management 39.1 (2017): 20–30. <http://dx.doi.org/10.1080/1360080X.2016.1254429>.Highfield, Tim, and Tama Leaver. “A Methodology for Mapping Instagram Hashtags”. First Monday 20.1 (2015). 18 Oct. 2016 <http://firstmonday.org/ojs/index.php/fm/article/view/5563/4195>.Hochman, Nadav, and Lev Manovich. “Zooming into an Instagram City: Reading the Local through Social Media.” First Monday 18.7 (2013). <http://firstmonday.org/ojs/index.php/fm/article/view/4711/3698>.Hochman, Nadav, and Raz Schwartz. “Visualizing Instagram: Tracing Cultural Visual Rhythms.” Proceedings of the Workshop on Social Media Visualization (SocMedVis) in Conjunction with the Sixth International AAAI Conference on Weblogs and Social Media (ICWSM–12), 2012. 6–9. 2 June 2017 <http://razschwartz.net/wp-content/uploads/2012/01/Instagram_ICWSM12.pdf>.Huntsman, Leone. Sand in Our Souls: The Beach in Australian History. Carlton South, Victoria: Melbourne U Press, 2001.Instagram. “700 Million.” Instagram Blog, 26 Apr. 2017. 6 June 2017 <http://blog.instagram.com/post/160011713372/170426-700million>.Instagram. “Instagram Business.” 6 June 2017. <https://business.instagram.com/>.katgaskin. “Salty Pineapple”. Instagram.com, 2017. 2 June 2017 <https://www.instagram.com/katgaskin/>.katgaskin. “Salty Hair with a Pineapple Towel…” Instagram.com, 2 June 2017. 6 June 2017 <https://www.instagram.com/p/BU0zSWUF0cm/?taken-by=katgaskin>.Kibby, Marjorie Diane. “Monument Valley, Instagram, and the Closed Circle of Representation.” M/C Journal 19.5 (2016). 20 April 2017 <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1152>.Kirkup, Gill. “Academic Blogging: Academic Practice and Academic Identity.” London Review of Education 8.1 (2010): 75–84.liz_ellison. “#AustralianBeachspace.” Storify.com. 8 June 2017. <https://storify.com/liz_ellison/australianbeachspace>.Mahnke Skrubbeltrang, Martina, Josefine Grunnet, and Nicolar Traasdahl Tarp. “#RIPINSTAGRAM: Examining User’s Counter-Narratives Opposing the Introduction of Algorithmic Personalization on Instagram.” First Monday 22.4 (2017). <http://firstmonday.org/ojs/index.php/fm/article/view/7574/6095>.Mahrt, Merja, Katrin Weller, and Isabella Peters. “Twitter in Scholarly Communication.” Twitter and Society. Eds. Katrin Weller, Axel Bruns, Jean Burgess, Merja Mahrt, and Cornelius Puschmann. New York: Peter Lang, 2014. 399–410. <https://eprints.qut.edu.au/66321/1/Twitter_and_Society_(2014).pdf#page=438>.Manikonda, Lydia, Yuheng Hu, and Subbarao Kambhampati. “Analyzing User Activities, Demographics, Social Network Structure and User-Generated Content on Instagram.” ArXiv (2014). 1 June 2017 <https://arxiv.org/abs/1410.8099>.Niyazov, Yuri, Carl Vogel, Richard Price, et al. “Open Access Meets Discoverability: Citations to Articles Posted to Academia.edu.” PloS One 11.2 (2016): e0148257. <https://doi.org/10.1371/journal.pone.0148257>.Powell, Douglas A., Casey J. Jacob, and Benjamin J. Chapman. “Using Blogs and New Media in Academic Practice: Potential Roles in Research, Teaching, Learning, and Extension.” Innovative Higher Education 37.4 (2012): 271–82. <http://dx.doi.org/10.1007/s10755-011-9207-7>.Veletsianos, George. “Higher Education Scholars' Participation and Practices on Twitter.” Journal of Computer Assisted Learning 28.4 (2012): 336–49. <http://dx.doi.org/10.1111/j.1365-2729.2011.00449.x>.Weilenmann, Alexandra, Thomas Hillman, and Beata Jungselius. “Instagram at the Museum: Communicating the Museum Experience through Social Photo Sharing.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Paris: ACM Press, 2013. 1843–52. <dx.doi.org/10.1145/2470654.2466243>.

You might also be interested in the bibliographies on the topic 'COMPUTERS / Networking / Vendor Specific' for other source types:

Books

To the bibliography
Journal articles: 'COMPUTERS / Networking / Vendor Specific' – Grafiati (2024)

FAQs

What is computer network journal? ›

Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors.

What are the 5 most common type of computer networking? ›

There are five main types of Computer Networks:
  • LAN (Local Area Network) – Systems connected in a small network like in a building or a small office. ...
  • PAN (Personal Area Network) – The smallest computer network. ...
  • MAN (Metropolitan Area Network) – ...
  • WAN (Wide Area Network) – ...
  • VPN (Virtual Private Network): –

What are the three major types of computer network? ›

LAN (Local Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network)

What is basic computer networking? ›

Computer networking refers to interconnected computing devices that can exchange data and share resources with each other. These networked devices use a system of rules, called communications protocols, to transmit information over physical or wireless technologies. Let's answer some common computer networking FAQs.

What is a network pdf? ›

Basically, network consists of hardware component such as computer, hubs, switches, routers and other devices which form the network infrastructure. These are the devices that play an important role in data transfer from one place to another using different technology such as radio waves and wires.

What is a computer network with an example? ›

A computer network is a system that connects two or more computing devices for transmitting and sharing information. Computing devices include everything from a mobile phone to a server. These devices are connected using physical wires such as fiber optics, but they can also be wireless.

What are the 10 types of computer network? ›

Ten Types of Computer Networks: An Easy A-Z Guide
  • Campus Area Network (CAN) The network for education. ...
  • Enterprise Private Network (EPN) ...
  • Local Area Network (LAN) ...
  • Metropolitan Area Network (MAN) ...
  • Passive Optical LAN (POLAN) ...
  • Personal Area Network (PAN) ...
  • Storage Area Network (SAN) ...
  • Virtual Private Network (VPN)
Feb 22, 2019

What are the 10 types of computer network protocol? ›

Types of Internet Protocol
  • TCP/IP(Transmission Control Protocol/ Internet Protocol)
  • SMTP(Simple Mail Transfer Protocol)
  • PPP(Point-to-Point Protocol)
  • FTP (File Transfer Protocol)
  • SFTP(Secure File Transfer Protocol)
  • HTTP(Hyper Text Transfer Protocol)
  • HTTPS(HyperText Transfer Protocol Secure)
  • TELNET(Terminal Network)
Mar 24, 2023

Top Articles
Latest Posts
Article information

Author: Dr. Pierre Goyette

Last Updated:

Views: 6164

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Dr. Pierre Goyette

Birthday: 1998-01-29

Address: Apt. 611 3357 Yong Plain, West Audra, IL 70053

Phone: +5819954278378

Job: Construction Director

Hobby: Embroidery, Creative writing, Shopping, Driving, Stand-up comedy, Coffee roasting, Scrapbooking

Introduction: My name is Dr. Pierre Goyette, I am a enchanting, powerful, jolly, rich, graceful, colorful, zany person who loves writing and wants to share my knowledge and understanding with you.