Journal articles: 'Moral and ethical aspects of Online journalism' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / Moral and ethical aspects of Online journalism / Journal articles

To see the other types of publications on this topic, follow the link: Moral and ethical aspects of Online journalism.

Author: Grafiati

Published: 4 June 2021

Last updated: 7 February 2022

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 50 journal articles for your research on the topic 'Moral and ethical aspects of Online journalism.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Richards,DavidA., Holly VR Sugg, Emma co*ckcroft, Joanne Cooper, Susanne Cruickshank, Faye Doris, Claire Hulme, et al. "COVID-NURSE: evaluation of a fundamental nursing care protocol compared with care as usual on experience of care for noninvasively ventilated patients in hospital with the SARS-CoV-2 virus—protocol for a cluster randomised controlled trial." BMJ Open 11, no.5 (May 2021): e046436. http://dx.doi.org/10.1136/bmjopen-2020-046436.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

IntroductionPatient experience of nursing care is correlated with safety, clinical effectiveness, care quality, treatment outcomes and service use. Effective nursing care includes actions to develop nurse–patient relationships and deliver physical and psychosocial care to patients. The high risk of transmission of the SARS-CoV-2 virus compromises nursing care. No evidence-based nursing guidelines exist for patients infected with SARS-CoV-2, leading to potential variations in patient experience, outcomes, quality and costs.Methods and analysiswe aim to recruit 840 in-patient participants treated for infection with the SARS-CoV-2 virus from 14 UK hospitals, to a cluster randomised controlled trial, with embedded process and economic evaluations, of care as usual and a fundamental nursing care protocol addressing specific areas of physical, relational and psychosocial nursing care where potential variation may occur, compared with care as usual. Our coprimary outcomes are patient-reported experience (Quality from the Patients’ Perspective; Relational Aspects of Care Questionnaire); secondary outcomes include care quality (pressure injuries, falls, medication errors); functional ability (Barthell Index); treatment outcomes (WHO Clinical Progression Scale); depression Patient Health Questionnaire-2 (PHQ-2), anxiety General Anxiety Disorder-2 (GAD-2), health utility (EQ5D) and nurse-reported outcomes (Measure of Moral Distress for Health Care Professionals). For our primary analysis, we will use a standard generalised linear mixed-effect model adjusting for ethnicity of the patient sample and research intensity at cluster level. We will also undertake a planned subgroup analysis to compare the impact of patient-level ethnicity on our primary and secondary outcomes and will undertake process and economic evaluations.Ethics and disseminationResearch governance and ethical approvals are from the UK National Health Service Health Research Authority Research Ethics Service. Dissemination will be open access through peer-reviewed scientific journals, study website, press and online media, including free online training materials on the Open University’s FutureLearn web platform.Trial registration numberISRCTN13177364; Pre-results.

2

Wiesslitz, Carmit, and Tamar Ashuri. "‘Moral journalists’: The emergence of new intermediaries of news in an age of digital media." Journalism 12, no.8 (June14, 2011): 1035–51. http://dx.doi.org/10.1177/1464884910388236.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The article examines how online journalism fosters new models of journalism that challenge journalistic values associated with modern era journalism. It focuses on the shift from ‘objective’ journalism to an ethical journalistic practice that aims to publicize a reality of suffering that is marginalized or even denied. We argue that the digital platforms facilitate the emergence of a new journalistic model – the model of the ‘moral journalist’. Unlike the ‘objective’ journalist who (supposedly) remains outside of events and reports only ‘facts’, and unlike the ‘advocate’ journalist who aims to bring about change by reporting on events in which they take part, the ‘moral journalist’ witnesses events that involve the suffering of others with the aim of changing the witnessed reality. The claims will be grounded in an analysis of one case study: the online journalistic activities of the members of ‘Machsom Watch’ – an all female organization whose members act to monitor the human rights of Palestinians at checkpoints set up by the Israeli army and post their reports on their website.

3

Craig,DavidA., Patrick Lee Plaisance, Erin Schauster, RyanJ.Thomas, Chris Roberts, KatieR.Place, Yuan Sun, Jin Chen, Casey Yetter, and Randi Leigh Thomas. "Moving Into the Media World: The Moral Psychology of Emerging Adults in Journalism and Communication." Journalism & Mass Communication Educator 76, no.3 (February9, 2021): 314–37. http://dx.doi.org/10.1177/1077695821992244.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

A growing body of psychology-based scholarship identifies emerging adulthood as a distinct, transitional stage of life and work characterized by several features, wherein relatively little is known regarding moral development. This study is part of a 3-year, longitudinal project involving recent graduates across six U.S. universities who studied journalism and media-related fields. Guided by emerging adulthood, moral psychology, and media exemplar research, this study analyzes results for 110 graduates who completed an online survey regarding their personality traits, virtuous character, moral reasoning, and ethical ideology. It constitutes the first detailed portrait of moral identity of emerging adults in media-related fields.

4

Atabay, Gülem, Burcu Güneri Çangarli, and Şebnem Penbek. "Impact of ethical climate on moral distress revisited." Nursing Ethics 22, no.1 (August7, 2014): 103–16. http://dx.doi.org/10.1177/0969733014542674.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: Moral distress is a major problem in nursing profession. Researchers identified that the stronger the ethical basis of the organization, the less moral distress is reported. However, different ethical climates may have different impacts on moral distress. Moreover, conceptualization of moral distress and ethical climate as well as their relationship may change according to the cultural context. Objectives: The main aim of the study is to investigate the relationship between different types of ethical climate as described in Victor and Cullen’s framework, and moral distress intensity among nurses in Turkish healthcare settings. Research design: An online survey was administrated to collect data. Questionnaires included moral distress and ethical climate scales in addition to demographic questions. Participants and research context: Data were collected from registered nurses in Turkey. In all, 201 of 279 nurses completed questionnaires, resulting in a response rate of 72%. Ethical considerations: Ethical approval was obtained from the university to which the authors were affiliated, after a detailed investigation of the content and data collection method. Findings: Factor analyses showed that moral distress had three dimensions, namely, organizational constraints, misinformed and over-treated patients, and lack of time and resources, while ethical climate had four types, namely, rules, well-being of stakeholders, individualism, and organizational interests. Positive correlations were identified between certain types of ethical climate (rules, individualism, or organizational interests) and moral distress intensity. Discussion: Factor distribution of the scales shows some commonalities with the findings of previous research. However, context-specific dimensions and types were also detected. No particular ethical climate type was found to have a negative correlation with moral distress. Conclusion: Recommendations were made for reducing the negative impact of ethical climate on moral distress. These include solving the nursing-shortage problem, increasing autonomy, and improving physical conditions.

5

Monteverde, Settimio. "Undergraduate healthcare ethics education, moral resilience, and the role of ethical theories." Nursing Ethics 21, no.4 (December5, 2013): 385–401. http://dx.doi.org/10.1177/0969733013505308.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: This article combines foundational and empirical aspects of healthcare education and develops a framework for teaching ethical theories inspired by pragmatist learning theory and recent work on the concept of moral resilience. It describes an exemplary implementation and presents data from student evaluation. Objectives: After a pilot implementation in a regular ethics module, the feasibility and acceptance of the novel framework by students were evaluated. Research design: In addition to the regular online module evaluation, specific questions referring to the teaching of ethical theories were added using simple (yes/no) and Likert rating answer formats. Participants and research context: At the Bern University of Applied Sciences, a total of 93 students from 2 parallel sub-cohorts of the bachelor’s program in nursing science were sent the online survey link after having been exposed to the same modular contents. A total of 62% of all students participated in the survey. Ethical considerations: The survey was voluntary and anonymous. Students were free to write their name and additional comments. Findings: Students consider ethical theories—as taught within the proposed framework—as practically applicable, useful, and transferable into practice. Discussion: Teaching ethical theories within the proposed framework overcomes the shortcomings described by current research. Students do not consider the mutually exclusive character of ethical theories as an insurmountable problem. Conclusion: The proposed framework is likely to promote the effectiveness of healthcare ethics education. Inspired by pragmatist learning theory, it enables students to consider ethical theories as educative playgrounds that help them to “frame” and “name” the ethical issues they encounter in daily practice, which is seen as an expression of moral resilience. Since it does not advocate a single ethical theory, but is open to the diversity of traditions that shape ethical thinking, it promotes a culturally sensitive, ethically reflected healthcare practice.

6

Ohnishi, Kayoko, TeresaE.Stone, Takashi Yoshiike, and Kazuyo Kitaoka. "The role of online ethics consultation on mental health." Nursing Ethics 27, no.5 (April23, 2020): 1261–69. http://dx.doi.org/10.1177/0969733020906596.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background Nurses experience moral distress when they cannot do what they believe is right or when they must do what they believe is wrong. Given the limited mechanisms for managing ethical issues for nurses in Japan, an Online Ethics Consultation on mental health (OEC) was established open to anyone seeking anonymous consultation on mental health practice. Research objective To report the establishment of the Online Ethics Consultation and describe and evaluate its effectiveness. Ethical considerations The research was conducted in accordance with the Declaration of Helsinki. Research design This evaluation describes the outcomes of 5 years of operation of the Online Ethics Consultation on mental health in Japan Participants The Online Ethics Consultation received 12 emails requesting consultation. Consultees included mental health nurses, psychiatrists, and service users. Findings The most common questions directed to the service were about seclusion and physical restraint. Response time from receipt of email to sending a reply was between 1 and 14 days. Despite the disappointing number of consultations, feedback has been positive. Discussion The Online Ethics Consultation was established to assist morally sensitive nurses in resolving their ethical problems through provision of unbiased and encouraging advice. Mental health care in Japan has been less than ideal: long-term social hospitalization, seclusion, and restraint are common practices that often lead to moral distress in nurses and the questions received reflected this. The head of the Online Ethics Consultation sent a supportive, facilitative response summarizing the opinions of several consultants. Conclusion This study provides key information for the establishment of an online ethics resource the adoption of which has the potential to improve the experience of nurses, allied health and clients of mental health services. This paper has implications for services concerned with improving patient care, managing nurses’ moral distress, building ethics into decision-making.

7

Trobec, Irena, and Andreja Istenic Starcic. "Developing nursing ethical competences online versus in the traditional classroom." Nursing Ethics 22, no.3 (June10, 2014): 352–66. http://dx.doi.org/10.1177/0969733014533241.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: The development of society and science, especially medical science, gives rise to new moral and ethical challenges in healthcare. Research question/objectives/hypothesis: In order to respond to the contemporary challenges that require autonomous decision-making in different work contexts, a pedagogical experiment was conducted to identify the readiness and responsiveness of current organisation of nursing higher education in Slovenia. It compared the successfulness of active learning methods online (experimental group) and in the traditional classroom (control group) and their impact on the ethical competences of nursing students. The hypothesis set in the experiment, hypothesis 1 (the experimental group will be successful and will have good achievements in comprehension and application of ethical principles) was confirmed based on pre-tests and post-tests. The hypothesis tested by the questionnaire, hypothesis 2 (according to the students, the active learning methods online in the experimental group have a positive impact on the development of ethical competences) was confirmed. Research design: The pedagogical experiment was supported by a multiple-case study that enabled the in-depth analysis of the students’ attitudes towards the active learning methods in both settings. Participants and research context: The study included Slovenian first-year nursing students (N = 211) of all the enrolled students (N = 225) at the University of Ljubljana and University of Primorska in the academic year 2010/2011. Ethical considerations: Before the study ethical permission was obtained from the managements of both participating faculties. The students were given all the necessary information of the experiment before the tutorials. Findings: No significant difference was found between the two learning settings and both had a positive impact upon learning. The results of the content analysis show that the students’ active engagement with the active learning methods in the group enables the development of ethical competences and the related communicative competences, interpersonal skills, collaboration and critical thinking. Discussion: Active learning methods in the settings compared, online and the traditional classroom, enabled the development of a higher level of knowledge defined by the ability of critical thinking and reflective response, the core of ethical competences. Students develop ethical competence through active engagement in a group work, role play and discussion, and there is no difference between online or traditional learning settings. Conclusion: In the healthcare, it is crucial for providers to be capable of making autonomous decisions and managing various communication situations and contexts in which the moral attitudes and ethical sensibility are essential.

8

Petrenko,S. "Truth in soviet journalism: imitation, manipulations, consequences." Fundamental and applied researches in practice of leading scientific schools 31, no.1 (February28, 2019): 166–72. http://dx.doi.org/10.33531/farplss.2019.1.32.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The article deals with four aspects of the problem of truth in journalism of the Soviet era and their consequences in post-Soviet times: the problem of understanding the essence of the phenomenon, finding the truth in concrete situations, truth-telling by mass media to society, perception of the truth by the audience and social reflection. The methods, forms and means of the influence of Soviet journalism on the society are analyzed. The general scientific methods (analysis, deduction, induction, generalization) and the strategy of the substantiated theory are used. The results of the research have scientific and practical significance, they reveal the causes of certain social and communicative consequences of the controlled interaction of the society with the media, transformation of moral and ethical values and concepts, and provide research material on the methodology and technology of mass communication impacts. The author concludes about the need to return society as a whole, and journalism in particular, to understanding, perception of the essential meanings of the truth, in particular its metaphysical nature, and the formation of truth-centered socially responsible position of the journalist.

9

Pezaro, Sally, Wendy Clyne, and Clare Gerada. "Confidentiality, anonymity and amnesty for midwives in distress seeking online support – Ethical?" Nursing Ethics 25, no.4 (July4, 2016): 481–504. http://dx.doi.org/10.1177/0969733016654315.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Research design: Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Findings: Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Discussion: Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. Conclusion: In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this article argue that the principles of confidentiality, anonymity and amnesty should be upheld in the pursuit of the greatest benefit for the greatest number of people.

10

O’Connell,ChristopherB. "Gender and the experience of moral distress in critical care nurses." Nursing Ethics 22, no.1 (January30, 2014): 32–42. http://dx.doi.org/10.1177/0969733013513216.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: Nursing practice is complex, as nurses are challenged by increasingly intricate moral and ethical judgments. Inadequately studied in underrepresented groups in nursing, moral distress is a serious problem internationally for healthcare professionals with deleterious effects to patients, nurses, and organizations. Moral distress among nurses has been shown to contribute to decreased job satisfaction and increased turnover, withdrawal from patients, physical and psychological symptoms, and intent to leave current position or to leave the profession altogether. Research question: Do significant gender differences exist in the moral distress scores of critical care nurses? Research design: This study utilized a quantitative, descriptive methodology to explore moral distress levels in a sample of critical care nurses to determine whether gender differences exist in their mean moral distress scores. Participants and research context: Participants ( n = 31) were critical care nurses from an American Internet nursing community who completed the Moral Distress Scale–Revised online over a 5-day period in July 2013. Ethical considerations: Institutional review board review approved the study, and accessing and completing the survey implied informed consent. Findings: The results revealed a statistically significant gender difference in the mean moral distress scores of participants. Females reported statistically significantly higher moral distress scores than did males. Overall, the moral distress scores for both groups were relatively low. Discussion: The findings of a gender difference have not previously been reported in the literature. However, other findings are consistent with previous studies on moral distress. Conclusion: Although the results of this study are not generalizable, they do suggest the need for continuing research on moral distress in underrepresented groups in nursing, including cultural and ethnic groups.

Abstract:

Background: Moral philosophical positions and professional values have been shown to influence nurses’ practice behaviours. Understanding nursing students’ professional values and ethical ideologies, therefore, is important as they may help inform evidence-informed curriculum decisions and education strategies to develop students’ professional reflective competencies. However, there is a dearth in current empirical data on Canadian nursing students’ perceptions of professional values and ethical positions. Objectives: This study’s purpose was to examine undergraduate nursing student’s perceptions of professional values and ethical ideology and explore relationships in data and selected participant demographic variables. Research design, participants and context: A descriptive cross-sectional research design was conducted with a convenience sample of undergraduate nursing students recruited from a university in Canada. An online encrypted survey consisting of two validated instruments was administered to participants who met study eligibility criteria. Descriptive and inferential statistics were employed to analyse the data and classify nursing students’ ethical ideologies into four categories based on mean scores for idealism and relativism. Ethical considerations: This study received ethical approval from the institutional Behavioural Research Ethics Board and was executed in-line with ethical principles for research involving humans. Findings: Nursing students scored high on professional values and ethical idealism and differed significantly on a measure of ethical relativism in terms of age and year of study. Professional values were significantly associated with ethical idealism. Based on mean scores for idealism and relativism, most nursing students in the study were classified as situationists. Discussion and conclusion: Findings suggest that faculty pay attention to influences of moral philosophical positions in facilitating nursing students’ professional values development. Implications for future research and curriculum are highlighted to strengthen nursing students’ professional values.

12

Rosenstock, Roland. "Computerspiele und Soziale Netzwerke." Zeitschrift für Evangelische Ethik 58, no.4 (October1, 2014): 273–85. http://dx.doi.org/10.14315/zee-2014-0406.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

AbstractEthics regarding media use can be pointed out in several situations in which media are used. The article takes Grand Theft Auto V, published by Rockstar Games, as an example to show opportunities and limits of the »acting subject« - the gamer - in computer and online games. Human dignity is debated by reference to socio-critical aspects which are confronted with the violation of moral limits. Finally, computer games are highlighted as a convenient medium for the process of ethical learning.

13

Regan,Á., M.Henchion, and B.McIntyre. "Ethical, moral and social dimensions in farm production practices: a segmentation study to assess Irish consumers’ perceptions of meat quality." Irish Journal of Agricultural and Food Research 57, no.1 (March9, 2018): 9–14. http://dx.doi.org/10.1515/ijafr-2018-0002.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

AbstractGrowing consumer concerns with modern farming and food production systems indicate a significant market opportunity for meat production practices that consider ethical, moral and social value traits. In the current study, we aimed to identify and characterise distinct segments of Irish consumers based on their perceptions of the quality of meat from different farm-level production practices (organic farming, high animal welfare standards, free range farming, and “natural”, treatment-free feeding regimes). An online survey was carried out with 251 Irish meat consumers. Using cluster analysis, we identified three distinct segments: “Target consumers”, “Purist consumers” and “Disinterested consumers”. Chi-square analyses revealed differences between the segments based on gender, age and meat-purchasing motivations. The results provide insight into the opportunities that exist for exploring new viable market segments as well as for engaging Irish consumers and empowering them with information around the ethical, social and moral aspects of farm-level practices related to meat production.

14

Gjukaj, Driton, Daniel Drewniak, and Nikola Biller-Andorno. "Ethical issues faced by Muslim patients: An empirical study of Muslim and non-Muslim students’ perceptions." Clinical Ethics 13, no.2 (November14, 2017): 67–74. http://dx.doi.org/10.1177/1477750917738112.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background Patients who follow a specific religion may experience specific moral conflicts when interacting with the health care system. Health care providers’ awareness of and sensitivity to such issues can be beneficial to patients and increase the quality of care they receive. The aims of this study were to investigate (1) which potential ethical issues were considered to be relevant to Muslim patients and (2) to examine if these assessments varied between Muslim non-medical, Muslim medical, and non-Muslim medical students. Methods An online questionnaire with n = 205 students from different universities in Zurich, Switzerland was conducted. The questionnaire contained a list of ethical issues of presumed relevance to Muslim patients, which had been compiled based on a literature search and an expert consultation. Results Muslim non-medical students considered 33% of the ethical issues as morally problematic to Muslim patients. In contrast, Muslim medical students regarded 19%, and non-Muslim medical students 14%, of the issues as morally problematic. All three groups identified female circumcision and abortion as problematic for Muslim patients. Muslim non-medical students additionally highlighted access to a prayer room and to a professional Muslim chaplain as important to them. Conclusions There are different ideas about which issues are of moral relevance to Muslim patients. Further studies investigating Muslim patients’ views and the extent to which these views matched with health care providers’ assessments of ethical issues relevant to their Muslim patients, are needed to provide a robust empirical basis for culturally sensitive, patient-oriented clinical care.

15

Kleinknecht-Dolf, Michael, Irena Anna Frei, Elisabeth Spichiger, Marianne Müller, JacquelineS.Martin, and Rebecca Spirig. "Moral distress in nurses at an acute care hospital in Switzerland." Nursing Ethics 22, no.1 (June10, 2014): 77–90. http://dx.doi.org/10.1177/0969733014534875.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: In the context of new reimbursem*nt systems like diagnosis-related groups, moral distress is becoming a growing problem for healthcare providers. Moral distress can trigger emotional and physical reactions in nurses and can cause them to withdraw emotionally from patients or can cause them to change their work place. Objective: The aim of this pilot study was to develop an instrument to measure moral distress among acute care nurses in the German-speaking context, to test its applicability, and to obtain initial indications of the instrument’s validity. Method: The study was designed in 2011 as a cross-sectional pilot survey. Conducted on eight units of one university hospital in German-speaking Switzerland, 294 registered nurses were asked to fill out a web-based questionnaire on moral distress. Ethical considerations: The study proposal was approved by the cantonal ethics committee. All participating nurses provided informed consent and were assured of data confidentiality. Results: The survey had a response rate of 55%. The results show the prevalence of statements on the questionnaire indicating situations with the potential to trigger moral distress. The entire range of answers was used in the responses. Most participants found the questionnaire comprehensible, while some criticized the phraseology of certain statements. Many more found the registration process prior to online access to be too time consuming. Nurses confirmed that the results reflect their subjective assessment of their situation and their experience of moral distress. Conclusion: The newly developed moral distress questionnaire appears to produce face validity and is sufficiently applicable for use in our study. The results indicate that moral distress appears to be a relevant phenomenon also in Swiss hospitals and that nurses were experiencing it prior to the introduction of Swiss diagnosis-related groups.

16

Shilton, Katie, Donal Heidenblad, Adam Porter, Susan Winter, and Mary Kendig. "Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation." Science and Engineering Ethics 26, no.6 (July1, 2020): 2911–26. http://dx.doi.org/10.1007/s11948-020-00250-0.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

AbstractThere is growing consensus that teaching computer ethics is important, but there is little consensus on how to do so. One unmet challenge is increasing the capacity of computing students to make decisions about the ethical challenges embedded in their technical work. This paper reports on the design, testing, and evaluation of an educational simulation to meet this challenge. The privacy by design simulation enables more relevant and effective computer ethics education by letting students experience and make decisions about common ethical challenges encountered in real-world work environments. This paper describes the process of incorporating empirical observations of ethical questions in computing into an online simulation and an in-person board game. We employed the Values at Play framework to transform empirical observations of design into a playable educational experience. First, we conducted qualitative research to discover when and how values levers—practices that encourage values discussions during technology development—occur during the design of new mobile applications. We then translated these findings into gameplay elements, including the goals, roles, and elements of surprise incorporated into a simulation. We ran the online simulation in five undergraduate computer and information science classes. Based on this experience, we created a more accessible board game, which we tested in two undergraduate classes and two professional workshops. We evaluated the effectiveness of both the online simulation and the board game using two methods: a pre/post-test of moral sensitivity based on the Defining Issues Test, and a questionnaire evaluating student experience. We found that converting real-world ethical challenges into a playable simulation increased student’s reported interest in ethical issues in technology, and that students identified the role-playing activity as relevant to their technical coursework. This demonstrates that roleplaying can emphasize ethical decision-making as a relevant component of technical work.

17

Perera-Delcourt, Ramesh, RobertA.Nash, and SusanJ.Thorpe. "Priming Moral Self-Ambivalence Heightens Deliberative Behaviour in Self-Ambivalent Individuals." Behavioural and Cognitive Psychotherapy 42, no.6 (September27, 2013): 682–92. http://dx.doi.org/10.1017/s1352465813000507.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: Recent work on cognitive-behavioural models of obsessive-compulsive disorder has focused on the roles played by various aspects of self-perception. In particular, moral self-ambivalence has been found to be associated with obsessive-compulsive phenomena. Aims: In this study we used an experimental task to investigate whether artificially priming moral self-ambivalence would increase participants’ deliberation on ethical problems, an index that might be analogous to obsessive-compulsive behaviour. Method: Non-clinical participants completed two online tasks designed to prime either moral self-ambivalence, general uncertainty, or neither. All participants then completed a task requiring them to consider solutions to moral dilemmas. We recorded the time participants took to respond to the dilemmas and the length of their responses; we then combined these variables to create a measure of deliberation. Results: Priming moral self-ambivalence led to increases in deliberation, but this was only significant among those participants who scored highly on a baseline measure of moral self-ambivalence. Priming general uncertainty had no significant effect upon deliberation. Conclusions: The results suggest that moral self-ambivalence may play a role in the maintenance of obsessive-compulsive behaviour. We propose that individuals who are morally self-ambivalent might respond to situations in which this ambivalence is made salient by exhibiting behaviour with obsessive-compulsive characteristics. These findings have implications for the incorporation of ideas about self-concept into theories of obsessive-compulsive disorder.

18

Ryu, Sunghan, and Byungho Park. "Do I want to pay to download movies." Journal of Information, Communication and Ethics in Society 16, no.1 (March12, 2018): 45–60. http://dx.doi.org/10.1108/jices-03-2017-0019.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Purpose The purpose of this study is to understand the nature and characteristics of legal movie download services and to explore the factors that influence user acceptance of the services. Design/methodology/approach The authors analyzed the three aspects (i.e. hedonic information systems, ethical and legal consideration and user characteristics) of legal movie download services and empirically examined how they affect the potential users’ behavioral intent to adopt the services based on the theory of reasoned action (TRA). An online survey of 142 respondents about a real legal movie download services, currently operated by a major online service provider, was conducted. Findings Perceived playfulness and perceived usefulness had statistically significant effects on attitude. The relationships between subjective norms and its influencers are validated for moral judgment as well as risk aversion. The influence of price consciousness and past experience on behavioral intent to adopt the service are both supported. In the TRA model, attitude and subjective norms had statistically significant influence on behavioral intent to adopt the services. Originality/value The authors contribute to extending the literature on online pirating behavior from the different perspective, i.e. adoption of new legal alternatives. The study shows that the specific boundary conditions, i.e. hedonic attribute of information systems and existence of illegal alternatives, would generate the different results from the theories and previous literature.

19

Minyar-Beloroucheva,AllaP., PolinaI.Sergienko, OlgaD.Vishnyakova, ElizavetaA.Vishnyakova, and OksanaG.Anossova. "Axiological approach to developing spirituality and morality in the process of L2 PR education." SHS Web of Conferences 103 (2021): 01024. http://dx.doi.org/10.1051/shsconf/202110301024.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The article is devoted to the analysis of fundamental aspects of spiritual and ethical education as well as to the development of cultural and moral values, pertaining to global citizens and proponents of sustainable development in the system of undergraduate PR education. The authors view the issues dealing with fostering the feelings of duty, breeding responsibility before other people and the environment, respect for human rights and freedoms as well love and deference for one’s family, the country and the whole world in the process of L2 PR studies. An individual trajectory chosen for L2 PR undergraduates’ needs and capabilities focuses on their intellectual as well as cultural development, thereby serving the purpose of enhancing their individual qualities. The spiritual image and values of L2 PR undergraduates are influenced by all the global problems of our time, including understanding life as the greatest value, preserving the world, the environment, and the entire cultural heritage. Spirituality implies a certain state of human self-awareness to make the one find new expressions in thoughts, in language and actions. This is the foundation for building a healthy and strong society and nations. Online extracurricular activities allow the educators to form not only the basic social, moral and cultural values that guide society, but also contribute to the personal growth of young people, their formation as individuals, the realization of all their potentials and abilities.

20

Cho, Kap-Chul, and Gisoo Shin. "Operational effectiveness of blended e-learning program for nursing research ethics." Nursing Ethics 21, no.4 (November19, 2013): 484–95. http://dx.doi.org/10.1177/0969733013505310.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: Since 2006, the Korean Ministry of Education, Science and Technology, and the National Research Foundation of Korea have taken the lead in developing an institutional guideline for research ethics. Objectives: The purpose was to identify the effectiveness of the Good Research Practice program, developed on a fund granted by the National Research Foundation of Korea, for nurses and nursing students whose knowledge and perception of research ethics were compared before and after the implementation of the Good Research Practice program. Research design: This study was conducted to compare the levels of knowledge and perception of research ethics in the participants before and after the program was implemented. Participant and research context: The participants included 45 nurses and 69 nursing students from hospitals, colleges of nursing, and the Korean Nurses Association, located in Seoul, Korea. Ethical considerations: This study was approved by the Institutional Research Board in Korea. Findings: Based on the Analysis, Design, Development, Implementation, and Evaluation model, the Good Research Practice program was made up of a total of 30 h of the blended learning both online and off-line. The results of this study showed that there were statistically significant differences in both knowledge and perception of research ethics in nursing students and nurses before and after the program had been implemented. Discussion: The concepts of professional nursing ethics, moral issues, and bioethics were often confused with one another and not clearly defined. Therefore, the concept and scope of bioethics, moral judgment, and overall nursing ethics should be well defined and conceptualized in the future. Conclusions: This study suggested integrating research ethics education in the nursing curriculum as a required course of study for nursing students and as part of the in-service training program for nurses in order to improve research ethics in nursing research in Korea.

21

Biller-Andorno, Nikola, Giovanni Spitale, Bettina Schwind, Kristen Jafflin, Andrea Kaiser-Grolimund, and Sonja Merten. "Publico – A Digital Tool for Pandemic Crisis Communication and Management." Studia Universitatis Babeş-Bolyai Bioethica 66, Special Issue (September9, 2021): 34–35. http://dx.doi.org/10.24193/subbbioethica.2021.spiss.13.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

"COVID-19 vividly demonstrates the global challenges of crisis communication. A flood of pandemic-related information from various sources and highly variable quality is inundating media platforms. To counter this “infodemic”, providing high-quality information is not sufficient. Real-time feedback loops from the public to policy-makers are urgently needed to better align communication strategies, actions taken, and public perception. To achieve this, the PubliCo online platform was launched in November 2020 in Switzerland. It follows a transdisciplinary multi-stakeholder approach rooted in participatory citizen science. PubliCo (https://publico.community/en/) includes three parts: 1. PubliCo Survey, collecting quantitative data, e.g. on moral preferences, while feeding back contextualized, tailored information to users; 2. PubliCo Diaries, collecting in-depth qualitative data, which also informs efforts to adapt PubliCo Survey to the evolving situation; and 3. PubliCo Analytics, which allows policymakers and other platform users to continuously analyse the collected data. We will present the PubliCo concept, considering the following key points: 1. Ethical considerations in the development of PubliCo concerning citizen science and crisis management. 2. PubliCo as a practical tool to implement the procedural ethics concepts such as Accountability for Reasonableness. 3. Lessons learned challenges, and opportunities for the transferability of PubliCo to better manage future crises in different global contexts. With our contribution, we aim to simulate a discussion on the ethical aspects of crisis communication and the strengths and limitations of citizen participation. "

22

Flores-Vivar, Jesús Miguel, and Ana María Zaharía. "Las facultades de comunicación como `laboratorios de prueba y error´ en la enseñanza-experimentación del nuevo periodismo." South Florida Journal of Development 2, no.3 (July28, 2021): 4622–42. http://dx.doi.org/10.46932/sfjdv2n3-062.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

RESUMEN El presente trabajo analiza los aspectos formativos que tienen las facultades de comunicación, las tendencias y las iniciativas que algunos centros están desarrollando como parte experimental del ecosistema del periodismo en Internet, cada vez más consolidado aunque con incertidumbres en sus modelos de negocio, narrativos e informativos. Fomenta el desarrollo de la investigación aplicada, a través de medialabs, de nuevos modelos periodísticos -sin menoscabo de los valores éticos y de la calidad en la redacción-, en las ilustraciones, correcciones y producción de materiales en plataformas digitales y multimedia. Propone una reflexión del periodismo, no sólo como profesión, sino, fundamentalmente, como disciplina científica, avalada y justificada su enseñanza en las Facultades de Comunicación. En este contexto, las facultades con estudios de periodismo asumen un papel fundamental y de vital importancia en la formación de periodistas de nuevo perfil, con un tipo de conocimientos que obliga a una revisión permanente de los planes de estudio. La metodología para realizar este estudio se basa en la revisión bibliográfica, informes y estudios sobre la formación periodística en donde impera lo multimedia, lo digital y lo online. Se complementa con un estudio Delphi, realizado a profesores-investigadores y profesionales de periodismo. Con los resultados obtenidos se pretende ofrecer algunas reflexiones sobre la formación periodística más experimental para estudiantes que deberán atender las necesidades informativas de una nueva “Sociedad red” (Castells, 2006), en donde los ciudadanos atienden a una definición distinta del acceso a la información y a su derecho a estar informados con contenidos de calidad, lo que consolida nuevas vivencias como algo especialmente nuevo, conocido ya como los “New, new media” (Levinson, 2012). ABSTRACT his paper analyzes the educational aspects of communication faculties, trends and initiatives that some centers are developing as an experimental part of the ecosystem of journalism on the Internet, increasingly consolidated although with uncertainties in their business, narrative and informative models . It encourages the development of applied research, through medialabs, of new journalistic models - without prejudice to ethical values ​​and quality in writing - in illustrations, corrections and production of materials on digital and multimedia platforms. It proposes a reflection of journalism, not only as a profession, but, fundamentally, as a scientific discipline, endorsed and justified by its teaching in the Faculties of Communication. In this context, the faculties with journalism studies assume a fundamental and vital role in the training of new profile journalists, with a type of knowledge that requires a permanent review of the study plans. The methodology to carry out this study is based on the bibliographic review, reports and studies on journalistic training where multimedia, digital and online prevail. It is complemented by a Delphi study, carried betwin professors-researchers and journalism professionals. With the results obtained, it is intended to offer some reflections on the more experimental journalistic training for students who will have to attend to the informational needs of a new "Network Society" (Castells, 2006), where citizens attend to a different definition of access to information and their right to be informed with quality content, which consolidates new experiences as something especially new, known as the “New, new media” (Levinson, 2012).

23

Vaskiv, Mykola. "Journalistic publications features of columnist Viacheslav Medvid." Synopsis: Text Context Media 26, no.4 (2020): 159–71. http://dx.doi.org/10.28925/2311-259x.2020.4.7.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The subject of the inquiry is the peculiarity of Ukrainian literary columnistics. The main problem of the paper was to find out the reasons for the flourishing of Ukrainian columnistics at the intersection of fiction and journalism, to outline the main range of its themes, motives, images as exemplified by V. Medvid’s publications. Only ever some theoretical aspects of author’s columns in national magazines were the object of research of Ukrainian scholars, without a thorough analysis of particular journalistic works, so a detailed description of the writer’s columnist output has determined the scientific novelty of the paper. The objective of the paper is a comprehensive study of the individual uniqueness of the content in author’s columns by V. Medvid against the backdrop of the development of national columnistics and journalism in the 1990s and 2000s. For this purpose, a cultural-historical method was used to determine the reasons for writing and the context of specific publications of the columnist, their place and role in the work of the writer and in the intellectual life of Ukrainian society; a philological method was used for the analysis of texts of these publications and a comparative method was used to determine the commonalities and differences in the materials of the author’s columns by V. Medvid and other Ukrainian writers of this period. The results of the study are: 1) Among various definitions of the author’s column for Ukrainian columnistics, the most acceptable is its understanding as a rubric, which contains works of different genres, but in a specific column — works of one genre and one style, as evidenced by the output by V. Medvid. In the rubrics “Literary Pages” and “Librarian-review” V. Medvid finds himself as a literary critic, publishing reviews of anthologies of modern literature in the former and short literary portraits of contemporaries in the latter. Publications in the columns “From the Heights and Lowlands” and “Light and Shadow” are descriptive, essayistic. 2) V. Medvid’s columnistics emerges as a synthesis of public attention to key social, moral and ethical problems, an unbiased author’s worldview and a unique parable style of a writer-publicist. 3) It is stated that publications with clear, mostly simplified, conclusions, as well as clear accents in the division into positive and negative, are popular with readers of magazines, so V. Medvid’s columnistics was not very successful in general. His writing requires of the readers a high intellectual level, intended for a narrow elite audience. The application of the paper lies in the possibility of using its results in works on journalistic genre, the history of Ukrainian journalism and literature of the XX–XXI centuries, in the study of V. Medvid’s work.

24

Venkatasawmy, Rama. "Communication and Media Education in an Era of Big Data." Journal of Interdisciplinary Studies in Education 7, no.1 (December6, 2018): 87–101. http://dx.doi.org/10.32674/jise.v7i1.1063.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Fundamental aspects of work carried out in the communication, media and creative industries are growingly being impacted upon by intense data-centric occurrences or Big data – which is constituted by vast amounts of information generated about and by social media users, instagrammers, tweeters, online retailers and service providers, shoppers, subscribers and netizens in general. Such information is categorized, scrutinized and processed so that substantial indications, extrapolations and inferences can be derived: and those subsequently influence investment decisions, production processes and output generation in the media, communication and creative industries (such as television, journalism, advertising and public relations). The quantifying and computing data-driven procedures associated with the collection, examination and depiction of Big Data bear explicit resonance in comprehending the intersection of communication, media and creative industries with technology and society. This resonance inevitably needs to be assimilated into the contemporary teaching of communication and media programs in higher education contexts. It has become vital for educators to ensure that contemporary communication and media students fully understand why and how large-scale datasets are collected, analyzed and interpreted so as to make sense of and to create value out of digital information. Big Data has now to be not simply addressed but fully incorporated into communication and media education, essentially to enable future generations of communication and media professionals to understand and apply Big Data in decision-making and when generating creative output. It is necessary to include Big Data in the teaching curriculum of communication and media programs because Big Data developments are already impacting strongly on the ways of knowing and of doing, as well as on the negotiation of value and on ethical considerations within the communication, media and creative industries.

25

Sedliacikova, Mariana, Anna Kocianova, Michal Dzian, and Josef Drabek. "Product Sampling as a Sales Promotion Tool." Marketing and Management of Innovations, no.1 (2020): 136–48. http://dx.doi.org/10.21272/mmi.2020.1-11.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Product sampling in the retail chains relates to marketing, it makes part of the in-store marketing, and it is one of the sale promotion tools. It used to promote the sales of non-durable products, i.e. food. The paper aimed to find out how it is perceived by customers of retail chains (consumers) in Slovakia. An essential aspect of the sampling effectiveness was verified, namely the addressing of potential customers by the promoters. The article focused on ethical practices during the samplings. The subject of interest was to confirm whether promoters keep basic ethical and moral principles. The repeated request for sampling was one of the points. The vital aspect of the sampling ethics was also considered as well as the truthfulness of customer responses to promoter questions about the taste of the product. The sampling ethics was judged from both viewpoints of the sampling participants. The questionnaire survey was carried out to meet the goal, and the sampling participants were addressed. The online questionnaire method was applied, in which 484 respondents were directed. The survey results have shown that customers perceive samplings positively. Sampling has found its application in Slovakia, and it is a relatively accessible tool for promotion of sales (also from the viewpoint of producers). The promoter is the major contributor to the number of participating customers. The main aspects influencing the level of sampling ethics are the age and gender of the customers. It is believed that at any time, it is appropriate to verify the ethics of one of the sales promotion tools – sampling, and at the same time to find out how customers perceive it. The paper contributes to the area of in-store marketing. It brings findings focused on the popularity of the sampling in practice, purchasing habits of the customers, and at the same time, it opens a space for further improvements. Keywords sampling, sampling perception, sampling ethics, customers, promoters.

26

Kononchuk,T.I. "PANTELEIMON KULISH AS A LITERARY CRITIC: FEATURES OF STYLE." Literary Studies, no.59 (2020): 82–89. http://dx.doi.org/10.17721/2520-6346.1(59).82-89.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The article deals with the work of Panteleimon Kulish (1819–1897) as a literary critic. Here is analyzed his article about Hryhoriy Kvitka-Osnovianenko, which was published in 1858 in St. Petersburg in a separate brochure. It has been found out that consideration of the writer’s creativity in the historical and world context, conclusion of generalizations, clarification of the most characteristic aesthetic features of the analyzed works, view on creativity through the author’s biography, journalism, emotionality, argumentation are characteristic for style of Kulish as a literary critic. At the beginning of the article, Kulish talks about the place and role of literature in society. He draws attention to the development and level of literature in the context of the historical development of the state. He gives examples from different literatures and concludes that the development of culture does not always go hand in hand with the development of the state. The author says that the opposite is the case: the decline of a state or kingdom is observed, and at the same time, literature, culture is developing. P. Kulish gives examples from Czech, Polish literature. These facts are important to him because he sees the same in Ukrainian literature. Kulish speaks about literature as a national spirit living in the artistic word. He emphasizes that literature is the key to being a nation. Analyzing the work of H. Kvitka-Osnovyanenko, P. Kulish draws attention to the language of works as the main factor of the text, because of which language appears as a representation of the national spirit, as a guarantee of prosperity of the people. He emphasizes that through literature the people manifest their mission of philanthropy. The works of H. Kvitka-Osnovyanenko, writes P. Kulish, have appeared during difficult years, and show national spirit, they are organic with time requirements. The author briefly describes the biography of H. Kvitka-Osnovyanenko. The journalistic style is characteristic of him. P. Kulish explains where H. Kvitka got his knowledge of the Ukrainian language, why he was so respectful to religion, which later became one of the central themes in his work. In analyzing H. Kvitka-Osnovyanenko’s stories, P. Kulish emphasizes moral and ethical aspects. According to one article by Panteleimon Kulish, we see that he is an interesting critic. His text contains a lot of information, generalizations, reveals typical in the history of peoples and cultures.

27

Stovpets, Oleksandr, and Vasyl Stovpets. "The Bright and the Dark sides of a new Information Reality (in the context of the Intellectual Property protection)." Law Review of Kyiv University of Law, no.1 (April15, 2020): 234–37. http://dx.doi.org/10.36695/2219-5521.1.2020.46.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Nowadays changes’ vector related to the information and technological novelties presently shifts: from technical, economic and legal fields - to the socio-cultural dimension. Following the production sectors, other areas of life became the objects of conscious and deliberate innovative activities, that allow us to fix the transition towards an innovative model of social and cultural development, and the corresponding increase in the value of Intellectual Property institutions in today’s post-industrial world. This is why the innovation has become one of the main types of nowadays practical activity with intellectual or creative content, and it’s perceived as an essential precondition for further civilized development. The intellectual property may be considered as a specific kind of original information, objectified in appropriate form. The core of any intellectual property object is innovation. The latter may even be understood as its inner substance. And the knowledge should be esteemed as a prelude to innovative or creative process. In the article, the main attention was focused on the dialectics of development of our Information reality that is changing gradually, but inevitably. The most controversial point is to keep the balance between the principle of Freedom of information (including free Internet, independent mass-media, privacy on the Web, anonymous sources for press and journalism activity), on the one hand, and the principle of informational safety and public security (i.e. the possibility of state power to resist an external informational aggression, to block disinformation attempts, to prevent manipulations with information that may be really dangerous or harmful to the society in different aspects), on the other hand. The general vision of today’s Information space evolution is expressed as an ambiguous process, which implies both the advantages and disadvantages of this new kind of reality. Eventually, this means the existence of the dark side of mentioned processes, and the bright one. It all depends on how people will actually use these technological tools. That’s why the state should always remain the sentinel of this fragile balance between the Freedom of Information in all possible ways, and the Censorship that may be expressed in soft or hard forms. The other matter is an Intellectual Property protection mechanism in this new information reality, including international and local legislation, judicial practice, as well as mental, moral and ethical, sociocultural, economic and even geopolitical aspects of IP protection. Everyone should respect the related Laws, and individual commercial & noncommercial rights of authors or possessors. But, simultaneously, this realm of social-economic and legal relations - called "intellectual property" - should be reconsidered deeply, as technological and sociocultural conditions have changed substantially. That’s why we consider the current global IP protection system as the olden one. It must be modernized, and this modernization should be definitely commenced by its liberalization.

28

Martynova,MarinaD. "“Digital trust” vs “Distrust” in the Formation of Social Relations and Practices of Glocal Society." Humanitarian: actual problems of the humanities and education 20, no.4 (December30, 2020): 445–53. http://dx.doi.org/10.15507/2078-9823.052.020.202004.445-453.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction. The individual’s application of established social practices in the digital environment faces certain difficulties caused by the wide opportunities for “honest” and “dishonest” behavior on the Internet. The high level of trust in digital technologies and the possibility of manipulating personal data, the desire to rely on “expert opinion” and unreliable information, the social need for communication and the illusion of communication in social networks, as well as other dilemmas of relationships in the digital world and operating with big data create a sense of uncertainty, instability and disunity in the perception of digital reality. The purpose of the article is to identify social and ethical aspects of trust phenomenon as an attitude of consciousness, obstacles to digital trust and identify ways to develop it. Materials and Methods. The interdisciplinary approach based on ethics of information technology, sociology, and communication theory allows us to analyze the formation of new social practices and interpret the development of a person’s value attitude to new realities of life. Research result. The following areas of actualization of the concept of “trust” in the digital world are identified as trust in data and algorithms, trust in “digital subject”, “Internet of trust” as a space of obligations and rules. The formation of the “Internet of trust” is associated with awareness of all social, moral and psychological problems associated with the process of combining online and offline environments in the social practice of an individual, where new forms of applying traditional standards of behavior should be found. Discussion and Conclusion. Postponing the rational risk analysis of digital interaction by an individual “for later” provokes the creation of situations that are critical for the individual’s well-being and security. The costs of digital trust are reduced security and creation of “traps” in public relations and social practices. Digital environment creates a situation of vulnerability of an individual, which encourages him to resort to possible measures of protection. In turn, the “Internet of trust” as a new digital reality is absolutely necessary for the effective functioning and further development of society.

29

Bukhtiyarov,I.V., A.F.Bobrov, EduardI.Denisov, A.L.Eremin, N.N.Kur’erov, T.K.Losik, E.S.Pochtareva, et al. "OCCUPATIONAL RISK ASSESSMENT METHODS AND THEIR INFORMATION SUPPORT." Hygiene and sanitation 98, no.12 (December15, 2019): 1327–30. http://dx.doi.org/10.18821/0016-9900-2019-98-12-1327-1330.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The digital transformation of the economy and society prompts the renewal of methods in occupational health as well. There are outlined fundamentals of the draft revision of the “Guidelines for the Assessment of Occupational Risk to Employee Health. Organizational and methodological foundations, principles and criteria for the assessment». R 2.2.1766-03. The draft contains methods of occupational risk (OR) assessment supplied with information materials and software for working on the Internet in real-time. Algorithms and models for calculating the probability of impairment of health according to data of the Special Assessment of Working Conditions (SAWC) as well as causation algorithms - work-relatedness assessment according to data of periodic medical examinations (PME) for the validity of risk assessment from the standpoint of evidence-based medicine are presented. There are set out methods for calculating the probability of the formation of occupational diseases (OD) of the main nosological forms from the exposure of noise, hand-arm and whole-body vibration, heat and cool microclimate, fibrogenic dusts, physical labor (local, regional and general loads), strenuous work, standing work with the likelihood of varicose lower veins limbs, multi-factor exposure and low-back pain. Risk assessments for the reproductive health of workers are also discussed. The models are based on the documents of the WHO, ILO, ISO, domestic and foreign literature data that meet the principles of evidence-based medicine. The problems of work-related diseases (WRD) - the concept of WHO (1987) -basics of etiology, qualitative and quantitative criteria for causation, models of consensus and evidence-based medicine, as well as projects for integrated work on the detection systems for WRD in the European Union countries are considered. Single-digit indices of working conditions and health problems, moral harm caused to an employee suffering from OD or WRD. Hygienic recommendations to employers on OR management, prevention priorities, the role of personal protection equipment, the basics of corporate health promotion programs, and ethical and economic aspects are described. The calculation methods are provided by the software of the electronic online reference book “Occupational Risk” (URL: http://medtrud.com/) in order to ensure evidence-based decisions of hygienists. In conclusion, a turning point in occupational health is noted: a decrease in the detection of traditional ODs without compensation by the number of OD and WRD from new technologies, materials and risk factors; this problem requires urgent action.

30

Popova, Liudmyla, and Olha Protsenko. "Genre and style features of creative heritage by Mark Karminskyi: educational and methodological aspects." Aspects of Historical Musicology 19, no.19 (February7, 2020): 65–79. http://dx.doi.org/10.34064/khnum2-19.04.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background. The article is a step towards a modern comprehension of the creative heritage by M. Karminskyi, whose work in the second half of the 20 century contributed to the development and international fame of Ukrainian music. Analysis of scientific publications (Heivandova, K., 1981; Ivanova, Yu., 2001; Kushchova, E., 2004 etc.), memoirs (Hanzburg, G., 2000) and a huge array of periodicals devoted to the composer allows us to single out the characteristic features of his creative personality, which determine the originality of his talent as a composer, explaining the constant demand for his music and its successful functioning in the pedagogical process, in particular, in children’s music schools. The purpose and objectives of this study – to consider the artistic and aesthetic orientation of the creative heritage by M. Karminskyi and identify its distinctive features, focusing on the genre and style aspect of his works for children and youth and their methodological significance in pedagogical practice. Research methods are based on general scientific principles of systematization and generalization. The most important role was played by the interdisciplinary approach to the analysis of the composer’s creative heritage from the standpoint not only of musicology, but also of history, culturology, and pedagogy. For reflecting the spiritual atmosphere, where the composer’s talent was formed, the historicalbiographical approach was of great importance. Research results. The way of formation of M. Karminskyi’s individuality, development of his innate musical inclinations to successful realization of talent is crowned with creation of compositions of various genres, both largescale – partitas, operas, music to performances, and chamber – vocal-choral and instrumental miniatures, among which the piano music for children and youth audiences appealed to the style of Ukrainian folklore occupies a significant place. Ukrainian literature, in particular, works by Taras Shevchenko, Lesia Ukrainka, and Ivan Franko, which were carefully studied by M. V. Karminskyi as a student of the Faculty of Journalism at V. N. Karazin Kharkiv State University, had a significant influence on the formation of the composer’s worldview and aesthetic priorities. Probably, it was the love for literature that determined the programmatic narrative nature of M. Karminskyi’s compositions. However, the love for music itself prevailed: M. Karminskyi continued his studies at the Kharkiv Conservatory in the class of Professor D. Klebanov possessed in perfection by the musical artistic heritage and was able to transfer creatively this knowledge to students. M. Karminskyi’s later applied the skills acquired from him in his work. In those years, the Kharkiv School of Composition stood out among other music unions of Ukraine with a high level of creative competence: composers sought their own way and artistic individuality, creating a modern musical language. However, even in this highly educated environment, the personal potential of Mark Veniaminovich, his highly artistic taste and erudition rose. Mark Veniaminovich is sometimes called “the knight of the country of childhood” thanks to his brilliant compositions for children. The composer speaks to the children’s audience with the help of intonations and artistic techniques available to the child’s worldview, but he does not adapt to the child, but teaches him to develop thinking, show strong emotions. Pupils like program music with interesting content that evokes familiar associations, specific ideas. Therefore, in many of his works M. Karminskyi turns to the literary basis, clear concrete and dynamic images, heightened emotionality (“Steppe, steppe...”, “Autumn Day”, “Lyrical intermezzo”, etc.). Such approach motivates children not to perform works abstractly and mechanically, but to bring their own emotions and understandings into them. M. Karminskyi uses clear three-part or couplet forms that contain repetition (the plays “Favorite Tale”, “Ancient History”, “Merry Trumpeter”, etc.), he is characterized by conciseness of melodic phrases. The texture is convenient for children’s hands: parallel intervals, counterpointing voices, organ points of the lower voice, melodic figurations and harmonic degrees sustained in the middle line, register dynamics are used. These and other techniques promote students’ technical capabilities by developing mobility and finger strength. Continuing the traditions of the Ukrainian singing school, M. Karminskyi pays a lot of attention to the techniques of cantilena performance, forcing students to master the art of playing the pedal, which requires careful sound control. Piano ensembles, unique in their poetic beauty, were created by the composer at the end of his not too long life. These plays use themes from the music to the play “Robin Hood”, and the musical images of the pieces are extremely clear even in the names: “Old Grandfather Kohl”, “Lady Tambourine”, “Road to the Temple”, “Crazy Waltz”. M. Karminskyi, feeling a passionate interest in theatrical action with its playful moments and the task of embodying specific images, created music for performances. The radio production “Robin Hood” with the participation of the country’s leading artists, based on the poems of the famous Scottish poet R. Burns translated by S. Marshak and imbued with romantic sublimity, lyricism and sincerity, received a special resonance; it contains expressive melodies that are quickly memorized. In 1978, the company “Melody” released a stereo disc “Robin Hood” with a recording of this radio show. The variety of artistic tasks of the ensemble music of M. Kaminskyi leads to the formation of a variety of pianistic skills. The predominance of playful, moving images in plays develops motor technic and synchronization in performing. The meter and the rhythm of the works are complicated using the measures 6/8, 9/8 or size change in one work: 2/4; 3/4; again 2/4; then 4/4. This technique allows you to transmit movement and free breath of a musical phrase. Karminskyi actively uses chords from fourths and fifths intervals characterized the repertoire of Ukrainian bandura players. Conclusions. The composer gave the children a lot of strength and inspiration, creating music for them in accordance with high moral and ethical criteria and filled with vivid emotions, theatricality, and visible concrete imagery. Miniatures for the children’s choir, the master’s piano pieces have a high spiritual meaning and are among the best achievements of Ukrainian children’s musical literature. The piano music of M. Karminskyi is marked by a tendency to search for a new national style: the composer does not quote folk melodies, creating original musical images in the spirit of folklore. The multi-genre works of M. Karminskyi embody the eternal themes of good and evil, love and death, betrayal and fidelity with the emotional strength inherent in his music, demonstrating the composer’s deep erudition and human decency, originality, uniqueness of his personality and his talent.

31

Donkers,MoniekA., VincentJ.H.S.Gilissen, MathJ.J.M.Candel, NathalieM.vanDijk, Hans Kling, Ruth Heijnen-Panis, Elien Pragt, Iwan van der Horst, SebastiaanA.Pronk, and WaltherN.K.A.vanMook. "Moral distress and ethical climate in intensive care medicine during COVID-19: a nationwide study." BMC Medical Ethics 22, no.1 (June17, 2021). http://dx.doi.org/10.1186/s12910-021-00641-3.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background The COVID-19 pandemic has created ethical challenges for intensive care unit (ICU) professionals, potentially causing moral distress. This study explored the levels and causes of moral distress and the ethical climate in Dutch ICUs during COVID-19. Methods An extended version of the Measurement of Moral Distress for Healthcare Professionals (MMD-HP) and Ethical Decision Making Climate Questionnaire (EDMCQ) were online distributed among all 84 ICUs. Moral distress scores in nurses and intensivists were compared with the historical control group one year before COVID-19. Results Three hundred forty-five nurses (70.7%), 40 intensivists (8.2%), and 103 supporting staff (21.1%) completed the survey. Moral distress levels were higher for nurses than supporting staff. Moral distress levels in intensivists did not differ significantly from those of nurses and supporting staff. “Inadequate emotional support for patients and their families” was the highest-ranked cause of moral distress for all groups of professionals. Of all factors, all professions rated the ethical climate most positively regarding the culture of mutual respect, ethical awareness and support. “Culture of not avoiding end-of-life-decisions” and “Self-reflective and empowering leadership” received the lowest mean scores. Moral distress scores during COVID-19 were significantly lower for ICU nurses (p < 0.001) and intensivists (p < 0.05) compared to one year prior. Conclusion Levels and causes of moral distress vary between ICU professionals and differ from the historical control group. Targeted interventions that address moral distress during a crisis are desirable to improve the mental health and retention of ICU professionals and the quality of patient care.

32

Hildesheim, Hanna, Annette Rogge, Christoph Borzikowsky, Victoria Dorothea Witt, Eva Schäffer, and Daniela Berg. "Moral distress among residents in neurology: a pilot study." Neurological Research and Practice 3, no.1 (February1, 2021). http://dx.doi.org/10.1186/s42466-021-00104-5.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Medical progress, economization of healthcare systems, and scarcity of resources raise fundamental ethical issues. Physicians are exposed to increasing moral conflict situations, which may cause Moral Distress (MD). MD occurs when someone thinks he or she might know the morally correct action but cannot act upon this knowledge because of in- or external constraints. Correlations of MD among residents to job changes and burn-out have been shown previously. There are, however, hardly any quantitative studies about MD among physicians in Germany. The aim of this study was to investigate the frequency of occurrence, the level of disturbance, and reasons for MD among neurological residents in German hospitals. Methods 1st qualitative phase: Open interviews on workload and ethical conflicts in everyday clinical practice were conducted with five neurological residents. Ethical principles of medical action and potential constraints that could cause MD were identified and a questionnaire designed. 2nd quantitative phase: A preliminary questionnaire was tested and evaluated by five further neurological residents. The final questionnaire consisted of 12 items and was conducted online and anonymously via e-mail or on-site as part of an unrelated resident training event at 56 sites. Results One hundred seven neurological residents from 56 university/acute care and rehabilitation hospitals throughout Germany were examined (response rate of those requesting the questionnaire: 75.1%). 96.3% of the participants had experienced MD weekly (3.86, SD 1.02), because they were unable to invest the necessary time in a patient or relative consultation. Errors in medical care, which could not be communicated adequately with patients or relatives, were rated as most distressing. The most common reasons for MD were the growing numbers of patients, expectations of patient relatives, fears of legal consequences, incentives of the DRG-system, and the increasing bureaucratization requirement. 43.0% of participants mentioned they considered leaving the field of inpatient-care. 65.4% stated they would like more support in conflict situations. Conclusion MD plays an important role for neurological residents in German hospitals and has an impact on participants’ consideration of changing the workplace. Important aspects are rationing (time/beds) and incentives for overdiagnosis as well as lack of internal communication culture and mentoring.

33

Fryer, Caroline, Andrea Sturm, Roswith Roth, and Ian Edwards. "Scarcity of resources and inequity in access are frequently reported ethical issues for physiotherapists internationally: an observational study." BMC Medical Ethics 22, no.1 (July20, 2021). http://dx.doi.org/10.1186/s12910-021-00663-x.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Little is known about the ethical situations which physiotherapists encounter internationally. This lack of knowledge impedes the ability of the profession to prepare and support physiotherapists in all world regions in their ethical practice. The purpose of the study was to answer the following research questions: What types of ethical issues are experienced by physiotherapists internationally? How frequently are ethical issues experienced by physiotherapists internationally? Can the frequency and type of ethical issue experienced by physiotherapists be predicted by sociodemographic, educational or vocational variables? Methods An observational study was conducted in English using an online survey from October 2018 to May 2019. Participants were 1212 physiotherapists and physiotherapy students located internationally which represented less than 1% of estimated number of physiotherapists worldwide at that time. The survey questionnaire contained 13 items requesting demographic detail and knowledge of ethical codes and decision-making, and 46 items asking what frequency participants experienced specific ethical issues in four categories: (A) Physiotherapist and patient interaction (19 items), (B) Physiotherapist and other health professionals including other physiotherapists (10 items), (C) Physiotherapists and the system (5 items) and (D) Professional and economic ethical situations (12 items). Results The two most frequently experienced ethical issues were ‘Scarce resources and time affecting quality of physiotherapy treatment’ and ‘Physiotherapy not accessible to all people in society who need it’. These items were experienced, on average, more often than monthly. Interprofessional practice also presented frequent ethical issues for participants. Ethical issues related to the context of ‘Physiotherapists and the system’ were most frequently experienced for all world regions. Working longer years in physiotherapy and learning about ethics in basic physiotherapy education was associated with participants reporting lower frequencies of ethical issues across all contexts. Conclusion This study provides the first global profile of ethical issues experienced by physiotherapists. Societal and cultural systems are key influences on physiotherapists’ ethical practice. Physiotherapists globally need support from their work organisations, academic institutions and professional associations, and robust ethical training, to assist them to be active moral agents in their practice.

34

Wilson, Michael, Marie Wilson, Suzanne Edwards, Lynette Cusack, and Richard Wiechula. "Role of attitude in nurses’ responses to requests for assisted dying." Nursing Ethics, December3, 2020, 096973302096677. http://dx.doi.org/10.1177/0969733020966777.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: Legal assisted dying is a rare event, but as legalisation expands, requests for it will likely increase, and the nurse most often receives the informal, initial request. Objectives: To assess the effects of attitude in interaction with normative and control beliefs on an intention to respond to a request for legal assisted dying. Ethical considerations: The study had the lead author’s institutional ethics approval, and participants were informed that participation was both anonymous and voluntary. Methodology: This was a cross-sectional correlational study of 377 Australian registered nurses who completed an online survey. Generalised linear modelling assessed the effects of independent variables against intended responses to requests for legal assisted dying. Results: Compared to nurses who did not support legal assisted dying, nurses who did had stronger beliefs in patient rights, perceived social expectations to refer the request and stronger control in that intention. Nurses who did not support legal assisted dying had stronger beliefs in ethics of duty to the patient and often held dual intentions to discuss the request with the patient but also held an intention to deflect the request to consideration of alternatives. Discussion: This study advances the international literature by developing quantified models explaining the complexity of nurses’ experiences with requests for an assisted death. Attitude was operationalised in interaction with other beliefs and was identified as the strongest influence on intentions, but significantly moderated by ethical norms. Conclusion: The complex of determinants of those intentions to respond to requests for an assisted death suggests they are not isolated from each other. Nurses might have distinct intentions, but they can also hold multiple intentions even when they prioritise one. These findings present opportunities to prepare nurses in a way that enhances moral resilience in the face of complex moral encounters.

35

Kubheka, Brenda Zanele. "Bioethics and the use of social media for medical crowdfunding." BMC Medical Ethics 21, no.1 (October6, 2020). http://dx.doi.org/10.1186/s12910-020-00521-2.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Social media has globalised compassion enabling requests for donations to spread beyond geographical boundaries. The use of social media for medical crowdfunding links people with unmet healthcare needs to charitable donors. There is no doubt that fundraising campaigns using such platforms facilitates access to financial resources to the benefit of patients and their caregivers. Main text This paper reports on a critical review of the published literature and information from other online resources discussing medical crowdfunding and the related ethical questions. The review highlighted the benefits of crowdfunding as well as the under-exploration of the risk of having patients’ desires and human rights undermined during online fundraising campaigns. Majority of these campaigns get initiated on behalf of the patients, especially the very sick and dependant. The ethical questions raised relate to the voluntariness of informed consent and the possibility of patients being used as a means to an end. Vulnerability of patients may expose them to coercion, undue influence, manipulation, and violation of their human rights. The success of these campaigns is influenced by the digital skills, pre-existing social networks and, the emotional potency. Healthcare is a public good, and online market forces should not determine access to essential health services. The benefits of crowdfunding cannot be subverted, but it can perpetuate unintended injustices, especially those arising from socio-economic factors. Conclusions Policymakers ought to monitor the utilisation of crowdfunding sites to identify policy failures and unmet essential health care needs responsible for driving individuals to use these platforms. The upholding of human rights and the fundamental respect of the individual’s wishes is a moral imperative. The need for an ethics framework to guide different stakeholders during medical crowdfunding needs further examination.

36

Roman, Nadinne, Roxana Miclaus, and Liliana Rogozea. "Ethical considerations about informed consent in physiotherapy in Romania." Medicine and Pharmacy Reports, October23, 2019. http://dx.doi.org/10.15386/mpr-1223.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background and aim. Physiotherapy has a distinct feature in terms of patient relationship, regarding the level of communication, especially how physical therapy sessions take place throughout the rehabilitation process. One of the particularities encountered in Romanian physiotherapy practice is related to obtaining informed consent (IC), considering that the initial contact of the patient is with a rehabilitation doctor when general consent is obtained. The aim of this study was to investigate Romanian physiotherapists aspects related to the frequency and use of IC at the beginning of physiotherapy. Method. A cross-sectional study was conducted among Romanian physiotherapists using a survey with 2 open and 37 closed items, including nine demographics items, developed after a systematic literature review. The closed items were Likert type scales, measuring frequency or agreement on scale from 1 to 5. The questionnaire was distributed online from November 2017 until May 2018 and data was gathered from 148 physiotherapists. The statistical analysis targeted descriptive analysis and multiple regression. Results. The results suggested that only 40.82% of physiotherapists always seek to obtain IC at physiotherapy onset, while 16.3% never apply this legal demand in their professional activity, confidence intervals were set to 95% with 3.34 lower bound and 3.82 upper bound. Through multiple regression, we have identified factors which correlate with an increased frequency of IC obtaining at physiotherapy onset. Professional skills,ethical knowledge and ethical reasoning are factors with a positive influence towards obtaining IC with an increased frequency. Conclusions. Ethical knowledge, moral reasoning and consideration for patient are elements which have a positive influence regarding the awareness of IC. The process of demanding and obtaining IC within Romanian physiotherapists must be improved despite the particularities of medical practiceFurther research is needed to identify the methods by which Romanian physiotherapists awareness toward IC can be increased.

37

Kuylen,MargotN.I., ScottY.Kim, Alexander Ruck Keene, and GarethS.Owen. "Should age matter in COVID-19 triage? A deliberative study." Journal of Medical Ethics, March9, 2021, medethics—2020–107071. http://dx.doi.org/10.1136/medethics-2020-107071.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The COVID-19 pandemic put a large burden on many healthcare systems, causing fears about resource scarcity and triage. Several COVID-19 guidelines included age as an explicit factor and practices of both triage and ‘anticipatory triage’ likely limited access to hospital care for elderly patients, especially those in care homes. To ensure the legitimacy of triage guidelines, which affect the public, it is important to engage the public’s moral intuitions. Our study aimed to explore general public views in the UK on the role of age, and related factors like frailty and quality of life, in triage during the COVID-19 pandemic. We held online deliberative workshops with members of the general public (n=22). Participants were guided through a deliberative process to maximise eliciting informed and considered preferences. Participants generally accepted the need for triage but strongly rejected ‘fair innings’ and ‘life projects’ principles as justifications for age-based allocation. They were also wary of the ‘maximise life-years’ principle, preferring to maximise the number of lives rather than life years saved. Although they did not arrive at a unified recommendation of one principle, a concern for three core principles and values eventually emerged: equality, efficiency and vulnerability. While these remain difficult to fully respect at once, they captured a considered, multifaceted consensus: utilitarian considerations of efficiency should be tempered with a concern for equality and vulnerability. This ‘triad’ of ethical principles may be a useful structure to guide ethical deliberation as societies negotiate the conflicting ethical demands of triage.

38

Nazarenko, Lyudmila. "«INVERTED LEARNING AS AN INNOVATIVE FORM OF EDUCATIONAL PROCESS ORGANIZATION»." Educological discourse, no.4 (2020). http://dx.doi.org/10.28925/2312-5829.2020.4.11.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The article highlights the need for positive changes in education through the use of innovative learning technologies. Analysis of scientific sources shows that this problem is urgent in the education system. Modern findings of equipping teachers with knowledge based on the innovations and child-centered approach are considered. The meaning and the content of flipped learning concept is specified; the own vision of the term is offered in the article. The principles of literary competence formation among high school students with the use of blended learning are substantiated and determined. The methodological aspects of the model application in a modern school are covered as well as its essence, features, advantages, possible difficulties and conditions which ensure the acquisition of literary education. The appropriateness of introducing such training in Ukrainian literature lessons is substantiated. The use of flipped learning at the Ukrainian literature lesson is demonstrated, due to which students acquire moral and ethical values. In the article there are covered methodological aspects of the Flipped Classroom, implementation possibilities of the competence approach in teaching of Ukrainian literature. The educational process is modeled in accordance with the modern requirements of student-oriented approach and task-based approach and Flipped classroom at the lesson of Ukrainian literature. The article proposes an algorithm based on the flipped learning for conducting the 11th grade Ukrainian literature lesson about the life and career of Valerian Pidmohylny. It is noted that the effective acquisition of knowledge occurs due to a combination of traditional and innovative learning, and it also depends on the student’s moral values and the staged use of technological learning. It is justified that the reading experience is based on the ability to analyze, interpret, compare, draw parallels, draw conclusions, use knowledge of literary theory in practice. It is primarily a combination of logical and sensory aspects, modern means of education, remote teaching and online learning, these components allow students to acquire competencies through projects, discussions and other activities. It is proved that the combination of traditional and innovative learning approaches including the virtual and real educational resources contributes to the transformation of literary knowledge into social and reading experience, prepares students for productive activities by turning them into active learners and changing teachers' role from the main source of knowledge to facilitator

39

Busse, Kristina, and Shannon Farley. "Remixing the Remix: Fannish Appropriation and the Limits of Unauthorised Use." M/C Journal 16, no.4 (August11, 2013). http://dx.doi.org/10.5204/mcj.659.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In August 2006 the LiveJournal (hereafter LJ) community sga_flashfic posted its bimonthly challenge: a “Mission Report” challenge. Challenge communities are fandom-specific sites where moderators pick a theme or prompt to which writers respond and then post their specific fan works. The terms of this challenge were to encourage participants to invent a new mission and create a piece of fan fiction in the form of a mission report from the point of view of the Stargate Atlantis team of explorers. As an alternative possibility, and this is where the trouble started, the challenge also allowed to “take another author’s story and write a report” of its mission. Moderator Cesperanza then explained, “if you choose to write a mission report of somebody else’s story, we’ll ask you to credit them, but we won’t require you to ask their permission” (sga_flashfic LJ, 21 Aug. 2006, emphasis added). Whereas most announcement posts would only gather a few comments, this reached more than a hundred responses within hours, mostly complaints. Even though the community administrators quickly backtracked and posted a revision of the challenge not 12 hours later, the fannish LiveJournal sphere debated the challenge for days, reaching far beyond the specific fandom of Stargate Atlantis to discuss the ethical questions surrounding fannish appropriation and remix. At the center of the debate were the last eight words: “we won’t require you to ask their permission.” By encouraging fans to effectively write fan fiction of fan fiction and by not requiring permission, the moderators had violated an unwritten norm within this fannish community. Like all fan communities, western media fans have developed internal rules covering everything from what to include in a story header to how long to include a spoiler warning following aired episodes (for a definition and overview of western media fandom, see Coppa). In this example, the mods violated the fannish prohibition against the borrowing of original characters, settings, plot points, or narrative structures from other fan writers without permission—even though as fan fiction, the source of the inspiration engages in such borrowing itself. These kinds of normative rules can be altered, of course, but any change requires long and involved discussions. In this essay, we look at various debates that showcase how this fan community—media fandom on LiveJournal—creates and enforces but also discusses and changes its normative behavior. Fan fiction authors’ desire to prevent their work from being remixed may seem hypocritical, but we argue that underlying these conversations are complex negotiations of online privacy and control, affective aesthetics, and the value of fan labor. This is not to say that all fan communities address issues of remixing in the same way media fandom at this point in time did nor to suggest that they should; rather, we want to highlight a specific community’s internal ethics, the fervor with which members defend their rules, and the complex arguments that evolve from all sides when rules are questioned. Moreover, we suggest that these conversations offer insight into the specific relation many fan writers have to their stories and how it may differ from a more universal authorial affect. In order to fully understand the underlying motivations and the community ethos that spawned the sga_flashfic debates, we first want to differentiate between forms of unauthorised (re)uses and the legal, moral, and artistic concerns they create. Only with a clear definition of copyright infringement and plagiarism, as well as a clear understanding of who is affected (and in what ways) in any of these cases, can we fully understand the social and moral intersection of fan remixing of fan fiction. Only when sidestepping the legal and economic concerns surrounding remix can we focus on the ethical intricacies between copyright holders and fan writers and, more importantly, within fan communities. Fan communities differ greatly over time, between fandoms, and even depending on their central social interfaces (such as con-based zines, email-based listservs, journal-based online communities, etc.), and as a result they also develop a diverse range of internal community rules (Busse and Hellekson, “Works”; Busker). Much strife is caused when different traditions and their associated mores intersect. We’d argue, however, that the issues in the case of the Stargate Atlantis Remix Challenge were less the confrontation of different communities and more the slowly changing attitudes within one. In fact, looking at media fandom today, we may already be seeing changed attitudes—even as the debates continue over remix permission and unauthorised use. Why Remixes Are Not Copyright Infringement In discussing the limits of unauthorised use, it is important to distinguish plagiarism and copyright violation from forms of remix. While we are more concerned with the ethical issues surrounding plagiarism, we want to briefly address copyright infringement, simply because it often gets mixed into the ethics of remixes. Copyright is strictly defined as a matter of law; in many of the online debates in media fandom, it is often further restricted to U.S. Law, because a large number of the source texts are owned by U.S. companies. According to the U.S. Constitution (Article I, Section 8), Congress has the power to secure an “exclusive Right” “for limited Times.” Given that intellectual property rights have to be granted and are limited, legal scholars read this statute as a delicate balance between offering authors exclusive rights and allowing the public to flourish by building on these works. Over the years, however, intellectual property rights have been expanded and increased at the expense of the public commons (Lessig, Boyle). The main exception to this exclusive right is the concept of “fair use,” defined as use “for purposes such as criticism, comment, news reporting, teaching..., scholarship, or research” (§107). Case law circ*mscribes the limits of fair use, distinguishing works that are merely “derivative” from those that are “transformative” and thus add value (Chander and Sunder, Fiesler, Katyal, McCardle, Tushnet). The legal status of fan fiction remains undefined without a specific case that would test the fair use doctrine in regards to fan fiction, yet fair use and fan fiction advocates argue that fan fiction should be understood as eminently transformative and thus protected under fair use. The nonprofit fan advocacy group, the Organization for Transformative Works, in fact makes clear its position by including the legal term in their name, reflecting a changing understanding of both fans and scholars. Why Remixes Are Not Plagiarism Whereas copyright infringement is a legal concept that punishes violations between fan writers and commercial copyright holders, plagiarism instead is defined by the norms of the audience for which a piece is written: definitions of plagiarism thus differ from academic to journalist to literary contexts. Within fandom one of the most blatant (and most easily detectable) forms of plagiarism is when a fan copies another work wholesale and publishes it under their own name, either within the same fandom or by simply searching and replacing names to make it fit another fandom. Other times, fan writers may take selections of published pro or fan fiction and insert them into their works. Within fandom accusations of plagiarism are taken seriously, and fandom as a whole polices itself with regards to plagiarism: the LiveJournal community stop_plagiarism, for example, was created in 2005 specifically to report and pursue accusations of plagiarism within fandom. The community keeps a list of known plagiarisers that include the names of over 100 fan writers. Fan fiction plagiarism can only be determined on a case-by-case basis—and fans remain hypervigilant simply because they are all too often falsely accused as merely plagiarising when instead they are interpreting, translating, and transforming. There is another form of fannish offense that does not actually constitute plagiarism but is closely connected to it, namely the wholesale reposting of stories with attributions intact. This practice is frowned upon for two main reasons. Writers like to maintain at least some control over their works, often deriving from anxieties over being able to delete one’s digital footprint if desired or necessary. Archiving stories without authorial permission strips authors of this ability. More importantly, media fandom is a gift economy, in which labor is not reimbursed economically but rather rewarded with feedback (such as comments and kudos) and the growth of a writer’s reputation (Hellekson, Scott). Hosting a story in a place where readers cannot easily give thanks and feedback to the author, the rewards for the writer’s fan labor are effectively taken from her. Reposting thus removes the story from the fannish gift exchange—or, worse, inserts the archivist in lieu of the author as the recipient of thanks and comments. Unauthorised reposting is not plagiarism, as the author’s name remains attached, but it tends to go against fannish mores nonetheless as it deprives the writer of her “payment” of feedback and recognition. When Copyright Holders Object to Fan Fiction A small group of professional authors vocally proclaim fan fiction as unethical, illegal, or both. In her “Fan Fiction Rant” Robin Hobbs declares that “Fan fiction is to writing what a cake mix is to gourmet cooking” and then calls it outright theft: “Fan fiction is like any other form of identity theft. It injures the name of the party whose identity is stolen.” Anne Rice shares her feelings about fan fiction on her web site with a permanent message: “I do not allow fan fiction. The characters are copyrighted. It upsets me terribly to even think about fan fiction with my characters. I advise my readers to write your own original stories with your own characters. It is absolutely essential that you respect my wishes.” Diana Gabaldon calls fan fiction immoral and describes, “it makes me want to barf whenever I’ve inadvertently encountered some of it involving my characters.” Moreover, in a move shared by other anti-fan fiction writers, she compares her characters to family members: “I wouldn’t like people writing sex fantasies for public consumption about me or members of my family—why would I be all right with them doing it to the intimate creations of my imagination and personality?” George R.R. Martin similarly evokes familial intimacy when he writes, “My characters are my children, I have been heard to say. I don’t want people making off with them.” What is interesting in these—and other authors’—articulations of why they disapprove of fan fiction of their works is that their strongest and ultimate argument is neither legal nor economic reasoning but an emotional plea: being a good fan means coloring within the lines laid out by the initial creator, putting one’s toys back exactly as one found them, and never ever getting creative or transformative with them. Many fan fiction writers respect these wishes and do not write in book fandoms where the authors have expressed their desires clearly. Sometimes entire archives respect an author’s desires: fanfiction.net, the largest repository of fic online, removed all stories based on Rice’s work and does not allow any new ones to be posted. However, fandom is a heterogeneous culture with no centralised authority, and it is not difficult to find fic based on Rice’s characters and settings if one knows where to look. Most of these debates are restricted to book fandoms, likely for two reasons: (1) film and TV fan fiction alters the medium, so that there is no possibility that the two works might be mistaken for one another; and (2) film and TV authorship tends to be collaborative and thus lowers the individual sense of ownership (Mann, Sellors). How Fannish Remixes Are like Fan Fiction Most fan fiction writers strongly dismiss accusations of plagiarism and theft, two accusations that all too easily are raised against fan fiction and yet, as we have shown, such accusations actually misdefine terms. Fans extensively debate the artistic values of fan fiction, often drawing from classical literary discussions and examples. Clearly echoing Wilde’s creed that “there is no such thing as a moral or immoral book,” Kalichan, for example, argues in one LJ conversation that “whenever I hear about writers asserting that other writing is immoral, I become violently ill. Aside from this, morality & legality are far from necessarily connected. Lots of things are immoral and legal, illegal and moral and so on, in every permutation imaginable, so let’s just not confuse the two, shall we” (Kalichan LJ, 3 May 2010). Aja Romano concludes an epic list of remixed works ranging from the Aeneid to The Wind Done Gone, from All’s Well That Ends Well to Wicked with a passionate appeal to authors objecting to fan fiction: the story is not defined by the barriers you place around it. The moment you gave it to us, those walls broke. You may hate the fact people are imagining more to your story than what you put there. But if I were you, I’d be grateful that I got the chance to create a story that has a culture around it, a story that people want to keep talking about, reworking, remixing, living in, fantasizing about, thinking about, writing about. (Bookshop LJ, 3 May 2010)Many fan writers view their own remixes as part of a larger cultural movement that appropriates found objects and culturally relevant materials to create new things, much like larger twentieth century movements that include Dada and Pop Art, as well as feminist and postcolonial challenges to the literary canon. Finally, fan fiction partakes in 21st century ideas of social anarchy to create a cultural creative commons of openly shared ideas. Fan Cupidsbow describes strong parallels and cross-connection between all sorts of different movements, from Warhol to opensource, DeviantArt to AMV, fanfiction to mashups, sampling to critique and review. All these things are about how people are interacting with technology every day, and not just digital technology, but pens and paper and clothes and food fusions and everything else. (Cupidsbow LJ, 20 May 2009) Legally, of course, these reuses of collectively shared materials are often treated quite differently, which is why fan fiction advocates often maintain that all remixes be treated equally—regardless of whether their source text is film, TV, literature, or fan fiction. The Archive of Our Own, a project of the Organization for Transformative Works, for example, does not distinguish in its Content and Abuse Policy section between commercial and fan works in regard to plagiarism and copyright. Returning to the initial case of the Stargate Atlantis Mission Report Challenge, we can thus see how the moderator clearly positions herself within a framework that considers all remixes equally remixable. Even after changing the guidelines to require permission for the remixing of existing fan stories, moderator Cesperanza notes that she “remain[s] philosophically committed to the idea that people have the right to make art based on other art provided that due credit is given the original artist” (sga_flashfic LJ, 21 Aug. 2006). Indeed, other fans agree with her position in the ensuing discussions, drawing attention to the hypocrisy of demanding different rules for what appears to be the exact same actions: “So explain to me how you can defend fanfiction as legitimate derivative work if it’s based on one type of source material (professional writing or TV shows), yet decry it as ‘stealing’ and plagiarism if it’s based on another type of source material (fanfiction)” (Marythefan LJ, 21 Aug. 2006). Many fans assert that all remixes should be tolerated by the creators of their respective source texts—be they pro or fan. Fans expect Rowling to be accepting of Harry Potter’s underage romance with a nice and insecure Severus Snape, and they expect Matthew Weiner to be accepting of stories that kill off Don Draper and have his (ex)wives join a commune together. So fans should equally accept fan fiction that presents the grand love of Rodney McKay and John Sheppard, the most popular non-canonical fan fiction pairing on Stargate Atlantis, to be transformed into an abusive and manipulative relationship or rewritten with one of them dying tragically. Lydiabell, for example, argues that “there’s [no]thing wrong with creating a piece of art that uses elements of another work to create something new, always assuming that proper credit is given to the original... even if your interpretation is at odds with everything the original artist wanted to convey” (Lydiabell LJ, 22 Aug. 2006). Transforming works can often move them into territory that is critical of the source text, mocks the source text, rearranges relationships, and alters characterisations. It is here that we reach the central issue of this article: many fans indeed do view intrafandom interactions as fundamentally different to their interactions with professional authors or commercial entertainment companies. While everyone agrees that there are no legal, economic, or even ultimately moral arguments to be made against remixing fan fiction (because any such argument would nullify the fan’s right to create their fan fiction in the first place), the discourses against open remixing tend to revolve around community norms, politeness, and respect. How Fannish Remixes Are Not like Fan Fiction At the heart of the debate lie issues of community norms: taking another fan’s stories as the basis for one’s own fiction is regarded as a violation of manners, at least the way certain sections of the community define them. This, in fact, is not unlike the way many fan academics engage with fandom research. While it may be perfectly legal to directly cite fans’ blog posts, and while it may even be in compliance with institutional ethical research requirements (such as Internal Review Boards at U.S. universities), the academic fan writing about her own community may indeed choose to take extra precautions to protect herself and that community. As Kristina Busse and Karen Hellekson have argued, fan studies often exists at the intersection of language and social studies, and thus written text may simultaneously be treated as artistic works and as utterances by human subjects (“Identity”). In this essay (and elsewhere), we thus limit direct linking into fannish spaces, instead giving site, date, and author, and we have consent from all fans we cite in this essay. The community of fans who write fic in a particular fandom is relatively small, and most of them are familiar with each other, or can trace a connection via one or two degrees of separation only. While writing fan fiction about Harry Potter may influence the way you and your particular circle of friends interpret the novels, it is unlikely to affect the overall reception of the work. During the remix debate, fan no_pseud articulates the differing power dynamic: When someone bases fanfic on another piece of fanfic, the balance of power in the relationship between the two things is completely different to the relationship between a piece of fanfic and the canon source. The two stories have exactly equal authority, exactly equal validity, exactly equal ‘reality’ in fandom. (nopseud LJ, 21 Aug. 2006) Within fandom, there are few stories that have the kind of reach that professional fiction does, and it is just as likely that a fan will come across an unauthorised remix of a piece of fan fiction as the original piece itself. In that way, the reception of fan fiction is more fragile, and fans are justifiably anxious about it. In a recent conversation about proper etiquette within Glee fandom, fan writer flaming_muse articulates her reasons for expecting different behavior from fandom writers who borrow ideas from each other: But there’s a huge difference between fanfic of media and fanfic of other fanfic authors. Part of it is a question of the relationship of the author to the source material … but part of it is just about not hurting or diminishing the other creative people around you. We aren’t hurting Glee by writing fic in their ‘verse; we are hurting other people if we write fanfic of fanfic. We’re taking away what’s special about their particular stories and all of the work they put into them. (Stoney321 LJ, 12 Feb. 2012)Flaming_muse brings together several concepts but underlying all is a sense of community. Thus she equates remixing within the community without permission as a violation of fannish etiquette. The sense of community also plays a role in another reason given by fans who prefer permission, which is the actual ease of getting it. Many fandoms are fairly small communities, which makes it more possible to ask for permission before doing a translation, adaptation, or other kind of rewrite of another person’s fic. Often a fan may have already given feedback to the story or shared some form of conversation with the writer, so that requesting permission seems fairly innocuous. Moreover, fandom is a community based on the economy of gifting and sharing (Hellekson), so that etiquette becomes that much more important. Unlike pro authors who are financially reimbursed for their works, feedback is effectively a fan writer’s only payment. Getting comments, kudos, or recommendations for their stories are ways in which readers reward and thank the writers for their work. Many fans feel that a gift economy functions only through the goodwill of all its participants, which remixing without permission violates. How Fan Writing May Differ From Pro Writing Fans have a different emotional investment in their creations, only partially connected to writing solely for love (as opposed to professional writers who may write for love but also write for their livelihood in the best-case scenarios). One fan, who writes both pro and fan fiction, describes her more distanced emotional involvement with her professional writing as follows, When I’m writing for money, I limit my emotional investment in the material I produce. Ultimately what I am producing does not belong to me. Someone else is buying it and I am serving their needs, not my own. (St_Crispins LJ, 27 Aug. 2006)The sense of writing for oneself as part of a community also comes through in a comment by pro and fan writer Matociquala, who describes the specificity and often quite limited audience of fan fiction as follows: Fanfiction is written in the expectation of being enjoyed in an open membership but tight-knit community, and the writer has an expectation of being included in the enjoyment and discussion. It is the difference, in other words, between throwing a fair on the high road, and a party in a back yard. Sure, you might be able to see what’s going on from the street, but you’re expected not to stare. (Matociquala LJ, 18 May 2006)What we find important here is the way both writers seem to suggest that fan fiction allows for a greater intimacy and immediacy on the whole. So while not all writers write to fulfill (their own or other’s) emotional and narrative desires, this seems to be more acceptable in fan fiction. Intimacy, i.e., the emotional and, often sexual, openness and vulnerability readers and writers exhibit in the stories and surrounding interaction, can thus constitute a central aspect for readers and writers alike. Again, none of these aspects are particular to fan fiction alone, but, unlike in much other writing, they are such a central component that the stories divorced from their context—textual, social, and emotional—may not be fully comprehensible. In a discussion several years ago, Ellen Fremedon coined the term Id Vortex, by which she refers to that very tailored and customised writing that caters to the writers’ and/or readers’ kinks, that creates stories that not only move us emotionally because we already care about the characters but also because it uses tropes, characterisations, and scenes that appeal very viscerally: In fandom, we’ve all got this agreement to just suspend shame. I mean, a lot of what we write is masturbation material, and we all know it, and so we can’t really pretend that we’re only trying to write for our readers’ most rarefied sensibilities, you know? We all know right where the Id Vortex is, and we have this agreement to approach it with caution, but without any shame at all. (Ellen Fremedon LJ, 2 Dec. 2004)Writing stories for a particular sexual kink may be the most obvious way fans tailor stories to their own (or others’) desires, but in general, fan stories often seem to be more immediate, more intimate, more revealing than most published writing. This attachment is only strengthened by fans’ immense emotional attachment to the characters, as they may spend years if not decades rewatching their show, discussing all its details, and reading and writing stories upon stories. From Community to Commons These norms and mores continue to evolve as fannish activity becomes more and more visible to the mainstream, and new generations of fans enter fandom within a culture where media is increasingly spreadable across social networks and all fannish activity is collectively described and recognised as “fandom” (Jenkins, Ford, and Green). The default mode of the mainstream often treats “found” material as disseminable, and interfaces encourage such engagement by inviting users to “share” on their collection of social networks. As a result, many new fans see remixing as not only part of their fannish right, but engage in their activity on platforms that make sharing with or without attribution both increasingly easy and normative. Tumblr is the most recent and obvious example of a platform in which reblogging other users’ posts, with or without commentary, is the normative mode. Instead of (or in addition to) uploading one’s story to an archive, a fan writer might post it on Tumblr and consider reblogs as another form of feedback. In fact, our case study and its associated differentiation of legal, moral, and artistic justifications for and against remixing fan works, may indeed be an historical artifact in its own right: media fandom as a small and well-defined community of fans with a common interest and a shared history is the exception rather than the norm in today’s fan culture. When access to stories and other fans required personal initiation, it was easy to teach and enforce a community ethos. Now, however, fan fiction tops Google searches for strings that include both Harry and Draco or Spock and Uhura, and fan art is readily reblogged by sites for shows ranging from MTV’s Teen Wolf to NBC’s Hannibal. Our essay thus must be understood as a brief glimpse into the internal debates of media fans at a particular historical juncture: showcasing not only the clear separation media fan writers make between professional and fan works, but also the strong ethos that online communities can hold and defend—if only for a little while. References Boyle, James. The Public Domain: Enclosing the Commons of the Mind. Ithaca: Yale University Press, 2008. Busker, Rebecca Lucy. “On Symposia: LiveJournal and the Shape of Fannish Discourse.” Transformative Works and Cultures 1 (2008). http://journal.transformativeworks.org/index.php/twc/article/view/49. Busse, Kristina, and Karen Hellekson. “Work in Progress.” In Karen Hellekson and Kristina Busse, eds., Fan Fiction and Fan Communities in the Age of the Internet: New Essays. Jefferson, N.C.: McFarland, 2006. 5–40. Busse, Kristina, and Karen Hellekson. “Identity, Ethics, and Fan Privacy.” In Katherine Larsen and Lynn Zubernis, eds., Fan Culture: Theory/Practice. Newcastle upon Tyne: Cambridge Scholars Publishing, 2012. 38-56. Chander, Anupam, and Madhavi Sunder. “Everyone’s a Superhero: A Cultural Theory of ‘Mary Sue’ Fan Fiction as Fair Use.” California Law Review 95 (2007): 597-626. Coppa, Francesca. “A Brief History of Media Fandom.” In Karen Hellekson and Kristina Busse, eds., Fan Fiction and Fan Communities in the Age of the Internet: New Essays. Jefferson, N.C.: McFarland, 2006. 41–59. Fiesler, Casey. “Everything I Need to Know I Learned from Fandom: How Existing Social Norms Can Help Shape the Next Generation of User-Generated Content.” Vanderbilt Journal of Entertainment and Technology Law 10 (2008): 729-62. Gabaldon, Diana. “Fan Fiction and Moral Conundrums.” Voyages of the Artemis. Blog. 3 May 2010. 7 May 2010 http://voyagesoftheartemis.blogspot.com/2010/05/fan-fiction-and-moral-conundrums.html. Hellekson, Karen. “A Fannish Field of Value: Online Fan Gift Culture.” Cinema Journal 48.4 (2009): 113–18. Hobbs, Robin. “The Fan Fiction Rant.” Robin Hobb’s Home. 2005. 14 May 2006 http://www.robinhobb.com/rant.html. Jenkins, Henry, Sam Ford, and Joshua Green. Spreadable Media: Creating Value and Meaning in a Networked Culture. New York: New York University Press, 2013. Katyal, Sonia. “Performance, Property, and the Slashing of Gender in Fan Fiction.” Journal of Gender, Social Policy, and the Law 14 (2006): 463-518. Lessig, Lawrence. Remix: Making Art and Commerce Thrive in a Hybrid Economy. New York: Penguin, 2008. Mann, Denise. “It’s Not TV, It’s Brand Management.” In Vicki Mayer, Miranda Banks, and John Thornton Caldwell, eds., Production Studies: Cultural Studies of Media Industries. New York: Routledge, 2009. 99-114. Martin, George R.R. “Someone is Angry on the Internet.” LiveJournal. 7 May 2010. 15 May 2013. http://grrm.livejournal.com/151914.html. McCardle, Meredith. “Fandom, Fan Fiction and Fanfare: What’s All the Fuss?” Boston University Journal of Science and Technology Law 9 (2003): 443-68. Rice, Anne. “Important Message From Anne on ‘Fan Fiction’.” n.d. 15 May 2013. http://www.annerice.com/readerinteraction-messagestofans.html. Scott, Suzanne. “Repackaging Fan Culture: The Regifting Economy of Ancillary Content Models.” Transformative Works and Cultures 3 (2009). http://dx.doi.org/10.3983/twc.2009.0150. Sellors, C. Paul. Film Authorship: Auteurs and Other Myths. London: Wallflower, 2010. Tushnet, Rebecca. “Copyright Law, Fan Practices, and the Rights of the Author.” In Jonathan Gray, Cornel Sandvoss, and C. Lee Harrington, eds., Fandom: Identities and Communities in a Mediated World. New York: New York University Press, 2007. 60-71.

40

Hookway, Nicholas, and Tim Graham. "‘22 Push-Ups for a Cause’: Depicting the Moral Self via Social Media Campaign #Mission22." M/C Journal 20, no.4 (August16, 2017). http://dx.doi.org/10.5204/mcj.1270.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

IntroductionIn 2016, the online cause #Mission22 went viral on social media. Established to raise awareness about high suicide rates among US military veterans, the campaign involves users posting a video of themselves doing 22 push-ups for 22 days, and on some platforms, to donate and recruit others to do the same. Based on a ‘big data’ analysis of Twitter data (over 225,883 unique tweets) during the height of the campaign, this article uses #Mission22 as a site in which to analyse how people depict, self-represent and self-tell as moral subjects using social media campaigns. In addition to spotlighting how such movements are mobilised to portray moral selves in particular ways, the analysis focuses on how a specific online cause like #Mission22 becomes popularly supported from a plethora of possible causes and how this selection and support is shaped by online networks. We speculate that part of the reason why Mission22 went ‘viral’ in the highly competitive attention economies of social media environments was related to visual depictions of affective bodily, fitness and moral practices.Web 2.0 Culture: Self and Mass DepictionWeb 2.0 culture such as social networking sites (eg., Facebook; Instagram), the advent of video sharing technologies (eg., YouTube) and more recently, micro-blogging services like Twitter have created new and transformative spaces to create, depict and display identity. Web 2.0 is primarily defined by user-generated content and interaction, whereby users are positioned as both consumer and producers, or ‘produsers’ of Web content (Bruns and Schmidt). Challenging traditional “broadcast” media models, Web 2.0 gives users a platform to produce their own content and for “the many” to communicate “with the many” (Castells). The growth of mass self communication, supported by broadband and wireless technologies, gives unprecedented power to individuals and groups to depict and represent their identities and relationships to a potential global audience.The rise of user-generated communication technologies dovetails with broader analyses of the changing contours of self and identity in late-modern times. Individuals in the early decades of the 21st century must take charge for how they depict, portray and self-tell as distinctive, unique and individual subjects (Beck and Beck-Gernsheim; Giddens; Bauman). As contemporary lives become less bound to the strictures of tradition, community and religion, the self becomes a project to be worked out and developed. These theorists suggest that via processes of individualisation, detraditionalisation and globalisation, contemporary subjects have become disconnected from the traditional coordinates of community and are thus faced with the imperative of self-construction and reinvention (Elliott and Lemert).More recently, theoretical and empirical work has attempted to interpret and evaluate how networks of mass self-depiction powered by new digital and wireless technologies are reshaping identity practices. For some theorists, like Bauman (Consuming 2) and Turkle, Web 2.0 is a worrying trend. Bauman suggests in the “confessional society” – think reality TV, talk shows, social media – people are compelled to curate and reflect upon their lives in the public realm. These public acts of self-depiction are part of a move to treating the self as a brand to be consumed, “as products capable of drawing attention, and attracting demands and customers” (Bauman and Lyon 33). The consumer quality of new communications sees connections replace relationships as social bonds become short-term and brittle. Turkle makes a similar argument, suggesting that our preoccupation with online curation centres on controlling our identities and depicting “perfect” versions of ourselves. The result is diminished forms of intimacy and connection; we preach authenticity and realness but practice self-curation and self-stylisation.A more positive body of literature has examined how Web technologies work as tools for the formation of self. This literature is based on more close-up and detailed readings of particular platforms and practices rather than relying on sweeping claims about technology and social change. Following Foucault, Bakardjieva & Gaden argue that personal blogs and social networking site (SNS) profiles constitute a contemporary technology of the self, whereby users employ Web 2.0 technologies in everyday life as practices of self care and self-formation. In a similar way, Sauter argues that SNSs, and in particular Facebook, are tools for self-formation through the way in which status updates provide a contemporary form of self-writing. Eschewing the notion of social media activity as narcissistic or self-obsessive, Sauter argues that SNSs are a techno-social practice of self-writing that facilitate individuals to “form relations to self and others by exposing themselves to others and obtaining their feedback” (Sauter 836). Other research has explored young people’s sustained use of social media, particularly Facebook, and how these sites are used to tell and archive “growing up” narratives and key rites of passage (Robards and Lincoln).One area of research that has been overlooked is how people use social media to construct and depict moral identity. Following Sauter’s arguments about the self work that occurs through networked self-writing, we can extend this to include the ethical self work performed and produced through online depictions. One exception is work by Hookway which analyses how people use blogs – an earlier Web 2.0 form – to write and self-examine their moral experiences. This research shows how bloggers use blogging as a form of online self-writing to construct a do-it-yourself form of morality that emphasises the self, emotions, body and ideals of authenticity. Hookway highlights the idea that morality is less about obedience to a code of rules or following external laws to becoming a particular moral person through a set of self-practices. Paralleling broader shifts in identity construction, people are no longer bound to the inherited guidelines of the past, morality becomes a project to be worked out, designed and depicted in relation to Others (Hookway).In Foucault’s terms, morality involves a process of ethical self-stylisation – an “aesthetics of existence” – based on “the ethical work of the self on the self” (Foucault 91). “Care of the self” involves a “set of occupations” or “labours” that connect and link the self to the Other through guidance, counselling and communication (Foucault 50). For Foucault, self-creation and self-care imply “care for others” as individuals perform a mutual concern with achieving an “art of existence”. This is a reciprocated ethics that obligates the individual to care for others in order to help them care for themselves.This stylisation of the ethical self has been drastically reshaped by the new opportunities for self-expression, belonging and communication offered in our digitally networked society. Digital worlds and spaces create new multi-media modes for individuals and groups to depict, perform and communicate particular moral identities and positions. Web 2.0 technologies are seeing the boundaries between the private and public sphere collapse as more people are willing to share the most intimate part of their moral lives with a diverse mix of strangers, friends, family and associates.The confessional quality of online spaces provide a unique opportunity to analyse “lay morality” or everyday moral understandings, constructions and depictions and how this is co-produced in relation to new technological affordances. Following Sayer (951), morality is defined as “how people should treat others and be treated by them, which of course is crucial for their subjective and objective well-being”. Morality is understood as a relational and evaluative practice that involves being responsive to how people are faring and whether they are suffering or flourishing.In this article, we use the #Mission22 campaign – a campaign that went “viral” across multiple social media platforms – as a unique site to analyse and visualise lay moral depictions and constructions. Specifically, we analyse the #Mission22 campaign on Twitter using a big data analysis. Much of the empirical work on online self construction and depiction is either purely theoretical in the vein of Bauman, Turkle and Sauter or based on small qualitative samples such as the work by Lincoln and Robards and Author A. This article is unique not only in investigating the crafting of moral depictions in Web 2.0 forums but also in the scale of the textual and visual representation of mass moral self-depictions it captures and analyses. Big Data Analysis of #Mission22 on TwitterIn order to empirically examine the #Mission22 campaign on Twitter, we used the Twitter API to collect over three months of tweets that contained the campaign hashtag (from 20 Aug. 2016 to 1 Dec. 2016). This resulted in a dataset of 2,908,559 tweets, of which 225,883 were non-duplicated (i.e., some tweets were collected multiple times by the crawler).There were 3,230 user accounts participating during this period, with each user tweeting 70 times on average. As Figure 1 shows, a sizeable percentage of users were quite active at the height of the campaign, although there is clearly a number of users who only tweeted once or twice. More specifically, there were 1,232 users (or 38%) who tweeted at least 100 times, and on the other hand 1080 users (or 33%) who only tweeted two times or less. In addition, a tiny number of ‘power users’ (18 or 0.006%) tweeted more than 400 times during this period. Figure 1: Frequency distribution of #Mission22 tweets for each user in the datasetTo get a sense of what users were talking about during the campaign, we constructed a wordcloud out of the text data extracted from the tweets (see Figure 2). To provide more information and context, usernames (preceded with @) and hashtags (preceded with #) were included along with the words, providing a set of terms. As a result, the wordcloud also shows the user accounts and hashtags that were mentioned most often (note that #Mission22 was excluded from the data as it, by definition of the data collection process, has to occur in every tweet). In order to remove meaningless terms from the dataset we applied several text processing steps. First, all terms were converted to lowercase, such that “Veteran” and “veteran” are treated as the same term. Next, we applied a technique known as term frequency-inverse document frequency (tf-idf) to the tweet text data. Tf-idf effectively removes terms that occur so frequently that they provide no interesting information (e.g., the term “mission22”), and also terms that occur extremely infrequently. Finally, we removed English “stop words” from the text data, thereby eliminating common words such as “the” and “and”. Figure 2: Wordcloud of the #Mission22 tweet contentAs Figure 2 shows, the most frequent terms revolve around the campaign message and call-to-action for suicide awareness, including, for example, “day”, “veteran”, “support”, “push-ups”, “band”, “challenge”, “suicide”, “fight”, and “alone”. A number of user accounts are also frequently mentioned, which largely relate to the heavily retweeted users (discussed further below). Furthermore, alongside the central #mission22 hashtag, a number of other popular hashtags were in circulation during the campaign, including “#veteran”, “#americasmission”, “#22kill”, and “#22adayis22toomany”. Table 1 provides the top 50 most frequently occurring terms in decreasing order.Table 1: Top 50 words in the #Mission22 tweet content (decreasing order)1-1011-2021-3031-4041-50day@mrbernardedlong@uc_vetsnothingveteran#veteranbetter@kappasigmauceverysupporteverydaybelieve@ucthetachimissionpush-upschallengetodaytakehelp@sandratxassuicidehaulone#22kill@defensebaronveteransawarenessjustsay@the_usofightaccepted@piedmontlax#veterans@nbcnewsaloneptsdgoodweaknessbandvets22kwrong#nevertrumpcimmunity [sic]#americasmissionshoutoutgodwillA surprising finding of our study is that the vast majority of tweets are simply just retweets of other users. The number of retweets was 223,666, which accounts for about 99% of all tweets in the dataset. Even more surprising was that the vast majority of these retweets are from a single tweet. Indeed, 221,088 (or 98%) of all tweets in the dataset were retweets of the following tweet that was authored on 2 March 2015 by @SandraTXAS (see Figure 3). Clearly we can say that this tweet went ‘viral’ (Jenders et al) in the sense that it became frequently retweeted and gained an increasing amount of attention due to its cumulative popularity and visibility over time. Figure 3: #1 most retweeted #Mission22 tweet – @SandraTXAS (https://twitter.com/SandraTXAS)This highly retweeted or viral #Mission22 tweet provides a point of departure to examine what aspects of the tweet content influence the virality or popularity of #Mission22 tweets during the height of the campaign. To do this, we extracted the next nine most retweeted tweets from our dataset, providing an analysis of the “top 10” retweets (including the @SandraTXAS tweet above). Figure 4: #2 most retweeted - @mrbernarded (https://twitter.com/mrbernarded/status/776221040582295553)This tweet was retweeted 715 times in our dataset. Figure 5: #4 most retweeted - @Mission22 (https://twitter.com/Mission22/status/799872548863414272)This was retweeted 317 times in our dataset. Figure 6: #4 most retweeted - @UCThetaChi (https://twitter.com/UCThetaChi/status/784775641430384640)This was retweeted 180 times in our dataset. Figure 7: #5 most retweeted - @PamKeith2016 (https://twitter.com/PamKeith2016/status/782975576550305792)This was retweeted 121 times in our dataset. Figure 8: #6 most retweeted - @PiedmontLax (https://twitter.com/PiedmontLax/status/770749891698122752)This was retweeted 105 times in our dataset. Figure 9: #7 most retweeted - @PiedmontLax (https://twitter.com/PiedmontLax/status/771181070066692098) This was retweeted 78 times in our dataset. Figure 10: #8 most retweeted - @PatriotBrother (https://twitter.com/PatriotBrother/status/804387050728394752) This was retweeted 59 times in our dataset. Figure 11: #9 most retweeted - @alexgotayjr (https://twitter.com/alexgotayjr/status/787112936644849664) This was retweeted 49 times in our dataset. Figure 12: #10 most retweeted - @csjacobson89 (https://twitter.com/csjacobson89/status/772921614044233729) This was retweeted 45 times in our dataset.DiscussionThis article has provided the first “big data” analysis of the #Mission22 movement that went viral across multiple social media platforms in 2016. We began by arguing that Web 2.0 has ushered in profound changes to how people depict and construct identities that articulate with wider transformations in self and identity in conditions of late-modernity. The “confessional” quality of Web 2.0 means individuals and groups are presented with unprecedented opportunities to “mass self-depict” through new communication and Internet technologies. We suggest that the focus on how Web technologies are implicated in the formation of moral subjectivities is something that has been overlooked in the extant research on identity and Web 2.0 technologies.Filling this gap, we used the #Mission22 movement on Twitter as an empirical site to analyse how contemporary subjects construct and visually depict moral identities in online contexts. A central finding of our analysis of 225883 Twitter posts is that most engagement with #Mission22 was through retweeting. Our data show that retweets were by far the most popular way to interact and engage with the movement. In other words, most people were not producing original or new content in how they participated in the movement but were re-sharing – re-depicting – what others had shared. This finding highlights the importance of paying attention to the architectural affordances of social media platforms, in this case, the affordances of the ‘retweet’ button, and how they shape online identity practices and moral expression. We use moral expression here as a broad term to capture the different ways individuals and groups make moral evaluations based on a responsiveness to how people are faring and whether they are suffering or flourishing (Sayer). This approach provides an emic account of everyday morality and precludes, for example, wider philosophical debates about whether patriotism or nationalistic solidarity can be understood as moral values.The prominence of the retweet in driving the shape and nature of #Mission22 raises questions about the depth of moral engagement being communicated. Is the dominance of the retweet suggestive of a type of “moral slacktivism”? Like its online political equivalent, does the retweet highlight a shallow and cursory involvement with a cause or movement? Did online engagement translate to concrete moral actions such as making a donation to the cause or engaging in some other form of civic activity to draw attention to the movement? These questions are beyond the scope of this article but it is interesting to consider the link between the affordances of the platform, capacity for moral expression and how this translates to face-to-face moral action. Putting aside questions of depth, people are compelled not to ignore these posts, they move from “seeing” to “posting”, to taking action within the affordances of the architectural platform.What then is moving Twitter users to morally engage with this content? How did this movement go viral? What helped bust this movement out of the “long tail distribution” which characterises most movements – that is, few movements “take-off” and become durable within the congested attention economies of social media environments. The Top 10 most retweeted tweets provide powerful answers here. All of them feature highly emotive and affective visual depictions, either high impact photos and statements, or videos of people/groups doing pushups in solidarity together. The images and videos align affective, bodily and fitness practices with nationalistic and patriotic themes to produce a powerful and moving moral co*cktail. The Top 50 words also capture the emotionally evocative use of moral language: words like: alone, fight, challenge, better, believe, good, wrong, god, help, mission, weakness and will.The emotional and embodied visual depictions that characterise the the Top 10 retweets and Top 50 words highlight how moral identity is not just a cerebral practice, but one that is fundamentally emotional and bodily. We do morality not just with our minds and heads but also with our bodies and our hearts. Part of the power of this movement, then, is the way it mobilises interest and involvement with the movement through a physical and embodied practice – doing push-ups. Visually depicting oneself doing push-ups online is a powerful display of morality identity. The “lay morality” being communicated is that not only are you somebody who cares about the flourishing and suffering of Others, you are also a fit, active and engaged citizen. And of course, the subject who actively takes responsibility for their health and well-being is highly valued in neoliberal risk contexts (Lupton).There is also a strong gendered dimensions to the visual depictions used in #Mission22. All of the Top 10 retweets feature images of men, mostly doing push-ups in groups. In the case of the second most popular retweet, it is two men in suits doing push-ups while three sexualised female singers “look-on” admiringly. Further analysis needs to be done to detail the gendered composition of movement participation, but it is interesting to speculate whether men were more likely to participate. The combination of demonstrating care for Other via a strong assertion of physical strength makes this a potentially more masculinised form of moral self-expression.Overall, Mission22 highlights how online self-work and cultivation can have a strong moral dimension. In Foucault’s language, the self-work involved in posting a video or image of yourself doing push-ups can be read as “an intensification of social relations”. It involves an ethics that is about self-creation through visual and textual depictions. Following the more pessimistic line of Bauman or Turkle, posting images of oneself doing push-ups might be seen as evidence of narcissism or a consumerist self-absorption. Rather than narcissism, we want to suggest that Mission22 highlights how a self-based moral practice – based on bodily, emotional and visual depictions – can extend to Others in an act of mutual care and exchange. Again Foucault helps clarify our argument: “the intensification of the concern for the self goes hand in hand with a valorisation of the Other”. What our work does, is show how this operates empirically on a large-scale in the new confessional contexts of Web 2.0 and its cultures of mass self-depiction. ReferencesBakardjieva, Maria, and Georgia Gaden. “Web 2.0 Technologies of the Self.” Philosophy & Technology 25.3 (2012): 399–413.Bauman, Zygmunt. Liquid Modernity. Cambridge: Polity, 2000.———. Consuming Life. Cambridge: Polity, 2007.———, and David Lyon. Liquid Surveillance. Cambridge: Polity, 2013.Beck, Ulrich, and Elizabeth Beck-Gernsheim. Individualisation. London: Sage, 2001.Bruns, Axel, and Jan-Hinrik Schmidt. “Produsage: A Closer Look at Continuing Developments.” New Review of Hypermedia and Multimedia 17.1 (2011): 3–7.Dutta-Bergman, Mohan J. “Primary Sources of Health Information: Comparisons in the Domain of Health Attitudes, Health Cognitions, and Health Behaviors.” Health Communication 16.3 (2004): 273–288.Elliott, Anthony, and Charles Lemert. The New Individualism: The Emotional Costs of Globalization. New York: Routledge, 2006.Foucault, Michel. The Care of the Self: The History of Sexuality. Vol. 3. New York: Random House, 1986.Giddens, Anthony. Modernity and Self-Identity: Self and Society in the Late Modern Age. Cambridge: Polity, 1991.Hookway, Nicholas. “The Moral Self: Class, Narcissism and the Problem of Do-It-Yourself Moralities.” The Sociological Review, 15 Mar. 2017. <http://journals.sagepub.com/doi/abs/10.1177/0038026117699540?journalCode=sora>.Jenders, Maximilian, et al. “Analyzing and Predicting Viral Tweets.” Proceedings of the 22nd International Conference on World Wide Web (WWW). Rio de Janeiro, 13-17 May 2013.Kata, Anna. “Anti-Vaccine Activists, Web 2.0, and the Postmodern Paradigm: An Overview of Tactics and Tropes Used Online by the Anti-Vaccination Movement.” Vaccine 30.25 (2012): 3778–89.Lincoln, Sian, and Brady Robards. “Editing the Project of the Self: Sustained Facebook Use and Growing Up Online.” Journal of Youth Studies 20.4 (2017): 518–531.Lupton, Deborah. The Imperative of Health: Public Health and the Regulated Body. London: Sage, 1995.Sauter, Theresa. ‘“What's on Your Mind?’ Writing on Facebook as a Tool for Self-Formation.” New Media & Society 16.5 (2014): 823–839.Sayer, Andrew. Why Things Matter to People: Social Science, Values and Ethical Life. Cambridge: Cambridge University Press, 2011.Smith, Gavin J.D., and Pat O’Malley. “Driving Politics: Data-Driven Governance and Resistance.” The British Journal of Criminology 56.1 (2016): 1–24.Turkle, Sherry. Reclaiming Conversation: The Power of Talk in a Digital Age. Penguin: New York, 2015.

41

Barcelos, Patrícia Estrella Liporace, and Adriana Cavalcanti de Aguiar. "A comunicação sobre HIV nas práticas de saúde no Sistema Único de Saúde (SUS)- Brasil = The communication about HIV in health practices in the Unified Health System (SUS)-Brazil." REVISTA ESPAÑOLA DE COMUNICACIÓN EN SALUD, November12, 2019, 100. http://dx.doi.org/10.20318/recs.2019.4473.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Resumo: Introdução: Dimensões comunicacionais permeiam as práticas dos profissionais de saúde. Desde a criação do SUS (Sistema Único de Saúde), em 1988, no Brasil, são enfatizados princípios como a humanização do cuidado e a valorização dos aspectos relacionais, sociais e culturais na comunicação com usuários e entre profissionais. Com relação à Aids, políticas de saúde buscaram informar e mudar comportamentos, enfatizando o diagnóstico precoce, o tratamento adequado e a prevenção. Apesar da epidemia do HIV ter estimulado muitas inovações na educação e comunicação em saúde, ainda se verificam ações predominantemente prescritivas, baseadas no saber biomédico, responsabilizando indivíduos por seus problemas de saúde. Objetivos: O presente trabalho investigou como a comunicação envolvendo o HIV atualmente é abordada nos cenários de práticas do SUS. Metodologia: Foi realizada uma análise temática de conteúdo em busca bibliográfica na literatura brasileira especializada publicada de 2000 a 2018 na SciELO (Scientific Electronic Library Online). Resultados: Obtivemos 15 artigos que mostram a comunicação utilizada como instrumento de fomento à adesão, prevenção, detecção e tratamento do HIV, mas também como competência para lidar com dilemas éticos e morais. Conclusão: Embora ainda seja restrita, a produção acadêmica em comunicação sobre HIV nos serviços aponta mudanças em direção às necessidades do usuário.Palavras-chave: comunicação; serviços de saúde; Sistema Único de Saúde (SUS); HIV; Aids.Abstract: Introduction: Communication dimensions permeate the practices of health professionals. Since the creation of the Brazilian Health Care System (SUS), in 1988 in Brazil, principles such as humanization of care and appreciation of relational, social and cultural aspects of communication between users and professionals and in professional teams have been emphasized. In relation to AIDS, health policies have sought to inform and change behaviors, emphasizing early diagnosis, appropriate treatment and prevention. Although the HIV epidemic has stimulated the development of technologies in health education and communication, there still predominate prescriptive actions aimed at biomedical knowledge and blaming individuals for their health problems. Objectives: This study investigated how communication regarding HIV has been addressed in SUS practices. Methodology: A thematic analysis of bibliographic search content was carried out in specialized Brazilian literature published from 2000 to 2018 in SciELO (Scientific Electronic Library Online). Results: The 15 articles obtained display communication as a tool to promote adherence, prevention, detection and treatment of HIV, but also point to its importance in dealing with ethical and moral dilemmas. Conclusion: Although it is still restricted, the academic production of HIV communication in services indicates a trend towards addressing the needs of the users.Keywords: communication; health services; Unified Health System (SUS); HIV; Aids.

42

Hookway, Nicholas. "Living Authentic: "Being True to Yourself" as a Contemporary Moral Ideal." M/C Journal 18, no.1 (February5, 2015). http://dx.doi.org/10.5204/mcj.953.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

IntroductionFrom reality television and self-help literature to exhortations to be “true to yourself,” authenticity pervades contemporary culture. Despite their prevalence, cultures of self-improvement and authenticity are routinely linked to arguments about increasing narcissism and declining care for others. Self-improvement involves self-based practices geared to help realise the “improved” and “better you” while authenticity is focused on developing the unique, inner and “real” you. Critiques of both self-improvement and authenticity culture are particularly evident in a sociological tradition of “cultural pessimism” (Hookway, Moral). This group of thinkers argue that the dominance of a “therapeutic” culture where the “self improved is the ultimate concern of modern culture” has catastrophic social and moral consequences (Reiff; Bell; Lasch; Bellah; Bauman and Donskis). Drawing upon Charles Taylor, I take critical aim at such assessments, arguing that ideals and practices of authenticity can be morally productive. I then turn to an empirical investigation of how everyday Australians understand and practice morality based on a qualitative analysis of 44 Australian blogs combined with 25 follow-up online in-depth interviews. I suggest that while the data shows the prevalence and significance of “being true to yourself” as an orientating principle, the bloggers produce a version of authenticity that misses the relational and socially-shaped character of self and morality (Taylor; Vannini and Williams).Authenticity and NarcissismA key tenet of modern cultural diagnosis (Rieff, Bell; Lasch; Bellah; Bauman and Donskis) is that Westerners have become increasingly “narcissistic” as cultural authority weakens and the self becomes something to “be discovered” and “worked out” (Bauman). Rieff, a key proponent of this tradition, locates the problem specifically with the rise of therapeutic culture in the 1960s, which denied the proper prohibitive function of culture and transformed moral problems into analytic issues for the self-actualising and “authentic” self. Bell identifies growing consumerism and weakening religion as issuing a shift from a culture of restraint to a culture of release, resulting in an unparalleled permissiveness, hedonism and potential nihilism. More recently, Bauman and Donskis (13) argue that our consumerist pursuit of “authentic” or “peak” experiences tears apart the once solid social bonds of the past. For these theorists, a modern culture postulating the uniqueness and authenticity of the individual can only result in a diminishing care for others and a self-defeating culture of self-fulfilment.Lasch launches perhaps the most scathing critique of “authenticity” culture. Lasch asserts that the modern West has seen the emergence of a “culture of narcissism:” a culture pathologically preoccupied with the care and well-being of the self. He contends that meaning and morality comes to be increasingly defined through the lens of “psychic self-improvement” and “an intense preoccupation with the self” (Lasch 25). Lasch writes:Having no hope of improving their lives in any of the ways that matter, people have convinced themselves that what matters is psychic self-improvement: getting in touch with their feelings, eating health food, taking lessons in ballet or belly-dancing, immersing themselves in the wisdom of the East, jogging, learning how to relate’, overcoming the ‘fear of pleasure’ (Lasch 4).This search for self-fulfilment within the private realm of the self offers little hope of escape in Lasch’s analysis. It is a symptom of the disease rather than a treatment. Having sacrificed obedience to a higher authority for an intensive focus on the authentic and self-actualising self, the modern West is left with amoral, uncaring and “narcissistic” selves (Lasch). In the end, morality has little hope in a culture in which the individual is allowed to create their “own set of rules,” where “no” has disappeared from our moral vocabulary, and where foundational moral laws enforced by religious tradition and higher moral authorities have disappeared.Self-Improvement and Authenticity as Moral Ideals A central problem with cultural decline accounts is that they miss how the search for personal authenticity or self-discovery could be morally productive (Taylor). Practices of therapy and self-improvement do not always need to be one-dimensionally read as exemplars of narcissism (Wright). For example, it is important to recognise how contemporary therapeutic and confessional cultures, underpinned by a focus on self-authenticity, self-discovery and personal growth, can emphasise the “moral makeover” or becoming a “better” person (Elliott and Lemert 124). Talk-shows, self-help literature, reality TV and blogging are all cultural examples that underpin how the therapeutic search for authenticity does not have to read as a one-way road to shrinking moral concern.Lasch’s indices of moral decline—“the wisdom of the east” or “eating health food”—can also be read in a more positive moral light. Take yoga, meditation and vegetarianism as examples. These practices are growing rapidly in popularity in Australia (Penman; Hookway, Moral) and have a strong cultural focus on values of authenticity. While these self-practices emphasise personal growth, self-awareness and self-care, at the same time they promote ethical relations of responsibility between self, others, body, nature, animals and environment. As actor Gillian Anderson said: “the whole thing about meditation and yoga is about connecting to the higher part of yourself, and then seeing that every living thing is connected in some way” (Marati). Could these practices, therefore, not be re-interpreted as self-originating acts of ethics—as acts of personal authenticity that morally recognise the Other? (Taylor)?Taylor (1992) provides a useful approach to salvage values of authenticity from the despair of much cultural diagnosis. He (81) suggests that the ethical ideal of authenticity—wrapped in notions of self-discovery, self-fulfilment and personal improvement—now plays a central role in modern Western culture. Taylor (11) emphasises the moral possibilities of authenticity as an ethical ideal built on the principle of “being true to yourself” (Taylor 26). This is a moral mode that rests in the moral ideal of “being true to my own originality,” which is “something only I can articulate” (Taylor 29).Taylor (74) contends that “at its best” authenticity as a contemporary ideal “allows a richer model of existence.” Rather than destroying it point-blank for its weaknesses, Taylor sets as his task to raise the bar of the ideal. He suggests that authenticity in this higher form calls upon people to adopt a self-responsible form of life that engenders people to be “true to themselves” within relations of responsibility to others. The key to achieving this is a tempered version of authenticity that acknowledges its “constitutive tensions” (Taylor 71). This is a reconstructed ideal that balances the creative, original and non-conformist dimensions of authenticity—the artistic aspects—with external signifiers or points of reference outside the self.What Taylor is doing here is putting some checks and balances around authenticity as a notion of unfettered self-determining freedom. He does this by underlining the significance of the self in relation to what he calls “horizons of significance.” For Taylor, it is only through “horizons of significance”—for example, history, nature, charity, citizenship and God—that we come to know and recognise ourselves in meaningful ways (45–48; 68). Taylor highlights here the importance of a social self where the individual choosing/feeling self is absurd taken in isolation from others (36).Like the poet, the musician or the artist, moral creation is personal and intensely subjective but it is still connected to a social self. For example, vegetarianism or yoga may involve the development of an authentic relationship with the self through the cultivation of qualities of personal awareness, growth and self-care but they are also fundamentally about dialogical relations with others—with animals, with nature, with a sense of social and cosmic connectedness. As Taylor asserts, personal sensibility finds significance in the construction of a world independent of self-choice and feeling (89). The value of Taylor is that he recovers authenticity and practices of self-improvement from the straight out negativity of decline theory but does not trivialise morality to a sort of unfettered self-determining and disencumbered freedom. This theoretical discussion provides a conceptual framework in which to investigate how everyday moralities are constructed and practiced in contemporary Australia.Present Study How do Australians understand and experience morality in their everyday lives? What role does authenticity play? What are the implications of this and what it does it mean for authenticity as a contemporary ethical ideal? To help answer these questions I now report the findings of a qualitative study I conducted into everyday Australian moralities. A small qualitative sample of bloggers is in no way representative of the population but provides some illustrative examples of the shape and influence of authenticity culture on moral life. The aim of the everyday moralities project was to “thickly describe” (Geertz) how individuals “write” and “talk” their everyday moral worlds into existence from their own perspectives. The first part of the study involved a qualitative analysis of 44 Australian blogs. Blogs offered an original empirical lens through which to investigate the contemporary production of morality and selfhood in late-modernity. The blogs were selected as a form of personal life record (Thomas and Znaniecki 1833) that allowed access to spontaneous accounts of everyday life that reflected what was important to the blogger without the intervention of a researcher (Hookway, Entering). The blogs were sampled from the blog hosting Website LiveJournal (LJ). Blogs were selected that contained at least two incidents, moments, descriptions or experiences that shed light on the blogger’s everyday moral constructions and practices. The second part of the study inviting sampled bloggers to participate in an online interview to further develop themes expressed in their blog posts. This resulted in 25 online interviews, which were conducted via various instant-messaging programs.“Being True to Yourself”: Authenticity as Moral Value? Meet Queen_Extremist, a 26 year-old female university student from Melbourne and president of the university student association. While writing that her life is “all in a spin”, Queen_Extremist says she “likes who I am, I like the way I do things, I’m proud of what I’ve achieved. I stayed true to myself”. Although Queen_Extremist may position herself as someone who is “not sure what [her] beliefs are based on, or whether they are worthwhile”, she “knows who she is”. And while potentially conflicted about whether “the concept of staying true to one’s self is arrogant and selfish”, “being true to yourself” according to what “feels right” is positioned as a sort of royal road to the construction of everyday rightness. She writes:I know what I feel. I know when something feels wrong to me. I know when something feels right. And I know that it feels terrible when I do something that feels wrong. It’s not logical. It’s not rational. I don’t know if it’s the right thing to do or if it’s selfish or arrogant. But I don't like being something I’m not. I don't like being false or changing my personality for others. I’m really happy with who I am. If something contrary to that is required, I suggest that someone other than me is requested to do it.Queen_Extremist offers a clear articulation of the everyday guiding power of authenticity. This type of morality is rooted in an obligation to realise an authentic selfhood found in a feeling-based sense of right and wrong. One “looks within” to the subjective and authentic world of the feeling and true self to determine “right” and “wrong.” The source of “who I am” is found within the inner world of “true feelings”. So while Queen_Extremist may feel that she does not “know much about anything” she is confident in her knowledge of who she truly is and what she truly feels. This is an ethical knowledge that she can explicitly trust. The trick for Queen_Extremist’s practice of an “ethics of authenticity” is discovering who you are and sticking to it.Universal_cloak, Squash_pippa and Snifflethebouncer all advance a similar moral strategy that highlights the power of “being true to yourself”. 32-year-old Universal_cloak, an artistic designer from Melbourne, writes on her blog of the importance of “being true to yourself” and its helping role in “making moral choices about who I am and what I stand for”:Being true to yourself is one of the most important things you can nurture in life … I think it’s important to live your life in a way that reflects who you are. If you lead a false life you will sooner or later run into problems because you’re ignoring huge parts of yourself that require attention (interview).Universal_cloak believes that “it’s morally wrong to avoid, ignore or otherwise mistreat yourself”. Inverting “do unto others”, she writes, “if you wouldn’t do it to other people, don’t do it to yourself”. She reasons that to not be “who you are” is inherently self-destructive: “I have known people who have ignored who they are, and as a result have sort of ‘soured themselves’”. For Universal_cloak, a corollary of “souring” the self is “souring” relations to others: “in turn, they build up this sourness and it reflects in their life, making them sour toward other people”. For Universal_cloak, authenticity not only governs the relation of self upon self but also involves relations of care with others; the personal search for authenticity is connected to how one treats and relates to other people.Similarly, Snifflethebouncer, a 22-year old PhD student from Sydney, writes “one of the things that matters most to me, with morality, is that you feel genuine about what you’re doing”. Feeling emerges here as a strategy to validate a “genuine” or “authentic” morality:You feel in your heart that it’s the right thing. If you feel one thing and do something else, then you’re not being true to yourself. If I feel one thing is the right thing to do, but I do something else (to benefit myself, most probably), then I’ll feel bad about it, and I’ll feel I haven't followed my morals.Squash_pippa, a 32-year-old female community worker from Sydney, elaborates the significance of “being true to yourself” as a code of action by describing a story about someone who “invented themselves to be someone that they’re not” and how this had caused her to feel inferior, to even “hate” herself “for not being as good as what they were”. She explains, claiming to now see the “situation objectively”, that this person had actually lied about “who they were” by “making themselves out to be so good”. They had violated the ideal of being the “real” and “authentic” you. For Squash_pippa this meant they were actually a “lesser person” as they were not prepared to accept the reality of “who they really are”. This notion of being authentic to the self (Taylor) is something Squash_pippa says she has always committed to. She is “who I am” and “never compromises what ‘feels’ right”:I am who I am and people can either like me or hate me, either way I’m not too fussy just as long as I never have to go against the morals and values I have and never compromise what ‘feels’ right … We all have our faults and they're not always easy to accept but it takes a stronger person to accept who they really are than the one who lies and makes themselves to be someone who they’re not.Queen_Extremist, Universal_cloak, Squash_pippa and Snifflethebouncer evoke a type of “ethics of authenticity”, where the notion of “being true to yourself” is sourced from the “romantic solace” of moral feeling. In these accounts, there is only one true or authentic self—the rest are imposters that lead to falseness and the problems of inauthenticity, fakery and phoniness—the contemporary sins of an “age of authenticity”.Being true to self is developed in these accounts as a life-principle that suggests we all have a unique and original way of being moral within us that needs to be realised and fulfilled. For these bloggers, the primary moral task is to search and reveal the “authentic” self, the real and truthful self that lurks within. While “being true to yourself” operates as a powerful framework of belief in these blog accounts, it does not meet Taylor’s criteria of authenticity in its “higher form.” Authenticity is mobilised in its more “narcissistic” form, where moral talk is never linked to something external to the self. For example, Queen_Extremist knows who she is and does not want to be something she is not. Likewise, Universal_Cloak believes in living life “in a way that reflects who you are”. These are highly subjectivist accounts of morality which not only ignore the social basis of morality but also present morality as unilateral and deaf rather than something that is responsive to people’s suffering or flourishing (Sayer). Authenticity—using Taylor’s language—is presented in an impoverished form where ideals of action never reside outside the self and thus fail to invoke a better or higher form of life worth searching and striving for (Taylor 61). In many ways, we end up with evidence that support declinist accounts of authenticity discourses as self-centred, introverted and amoral.ConclusionIn this paper I have examined the importance of authenticity as a contemporary cultural and moral value. In the first part, I showed how authenticity and cultures of self-fulfilment have been negatively theorised by the “cultural pessimists.” Using the work of Taylor, I went on to argue that authenticity, particularly the ethical principle of “being true to yourself” can be retrieved from the pessimism of thinkers like Rieff, Lasch, Bell, Bauman and Donskis. I argue that Taylor is particularly important in how he recognises the value of authenticity in terms of it’s creative and artistic dimensions but also the external “horizons of significance” that give it substance, life and meaning. The second part of the paper moved to an empirical analysis of how authenticity was mobilized by a selection of Australian bloggers. For these individuals, to be authentic means not “being something I’m not” (Queen_Extremist); “not leading a false life” (Universal_cloak); and not “inventing” yourself “as someone else”. Like reality television contestants, their task is to sort the real from the fake, from those “playing the game” and those being themselves—to work out who’s being “real” and who’s not. Why authenticity is clearly a powerful guide for this group of bloggers, their accounts do seem to partly support the pessimists’ charge of narcissism. Ideas of authenticity are presented as coming purely from inside the self without reference to external “horizons of significance.” This leaves us with an anemic form of authenticity that ignores the social basis of self, authenticity and morality (Taylor).“Being true to yourself” is a moral strategy that invokes a modernist assumption of a stable and unitary model of self. It is a version of self that appears distinctly “non-liquid” (Bauman). There are, for example, no “multiple” or “fragmented” selves in the blog accounts of Queen_Extremist, Universal_cloak and Snifflethebouncer but only “true” and “false” “personalities”; “real”, “false” or “invented selves”. As Universal_cloak says, being “true to yourself” means “to live your life in a way that reflects who you are” (Universal_cloak). In this way the bloggers appear to not only miss the socially-shaped character of the moral self but also the aboutness of morality—how morality is about people’s well-being, suffering and flourishing rather than simply the authority of the subject (Sayer).Two key research agendas emerge from these findings. First, further research is needed to empirically investigate wider practices of authenticity and morality beyond internet populations and to examine the extent and shape of narcissism. Second, there are fruitful lines of inquiry in investigating the dynamics of “being true to yourself” in a “liquid” age supposedly defined by identity reinvention and instant transformation (Elliott and Lemert). Does the pursuit of an authentic ethical self represent a form of resistance to identity fluidity and reinvention or could it actually feed the short-termism of a “no strings attached” world, where the search for “true” or “authentic” selves promote a culture of “moving on” and weak social bonds (Bauman and Donskis 14)?ReferencesBauman, Zygmunt, and Donskis, Leonidas. Moral Blindness: The Loss of Sensitivity in Liquid Modernity. Cambridge: Polity, 2013. Bauman, Zygmunt. Liquid Modernity. Cambridge: Polity, 2000.Bell, Daniel. The Cultural Contradictions of Capitalism. New York: Basic Books, 1976.Bellah, Robert, Richard Madsen, William M. Sullivan, Ann Swidler, and Steve Tipton. Habits of the Heart: Individualism and Commitment in American Life. Berkeley: U of California P, 1996.Elliott, Anthony and Charles Lemert. The New Individualism: The Emotional Costs of Globalization. New York: Routledge, 2006.Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973.Hookway, Nicholas. “Entering the Blogosphere: Some Strategies for Using Blogs in Social Research.” Qualitative Research 8.1 (2008): 91–113.Hookway, Nicholas. “Moral Decline Sociology: Critiquing the Legacy of Durkheim.” Journal of Sociology 20 Jan. 2014. DOI: 10.1177/1440783313514644.Lasch, Christopher. The Culture of Narcissism: American Life in an Age of Diminishing Expectations. New York: W.W. Norton, 1979. Marati, Jessica. 50 Quotes about Meditation and Yoga. 2012. 15 Jan. 2015 ‹http://ecosalon.com/50-quotes-on-meditation-amp-yoga/›.Penman, Stephen. Yoga in Australia: Sign of the Times. 2010. 15 Jan. 2015 ‹http://www.yogasurvey.com/SignoftheTimes.pdf›.Rieff, Phillip. The Triumph of the Therapeutic: Uses of Faith after Freud. New York: Harper and Row, [1966] 1987.Sayer, Andrew. Why Things Matter to People. New York: Cambridge UP, 2011.Taylor, Charles. The Ethics of Authenticity. Cambridge: Harvard UP, 1992.Thomas, William I. and Florian Znaniecki. The Polish Peasant in Europe and America. New York: Dover,[1918] 1958.Vannini, Phillip and J. Patrick Williams. Authenticity in Culture, Self and Society. Surrey: Ashgate, 2009. Wright, Katie. “Theorizing Therapeutic Culture: Past Influences, Future Directions.” Journal of Sociology 44.1 (2008): 321–336.

43

Aviandy, Mochamad. "COVID-19 PANDEMIC: A MOMENT TO LEARN AND TO WRITE." International Review of Humanities Studies, July31, 2020. http://dx.doi.org/10.7454/irhs.v0i0.258.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

March 2020 marks the coming of bad news to this country. COVID-19 pandemic began to strike and its domino impacts have affected almost all aspects of life, including academic and scientific writing on journal. In the midst of the spirit of working and researching from home, the International Review of Humanities Studies Journal is back to publish for July 2020 edition. The issues discussed are increasingly diverse, marked by the diverse expertises of the respective authors. Domestic contributions can be seen from the articles of the researchers from Universitas Indonesia, particularly from the Faculty of Humanities and the School of Strategic and Global Studies which are interconnected with the scholars from the Indonesian Police College and Al Azhar University.Since this journal is intended to be available internationally, it is also necessary to pay attention to the contributions of foreign authors. Researchers from the University of Uyo, the University of Ilorin, the University of Benin, the University of Lagos, and Delta State University provide interesting views on the issues of humanities in Nigeria. Five articles from various universities in Nigeria are interconnected with independent researchers from the People's Republic of China, who without links to universities or colleges have sent their own independent research articles.This edition begins with Darmoko's writing that discusses the moral complexities of Javanese in the Asmara Djibrat Ludira novel. Darmoko's research emphasises the spiritual role of knight figures who defended their territory and romance. The second article is from Letmiros who also discusses Java. Letmiros saw a mosque in Jogjakarta, namely the Jogokariyan Mosque, as an agent of change as well as a legend. Letmiros argued that by having activities – whether it is spiritual, economic, cultural, or politics – that are conducted in the mosque, mosque can be ordained as an agent of change and branded as legendary, especially in the city of Jogjakarta.The third article is a research carried out during the COVID-19 pandemic. Fera Belinda saw how a new normality, in a tourist village in the Badung-Bali area, is interconnected with local wisdom and health protocols. Fera Belinda's study shows that health science on pandemic like COVID-19 can be analysed together using the humanities approach. Then in the fourth article, we are invited to take a walk to explore Nigerian drama. Inegbe and Rebecca see that a theatre, titled Cemetary Road, has a significant impact on Nigerian society; to the extent that it can be considered a radical impact. Inegbe and Rebecca's research provides new treasure of knowledge, especially for readers in the regions outside Nigeria.In the fifth article, we are invited to see how online studies, especially the use of video technology, are utilised by teachers. Silalahi and Halimi see how the use of two methods, namely the use of video teaching and the use of textual textbook teaching, are compared between the experimental class and the control class. In conclusion, they find that video-based teaching provides better results in the learning process. The next article, by Soekarba and Rosyidah, invites us to see the contribution of the Hadrami group to a community in the Tegal area, Central Java.The impact of the Hadrami (Al Irsyad) group movement was mostly felt in the social and educational fields in the area.The seventh article invites us to get to know Nigeria. Okpevra's research discusses pre-colonial aspects in the Delta State, Nigeria. This research concludes that intergroup relations in the region are influenced by factors of origin, equality of geographical conditions, and similarity of cultural practices. The eighth article invites us to get acquainted with humanities research that is associated with psychological studies of the police. Mayastinasari and Suseno discussed how strengthening the current role of the police influences the public satisfaction, especially in North Sumatra where this research took place.The ninth article is an issue that has been discussed lately. Nwosu discusses the issue of hom*osexuality in the Catholic group in Nigeria which is interconnected with its society. Although the discussed issues are quite sensitive, the scientific explanation could vividly answers the questions regarding these issues. Next, the tenth article from Akpan and Edem discusses how a film, in this case Frozen, is examined from the perspective of digital technology and digital costumes which is a new contribution in analysing a child-friendly content. The eleventh article of Ademakinwa and Smith discusses a film adapted from a well-known Nigerian novelist in the United States, Chimamanda Adichie. Ademakinwa and Smith's findings state that collective memory, reconstructed through film, can have a more significant impact than that of novels. It can even create a crisis within society if not properly controlled.The twelfth article from Filia and Nurfitri invites us to explore the expression of confessions of love in Japanese. Data on love expressions from these researchers were collected via video interviews. It is interesting to find that the expression of love turns out to depend on the cultural context associated with togetherness and sustainability. The next article, the thirteenth, is a contribution of an independent Chinese researcher named Zhang Guanan. He analysed Chinese folklore, Pi Ying, with wayang kulit – leather puppet – stories. It is interesting to follow how Guanan managed to find the uniqueness of both in his research.The fourteenth article by Sugiharto and Puspitasari discusses the online stalking activities of urban millennial. It is their second research which found that cyber stalking is a natural thing for millennial generation living in urban areas, including following colleagues, friends, spouses, even ex-spouses and friends who have not been associated for a long time. The fifteenth paper from Guanah Akbanu and Obi discusses the practice of online journalism in Nigeria, using artificial intelligence. The case study they chose was how journalists in Edo, Nigeria, perceived the use of AI in their journalistic methods. It was found that the use of AI turned out to be more positive for journalism in the area.The sixteenth article by Sonya Suganda discusses how a commemorative object, stolperschwelle, is useful as an object for narrative of the death. The object that was initially used to commemorate Nazi victims has developed to be the object to commemorate those who are marginalized, including hom*osexuals, gypsies, and those who are exiled because of political differences. The next contribution, the seventeenth, comes from Zaqiatul, Al Azhar University who discusses how the functioning of suffixes and verbs is interconnected in the realm of Arabic conjugation. The eighteenth article by Hutapea discusses a quite sensitive issue, namely the conflict between the native people of Jogja and the Papuans living in Jogjakarta. This conflict was examined from the perspective of the police, especially how they controlled it. The nineteenth article from Arif Budiman discusses the strategy used by the French interpreter in the film Marlina Murder in Four Acts. The last article by Basuni discusses the problem of the Arabic-Indonesian translation, in the context of the increasingly contextual scripture.Hopefully, this current edition along with the entire articles can enlighten the readers and contribute significantly to the knowledge of humanities studies.

44

Bretag, Tracey. "Editorial Volume 9(2)." International Journal for Educational Integrity 9, no.2 (November30, 2013). http://dx.doi.org/10.21913/ijei.v9i2.887.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Welcome to the last issue of the IJEI for 2013. It has been an exciting year with numerous conferences and research on academic integrity around the world. Auckland University of Technology kicked off the year with the Fraud, Fakery and Fabrication: Academic and research integrity conference, the International Center for Academic Integrity held their annual conference in San Antonio on 28 February, the National Roundtable and Australian National Speaking Tour for the Exemplary Academic Integrity Project was also held in late February and early March, the 3rd World Conference on Research Integrity was held in Montreal in May, the Plagiarism across Europe and Beyond Conference shared the results of the 'Impact of policies for plagiarism in higher education across Europe' project in Brno, Czech Republic in June, and the 6th Asia Pacific Conference on Educational Integrity showcased the work of Australian Office for Learning and Teaching commissioned projects on academic integrity in Sydney in October. With so much interest and research on this topic across a range of countries and contexts, it is perhaps not surprising that the current issue is an eclectic mix of reflective, conceptual, empirical and case study work from researchers spanning six countries, including the United Arab Emirates, Norway, Australia, Sweden, Indonesia and the UK. The issue covers diverse topics extending from the development of academic skills, to motivations and predictors of student plagiarism, systems to reduce plagiarism and the responsibility of universities to provide marketing information based on ethical principles of honesty and trustworthiness. Student groups represented include secondary school, undergraduate and postgraduate. Radhika Iyer-O'Sullivan, formerly of the British University in Dubai, analyses faculty feedback, samples of student writing and Turnitin Similarity Reports to determine if teaching critical reading as a threshold concept results in critical thinking and subsequently improved critical writing skills. While the sample was small and the results inconclusive, Iyer-O'Sullivan makes the case that teaching critical reading assists students to understand the importance of using supporting evidence to develop a convincing academic argument. Håvard Skaar and Hugo Hammer from Oslo and Akershus University College, Norway use a mixed-methods approach to explore secondary school students' plagiarism of internet sources in essay writing. The survey of 67 students indicated that 75% of students reported plagiarising from online sources and that plagiarism accounted for 25% of the total amount of text. Students with a higher grade in written Norwegian plagiarised less than those with a lower grade, and students more conversant with appropriate citation practices plagiarised less than those students less familiar with referencing conventions. Qualitative feedback from interviews with 29 students indicated that the students wanted to spend as little time and effort as possible on the assessment task and that plagiarism was chosen as a writing strategy, with little reflection on the moral aspects on this decision. In contrast, Rebecca Awdry, from the University of Canberra, and Rick Sarre, from the University of South Australia, found that the university students in their study expressed strong ethical positions in relation to plagiarism, arguing that it was cheating and dishonest. Awdry and Sarre explored students' motivations to plagiarise using a mixed methods approach, and analysed the data through the prism of criminological theory. The authors conclude that while rational choice theory provides some insight into student breaches of academic integrity, there is an apparent disconnect between the way that academics view students' behaviour and how students themselves express their motivations. In agreement with key writers in the field (Bertram Gallant, McCabe, Bretag et al.), Awdry and Sarre conclude that higher education providers should focus less on detection and punishment and more on developing a values-based culture of integrity. Based on a sample of 362 undergraduate psychology students, and in the context of the Indonesian government's position that any form of plagiarism "is a serious offense that may even be classified as an illegal action", Ide Bagus Siaputra, from Universitas Surabaya, explores the proposition that "regardless of the presence or absence of opportunities and the severity of the potential sanctions, some individuals seem to be prone to plagiarism". Siaputra builds on the work of Williams, Nathanson and Paulhus (2010), to propose five variables as predictors of plagiarism, including procrastination, performance, personality, perfectionism, and achievement motivation, and names the model 'the 4PA of plagiarism'. Findings from the author's study indicate that procrastination was the key predictor of plagiarism, followed by achievement motivation. Looking to provide a multi-pronged response to student plagiarism, Ken Larsson and Henrik Hansson from Stockholm University, Sweden share the results of an innovation at their university. The digital system called SciPro was developed to support independent student thesis work, decrease the burden on supervisors for feedback on basic skills, and reduce plagiarism. The system includes a number of modules which facilitate management, communication and learning. According to the authors, SciPro works to prevents plagiarism by providing: 1) clear instructions about rules and regulations for students and supervisors; 2) an online peer-review system; 3) transparent online communication and file storage of accumulated manuscripts; and 4) a final seminar module enabling automatic generation of originality reports from Turnitin when students upload their final thesis manuscripts. Larsson and Hansson report that the implementation of SciPro has resulted in substantial improvements in policy development, successful integration of anti-plagiarism software, and an increased awareness of plagiarism issues. The final paper in the issue reminds us that academic integrity is an issue which underpins every aspect of the educational enterprise and goes well beyond plagiarism in student assessment. Educational psychologist, John Bradley, from the UK, offers a typology of nine misleading data-based marketing claims based on his examination of UK university prospectuses. Bradley's analysis leads him to assert that marketing of higher education should aspire to higher ethical standards than marketing in general because of the high stakes involved for a potentially vulnerable group, and because the reputation of the university is founded on having high standards of scholarship. Rather than rely on external regulators to ensure the authenticity of marketing claims, the author advocates a system of voluntary peer review of university marketing prospectuses based on the principles of research and publication ethics. I trust you will enjoy this varied issue which will interest teachers, researchers, policymakers, administrators and marketers of education, in both secondary and tertiary contexts. Volume 10(1) of the IJEI, to be published in June 2014, will include the best reviewed papers from the Plagiarism Across Europe and Beyond Conference, Czech Republic 2013, along with appropriate papers submitted via the IJEI platform. Tracey Bretag, IJEI Editor Email: tracey.bretag@unisa.edu.au

45

Abidin, Crystal. "Micro­microcelebrity: Branding Babies on the Internet." M/C Journal 18, no.5 (October14, 2015). http://dx.doi.org/10.5204/mcj.1022.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Babies and toddlers are amassing huge followings on social media, achieving microcelebrity status, and raking in five figure sums. In East Asia, many of these lucrative “micro­-microcelebrities” rise to fame by inheriting exposure and proximate microcelebrification from their social media Influencer mothers. Through self-branding techniques, Influencer mothers’ portrayals of their young’ children’s lives “as lived” are the canvas on which (baby) products and services are marketed to readers as “advertorials”. In turning to investigate this budding phenomenon, I draw on ethnographic case studies in Singapore to outline the career trajectory of these young children (under 4yo) including their social media presence, branding strategies, and engagement with their followers. The chapter closes with a brief discussion on some ethical considerations of such young children’s labour in the social media age.Influencer MothersTheresa Senft first coined the term “microcelebrity” in her work Camgirls as a burgeoning online trend, wherein people attempt to gain popularity by employing digital media technologies, such as videos, blogs, and social media. She describes microcelebrities as “non-actors as performers” whose narratives take place “without overt manipulation”, and who are “more ‘real’ than television personalities with ‘perfect hair, perfect friends and perfect lives’” (Senft 16), foregrounding their active response to their communities in the ways that maintain open channels of feedback on social media to engage with their following.Influencers – a vernacular industry term albeit inspired by Katz & Lazarsfeld’s notion of “personal influence” that predates Internet culture – are one type of microcelebrity; they are everyday, ordinary Internet users who accumulate a relatively large following on blogs and social media through the textual and visual narration of their personal lives and lifestyles, engage with their following in “digital” and “physical” spaces, and monetize their following by integrating “advertorials” into their blog or social media posts and making physical appearances at events. A pastiche of “advertisem*nt” and “editorial”, advertorials in the Influencer industry are highly personalized, opinion-laden promotions of products/services that Influencers personally experience and endorse for a fee. Influencers in Singapore often brand themselves as having “relatability”, or the ability to persuade their followers to identify with them (Abidin). They do so by make consciously visible the backstage (Goffman) of the usually “inaccessible”, “personal”, and “private” aspects of mundane, everyday life to curate personae that feel “authentic” to fans (Marwick 114), and more accessible than traditional celebrity (Senft 16).Historically, the Influencer industry in Singapore can be traced back to the early beginnings of the “blogshop” industry from the mid-2000s and the “commercial blogging” industry. Influencers are predominantly young women, and market products and services from diverse industries, although the most popular have been fashion, beauty, F&B, travel, and electronics. Most prominent Influencers are contracted to management agencies who broker deals in exchange for commission and assist in the production of their vlogs. Since then, the industry has grown, matured, and expanded so rapidly that Influencers developed emergent models of advertorials, with the earliest cohorts moving into different life stages and monetizing several other aspects of their personal lives such as the “micro-microcelebrity” of their young children. What this paper provides is an important analysis of the genesis and normative practices of micro-microcelebrity commerce in Singapore from its earliest years, and future research trajectories in this field.Micro-Microcelebrity and Proximate MicrocelebrificationI define micro-microcelebrities as the children of Influencers who have themselves become proximate microcelebrities, having derived exposure and fame from their prominent Influencer mothers, usually through a more prolific, deliberate, and commercial form of what Blum-Ross defines as “sharenting”: the act of parents sharing images and stores about their children in digital spaces such as social networking sites and blogs. Marwick (116-117), drawing from Rojek’s work on types of celebrity – distinguishes between two types of microcelebrity: “ascribed microcelebrity” where the online personality is made recognizable through the “production of celebrity media” such as paparazzi shots and user-produced online memes, or “achieved microcelebrity” where users engage in “self-presentation strateg[ies]”, such as fostering the illusion of intimacy with fans, maintaining a persona, and selective disclosure about oneself.Micro-microcelebrities lie somewhere between the two: In a process I term “proximate microcelebrification”, micro-microcelebrities themselves inherit celebrity through the preemptive and continuous exposure from their Influencer mothers, many beginning even during the pre-birth pregnancy stages in the form of ultrasound scans, as a form of “achieved microcelebrity”. Influencer mothers whose “presentational strategies” (cf. Marshall, “Promotion” 45) are successful enough (as will be addressed later) gain traction among followers, who in turn further popularize the micro-microcelebrity by setting up fan accounts, tribute sites, and gossip forums through which fame is heightened in a feedback loop as a model of “ascribed microcelebrity”.Here, however, I refrain from conceptualizing these young stars as “micro-Influencers” for unlike Influencers, these children do not yet curate their self-presentation to command the attention of followers, but instead are used, framed, and appropriated by their mothers for advertorials. In other words, Influencer mothers “curate [micro-microcelebrities’] identities into being” (Leaver, “Birth”). Following this, many aspects of their micro-microcelebrities become rapidly commodified and commercialized, with advertisers clamoring to endorse anything from maternity hospital stays to nappy cream.Although children of mommybloggers have the prospect to become micro-microcelebrities, both groups are conceptually distinct. Friedman (200-201) argues that among mommybloggers arose a tension between those who adopt “the raw authenticity of nonmonetized blogging”, documenting the “unglamorous minutiae” of their daily lives and a “more authentic view of motherhood” and those who use mommyblogs “primarily as a source of extra income rather than as a site for memoir”, focusing on “parent-centered products” (cf. Mom Bloggers Club).In contrast, micro-microcelebrities and their digital presence are deliberately commercial, framed and staged by Influencer mothers in order to maximize their advertorial potential, and are often postured to market even non-baby/parenting products such as fast food and vehicles (see later). Because of the overt commerce, it is unclear if micro-microcelebrity displays constitute “intimate surveillance”, an “almost always well-intentioned surveillance of young people by parents” (Leaver, “Born” 4). Furthermore, children are generally peripheral to mommybloggers whose own parenting narratives take precedence as a way to connect with fellow mothers, while micro-microcelebrities are the primary feature whose everyday lives and digital presence enrapture followers.MethodologyThe analysis presented is informed by my original fieldwork with 125 Influencers and related actors among whom I conducted a mixture of physical and digital personal interviews, participant observation, web archaeology, and archival research between December 2011 and October 2014. However, the material presented here is based on my digital participant observation of publicly accessible and intentionally-public digital presence of the first four highly successful micro-microcelebrities in Singapore: “Baby Dash” (b.2013) is the son of Influencer xiaxue, “#HeYurou” (b.2011) is the niece of Influencer bongqiuqiu, “#BabyElroyE” (b.2014) is the son of Influencer ohsofickle, and “@MereGoRound” (b.2015) is the daughter of Influencer bongqiuqiu.The microcelebrity/social media handles of these children take different forms, following the platform on which their parent/aunt has exposed them on the most. Baby Dash appears in all of xiaxue’s digital platforms under a variety of over 30 indexical, ironic, or humourous hashtags (Leaver, “Birth”) including “#pointylipped”, #pineappledash”, and “#面包脸” (trans. “bread face”); “#HeYurou” appears on bongqiuqiu’s Instagram and Twitter; “#BabyElroyE” appears on ohsofickle’s Instagram and blog, and is the central figure of his mother’s new YouTube channel; and “@MereGoRound” appears on all of bongqiuqiu’s digital platforms but also has her own Instagram account and dedicated YouTube channel. The images reproduced here are screenshot from Influencer mothers’ highly public social media: xiaxue, bongqiuqiu, and ohsofickle boast 593k, 277k, and 124k followers on Instagram and 263k, 41k, and 17k followers on Twitter respectively at the time of writing.Anticipation and Digital EstatesIn an exclusive front-pager (Figure 1) on the day of his induced birth, it was announced that Baby Dash had already received up to SGD25,000 worth of endorsem*nt deals brokered by his Influencer mother, xiaxue. As the first micro-microcelebrity in his cohort (his mother was among the pioneer Influencers), Baby Dash’s Caesarean section was even filmed and posted on xiaxue’s YouTube channel in three parts (Figure 2). xiaxue had announced her pregnancy on her blog while in her second trimester, following which she consistently posted mirror selfies of her baby bump.Figure 1 & 2, screenshot April 2013 from ‹instagram.com/xiaxue›In her successful attempt at generating anticipation, the “bump” itself seemed to garner its own following on Twitter and Instagram, with many followers discussing how the Influencer dressed “it”, and how “it” was evolving over the weeks. One follower even compiled a collage of xiaxue’s “bump” chronologically and gifted it to the Influencer as an art image via Twitter on the day she delivered Baby Dash (Figure 3 & 4). Followers also frequently speculated and bantered about how her baby would look, and mused about how much they were going to adore him. Figure 3 & 4, screenshot March 2013 from ‹twitter.com/xiaxue› While Lupton (42) has conceptualized the sharing of images that precede birth as a “rite of passage”, Influencer mothers who publish sonograms deliberately do so in order to claim digital estates for their to-be micro-microcelebrities in the form of “reserved” social media handles, blog URLs, and unique hashtags for self-branding. For instance, at the 3-month mark of her pregnancy, Influencer bongqiuqiu debuted her baby’s dedicated hashtag, “#MereGoRound” in a birth announcement on her on Instagram account. Shortly after, she started an Instagram account, “@MereGoRound”, for her baby, who amassed over 5.5k followers prior to her birth. Figure 5 & 6, screenshot March 2015 from instagram.com/meregoround and instagram.com/bongqiuqiuThe debut picture features a heavily pregnant belly shot of bongqiuqiu (Figure 5), creating much anticipation for the arrival of a new micro-microcelebrity: in the six months leading up to her birth, various family, friends, and fans shared Instagram images of their gifts and welcome party for @MereGoRound, and followers shared congratulations and fan art on the dedicated Instagram hashtag. During this time, bongqiuqiu also frequently updated followers on her pregnancy progress, not without advertising her (presumably sponsored) gynecologist and hospital stay in her pregnancy diaries (Figure 6) – like Baby Dash, even as a foetus @MereGoRound was accumulating advertorials. Presently at six months old, @MereGoRound boasts almost 40k followers on Instagram on which embedded in the narrative of her growth are sponsored products and services from various advertisers.Non-Baby-Related AdvertorialsPrior to her pregnancy, Influencer bongqiuqiu hopped onto the micro-microcelebrity bandwagon in the wake of Baby Dash’s birth, by using her niece “#HeYurou” in her advertorials. Many Influencers attempt to naturalize their advertorials by composing their post as if recounting a family event. With reference to a child, parent, or partner, they may muse or quip about a product being used or an experience being shared in a bid to mask the distinction between their personal and commercial material. bongqiuqiu frequently posted personal, non-sponsored images engaging in daily mundane activities under the dedicated hashtag “#HeYurou”.However, this was occasionally interspersed with pictures of her niece holding on to various products including storybooks (Figure 8) and shopping bags (Figure 9). At first glance, this might have seemed like any mundane daily update the Influencer often posts. However, a close inspection reveals the caption bearing sponsor hashtags, tags, and campaign information. For instance, one Instagram post shows #HeYurou casually holding on to and staring at a burger in KFC wrapping (Figure 7), but when read in tandem with bongqiuqiu’s other KFC-related posts published over a span of a few months, it becomes clear that #HeYurou was in fact advertising for KFC. Figure 7, 8, 9, screenshot December 2014 from ‹instagram.com/bongqiuqiu›Elsewhere, Baby Dash was incorporated into xiaxue’s car sponsorship with over 20 large decals of one of his viral photos – dubbed “pineapple Dash” among followers – plastered all over her vehicle (Figure 10). Followers who spot the car in public are encouraged to photograph and upload the image using its dedicated hashtag, “#xiaxuecar” as part of the Influencer’s car sponsorship – an engagement scarcely related to her young child. Since then, xiaxue has speculated producing offshoots of “pineapple Dash” products including smartphone casings. Figure 10, screenshot December 2014 from ‹instagram.com/xiaxue›Follower EngagementSponsors regularly organize fan meet-and-greets headlined by micro-microcelebrities in order to attract potential customers. Photo opportunities and the chance to see Baby Dash “in the flesh” frequently front press and promotional material of marketing campaigns. Elsewhere on social media, several Baby Dash fan and tribute accounts have also emerged on Instagram, reposting images and related media of the micro-microcelebrity with overt adoration, no doubt encouraged by xiaxue, who began crowdsourcing captions for Baby Dash’s photos.Influencer ohsofickle postures #BabyElroyE’s follower engagement in a more subtle way. In her YouTube channel that debut in the month of her baby’s birth, ohsofickle produces video diaries of being a young, single, mother who is raising a child (Figure 11). In each episode, #BabyElroyE is the main feature whose daily activities are documented, and while there is some advertising embedded, ohsofickle’s approach on YouTube is much less overt than others as it features much more non-monetized personal content (Figure 12). Her blog serves as a backchannel to her vlogs, in which she recounts her struggles with motherhood and explicitly solicits the advice of mothers. However, owing to her young age (she became an Influencer at 17 and gave birth at 24), many of her followers are teenagers and young women who respond to her solicitations by gushing over #BabyElroyE’s images on Instagram. Figure 11 & 12, screenshot September 2015 from ‹instagram.com/ohsofickle›PrivacyAs noted by Holloway et al. (23), children like micro-microcelebrities will be among the first cohorts to inherit “digital profiles” of their “whole lifetime” as a “work in progress”, from parents who habitually underestimate or discount the privacy and long term effects of publicizing information about their children at the time of posting. This matters in a climate where social media platforms can amend privacy policies without user consent (23), and is even more pressing for micro-microcelebrities whose followers store, republish, and recirculate information in fan networks, resulting in digital footprints with persistence, replicability, scalability, searchability (boyd), and extended longevity in public circulation which can be attributed back to the children indefinitely (Leaver, “Ends”).Despite minimum age restrictions and recent concerns with “digital kidnapping” where users steal images of other young children to be re-posted as their own (Whigham), some social media platforms rarely police the proliferation of accounts set up by parents on behalf of their underage children prominently displaying their legal names and life histories, citing differing jurisdictions in various countries (Facebook; Instagram), while others claim to disable accounts if users report an “incorrect birth date” (cf. Google for YouTube). In Singapore, the Media Development Authority (MDA) which governs all print and digital media has no firm regulations for this but suggests that the age of consent is 16 judging by their recommendation to parents with children aged below 16 to subscribe to Internet filtering services (Media Development Authority, “Regulatory” 1). Moreover, current initiatives have been focused on how parents can impart digital literacy to their children (Media Development Authority, “Empowered”; Media Literacy Council) as opposed to educating parents about the digital footprints they may be unwittingly leaving about their children.The digital lives of micro-microcelebrities pose new layers of concern given their publicness and deliberate publicity, specifically hinged on making visible the usually inaccessible, private aspects of everyday life (Marshall, “Persona” 5).Scholars note that celebrities are individuals for whom speculation of their private lives takes precedence over their actual public role or career (Geraghty 100-101; Turner 8). However, the personae of Influencers and their young children are shaped by ambiguously blurring the boundaries of privacy and publicness in order to bait followers’ attention, such that privacy and publicness are defined by being broadcast, circulated, and publicized (Warner 414). In other words, the publicness of micro-microcelebrities is premised on the extent of the intentional publicity rather than simply being in the public domain (Marwick 223-231, emphasis mine).Among Influencers privacy concerns have aroused awareness but not action – Baby Dash’s Influencer mother admitted in a national radio interview that he has received a death threat via Instagram but feels that her child is unlikely to be actually attacked (Channel News Asia) – because privacy is a commodity that is manipulated and performed to advance their micro-microcelebrities’ careers. As pioneer micro-microcelebrities are all under 2-years-old at present, future research warrants investigating “child-centred definitions” (Third et al.) of the transition in which they come of age, grow an awareness of their digital presence, respond to their Influencer mothers’ actions, and potentially take over their accounts.Young LabourThe Ministry of Manpower (MOM) in Singapore, which regulates the employment of children and young persons, states that children under the age of 13 may not legally work in non-industrial or industrial settings (Ministry of Manpower). However, the same document later ambiguously states underaged children who do work can only do so under strict work limits (Ministry of Manpower). Elsewhere (Chan), it is noted that national labour statistics have thus far only focused on those above the age of 15, thus neglecting a true reflection of underaged labour in Singapore. This is despite the prominence of micro-microcelebrities who are put in front of (video) cameras to build social media content. Additionally, the work of micro-microcelebrities on digital platforms has not yet been formally recognized as labour, and is not regulated by any authority including Influencer management firms, clients, the MDA, and the MOM. Brief snippets from my ethnographic fieldwork with Influencer management agencies in Singapore similarly reveal that micro-microcelebrities’ labour engagements and control of their earnings are entirely at their parents’ discretion.As models and actors, micro-microcelebrities are one form of entertainment workers who if between the ages of 15 days and 18 years in the state of California are required to obtain an Entertainment Work Permit to be gainfully employed, adhering to strict work, schooling, and rest hour quotas (Department of Industrial Relations). Furthermore, the Californian Coogan Law affirms that earnings by these minors are their own property and not their parents’, although they are not old enough to legally control their finances and rely on the state to govern their earnings with a legal guardian (Screen Actors Guild). However, this similarly excludes underaged children and micro-microcelebrities engaged in creative digital ecologies. Future research should look into safeguards and instruments among young child entertainers, especially for micro-micrcocelebrities’ among whom commercial work and personal documentation is not always distinct, and are in fact deliberately intertwined in order to better engage with followers for relatabilityGrowing Up BrandedIn the wake of moral panics over excessive surveillance technologies, children’s safety on the Internet, and data retention concerns, micro-microcelebrities and their Influencer mothers stand out for their deliberately personal and overtly commercial approach towards self-documenting, self-presenting, and self-publicizing from the moment of conception. As these debut micro-microcelebrities grow older and inherit digital publics, personae, and careers, future research should focus on the transition of their ownership, engagement, and reactions to a branded childhood in which babies were postured for an initimate public.ReferencesAbidin, Crystal. “Communicative Intimacies: Influencers and Perceived Interconnectedness.” Ada: A Journal of Gender, New Media, & Technology. Forthcoming, Nov 2015.Aiello, Marianne. “Mommy Blog Banner Ads Get Results.” Healthcare Marketing Advisor 17 Nov. 2010. HealthLeaders Media. 16 Aug. 2015 ‹http://healthleadersmedia.com/content/MAR-259215/Mommy-Blog-Banner-Ads-Get-Results›.Azzarone, Stephanie. “When Consumers Report: Mommy Blogging Your Way to Success.” Playthings 18 Feb. 2009. Upfront: Marketing. 16 Aug. 2015 ‹http://mamanista.com/media/Mamanista_playthings_full.pdf›.Blum-Ross, Alicia. “’Sharenting’: Parent Bloggers and Managing Children’s Digital Footprints.” Parenting for a Digital Future, 17 Jun. 2015. 16 Aug. 2015 ‹http://blogs.lse.ac.uk/parenting4digitalfuture/2015/06/17/managing-your-childs-digital-footprint-and-or-parent-bloggers-ahead-of-brit-mums-on-the-20th-of-june/›.boyd, danah. “Social Network Sites and Networked Publics: Affordances, Dymanics and Implications.” A Networked Self: Identity, Community, and Culture on Social Network Sites. Ed. Zizi Papacharissi. London: Routledge, 2010. 39–58.Business Wire. “Attention All Mommy Bloggers: TheBump.com Launches 2nd Annual The Bump Mommy Blog Awards.” Business Wire 2 Nov. 2010. 16 Aug. 2015 ‹http://www.businesswire.com/news/home/20101102007005/en/Attention-Mommy-Bloggers-TheBump.com-Launches-2nd-Annual#.VdDsXp2qqko›.Channel News Asia. “Blogger Xiaxue ‘On the Record’.” Channel News Asia 10 Jul. 2015. 16 Aug. 2015 ‹http://www.channelnewsasia.com/news/singapore/blogger-xiaxue-on-the/1975712.html›.Chan, Wing Cheong. “Protection of Underaged Workers in Singapore: Domestic and International Regulation.” Singapore Academy of Law Journal 17 (2005): 668-692. ‹http://www.sal.org.sg/digitallibrary/Lists/SAL%20Journal/Attachments/376/2005-17-SAcLJ-668-Chan.pdf›.Department of Industrial Relations. “California Child Labor Laws.” Department of Industrial Relations, 2013. 16 Aug. 2015 ‹http://www.dir.ca.gov/DLSE/ChildLaborLawPamphlet.pdf›.Facebook. “How Do I Report a Child under the Age of 13?” Facebook 2015. 16 Aug. 2015 ‹https://www.facebook.com/help/157793540954833›.Friedman, Mary. Mommyblogs and the Changing Face of Motherhood. Toronto, ON: University of Toronto Press, 2013.Geraghty, Christine. “Re-Examining Stardom: Questions of Texts, Bodies and Performance.” Stardom and Celebrity: A Reader. Eds. Sean Redmond & Su Holmes. Los Angeles: Sage, 2007. 98-110.Goffman, Erving. The Presentation of Self in Everyday Life. London: Penguin Books, 1956. Google. “Age Requirements on Google Accounts.” Google Support 2015. 16 Aug. 2015 ‹https://support.google.com/accounts/answer/1350409?hl=en›.Holloway, Donell, Lelia Green, and Sonia Livingstone. “Zero to Eight: Young Children and Their Internet Use.” EU Kids Online 2013. London: London School of Economics. 16. Aug 2015 ‹http://eprints.lse.ac.uk/52630/1/Zero_to_eight.pdf›.Howell, Whitney L.J. “Mom-to-Mom Blogs: Hospitals Invite Women to Share Experiences.” H&HN 84.10(2010): 18. ‹http://connection.ebscohost.com/c/articles/54858655/mom-to-mom-blogs-hospitals-invite-women-share-experiences-mommy-blogs-are-catching-as-way-let-parents-interact-compare-notes›.Instagram. “Tips for Parents.” Instagram Help 2015. 16 Aug. 2015 ‹https://help.instagram.com/154475974694511/›.Katz, Elihu, and Paul F. Lazarsfeld. Personal Influence: The Part Played by People in the Flow of Mass Communications. New Brunswick: Transaction Publishers, 2009. Leaver, Tama. “The Ends of Online Identity”. Paper presented at Internet Research 12, Seattle, 2011.Leaver, Tama. “Birth and Death on Social Media: Dr Tama Leaver.” Lecture presented at Curtin University, 20 Jul. 2015.. 16 Aug. 2015 ‹https://www.youtube.com/watch?v=rQ6eW6qxGx8›.Leaver, Tama. “Born Digital? Presence, Privacy, and Intimate Surveillance.” Re-Orientation: Translingual Transcultural Transmedia: Studies in Narrative, Language, Identity, and Knowledge. Eds. John Hartley & Weiguo Qu. Fudan University Press, forthcoming.Lupton, Deborah. The Social Worlds of the Unborn. Basingstoke: Palgrave MacMillan, 2013.Marshall, P. David. "The Promotion and Presentation of the Self: Celebrity as Marker of Presentational Media." Celebrity Studies 1.1 (2010): 35-48. Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self.” Journalism 15.2 (2013): 153-170. Marwick, Alice E. Status Update: Celebrity, Publicity, & Branding in the Social Media Age. New Haven, CT: Yale University Press, 2013.Media Development Authority. “The Regulatory Options to Facilitate the Adoption of Internet Parental Controls.” Regulations and Licensing 2015. 16 Aug. 2015 ‹http://www.mda.gov.sg/RegulationsAndLicensing/Consultation/Documents/Consultation%20Papers/Public%20consultation%20paper%20for%20Internet%20parental%20controls_21%20Apr_final.pdf›.Media Development Authority. “Be Empowered! Protecting Your Kids in the Digital Age.” Documents 2015. 16 Aug. 2015 ‹http://www.mda.gov.sg/Documents/Newsletter/Issue08/Pages/02.aspx.html›.Media Literacy Council. “Clique Click: Bringing Up Children in the Digital Age.” Resources 2014. 16 Aug. 2015 ‹http://www.medialiteracycouncil.sg/Lists/Resources/Attachments/176/Clique%20Click.pdf›.Ministry of Manpower. “Employing Young Persons and Children.” Employment 26 May 2014. 16 Aug. 2015 ‹http://www.mom.gov.sg/employment-practices/young-persons-and-children›.Mom Bloggers Club. “Eight Proven Ways to Monetize Your Mom Blog.” Mom Bloggers Club 19 Nov. 2009. 15 Aug. 2015 ‹http://www.mombloggersclub.com/page/eight-proven-ways-to-monetize?id=988554%3APage%3A345278&page=3#comments›.Morrison, Aimee. “‘Suffused by Feeling and Affect:’ The Intimate Public of Personal Mommy Blogging.” Biography 34.1 (2011): 37-55.Nash, Meredith. “Shapes of Motherhood: Exploring Postnatal Body Image through Photographs.” Journal of Gender Studies (2013): 1-20. ‹http://www.tandfonline.com/doi/abs/10.1080/09589236.2013.797340#.VdDsvZ2qqko›.Rojek, Chris. Celebrity. London: Reaktion Books, 2001. Screen Actors Guild. “Coogan Law.” SAGAFTRA 2015. 16 Aug. 2015 ‹http://www.sagaftra.org/content/coogan-law›.Senft, Theresa. M. Camgirls: Celebrity & Community in the Age of Social Networks. New York, NY: Peter Lang, 2008.Stevenson, Seth. “Popularity Counts.” Wired 20.5 (2012): 120.Tatum, Christine. “Mommy Blogs Mull and Prove Market Might.” Denver Post 23 Oct 2007. 16 Aug. 2015 ‹http://www.denverpost.com/search/ci_7250753›.Third, Amanda, Delphine Bellerose, Urszula Dawkins, Emma Keltie, and Kari Pihl. “Children’s Rights in the Digital Age.” Young and Well Cooperative Research Centre 2014. 16 Aug. 2015 ‹http://www.youngandwellcrc.org.au/wp-content/uploads/2014/10/Childrens-Rights-in-the-Digital-Age_Report_single_FINAL_.pdf >.Thompson, Stephanie. “Mommy Blogs: A Marketer’s Dream; Growing Number of Well-Produced Sites Put Advertisers in Touch with an Affluent, Loyal Demo.” AD AGE 26 Feb. 2007. 16 Aug. 2015 ‹http://adage.com/article/digital/mommy-blogs-a-marketer-s-dream/115194/›.Turner, Graeme. Understanding Celebrity. Los Angeles: Sage, 2004.Warner, Michael. “Publics and Counter Publics.” Quarterly Journal of Speech 88.4 (2002): 413-425. Whigham, Nick. “Digital Kidnapping Will Make You Think Twice about What You Post to Social Media.” News.com.au 15 July 2015. 16 Aug. 2015 ‹http://www.news.com.au/lifestyle/real-life/digital-kidnapping-will-make-you-think-twice-about-what-you-post-to-social-media/story-fnq2oad4-1227449635495›.

46

Heemsbergen,LukeJ., Alexia Maddox, Toija Cinque, Amelia Johns, and Robert Gehl. "Dark." M/C Journal 24, no.2 (April27, 2021). http://dx.doi.org/10.5204/mcj.2791.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

This issue of M/C Journal rejects the association of darkness with immorality. In digital communication, the possibilities of darkness are greater than simple fears of what is hidden in online networks. Instead, new work in an emerging field of “dark social” studies’ consider “dark” as holding the potential for autonomy away from the digital visibilities that pervade economic, political, and surveillance logics of the present age. We shall not be afraid of the dark. We start from a technical rather than moral definition of darkness (Gehl), a definition that conceives of dark spaces as having legitimacies and anonymities against structural surveillance. At the same time, breaking away from techno-centric critiques of the dark allows a humanisation of how dark is embodied and performed at individual and structural levels. Other readings of digitally mediated dark (Fisher and Bolter) suggest tensions between exploitative potentials and deep societal reflection, and the ability for a new dark age (Bridle) to allow us to explore unknown potentials. Together these perspectives allow our authors a way to use dark to question and upend the unresting pressure and acceptance of—and hierarchy given to—the light in aesthetics of power and social transformation. While we reject, however, the reduction of “dark” to “immoral” as we are not blind to “bad actors” lurking in hidden spaces (see Potter, forthcoming). Dark algorithms and their encoded biases shape our online lives. Not everyone has the ability to go off grid or create their own dark networks. Colonial settlerism often hides its brutal logics behind discourses of welfare. And some of us are forced to go dark against our will, as in the case of economies or nations being shut out of communication networks. But above all, the tensions produced in darkness, going dark, and acting dark show the normative powers beyond only focusing on the light. Taken as a whole, the articles in this issue explore the tensions between dark and connected, opting in and opting out, and exposure and retreat. They challenge binaries that reduce our vision to the monochromaticism of dark and light. They explain how the concept of “dark” expands opportunities for existence and persistence beyond datafication. They point to moral, ethical, and pragmatic responses of selves and communities seeking to be/belong in/of the dark. The issue starts with a high-stakes contest: what happens when an entire country is forced to go dark? While the articles in this issue were in review, Australian Facebook users were abruptly introduced to a unique form of darkness when, overnight, all news posts were removed from Facebook. Leaver’s feature article responds to tell the story of how Facebook and Google fought the Australian media law, and nobody won. Simply put, the platforms-cum-infrastructures did not want the government to mandate terms of their payments and business to traditional news organisations, so pulled the plug on Australia. As Leaver points out, Facebook’s cull not only made news media go dark, but in the midst of a pandemic and ongoing bushfires, prevented government agencies from posting and sharing government public health information, weather and wind patterns, and some State Emergency Services information. His article positions darkness on the spectrum from visibility to invisibility and focuses on the complex interplays of who is in control of, or has the power over, visibility. Facebook’s power to darken vital voices in society was unprecedented in Australia, a form of “de-platforming at scale” (Crawford). It seemed that Facebook (and as Leaver explains, Google, to a lesser extent) were using Australia to test platform power and legislative response. The results of this experiment, Leaver argues, was not a dawn of a new dark age—without the misinforming-glare of Facebook (see Cinque in this issue)—but confirmatory evidence of the political economy of national media: News Corp and other large traditional media companies received millions from Facebook and Google in exchange for the latter being exempt from the very law in question. Everyone won, except the Australians looking to experiment and explore alternatives in a new darkness. Scared of the dark, politicians accepted a mutually agreed transfer of ad-revenue from Google and Facebook to large and incumbent media organisations; and with that, hope of exploring a world mediated without the glare of digital incumbents was snuffed out. These agreements, of course, found user privacy, algorithmic biases, and other concerns of computational light out of scope. Playing off the themes of status quo of institutionalised social media companies, Cinque examines how social online spaces (SOS) which are governed by logics of surveillance and datafication embodied in the concept of the “gazing elite” (data aggregators including social media), can prompt anxieties for users regarding data privacy. Her work in the issue particularly observes that anxiety for many users is shaped by this manifestation of the “dark” as it relates to the hidden processes of data capture and processing by the mainstream platforms, surveillant digital objects that are incorporated into the Internet of Things, and “dark” or black boxed automated decisions which censor expression and self-representation. Against this way of conceptualising digital darkness, Cinque argues that dark SOS which use VPNs or the Tor browser to evade monitoring are valuable to users precisely because of their ability to evade the politics of visibility and resist the power of the gazing elite. Continuing away from the ubiquitous and all consuming blue glow of Facebook to more esoteric online communities, Maddox and Heemsbergen use their article to expand a critique on the normative computational logics which define the current information age (based on datafication, tracking, prediction, and surveillance of human socialities). They consider how “digging in the shadows” and “tinkering” with cryptocurrencies in the “dark” is shaping alternative futures based on social, equitable, and reciprocal relations. Their work traces cryptocurrencies—a “community generated technology” made by makers, miners and traders on darknets—from its emergence during a time of global economic upheaval, uncertainty and mistrust in centralised financial systems, through to new generations of cryptocurrencies like Dogecoin that, based on lessons from early cryptocurrencies, are mutating and becoming absorbed into larger economic structures. These themes are explored using an innovative analytical framework considering the “construction, disruption, contention, redirection, and finally absorption of emerging techno-potentials into larger structures”. The authors conclude by arguing that experiments in the dark don’t stay in the dark, but are radical potentials that impact and shape larger social forms. Bradfield and Fredericks take a step back from a focus on potentially arcane online cultures to position dark in an explicit provocation to settler politics’ fears and anxieties. They show how being dark in Australia is embodied and everyday. In doing so, they draw back the veil on the uncontested normality of fear of the dark-as-object. Their article’s examples offer a stark demonstration of how for Indigenous peoples, associations of “dark” fear and danger are built into the structural mechanisms that shape and maintain colonial understandings of Indigenous peoples and their bodies as part of larger power structures. They note activist practices that provoke settlers to confront individuals, communities, and politics that proclaim “I’m not afraid of the Dark” (see Cotes in Bradfield and Fredericks). Drawing on a related embodied refusal of poorly situated connotations of the dark, Hardley considers the embodied ways mobile media have been deployed in the urban night and observes that in darkness, and the night, while vision is obscured and other senses are heightened we also encounter enmeshed cultural relationships of darkness and danger. Drawing on the postphenomenological concept of multistability, Hardley frames engagement with mobile media as a particular kind of body-technology relation in which the same technology can be used by different people in multiple ways, as people assign different meanings to the technology. Presenting empirical research on participants’ night-time mobile media practices, Hardley analyses how users co-opt mobile media functionalities to manage their embodied experiences of the dark. The article highlights how mobile media practices of privacy and isolation in urban spaces can be impacted by geographical location and urban darkness, and are also distinctly gendered. Smith explores how conversations flow across social media platforms and messaging technologies and in and out of sight across the public domain. Darkness is the backstage where backchannel conversations take place outside of public view, in private and parochial spaces, and in the shadow spaces where communication crosses between platforms. This narrative threading view of conversation, which Smith frames as a multiplatform accomplishment, responds to the question held by so many researchers and people trying to interpret what people say in public on social media. Is what we see the tip of an iceberg or just a small blip in the ocean? From Smith’s work we can see that so much happens in the dark, beyond the gaze of the onlooker, where conversational practices move by their own logic. Smith argues that drawing on pre-digital conversational analysis techniques associated with ethnomethodology will illuminate the social logics that structure online interaction and increase our understanding of online sociality forces. Set in the context of merging platforms and the “rise of data”, Lee presents issues that undergird contemporary, globally connected media systems. In translating descriptions of complex systems, the article critically discusses the changing relational quality of “the shadow of hierarchy” and “Platform Power”. The governmental use of private platforms, and the influence it has on power and opportunity for government and civil society is prefigured. The “dark” in this work is lucidly presented as a relationality; an expression of differing values, logics, and (techno)socialities. The author finds and highlights the line between traditional notions of "infrastructure" and the workings of contemporary digital platforms which is becoming increasingly indistinct. Lee concludes by showing how the intersection of platforms with public institutions and infrastructures has moulded society’s light into an evolving and emergent shadow of hierarchy over many domains where there are, as always, those that will have the advantage—and those that do not. Finally, Jethani and Fordyce present an understanding of “data provenance” as a metaphor and method both for analysing data as a social and political artefact. The authors point to the term via an inter-disciplinary history as a way to explain a custodial history of objects. They adroitly argue that in our contemporary communication environment that data is more than just a transact-able commodity. Data is vital—being acquired, shared, interpreted and re-used with significant influence and socio-technical affects. As we see in this article, the key methods that rely on the materiality and subjectivity of data extraction and interpretation are not to be ignored. Not least because they come with ethical challenges as the authors make clear. As an illuminating methodology, “data provenance” offers a narrative for data assets themselves (asking what, when, who, how, and why). In the process, the kinds of valences unearthed as being private, secret, or exclusive reveal aspects of the ‘dark’ (and ‘light’) that is the focus of this issue. References Bridle, James. New Dark Age: Technology and the End of the Future. London, UK: Verso Books, 2018. Crawford, Kate (katecrawford). “It happened: Facebook just went off the deep end in Australia. They are blocking *all* news content to Australians, and *no* Australian media can post news. This is what showdowns between states and platforms look like. It's deplatforming at scale.” 18 Feb. 2021. 22 Apr. 2021 <https://twitter.com/katecrawford/status/1362149306170368004>. Fisher, Joshua A., and Jay David Bolter. "Ethical Considerations for AR Experiences at Dark Tourism Sites." 2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct) (2018): 365-69. Gehl, Robert. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2p. The Information Society Series. Cambridge, MA: MIT Press, 2018. Potter, Martin. “Bad Actors Never Sleep: Content Manipulation on Reddit.” Eds. Toija Cinque, Robert W. Gehl, Luke Heemsbergen, and Alexia Maddox. Continuum Dark Social Special Issue (forthcoming).

47

Henderson, Neil James. "Online Persona as Hybrid-Object: Tracing the Problems and Possibilities of Persona in the Short Film Noah." M/C Journal 17, no.3 (June10, 2014). http://dx.doi.org/10.5204/mcj.819.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction The short film Noah (2013) depicts the contemporary story of an adolescent relationship breakdown and its aftermath. The film tells the story by showing events entirely as they unfold on the computer screen of Noah, the film’s teenaged protagonist. All of the characters, including Noah, appear on film solely via technological mediation.Although it is a fictional representation, Noah has garnered a lot of acclaim within an online public for the authenticity and realism of its portrayal of computer-mediated life (Berkowitz; Hornyak; Knibbs; Warren). Judging by the tenor of a lot of this commentary, the film has keyed in to a larger cultural anxiety around issues of communication and relationships online. Many reviewers and interested commentators have expressed concern at how closely Noah’s distracted, frenetic and problematic multitasking resembles their own computer usage (Beggs; Berkowitz; Trumbore). They frequently express the belief that it was this kind of behaviour that led to the relationship breakdown depicted in the film, as Noah proves to be “a lot better at opening tabs than at honest communication” (Knibbs para. 2).I believe that the cultural resonance of the film stems from the way in which the film is an implicit attempt to assess the nature of contemporary online persona. By understanding online persona as a particular kind of “hybrid object” or “quasi-object”—a combination of both human and technological creation (Latour We Have)—the sense of the overall problems, as well as the potential, of online persona as it currently exists, is traceable through the interactions depicted within the film. By understanding social relationships as constituted through dynamic interaction (Schutz), I understand the drama of Noah to stem principally from a tension in the operation of online persona between a) the technological automation of presentation that forms a core part of the nature of contemporary online persona, and b) the need for interaction in effective relationship development. However, any attempt to blame this tension on an inherent tendency in technology is itself problematised by the film’s presentation of an alternative type of online persona, in a Chatroulette conversation depicted in the film’s second half.Persona and Performance, Mediation and DelegationMarshall (“Persona Studies” 163) describes persona as “a new social construction of identity and public display.” This new type of social construction has become increasingly common due to a combination of “changes in work, transformation of our forms of social connection and networking via new technologies, and consequent new affective clusters and micropublics” (Marshall “Persona Studies” 166). New forms of “presentational” media play a key role in the construction of persona by providing the resources through which identity is “performed, produced and exhibited by the individual or other collectives” (Marshall “Persona Studies” 160).In this formulation of persona, it is not clear how performance and presentation interlink with the related concepts of production and exhibition. Marshall’s concept of “intercommunication” suggests a classificatory scheme for these multiple registers of media and communication that are possible in the contemporary media environment. However, Marshall’s primary focus has so far been on the relationship between existing mediated communication forms, and their historical transformation (Marshall “Intercommunication”). Marshall has not as yet made clear the theoretical link between performance, presentation, production and exhibition. Actor-Network Theory (ANT) can provide this theoretical link, and a way of understanding persona as it operates in an online context: as online persona.In ANT, everything that exists is an object. Objects are performative actors—the associations between objects produce the identity of objects and the way they perform. The performative actions of objects, equally, produce the nature of the associations between them (Latour Reassembling). Neither objects nor associations have a prior existence outside of their relationship to each other (Law).For Latour, the semiotic distinction between “human” and “non-human” is itself an outcome of the performances of objects and their associations. There are also objects, which Latour calls “quasi-objects” or “hybrids,” that do not fit neatly on one side of the human/non-human divide or the other (Latour We Have). Online persona is an example of such a hybrid or quasi-object: it is a combination of both human creation and technological mediation.Two concepts formulated by Latour provide some qualitative detail about the nature of the operation of Actor-Networks. Firstly, Latour emphasises that actors are also “mediators.” This name emphasises that when an actor acts to create a connection between two or more other objects, it actively transforms the way that objects encounter the performance of other objects (Latour Reassembling). This notion of mediation resembles Hassan’s definition of “media” as an active agent of transferral (Hassan). But Latour emphasises that all objects, not just communication technologies, act as mediators. Secondly, Latour describes how an actor can take on the actions originally performed by another actor. He refers to this process as “delegation.” Delegation, especially delegation of human action to a technological delegate, can render action more efficient in two ways. It can reduce the effort needed for action, causing “the transformation of a major effort into a minor one.” It can also reduce the time needed to exert effort in performing an action: the effort need not be ongoing, but can be “concentrated at the time of installation” (Latour “Masses” 229-31).Online persona, in the terminology of ANT, is a constructed, performative presentation of identity. It is constituted through a combination of human action, ongoing mediation of present human action, and the automation, through technological delegation, of previous actions. The action of the film Noah is driven by the changes in expected and actual interaction that these various aspects of persona encourage.The Problems and Potential of Online PersonaBy relaying the action entirely via a computer screen, the film Noah is itself a testament to how encounters with others solely via technological mediation can be genuinely meaningful. Relaying the action in this way is in fact creatively productive, providing new ways of communicating details about characters and relationships through the layout of the screen. For instance, the film introduces the character of Amy, Noah’s girlfriend, and establishes her importance to Noah through her visual presence as part of a photo on his desktop background at the start of the film. The film later communicates the end of the relationship when the computer boots up again, but this time with Amy’s photo notably absent from the background.However, the film deviates from a “pure” representation of a computer screen in a number of ways. Most notably, the camera frame is not static, and moves around the screen in order to give the viewer the sense that the camera is simulating Noah’s eye focus. According to the directors, the camera needed to show viewers where the focus of the action was as the story progressed. Without this indication of where to focus, it was hard to keep viewers engaged and interested in the story (Paulas).Within the story of the film itself, the sense of drama surrounding Noah’s actions similarly stem from the exploration of the various aspects of what it is and is not possible to achieve in the performance of persona – both the positive and the negative consequences. At the start of the film, Noah engages in a Skype conversation with his girlfriend Amy. While Noah is indeed “approximating being present” (Berkowitz para. 3) for the initial part of this conversation, once Noah hears an implication that Amy may want to break up with him, the audience sees his eye movements darting between Amy’s visible face in Skype and Amy’s Facebook profile, and nowhere else.It would be a mistake to think that this double focus means Noah is not fully engaging with Amy. Rather, he is engaging with two dimensions of Amy’s available persona: her Facebook profile, and her Skype presence. Noah is fully focusing on Amy at this point of the film, but the unitary persona he experiences as “Amy” is constructed from multiple media channels—one dynamic and real-time, the other comparatively stable and static. Noah’s experience of Amy is multiplexed, a unitary experience constructed from multiple channels of communication. This may actually enhance Noah’s affective involvement with Amy.It is true that at the very start of the Skype call, Noah is focusing on several unrelated activities, not just on Amy. The available technological mediators enable this division of attention. But more than that, the available technological mediators also assume in their functioning that the user’s attention can be and should be divided. Thus some of the distractions Noah experiences at this time are of his own making (e.g. the simple game he plays in a browser window), while others are to some degree configured by the available opportunity to divide one’s attention, and the assumption of others that the user will do so. One of the distractions faced by Noah comes in the form of repeated requests from his friend “Kanye East” to play the game Call of Duty. How socially obligated is Noah to respond to these requests as promptly as possible, regardless of what other important things (that his friend doesn’t know about) he may be doing?Unfortunately, and for reasons which the audience never learns, the Skype call terminates abruptly before Noah can fully articulate his concerns to Amy. With a keen eye, the audience can see that the image of Amy froze not long after Noah started talking to her in earnest. She did indeed appear to be having problems with her Skype, as her later text message suggested. But there’s no indication why Amy decided, as described in the same text message, to postpone the conversation after the Skype call failed.This is a fairly obvious example of the relatively common situation in which one actor unexpectedly refuses to co-operate with the purposes of another (Callon). Noah’s uncertainty at how to address this non-cooperation leads to the penultimate act of the film when he logs in to Amy’s Facebook account. In order to fully consider the ethical issues involved, a performative understanding of the self and of relationships is insufficient. Phenomenological understandings of the self and social relationships are more suited to ethical considerations.Online Persona and Social RelationshipsIn the “phenomenological sociology” of Alfred Schutz, consciousness is inescapably temporal, constantly undergoing slight modification by the very process of progressing through time. The constitution of a social relationship, for Schutz, occurs when two (and only two) individuals share a community of space and time, simultaneously experiencing the same external phenomena. More importantly, it also requires that these two individuals have an ongoing, mutual and simultaneous awareness of each other’s progress and development through time. Finally, it requires that the individuals be mutually aware of the very fact that they are aware of each other in this ongoing, mutual and simultaneous way (Schutz).Schutz refers to this ideal-typical relationship state as the “We-relationship,” and the communal experience that constitutes it as “growing older together.” The ongoing awareness of constantly generated new information about the other is what constitutes a social relationship, according to Schutz. Accordingly, a lack of such information exchange will lead to a weaker social bond. In situations where direct interaction does not occur, Schutz claimed that individuals would construct their knowledge of the other through “typification”: pre-learned schemas of identity of greater or lesser generality, affixed to the other based on whatever limited information may be available.In the film, when Amy is no longer available via Skype, an aspect of her persona is still available for interrogation. After the failed Skype call, Noah repeatedly refreshes Amy’s Facebook profile, almost obsessively checking her relationship status to see if it has changed from reading “in a relationship.” In the process he discovers that, not long after their aborted Skype conversation, Amy has changed her profile picture—from one that had an image of the two of them together, to one that contains an image of Amy only. He also in the process discovers that someone he does not know named “Dylan Ramshaw” has commented on all of Amy’s current and previous profile pictures. Dylan’s Facebook profile proves resistant to interrogation—Noah’s repeated, frustrated attempts to click on Dylan’s profile picture to bring up more detail yields no results. In the absence of an aspect of persona that undergoes constant temporal change, any new information attained—a profile picture changed, a not-previously noticed regular commenter discovered—seems to gain heightened significance in defining not just the current relationship status with another, but the trajectory which that relationship is taking. The “typification” that Noah constructs of Amy is that of a guilty, cheating girlfriend.The penultimate act of the film occurs when Noah chooses to log in to Amy’s Facebook account using her password (which he knows), “just to check for sketchy sh*t,” or so he initially claims to Kanye East. His suspicions appear to be confirmed when he discovers that private exchanges between Amy and Dylan which indicate that they had been meeting together without Noah’s knowledge. The suggestion to covertly read Amy’s private Facebook messages comes originally from Kanye East, when he asks Noah “have you lurked [covertly read] her texts or anything?” Noah’s response strongly suggests the normative uncertainty that the teenaged protagonist feels at the idea; his initial response to Kanye East reads “is that the thing to do now?” The operation of Facebook in this instance has two, somewhat contradictory, delegated tasks: let others feel connected to Amy and what she’s doing, but also protect Amy’s privacy. The success of the second goal interferes with Noah’s desire to achieve the first. And so he violates her privacy.The times that Noah’s mouse hovers and circles around a button that would send a message from Amy’s account or update Amy’s Facebook profile are probably the film’s most cringe-inducing moments. Ultimately Noah decides to update Amy’s relationship status to single. The feedback he receives to Amy’s account immediately afterwards seems to confirm his suspicions that this was what was going to happen anyway: one friend of Amy’s says “finally” in a private message, and the suspicious “Dylan” offers up a shoulder to cry on. Apparently believing that this reflects the reality of their relationship, Noah leaves the status on Amy’s Facebook profile as “single.”The tragedy of the film is that Noah’s assumptions were quite incorrect. Rather than reflecting their updated relationship status, the change revealed to Amy that he had violated her privacy. Dylan’s supposedly over-familiar messages were perfectly acceptable on the basis that Dylan was not actually heterosexual (and therefore a threat to Noah’s role as boyfriend), but gay.The Role of Technology: “It’s Complicated”One way to interpret the film would be to blame Noah’s issues on technology per se. This is far too easy. Rather, the film suggests that Facebook was to some degree responsible for Noah’s relationship issues and the problematic way in which he tried to address them. In the second half of the film, Noah engages in a very different form of online interaction via the communication service known as Chatroulette. This interaction stands in sharp contrast to the interactions that occurred via Facebook.Chatroulette is a video service that pairs strangers around the globe for a chat session. In the film, Noah experiences a fairly meaningful moment on Chatroulette with an unnamed girl on the service, who dismisses Facebook as “weird and creepy”. The sheer normative power of Facebook comes across when Noah initially refuses to believe the unnamed Chatroulette girl when she says she does not have a Facebook profile. She suggests, somewhat ironically, that the only way to have a real, honest conversation with someone is “with a stranger, in the middle of the night”, as just occurred on Chatroulette.Besides the explicit comparison between Facebook and Chatroulette in the dialogue, this scene also provides an implicit comparison between online persona as it is found on Facebook and as it is found on Chatroulette. The style of interaction on each service is starkly different. On Facebook, users largely present themselves and perform to a “micro-public” of their “friends.” They largely engage in static self-presentations, often “interacting” only through interrogating the largely static self-presentations of others. On Chatroulette, users interact with strangers chosen randomly by an algorithm. Users predominantly engage in dialogue one-on-one, and interaction tends to be a mutual, dynamic affair, much like “real life” conversation.Yet while the “real-time” dialogue possible on Chatroulette may seem more conducive to facilitating Schutz’ idea of “growing older together,” the service also has its issues. The randomness of connection with others is problematic, as the film frankly acknowledges in the uncensored shots of frontal male nudity that Noah experiences in his search for a chat partner. Also, the problematic lack of a permanent means of staying in contact with each other is illustrated by a further tragic moment in the film when the session with the unnamed girl ends, with Noah having no means of ever being able to find her again.ConclusionIt is tempting to dismiss the problems that Noah encounters while interacting via mediated communication with the exhortation to “just go out and live [… ] life in the real world” (Trumbore para. 4), but this is also over-simplistic. Rather, what we can take away from the film is that there are trade-offs to be had in the technological mediation of self-presentation and communication. The questions that we need to address are: what prompts the choice of one form of technological mediation over another? And what are the consequences of this choice? Contemporary persona, as conceived by David Marshall, is motivated by the commodification of the self, and by increased importance of affect in relationships (Marshall “Persona Studies”). In the realm of Facebook, the commodification of the self has to some degree flattened the available interactivity of the online self, in favour of what the unnamed Chatroulette girl derogatorily refers to as “a popularity contest.”The short film Noah is to some degree a cultural critique of dominant trends in contemporary online persona, notably of the “commodification of the self” instantiated on Facebook. By conceiving of online persona in the terms of ANT outlined here, it becomes possible to envision alternatives to this dominant form of persona, including a concept of persona as commodification. Further, it is possible to do this in a way that avoids the trap of blaming technology for all problems, and that recognises both the advantages and disadvantages of different ways of constructing online persona. The analysis of Noah presented here can therefore provide a guide for more sophisticated and systematic examinations of the hybrid-object “online persona.”References Beggs, Scott. “Short Film: The Very Cool ‘Noah’ Plays Out Madly on a Teenager’s Computer Screen.” Film School Rejects 11 Sep. 2013. 3 Mar. 2014. Callon, M. “Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay.” Power, Action and Belief: A New Sociology of Knowledge? Ed. John Law. London, UK: Routledge & Kegan Paul, 1986. 196–223. Berkowitz, Joe. “You Need to See This 17-Minute Film Set Entirely on a Teen’s Computer Screen.” Fast Company 10 Sep. 2013. 1 Mar. 2014. Hassan, Robert. Media, Politics and the Network Society. Maidenhead: Open University Press, 2004. Hornyak, Tim. “Short Film ‘Noah’ Will Make You Think Twice about Facebook—CNET.” CNET 19 Sep. 2013. 2 Mar. 2014. Knibbs, Kate. “‘Have You Lurked Her Texts?’: How the Directors of ‘Noah’ Captured the Pain of Facebook-Era Dating.” Digital Trends 14 Sep. 2013. 9 Feb. 2014. Latour, Bruno. Reassembling the Social: An Introduction to Actor-Network Theory. Oxford University Press, 2005. Latour, Bruno. We Have Never Been Modern. Cambridge, Mass: Harvard University Press, 1993. Latour, Bruno. “Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts.” Shaping Technology/Building Society: Studies in Sociotechnical Change. Ed. Wiebe E. Bijker and John Law. Cambridge, MA: MIT Press, 1992. 225–58. Law, John. “After ANT: Complexity, Naming and Topology.” Actor-Network Theory and After. Ed. John Law and John Hassard. Oxford: Blackwell Publishers, 1999. 1–14. Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self.” Journalism 15.2 (2014): 153–170. Marshall, P. David. “The Intercommunication Challenge: Developing a New Lexicon of Concepts for a Transformed Era of Communication.” ICA 2011: Proceedings of the 61st Annual ICA Conference. Boston, MA: Intrenational Communication Association, 2011. 1–25. Paulas, Rick. “Step inside the Computer Screen of ‘Noah.’” VICE 18 Jan. 2014. 8 Feb. 2014. Schutz, Alfred. The Phenomenology of the Social World. Trans. George Walsh and Frederick Lehnert. London, UK: Heinemann, 1972. Trumbore, Dave. “Indie Spotlight: NOAH - A 17-Minute Short Film from Patrick Cederberg and Walter Woodman.” Collider 2013. 2 Apr. 2014. Warren, Christina. “The Short Film That Takes Place Entirely inside a Computer.” Mashable 13 Sep.2013. 9 Feb. 2014. Woodman, Walter, and Patrick Cederberg. Noah. 2013.

48

Arnold, Bruce, and Margalit Levin. "Ambient Anomie in the Virtualised Landscape? Autonomy, Surveillance and Flows in the 2020 Streetscape." M/C Journal 13, no.2 (May3, 2010). http://dx.doi.org/10.5204/mcj.221.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Our thesis is that the city’s ambience is now an unstable dialectic in which we are watchers and watched, mirrored and refracted in a landscape of iPhone auteurs, eTags, CCTV and sousveillance. Embrace ambience! Invoking Benjamin’s spirit, this article does not seek to limit understanding through restriction to a particular theme or theoretical construct (Buck-Morss 253). Instead, it offers snapshots of interactions at the dawn of the postmodern city. That bricolage also engages how people appropriate, manipulate, disrupt and divert urban spaces and strategies of power in their everyday life. Ambient information can both liberate and disenfranchise the individual. This article asks whether our era’s dialectics result in a new personhood or merely restate the traditional spectacle of ‘bright lights, big city’. Does the virtualized city result in ambient anomie and satiation or in surprise, autonomy and serendipity? (Gumpert 36) Since the steam age, ambience has been characterised in terms of urban sound, particularly the alienation attributable to the individual’s experience as a passive receptor of a cacophony of sounds – now soft, now loud, random and recurrent–from the hubbub of crowds, the crash and grind of traffic, the noise of industrial processes and domestic activity, factory whistles, fire alarms, radio, television and gramophones (Merchant 111; Thompson 6). In the age of the internet, personal devices such as digital cameras and iPhones, and urban informatics such as CCTV networks and e-Tags, ambience is interactivity, monitoring and signalling across multiple media, rather than just sound. It is an interactivity in which watchers observe the watched observing them and the watched reshape the fabric of virtualized cities merely by traversing urban precincts (Hillier 295; De Certeau 163). It is also about pervasive although unevenly distributed monitoring of individuals, using sensors that are remote to the individual (for example cameras or tag-readers mounted above highways) or are borne by the individual (for example mobile phones or badges that systematically report the location to a parent, employer or sex offender register) (Holmes 176; Savitch 130). That monitoring reflects what Doel and Clark characterized as a pervasive sense of ambient fear in the postmodern city, albeit fear that like much contemporary anxiety is misplaced–you are more at risk from intimates than from strangers, from car accidents than terrorists or stalkers–and that is ahistorical (Doel 13; Scheingold 33). Finally, it is about cooption, with individuals signalling their identity through ambient advertising: wearing tshirts, sweatshirts, caps and other apparel that display iconic faces such as Obama and Monroe or that embody corporate imagery such as the Nike ‘Swoosh’, Coca-Cola ‘Ribbon’, Linux Penguin and Hello Kitty feline (Sayre 82; Maynard 97). In the postmodern global village much advertising is ambient, rather than merely delivered to a device or fixed on a billboard. Australian cities are now seas of information, phantasmagoric environments in which the ambient noise encountered by residents and visitors comprises corporate signage, intelligent traffic signs, displays at public transport nodes, shop-window video screens displaying us watching them, and a plethora of personal devices showing everything from the weather to snaps of people in the street or neighborhood satellite maps. They are environments through which people traverse both as persons and abstractions, virtual presences on volatile digital maps and in online social networks. Spectacle, Anomie or Personhood The spectacular city of modernity is a meme of communication, cultural and urban development theory. It is spectacular in the sense that of large, artificial, even sublime. It is also spectacular because it is built around the gaze, whether the vistas of Hausmann’s boulevards, the towers of Manhattan and Chicago, the shopfront ‘sea of light’ and advertising pillars noted by visitors to Weimar Berlin or the neon ‘neo-baroque’ of Las Vegas (Schivelbusch 114; Fritzsche 164; Ndalianis 535). In the year 2010 it aspires to 2020 vision, a panoptic and panspectric gaze on the part of governors and governed alike (Kullenberg 38). In contrast to the timelessness of Heidegger’s hut and the ‘fixity’ of rural backwaters, spectacular cities are volatile domains where all that is solid continues to melt into air with the aid of jackhammers and the latest ‘new media’ potentially result in a hypereality that make it difficult to determine what is real and what is not (Wark 22; Berman 19). The spectacular city embodies a dialectic. It is anomic because it induces an alienation in the spectator, a fatigue attributable to media satiation and to a sense of being a mere cog in a wheel, a disempowered and readily-replaceable entity that is denied personhood–recognition as an autonomous individual–through subjection to a Fordist and post-Fordist industrial discipline or the more insidious imprisonment of being ‘a housewife’, one ant in a very large ant hill (Dyer-Witheford 58). People, however, are not automatons: they experience media, modernity and urbanism in different ways. The same attributes that erode the selfhood of some people enhance the autonomy and personhood of others. The spectacular city, now a matrix of digits, information flows and opportunities, is a realm in which people can subvert expectations and find scope for self-fulfillment, whether by wearing a hoodie that defeats CCTV or by using digital technologies to find and associate with other members of stigmatized affinity groups. One person’s anomie is another’s opportunity. Ambience and Virtualisation Eighty years after Fritz Lang’s Metropolis forecast a cyber-sociality, digital technologies are resulting in a ‘virtualisation’ of social interactions and cities. In post-modern cityscapes, the space of flows comprises an increasing number of electronic exchanges through physically disjointed places (Castells 2002). Virtualisation involves supplementation or replacement of face-to-face contact with hypersocial communication via new media, including SMS, email, blogging and Facebook. In 2010 your friends (or your boss or a bully) may always be just a few keystrokes away, irrespective of whether it is raining outside, there is a public transport strike or the car is in for repairs (Hassan 69; Baron 215). Virtualisation also involves an abstraction of bodies and physical movements, with the information that represents individual identities or vehicles traversing the virtual spaces comprised of CCTV networks (where viewers never encounter the person or crowd face to face), rail ticketing systems and road management systems (x e-Tag passed by this tag reader, y camera logged a specific vehicle onto a database using automated number-plate recognition software) (Wood 93; Lyon 253). Surveillant Cities Pervasive anxiety is a permanent and recurrent feature of urban experience. Often navigated by an urgency to control perceived disorder, both physically and through cultivated dominant theory (early twentieth century gendered discourses to push women back into the private sphere; ethno-racial closure and control in the Black Metropolis of 1940s Chicago), history is punctuated by attempts to dissolve public debate and infringe minority freedoms (Wilson 1991). In the Post-modern city unprecedented technological capacity generates a totalizing media vector whose plausible by-product is the perception of an ambient menace (Wark 3). Concurrent faith in technology as a cost-effective mechanism for public management (policing, traffic, planning, revenue generation) has resulted in emergence of the surveillant city. It is both a social and architectural fabric whose infrastructure is dotted with sensors and whose people assume that they will be monitored by private/public sector entities and directed by interactive traffic management systems – from electronic speed signs and congestion indicators through to rail schedule displays –leveraging data collected through those sensors. The fabric embodies tensions between governance (at its crudest, enforcement of law by police and their surrogates in private security services) and the soft cage of digital governmentality, with people being disciplined through knowledge that they are being watched and that the observation may be shared with others in an official or non-official shaming (Parenti 51; Staples 41). Encounters with a railway station CCTV might thus result in exhibition of the individual in court or on broadcast television, whether in nightly news or in a ‘reality tv’ crime expose built around ‘most wanted’ footage (Jermyn 109). Misbehaviour by a partner might merely result in scrutiny of mobile phone bills or web browser histories (which illicit content has the partner consumed, which parts of cyberspace has been visited), followed by a visit to the family court. It might instead result in digital viligilantism, with private offences being named and shamed on electronic walls across the global village, such as Facebook. iPhone Auteurism Activists have responded to pervasive surveillance by turning the cameras on ‘the watchers’ in an exercise of ‘sousveillance’ (Bennett 13; Huey 158). That mirroring might involve the meticulous documentation, often using the same geospatial tools deployed by public/private security agents, of the location of closed circuit television cameras and other surveillance devices. One outcome is the production of maps identifying who is watching and where that watching is taking place. As a corollary, people with anxieties about being surveilled, with a taste for street theatre or a receptiveness to a new form of urban adventure have used those maps to traverse cities via routes along which they cannot be identified by cameras, tags and other tools of the panoptic sort, or to simply adopt masks at particular locations. In 2020 can anyone aspire to be a protagonist in V for Vendetta? (iSee) Mirroring might take more visceral forms, with protestors for example increasingly making a practice of capturing images of police and private security services dealing with marches, riots and pickets. The advent of 3G mobile phones with a still/video image capability and ongoing ‘dematerialisation’ of traditional video cameras (ie progressively cheaper, lighter, more robust, less visible) means that those engaged in political action can document interaction with authority. So can passers-by. That ambient imaging, turning the public gaze on power and thereby potentially redefining the ‘public’ (given that in Australia the community has been embodied by the state and discourse has been mediated by state-sanctioned media), poses challenges for media scholars and exponents of an invigorated civil society in which we are looking together – and looking at each other – rather than bowling alone. One challenge for consumers in construing ambient media is trust. Can we believe what we see, particularly when few audiences have forensic skills and intermediaries such as commercial broadcasters may privilege immediacy (the ‘breaking news’ snippet from participants) over context and verification. Social critics such as Baudelaire and Benjamin exalt the flaneur, the free spirit who gazed on the street, a street that was as much a spectacle as the theatre and as vibrant as the circus. In 2010 the same technologies that empower citizen journalism and foster a succession of velvet revolutions feed flaneurs whose streetwalking doesn’t extend beyond a keyboard and a modem. The US and UK have thus seen emergence of gawker services, with new media entrepreneurs attempting to build sustainable businesses by encouraging fans to report the location of celebrities (and ideally provide images of those encounters) for the delectation of people who are web surfing or receiving a tweet (Burns 24). In the age of ambient cameras, where the media are everywhere and nowhere (and micro-stock photoservices challenge agencies such as Magnum), everyone can join the paparazzi. Anyone can deploy that ambient surveillance to become a stalker. The enthusiasm with which fans publish sightings of celebrities will presumably facilitate attacks on bodies rather than images. Information may want to be free but so, inconveniently, do iconoclasts and practitioners of participatory panopticism (Dodge 431; Dennis 348). Rhetoric about ‘citizen journalism’ has been co-opted by ‘old media’, with national broadcasters and commercial enterprises soliciting still images and video from non-professionals, whether for free or on a commercial basis. It is a world where ‘journalists’ are everywhere and where responsibility resides uncertainly at the editorial desk, able to reject or accept offerings from people with cameras but without the industrial discipline formerly exercised through professional training and adherence to formal codes of practice. It is thus unsurprising that South Australia’s Government, echoed by some peers, has mooted anti-gawker legislation aimed at would-be auteurs who impede emergency services by stopping their cars to take photos of bushfires, road accidents or other disasters. The flipside of that iPhone auteurism is anxiety about the public gaze, expressed through moral panics regarding street photography and sexting. Apart from a handful of exceptions (notably photography in the Sydney Opera House precinct, in the immediate vicinity of defence facilities and in some national parks), Australian law does not prohibit ‘street photography’ which includes photographs or videos of streetscapes or public places. Despite periodic assertions that it is a criminal offence to take photographs of people–particularly minors–without permission from an official, parent/guardian or individual there is no general restriction on ambient photography in public spaces. Moral panics about photographs of children (or adults) on beaches or in the street reflect an ambient anxiety in which danger is associated with strangers and strangers are everywhere (Marr 7; Bauman 93). That conceptualisation is one that would delight people who are wholly innocent of Judith Butler or Andrea Dworkin, in which the gaze (ever pervasive, ever powerful) is tantamount to a violation. The reality is more prosaic: most child sex offences involve intimates, rather than the ‘monstrous other’ with the telephoto lens or collection of nastiness on his iPod (Cossins 435; Ingebretsen 190). Recognition of that reality is important in considering moves that would egregiously restrict legitimate photography in public spaces or happy snaps made by doting relatives. An ambient image–unposed, unpremeditated, uncoerced–of an intimate may empower both authors and subjects when little is solid and memory is fleeting. The same caution might usefully be applied in considering alarms about sexting, ie creation using mobile phones (and access by phone or computer monitor) of intimate images of teenagers by teenagers. Australian governments have moved to emulate their US peers, treating such photography as a criminal offence that can be conceptualized as child p*rnography and addressed through permanent inclusion in sex offender registers. Lifelong stigmatisation is inappropriate in dealing with naïve or brash 12 and 16 year olds who have been exchanging intimate images without an awareness of legal frameworks or an understanding of consequences (Shafron-Perez 432). Cameras may be everywhere among the e-generation but legal knowledge, like the future, is unevenly distributed. Digital Handcuffs Generations prior to 2008 lost themselves in the streets, gaining individuality or personhood by escaping the surveillance inherent in living at home, being observed by neighbours or simply surrounded by colleagues. Streets offered anonymity and autonomy (Simmel 1903), one reason why heterodox sexuality has traditionally been negotiated in parks and other beats and on kerbs where sex workers ply their trade (Dalton 375). Recent decades have seen a privatisation of those public spaces, with urban planning and digital technologies imposing a new governmentality on hitherto ambient ‘deviance’ and on voyeuristic-exhibitionist practice such as heterosexual ‘dogging’ (Bell 387). That governmentality has been enforced through mechanisms such as replacement of traditional public toilets with ‘pods’ that are conveniently maintained by global service providers such as Veolia (the unromantic but profitable rump of former media & sewers conglomerate Vivendi) and function as billboards for advertising groups such as JC Decaux. Faces encountered in the vicinity of the twenty-first century pissoir are thus likely to be those of supermodels selling yoghurt, low interest loans or sportsgear – the same faces sighted at other venues across the nation and across the globe. Visiting ‘the mens’ gives new meaning to the word ambience when you are more likely to encounter Louis Vuitton and a CCTV camera than George Michael. George’s face, or that of Madonna, Barack Obama, Kevin 07 or Homer Simpson, might instead be sighted on the tshirts or hoodies mentioned above. George’s music might also be borne on the bodies of people you see in the park, on the street, or in the bus. This is the age of ambient performance, taken out of concert halls and virtualised on iPods, Walkmen and other personal devices, music at the demand of the consumer rather than as rationed by concert managers (Bull 85). The cost of that ambience, liberation of performance from time and space constraints, may be a Weberian disenchantment (Steiner 434). Technology has also removed anonymity by offering digital handcuffs to employees, partners, friends and children. The same mobile phones used in the past to offer excuses or otherwise disguise the bearer’s movement may now be tied to an observer through location services that plot the person’s movement across Google Maps or the geospatial information of similar services. That tracking is an extension into the private realm of the identification we now take for granted when using taxis or logistics services, with corporate Australia for example investing in systems that allow accurate determination of where a shipment is located (on Sydney Harbour Bridge? the loading dock? accompanying the truck driver on unauthorized visits to the pub?) and a forecast of when it will arrive (Monmonier 76). Such technologies are being used on a smaller scale to enforce digital Fordism among the binary proletariat in corporate buildings and campuses, with ‘smart badges’ and biometric gateways logging an individual’s movement across institutional terrain (so many minutes in the conference room, so many minutes in the bathroom or lingering among the faux rainforest near the Vice Chancellery) (Bolt). Bright Lights, Blog City It is a truth universally acknowledged, at least by right-thinking Foucauldians, that modernity is a matter of coercion and anomie as all that is solid melts into air. If we are living in an age of hypersocialisation and hypercapitalism – movies and friends on tap, along with the panoptic sorting by marketers and pervasive scrutiny by both the ‘information state’ and public audiences (the million people or one person reading your blog) that is an inevitable accompaniment of the digital cornucopia–we might ask whether everyone is or should be unhappy. This article began by highlighting traditional responses to the bright lights, brashness and excitement of the big city. One conclusion might be that in 2010 not much has changed. Some people experience ambient information as liberating; others as threatening, productive of physical danger or of a more insidious anomie in which personal identity is blurred by an ineluctable electro-smog. There is disagreement about the professionalism (for which read ethics and inhibitions) of ‘citizen media’ and about a culture in which, as in the 1920s, audiences believe that they ‘own the image’ embodying the celebrity or public malefactor. Digital technologies allow you to navigate through the urban maze and allow officials, marketers or the hostile to track you. Those same technologies allow you to subvert both the governmentality and governance. You are free: Be ambient! References Baron, Naomi. Always On: Language in an Online and Mobile World. New York: Oxford UP, 2008. Bauman, Zygmunt. Liquid Modernity. Oxford: Polity Press, 2000. Bell, David. “Bodies, Technologies, Spaces: On ‘Dogging’.” Sexualities 9.4 (2006): 387-408. Bennett, Colin. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge: MIT Press, 2008. Berman, Marshall. All That Is Solid Melts into Air: The Experience of Modernity. London: Verso, 2001. Bolt, Nate. “The Binary Proletariat.” First Monday 5.5 (2000). 25 Feb 2010 ‹http://131.193.153.231/www/issues/issue5_5/bolt/index.html›. Buck-Morss, Susan. The Dialectics of Seeing: Walter Benjamin and the Arcades Project. Cambridge: MIT Press, 1991. Bull, Michael. Sounding Out the City: Personal Stereos and the Management of Everyday Life. Oxford: Berg, 2003. Bull, Michael. Sound Moves: iPod Culture and the Urban Experience. London: Routledge, 2008 Burns, Kelli. Celeb 2.0: How Social Media Foster Our Fascination with Popular Culture. Santa Barbara: ABC-CLIO, 2009. Castells, Manuel. “The Urban Ideology.” The Castells Reader on Cities and Social Theory. Ed. Ida Susser. Malden: Blackwell, 2002. 34-70. Cossins, Anne, Jane Goodman-Delahunty, and Kate O’Brien. “Uncertainty and Misconceptions about Child Sexual Abuse: Implications for the Criminal Justice System.” Psychiatry, Psychology and the Law 16.4 (2009): 435-452. Dalton, David. “Policing Outlawed Desire: ‘hom*ocriminality’ in Beat Spaces in Australia.” Law & Critique 18.3 (2007): 375-405. De Certeau, Michel. The Practice of Everyday Life. Berkeley: University of California P, 1984. Dennis, Kingsley. “Keeping a Close Watch: The Rise of Self-Surveillance and the Threat of Digital Exposure.” The Sociological Review 56.3 (2008): 347-357. Dodge, Martin, and Rob Kitchin. “Outlines of a World Coming into Existence: Pervasive Computing and the Ethics of Forgetting.” Environment & Planning B: Planning & Design 34.3 (2007): 431-445. Doel, Marcus, and David Clarke. “Transpolitical Urbanism: Suburban Anomaly and Ambient Fear.” Space & Culture 1.2 (1998): 13-36. Dyer-Witheford, Nick. Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism. Champaign: U of Illinois P, 1999. Fritzsche, Peter. Reading Berlin 1900. Cambridge: Harvard UP, 1998. Gumpert, Gary, and Susan Drucker. “Privacy, Predictability or Serendipity and Digital Cities.” Digital Cities II: Computational and Sociological Approaches. Berlin: Springer, 2002. 26-40. Hassan, Robert. The Information Society. Cambridge: Polity Press, 2008. Hillier, Bill. “Cities as Movement Economies.” Intelligent Environments: Spatial Aspects of the Information Revolution. Ed. Peter Drioege. Amsterdam: Elsevier, 1997. 295-342. Holmes, David. “Cybercommuting on an Information Superhighway: The Case of Melbourne’s CityLink.” The Cybercities Reader. Ed. Stephen Graham. London: Routledge, 2004. 173-178. Huey, Laura, Kevin Walby, and Aaron Doyle. “Cop Watching in the Downtown Eastside: Exploring the Use of CounterSurveillance as a Tool of Resistance.” Surveillance and Security: Technological Politics and Power in Everyday Life. Ed. Torin Monahan. London: Routledge, 2006. 149-166. Ingebretsen, Edward. At Stake: Monsters and the Rhetoric of Fear in Public Culture. Chicago: U of Chicago P, 2001. iSee. “Now More Than Ever”. 20 Feb 2010 ‹http://www.appliedautonomy.com/isee/info.html›. Jackson, Margaret, and Julian Ligertwood. "Identity Management: Is an Identity Card the Solution for Australia?” Prometheus 24.4 (2006): 379-387. Jermyn, Deborah. Crime Watching: Investigating Real Crime TV. London: IB Tauris, 2007. Kullenberg, Christopher. “The Social Impact of IT: Surveillance and Resistance in Present-Day Conflicts.” FlfF-Kommunikation 1 (2009): 37-40. Lyon, David. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. London: Routledge, 2003. Marr, David. The Henson Case. Melbourne: Text, 2008. Maynard, Margaret. Dress and Globalisation. Manchester: Manchester UP, 2004. Merchant, Carolyn. The Columbia Guide to American Environmental History. New York: Columbia UP, 2002. Monmonier, Mark. “Geolocation and Locational Privacy: The ‘Inside’ Story on Geospatial Tracking’.” Privacy and Technologies of Identity: A Cross-disciplinary Conversation. Ed. Katherine Strandburg and Daniela Raicu. Berlin: Springer, 2006. 75-92. Ndalianis, Angela. “Architecture of the Senses: Neo-Baroque Entertainment Spectacles.” Rethinking Media Change: The Aesthetics of Tradition. Ed. David Thorburn and Henry Jenkins. Cambridge: MIT Press, 2004. 355-374. Parenti, Christian. The Soft Cage: Surveillance in America. New York: Basic Books, 2003. Sayre, Shay. “T-shirt Messages: Fortune or Folly for Advertisers.” Advertising and Popular Culture: Studies in Variety and Versatility. Ed. Sammy Danna. New York: Popular Press, 1992. 73-82. Savitch, Henry. Cities in a Time of Terror: Space, Territory and Local Resilience. Armonk: Sharpe, 2008. Scheingold, Stuart. The Politics of Street Crime: Criminal Process and Cultural Obsession. Philadephia: Temple UP, 1992. Schivelbusch, Wolfgang. Disenchanted Night: The Industrialization of Light in the Nineteenth Century. Berkeley: U of California Press, 1995. Shafron-Perez, Sharon. “Average Teenager or Sex Offender: Solutions to the Legal Dilemma Caused by Sexting.” John Marshall Journal of Computer & Information Law 26.3 (2009): 431-487. Simmel, Georg. “The Metropolis and Mental Life.” Individuality and Social Forms. Ed. Donald Levine. Chicago: University of Chicago P, 1971. Staples, William. Everyday Surveillance: Vigilance and Visibility in Postmodern Life. Lanham: Rowman & Littlefield, 2000. Steiner, George. George Steiner: A Reader. New York: Oxford UP, 1987. Thompson, Emily. The Soundscape of Modernity: Architectural Acoustics and the Culture of Listening in America. Cambridge: The MIT Press, 2004. Wark, Mackenzie. Virtual Geography: Living with Global Media Events. Bloomington: Indiana UP, 1994. Wilson, Elizabeth. The Sphinx in the City: Urban Life, the Control of Disorder and Women. Berkeley: University of California P, 1991. Wood, David. “Towards Spatial Protocol: The Topologies of the Pervasive Surveillance Society.” Augmenting Urban Spaces: Articulating the Physical and Electronic City. Eds. Allesandro Aurigi and Fiorella de Cindio. Aldershot: Ashgate, 2008. 93-106.

49

Chen, Peter. "Community without Flesh." M/C Journal 2, no.3 (May1, 1999). http://dx.doi.org/10.5204/mcj.1750.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

On Wednesday 21 April the Minister for Communications, Information Technology and the Arts introduced a piece of legislation into the Australian Senate to regulate the way Australians use the Internet. This legislation is presented within Australia's existing system of content regulation, a scheme that the Minister describes is not censorship, but merely regulation (Alston 55). Underlying Senator Alston's rhetoric about the protection of children from snuff film makers, paedophiles, drug pushers and other criminals, this long anticipated bill is aimed at reducing the amount of p*rnographic materials available via computer networks, a censorship regime in an age when regulation and classification are the words we prefer to use when society draws the line under material we want to see, but dare not allow ourselves access to. Regardless of any noble aspirations expressed by free-speech organisations such as Electronic Frontiers Australia relating to the defence of personal liberty and freedom of expression, this legislation is about p*rn. Under the Bill, Australia would proscribe our citizens from accessing: explicit depictions of sexual acts between consenting adults; mild non-violent fetishes; depictions of sexual violence, coercion or non-consent of any kind; depictions of child sexual abuse, bestial*ty, sexual acts accompanied by offensive fetishes, or exploitative incest fantasies; unduly detailed and/or relished acts of extreme violence or cruelty; explicit or unjustifiable depictions of sexual violence against non-consenting persons; and detailed instruction or encouragement in matters of crime or violence or the abuse of proscribed drugs. (OFLC) The Australian public, as a whole, favour the availability of sexually explicit materials in some form, with OFLC data indicating a relatively high degree of public support for X rated videos, the "high end" of the p*rn market (Paterson et al.). In Australia strict regulation of X rated materials in conventional media has resulted in a larger illegal market for these materials than the legalised sex industries of the ACT and Northern Territory (while 1.2 million X rated videos are legally sold out of the territories, 2 million are sold illegally in other jurisdictions, according to Patten). In Australia, censorship of media content has traditionally been based on the principles of the protection of society from moral harm and individual degradation, with specific emphasis on the protection of innocents from material they are not old enough for, or mentally capable of dealing with (Joint Select Committee on Video Material). Even when governments distanced themselves from direct personal censorship (such as Don Chipp's approach to the censorship of films and books in the late 1960s and early 1970s) and shifted the rationale behind censorship from prohibition to classification, the publicly stated aims of these decisions have been the support of existing community standards, rather than the imposition of strict legalistic moral values upon an unwilling society. In the debates surrounding censorship, and especially the level of censorship applied (rather than censorship as a whole), the question "what is the community we are talking about here?" has been a recurring theme. The standards that are applied to the regulation of media content, both online and off, are often the focus of community debate (a pluralistic community that obviously lacks "standards" by definition of the word). In essence the problem of maintaining a single set of moral and ethical values for the treatment of media content is a true political dilemma: a problem that lacks any form of solution acceptable to all participants. Since the introduction of the Internet as a "mass" medium (or more appropriately, a "popular" one), government indecision about how best to treat this new technology has precluded any form or content regulation other than the ad hoc use of existing non-technologically specific law to deal with areas of criminal or legally sanctionable intent (such as the use of copyright law, or the powers under the Crimes Act relating to the improper use of telecommunications services). However, indecision in political life is often associated with political weakness, and in the face of pressure to act decisively (motivated again by "community concern"), the Federal government has decided to extend the role of the Australian Broadcasting Authority to regulate and impose a censorship regime on Australian access of morally harmful materials. It is important to note the government's intention to censor access, rather than content of the Internet. While material hosted in Australia (ignoring, of course, the "cyberspace" definitions of non-territorial existence of information stored in networks) will be censored (removed from Australia computers), the government, lacking extraterritorial powers to compel the owners of machines located offshore, intends to introduce of some form of refused access list to materials located in other nations. What is interesting to consider in this context is the way that slight shifts of definitional paradigm alter the way this legislation can be considered. If information flows (upon which late capitalism is becoming more dependent) were to be located within the context of international law governing the flow of waterways, does the decision to prevent travel of morally dubious material through Australia's informational waterways impinge upon the riparian rights of other nations (the doctrine of fair usage without impeding flow; Godana 50)? Similarly, if we take Smith's extended definition of community within electronic transactional spaces (the maintenance of members' commitment to the group, monitoring and sanctioning behaviour and the production and distribution of resources), then the current Bill proposes the regulation of the activities of one community by another (granted, a larger community that incorporates the former). Seen in this context, this legislation is the direct intervention in an established social order by a larger and less hom*ogeneous group. It may be trite to quote the Prime Minister's view of community in this context, where he states ...It is free individuals, strong communities and the rule of law which are the best defence against the intrusive power of the state and against those who think they know what is best for everyone else. (Howard 21) possibly because the paradigm in which this new legislation is situated does not classify those Australians online (who number up to 3 million) as a community in their own right. In a way the Internet users of Australia have never identified themselves as a community, nor been asked to act in a communitarian manner. While discussions about the value of community models when applied to the Internet are still divided, there are those who argue that their use of networked services can be seen in this light (Worthington). What this new legislation does, however, is preclude the establishment of public communities in order to meet the desires of government for some limits to be placed on Internet content. The Bill does allow for the development of "restricted access systems" that would allow pluralistic communities to develop and engage in a limited amount of self-regulation. These systems include privately accessible Intranets, or sites that restrict access through passwords or some other form of age verification technique. Thus, ignoring the minimum standards that will be required for these communities to qualify for some measure of self-regulatory freedom, what is unspoken here is that specific subsections of the Internet population may exist, provided they keep well away from the public gaze. A ghetto without physical walls. Under the Bill, a co-regulatory approach is endorsed by the government, favouring the establishment of industry codes of practice by ISPs and (or) the establishment of a single code of practice by the content hosting industry (content developers are relegated to yet undetermined complementary state legislation). However, this section of the Bill, in mandating a range of minimum requirements for these codes of practice, and denying plurality to the content providers, places an administrative imperative above any communitarian spirit. That is, that the Internet should have no more than one community, it should be an entity bound by a single guiding set of principles and be therefore easier to administer by Australian censors. This administrative imperative re-encapsulates the dilemma faced by governments dealing with the Internet: that at heart, the broadcast and print press paradigms of existing censorship regimes face massive administrative problems when presented with a communications technology that allows for wholesale publication of materials by individuals. Whereas the limited numbers of broadcasters and publishers have allowed the development of Australia's system of classification of materials (on a sliding scale from G to RC classifications or the equivalent print press version), the new legislation introduced into the Senate uses the classification scheme simply as a censorship mechanism: Internet content is either "ok" or "not ok". From a public administration perspective, this allows government to drastically reduce the amount of work required by regulators and eases the burden of compliance costs by ISPs, by directing clear and unambiguous statements about the acceptability of existing materials placed online. However, as we have seen in other areas of social policy (such as the rationalisation of Social Security services or Health), administrative expedience is often antipathetic to small communities that have special needs, or cultural sensitivities outside of mainstream society. While it is not appropriate to argue that public administration creates negative social impacts through expedience, what can be presented is that, where expedience is a core aim of legislation, poor administration may result. For many Australian purveyors of p*rnography, my comments will be entirely unhelpful as they endeavour to find effective ways to spoof offshore hosts or bone up (no pun intended) on tunnelling techniques. Given the easy way in which material can be reconstituted and relocated on the Internet, it seems likely that some form of regulatory avoidance will occur by users determined not to have their content removed or blocked. For those regulators given the unenviable task of censoring Internet access it may be worthwhile quoting from Sexing the Cherry, in which Jeanette Winterson describes the town: whose inhabitants are so cunning that to escape the insistence of creditors they knock down their houses in a single night and rebuild them elsewhere. So the number of buildings in the city is always constant but they are never in the same place from one day to the next. (43) Thus, while Winterson saw this game as a "most fulfilling pastime", it is likely to present real administrative headaches to ABA regulators when attempting to enforce the Bill's anti-avoidance clauses. The Australian government, in adapting existing regulatory paradigms to the Internet, has overlooked the informal communities who live, work and play within the virtual world of cyberspace. In attempting to meet a perceived social need for regulation with political and administrative expedience, it has ignored the potentially cohesive role of government in developing self-regulating communities who need little government intervention to produce socially beneficial outcomes. In proscribing activity externally to the realm in which these communities reside, what we may see is a new type of community, one whose desire for a feast of flesh leads them to evade the activities of regulators who operate in the "meat" world. What this may show us is that in a virtual environment, the regulators' net is no match for a world wide web. References Alston, Richard. "Regulation is Not Censorship." The Australian 13 April 1999: 55. Paterson, K., et. al. Classification Issues: Film, Video and Television. Sydney: The Office of Film and Literature Classification, 1993. Patten, F. Personal interview. 9 Feb. 1999. Godana, B.A. Africa's Shared Water Resources: Legal and Institutional Aspects of the Nile, Niger and Senegal River Systems. London: Frances Pinter, 1985. Howard, John. The Australia I Believe In: The Values, Directions and Policy Priorities of a Coalition Government Outlined in 1995. Canberra: Liberal Party, 1995. Joint Select Committee On Video Material. Report of the Joint Select Committee On Video Material. Canberra: APGS, 1988. Office of Film and Literature Classification. Cinema & Video Ratings Guide. 1999. 1 May 1999 <http://www.oflc.gov.au/classinfo.php>. Smith, Marc A. "Voices from the WELL: The Logic of the Virtual Commons." 1998. 2 Mar. 1999 <http://www.sscnet.ucla.edu/soc/csoc/papers/voices/Voices.htm>. Winterson, Jeanette. Sexing the Cherry. New York: Vintage Books. 1991. Worthington, T. Testimony before the Senate Select Committee on Information Technologies. Unpublished, 1999. Citation reference for this article MLA style: Peter Chen. "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/bill.php>. Chicago style: Peter Chen, "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]). APA style: Author. (1999) Community without flesh: first thoughts on the new broadcasting services amendment (online services) bill 1999. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]).

50

Leaver, Tama. "The Social Media Contradiction: Data Mining and Digital Death." M/C Journal 16, no.2 (March8, 2013). http://dx.doi.org/10.5204/mcj.625.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction Many social media tools and services are free to use. This fact often leads users to the mistaken presumption that the associated data generated whilst utilising these tools and services is without value. Users often focus on the social and presumed ephemeral nature of communication – imagining something that happens but then has no further record or value, akin to a telephone call – while corporations behind these tools tend to focus on the media side, the lasting value of these traces which can be combined, mined and analysed for new insight and revenue generation. This paper seeks to explore this social media contradiction in two ways. Firstly, a cursory examination of Google and Facebook will demonstrate how data mining and analysis are core practices for these corporate giants, central to their functioning, development and expansion. Yet the public rhetoric of these companies is not about the exchange of personal information for services, but rather the more utopian notions of organising the world’s information, or bringing everyone together through sharing. The second section of this paper examines some of the core ramifications of death in terms of social media, asking what happens when a user suddenly exists only as recorded media fragments, at least in digital terms. Death, at first glance, renders users (or post-users) without agency or, implicitly, value to companies which data-mine ongoing social practices. Yet the emergence of digital legacy management highlights the value of the data generated using social media, a value which persists even after death. The question of a digital estate thus illustrates the cumulative value of social media as media, even on an individual level. The ways Facebook and Google approach digital death are examined, demonstrating policies which enshrine the agency and rights of living users, but become far less coherent posthumously. Finally, along with digital legacy management, I will examine the potential for posthumous digital legacies which may, in some macabre ways, actually reanimate some aspects of a deceased user’s presence, such as the Lives On service which touts the slogan “when your heart stops beating, you'll keep tweeting”. Cumulatively, mapping digital legacy management by large online corporations, and the affordances of more focussed services dealing with digital death, illustrates the value of data generated by social media users, and the continued importance of the data even beyond the grave. Google While Google is universally synonymous with search, and is the world’s dominant search engine, it is less widely understood that one of the core elements keeping Google’s search results relevant is a complex operation mining user data. Different tools in Google’s array of services mine data in different ways (Zimmer, “Gaze”). Gmail, for example, uses algorithms to analyse an individual’s email in order to display the most relevant related advertising. This form of data mining is comparatively well known, with most Gmail users knowingly and willingly accepting more personalised advertising in order to use Google’s email service. However, the majority of people using Google’s search engine are unaware that search, too, is increasingly driven by the tracking, analysis and refining of results on the basis of user activity (Zimmer, “Externalities”). As Alexander Halavais (160–180) quite rightly argues, recent focus on the idea of social search – the deeper integration of social network information in gauging search results – is oxymoronic; all search, at least for Google, is driven by deep analysis of personal and aggregated social data. Indeed, the success of Google’s mining of user data has led to concerns that often invisible processes of customisation and personalisation will mean that the supposedly independent or objective algorithms producing Google’s search results will actually yield a different result for every person. As Siva Vaidhyanathan laments: “as users in a diverse array of countries train Google’s algorithms to respond to specialized queries with localised results, each place in the world will have a different list of what is important, true, or ‘relevant’ in response to any query” (138). Personalisation and customisation are not inherently problematic, and frequently do enhance the relevance of search results, but the main objection raised by critics is not Google’s data mining, but the lack of transparency in the way data are recorded, stored and utilised. Eli Pariser, for example, laments the development of a ubiquitous “filter bubble” wherein all search results are personalised and subjective but are hidden behind the rhetoric of computer-driven algorithmic objectivity (Pariser). While data mining informs and drives many of Google’s tools and services, the cumulative value of these captured fragments of information is best demonstrated by the new service Google Now. Google Now is a mobile app which delivers an ongoing stream of search results but without the need for user input. Google Now extrapolates the rhythms of a person’s life, their interests and their routines in order to algorithmically determine what information will be needed next, and automatically displays it on a user’s mobile device. Clearly Google Now is an extremely valuable and clever tool, and the more information a user shares, the better the ongoing customised results will be, demonstrating the direct exchange value of personal data: total personalisation requires total transparency. Each individual user will need to judge whether they wish to share with Google the considerable amount of personal information needed to make Google Now work. The pressing ethical question that remains is whether Google will ensure that users are sufficiently aware of the amount of data and personal privacy they are exchanging in order to utilise such a service. Facebook Facebook began as a closed network, open only to students at American universities, but has transformed over time to a much wider and more open network, with over a billion registered users. Facebook has continually reinvented their interface, protocols and design, often altering both privacy policies and users’ experience of privacy, and often meeting significant and vocal resistance in the process (boyd). The data mining performed by social networking service Facebook is also extensive, although primarily aimed at refining the way that targeted advertising appears on the platform. In 2007 Facebook partnered with various retail loyalty services and combined these records with Facebook’s user data. This information was used to power Facebook’s Beacon service, which added details of users’ retail history to their Facebook news feed (for example, “Tama just purchased a HTC One”). The impact of all of these seemingly unrelated purchases turning up in many people’s feeds suddenly revealed the complex surveillance, data mining and sharing of these data that was taking place (Doyle and Fraser). However, as Beacon was turned on, without consultation, for all Facebook users, there was a sizable backlash that meant that Facebook had to initially switch the service to opt-in, and then discontinue it altogether. While Beacon has been long since erased, it is notable that in early 2013 Facebook announced that they have strengthened partnerships with data mining and profiling companies, including Datalogix, Epsilon, Acxiom, and BlueKai, which harness customer information from a range of loyalty cards, to further refine the targeting ability offered to advertisers using Facebook (Hof). Facebook’s data mining, surveillance and integration across companies is thus still going on, but no longer directly visible to Facebook users, except in terms of the targeted advertisem*nts which appear on the service. Facebook is also a platform, providing a scaffolding and gateway to many other tools and services. In order to use social games such as Zynga’s Farmville, Facebook users agree to allow Zynga to access their profile information, and use Facebook to authenticate their identity. Zynga has been unashamedly at the forefront of user analytics and data mining, attempting to algorithmically determine the best way to make virtual goods within their games attractive enough for users to pay for them with real money. Indeed, during a conference presentation, Zynga Vice President Ken Rudin stated outright that Zynga is “an analytics company masquerading as a games company” (Rudin). I would contend that this masquerade succeeds, as few Farmville players are likely to consider how their every choice and activity is being algorithmically scrutinised in order to determine what virtual goods they might actually buy. As an instance of what is widely being called ‘big data’, the data miing operations of Facebook, Zynga and similar services lead to a range of ethical questions (boyd and Crawford). While users may have ostensibly agreed to this data mining after clicking on Facebook’s Terms of Use agreement, the fact that almost no one reads these agreements when signing up for a service is the Internet’s worst kept secret. Similarly, the extension of these terms when Facebook operates as a platform for other applications is a far from transparent process. While examining the recording of user data leads to questions of privacy and surveillance, it is important to note that many users are often aware of the exchange to which they have agreed. Anders Albrechtslund deploys the term ‘social surveillance’ to usefully emphasise the knowing, playful and at times subversive approach some users take to the surveillance and data mining practices of online service providers. Similarly, E.J. Westlake notes that performances of self online are often not only knowing but deliberately false or misleading with the aim of exploiting the ways online activities are tracked. However, even users well aware of Facebook’s data mining on the site itself may be less informed about the social networking company’s mining of offsite activity. The introduction of ‘like’ buttons on many other Websites extends Facebook’s reach considerably. The various social plugins and ‘like’ buttons expand both active recording of user activity (where the like button is actually clicked) and passive data mining (since a cookie is installed or updated regardless of whether a button is actually pressed) (Gerlitz and Helmond). Indeed, because cookies – tiny packets of data exchanged and updated invisibly in browsers – assign each user a unique identifier, Facebook can either combine these data with an existing user’s profile or create profiles about non-users. If that person even joins Facebook, their account is connected with the existing, data-mined record of their Web activities (Roosendaal). As with Google, the significant issue here is not users knowingly sharing their data with Facebook, but the often complete lack of transparency in terms of the ways Facebook extracts and mines user data, both on Facebook itself and increasingly across applications using Facebook as a platform and across the Web through social plugins. Google after Death While data mining is clearly a core element in the operation of Facebook and Google, the ability to scrutinise the activities of users depends on those users being active; when someone dies, the question of the value and ownership of their digital assets becomes complicated, as does the way companies manage posthumous user information. For Google, the Gmail account of a deceased person becomes inactive; the stored email still takes up space on Google’s servers, but with no one using the account, no advertising is displayed and thus Google can earn no revenue from the account. However, the process of accessing the Gmail account of a deceased relative is an incredibly laborious one. In order to even begin the process, Google asks that someone physically mails a series of documents including a photocopy of a government-issued ID, the death certificate of the deceased person, evidence of an email the requester received from the deceased, along with other personal information. After Google have received and verified this information, they state that they might proceed to a second stage where further documents are required. Moreover, if at any stage Google decide that they cannot proceed in releasing a deceased relative’s Gmail account, they will not reveal their rationale. As their support documentation states: “because of our concerns for user privacy, if we determine that we cannot provide the Gmail content, we will not be able to share further details about the account or discuss our decision” (Google, “Accessing”). Thus, Google appears to enshrine the rights and privacy of individual users, even posthumously; the ownership or transfer of individual digital assets after death is neither a given, nor enshrined in Google’s policies. Yet, ironically, the economic value of that email to Google is likely zero, but the value of the email history of a loved one or business partner may be of substantial financial and emotional value, probably more so than when that person was alive. For those left behind, the value of email accounts as media, as a lasting record of social communication, is heightened. The question of how Google manages posthumous user data has been further complicated by the company’s March 2012 rationalisation of over seventy separate privacy policies for various tools and services they operate under the umbrella of a single privacy policy accessed using a single unified Google account. While this move was ostensibly to make privacy more understandable and transparent at Google, it had other impacts. For example, one of the side effects of a singular privacy policy and single Google identity is that deleting one of a recently deceased person’s services may inadvertently delete them all. Given that Google’s services include Gmail, YouTube and Picasa, this means that deleting an email account inadvertently erases all of the Google-hosted videos and photographs that individual posted during their lifetime. As Google warns, for example: “if you delete the Google Account to which your YouTube account is linked, you will delete both the Google Account AND your YouTube account, including all videos and account data” (Google, “What Happens”). A relative having gained access to a deceased person’s Gmail might sensibly delete the email account once the desired information is exported. However, it seems less likely that this executor would realise that in doing so all of the private and public videos that person had posted on YouTube would also permanently disappear. While material possessions can be carefully dispersed to specific individuals following the instructions in someone’s will, such affordances are not yet available for Google users. While it is entirely understandable that the ramification of policy changes are aimed at living users, as more and more online users pass away, the question of their digital assets becomes increasingly important. Google, for example, might allow a deceased person’s executor to elect which of their Google services should be kept online (perhaps their YouTube videos), which traces can be exported (perhaps their email), and which services can be deleted. At present, the lack of fine-grained controls over a user’s digital estate at Google makes this almost impossible. While it violates Google’s policies to transfer ownership of an account to another person, if someone does leave their passwords behind, this provides their loved ones with the best options in managing their digital legacy with Google. When someone dies and their online legacy is a collection of media fragments, the value of those media is far more apparent to the loved ones left behind rather than the companies housing those media. Facebook Memorialisation In response to users complaining that Facebook was suggesting they reconnect with deceased friends who had left Facebook profiles behind, in 2009 the company instituted an official policy of turning the Facebook profiles of departed users into memorial pages (Kelly). Technically, loved ones can choose between memorialisation and erasing an account altogether, but memorialisation is the default. This entails setting the account so that no one can log into it, and that no new friends (connections) can be made. Existing friends can access the page in line with the user’s final privacy settings, meaning that most friends will be able to post on the memorialised profile to remember that person in various ways (Facebook). Memorialised profiles (now Timelines, after Facebook’s redesign) thus become potential mourning spaces for existing connections. Since memorialised pages cannot make new connections, public memorial pages are increasingly popular on Facebook, frequently set up after a high-profile death, often involving young people, accidents or murder. Recent studies suggest that both of these Facebook spaces are allowing new online forms of mourning to emerge (Marwick and Ellison; Carroll and Landry; Kern, Forman, and Gil-Egui), although public pages have the downside of potentially inappropriate commentary and outright trolling (Phillips). Given Facebook has over a billion registered users, estimates already suggest that the platform houses 30 million profiles of deceased people, and this number will, of course, continue to grow (Kaleem). For Facebook, while posthumous users do not generate data themselves, the fact that they were part of a network means that their connections may interact with a memorialised account, or memorial page, and this activity, like all Facebook activities, allows the platform to display advertising and further track user interactions. However, at present Facebook’s options – to memorialise or delete accounts of deceased people – are fairly blunt. Once Facebook is aware that a user has died, no one is allowed to edit that person’s Facebook account or Timeline, so Facebook literally offers an all (memorialisation) or nothing (deletion) option. Given that Facebook is essentially a platform for performing identities, it seems a little short-sighted that executors cannot clean up or otherwise edit the final, lasting profile of a deceased Facebook user. As social networking services and social media become more ingrained in contemporary mourning practices, it may be that Facebook will allow more fine-grained control, positioning a digital executor also as a posthumous curator, making the final decision about what does and does not get kept in the memorialisation process. Since Facebook is continually mining user activity, the popularity of mourning as an activity on Facebook will likely mean that more attention is paid to the question of digital legacies. While the user themselves can no longer be social, the social practices of mourning, and the recording of a user as a media entity highlights the fact that social media can be about interactions which in significant ways include deceased users. Digital Legacy Services While the largest online corporations have fairly blunt tools for addressing digital death, there are a number of new tools and niche services emerging in this area which are attempting to offer nuanced control over digital legacies. Legacy Locker, for example, offers to store the passwords to all of a user’s online services and accounts, from Facebook to Paypal, and to store important documents and other digital material. Users designate beneficiaries who will receive this information after the account holder passes away, and this is confirmed by preselected “verifiers” who can attest to the account holder’s death. Death Switch similarly provides the ability to store and send information to users after the account holder dies, but tests whether someone is alive by sending verification emails; fail to respond to several prompts and Death Switch will determine a user has died, or is incapacitated, and executes the user’s final instructions. Perpetu goes a step further and offers the same tools as Legacy Locker but also automates existing options from social media services, allowing users to specify, for example, that their Facebook, Twitter or Gmail data should be downloaded and this archive should be sent to a designated recipient when the Perpetu user dies. These tools attempt to provide a more complex array of choices in terms of managing a user’s digital legacy, providing similar choices to those currently available when addressing material possessions in a formal will. At a broader level, the growing demand for these services attests to the ongoing value of online accounts and social media traces after a user’s death. Bequeathing passwords may not strictly follow the Terms of Use of the online services in question, but it is extremely hard to track or intervene when a user has the legitimate password, even if used by someone else. More to the point, this finely-grained legacy management allows far more flexibility in the utilisation and curation of digital assets posthumously. In the process of signing up for one of these services, or digital legacy management more broadly, the ongoing value and longevity of social media traces becomes more obvious to both the user planning their estate and those who ultimately have to manage it. The Social Media Afterlife The value of social media beyond the grave is also evident in the range of services which allow users to communicate in some fashion after they have passed away. Dead Social, for example, allows users to schedule posthumous social media activity, including the posting of tweets, sending of email, Facebook messages, or the release of online photos and videos. The service relies on a trusted executor confirming someone’s death, and after that releases these final messages effectively from beyond the grave. If I Die is a similar service, which also has an integrated Facebook application which ensures a user’s final message is directly displayed on their Timeline. In a bizarre promotional campaign around a service called If I Die First, the company is promising that the first user of the service to pass away will have their posthumous message delivered to a huge online audience, via popular blogs and mainstream press coverage. While this is not likely to appeal to everyone, the notion of a popular posthumous performance of self further complicates that question of what social media can mean after death. Illustrating the value of social media legacies in a quite different but equally powerful way, the Lives On service purports to algorithmically learn how a person uses Twitter while they are live, and then continue to tweet in their name after death. Internet critic Evgeny Morozov argues that Lives On is part of a Silicon Valley ideology of ‘solutionism’ which casts every facet of society as a problem in need of a digital solution (Morozov). In this instance, Lives On provides some semblance of a solution to the problem of death. While far from defeating death, the very fact that it might be possible to produce any meaningful approximation of a living person’s social media after they die is powerful testimony to the value of data mining and the importance of recognising that value. While Lives On is an experimental service in its infancy, it is worth wondering what sort of posthumous approximation might be built using the robust data profiles held by Facebook or Google. If Google Now can extrapolate what a user wants to see without any additional input, how hard would it be to retool this service to post what a user would have wanted after their death? Could there, in effect, be a Google After(life)? Conclusion Users of social media services have differing levels of awareness regarding the exchange they are agreeing to when signing up for services provided by Google or Facebook, and often value the social affordances without necessarily considering the ongoing media they are creating. Online corporations, by contrast, recognise and harness the informatic traces users generate through complex data mining and analysis. However, the death of a social media user provides a moment of rupture which highlights the significant value of the media traces a user leaves behind. More to the point, the value of these media becomes most evident to those left behind precisely because that individual can no longer be social. While beginning to address the issue of posthumous user data, Google and Facebook both have very blunt tools; Google might offer executors access while Facebook provides the option of locking a deceased user’s account as a memorial or removing it altogether. Neither of these responses do justice to the value that these media traces hold for the living, but emerging digital legacy management tools are increasingly providing a richer set of options for digital executors. While the differences between material and digital assets provoke an array of legal, spiritual and moral issues, digital traces nevertheless clearly hold significant and demonstrable value. For social media users, the death of someone they know is often the moment where the media side of social media – their lasting, infinitely replicable nature – becomes more important, more visible, and casts the value of the social media accounts of the living in a new light. For the larger online corporations and service providers, the inevitable increase in deceased users will likely provoke more fine-grained controls and responses to the question of digital legacies and posthumous profiles. It is likely, too, that the increase in online social practices of mourning will open new spaces and arenas for those same corporate giants to analyse and data-mine. References Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/article/view/2142/1949›. boyd, danah. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence 14.1 (2008): 13–20. ———, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662–679. Carroll, Brian, and Katie Landry. “Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn.” Bulletin of Science, Technology & Society 30.5 (2010): 341–349. Doyle, Warwick, and Matthew Fraser. “Facebook, Surveillance and Power.” Facebook and Philosophy: What’s on Your Mind? Ed. D.E. Wittkower. Chicago, IL: Open Court, 2010. 215–230. Facebook. “Deactivating, Deleting & Memorializing Accounts.” Facebook Help Center. 2013. 7 Mar. 2013 ‹http://www.facebook.com/help/359046244166395/›. Gerlitz, Carolin, and Anne Helmond. “The Like Economy: Social Buttons and the Data-intensive Web.” New Media & Society (2013). Google. “Accessing a Deceased Person’s Mail.” 25 Jan. 2013. 21 Apr. 2013 ‹https://support.google.com/mail/answer/14300?hl=en›. ———. “What Happens to YouTube If I Delete My Google Account or Google+?” 8 Jan. 2013. 21 Apr. 2013 ‹http://support.google.com/youtube/bin/answer.py?hl=en&answer=69961&rd=1›. Halavais, Alexander. Search Engine Society. Polity, 2008. Hof, Robert. “Facebook Makes It Easier to Target Ads Based on Your Shopping History.” Forbes 27 Feb. 2013. 1 Mar. 2013 ‹http://www.forbes.com/sites/roberthof/2013/02/27/facebook-makes-it-easier-to-target-ads-based-on-your-shopping-history/›. Kaleem, Jaweed. “Death on Facebook Now Common as ‘Dead Profiles’ Create Vast Virtual Cemetery.” Huffington Post. 7 Dec. 2012. 7 Mar. 2013 ‹http://www.huffingtonpost.com/2012/12/07/death-facebook-dead-profiles_n_2245397.html›. Kelly, Max. “Memories of Friends Departed Endure on Facebook.” The Facebook Blog. 27 Oct. 2009. 7 Mar. 2013 ‹http://www.facebook.com/blog/blog.php?post=163091042130›. Kern, Rebecca, Abbe E. Forman, and Gisela Gil-Egui. “R.I.P.: Remain in Perpetuity. Facebook Memorial Pages.” Telematics and Informatics 30.1 (2012): 2–10. Marwick, Alice, and Nicole B. Ellison. “‘There Isn’t Wifi in Heaven!’ Negotiating Visibility on Facebook Memorial Pages.” Journal of Broadcasting & Electronic Media 56.3 (2012): 378–400. Morozov, Evgeny. “The Perils of Perfection.” The New York Times 2 Mar. 2013. 4 Mar. 2013 ‹http://www.nytimes.com/2013/03/03/opinion/sunday/the-perils-of-perfection.html?pagewanted=all&_r=0›. Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. London: Viking, 2011. Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16.12 (2011). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/3168›. Roosendaal, Arnold. “We Are All Connected to Facebook … by Facebook!” European Data Protection: In Good Health? Ed. Serge Gutwirth et al. Dordrecht: Springer, 2012. 3–19. Rudin, Ken. “Actionable Analytics at Zynga: Leveraging Big Data to Make Online Games More Fun and Social.” San Diego, CA, 2010. Vaidhyanathan, Siva. The Googlization of Everything. 1st ed. Berkeley: University of California Press, 2011. Westlake, E.J. “Friend Me If You Facebook: Generation Y and Performative Surveillance.” TDR: The Drama Review 52.4 (2008): 21–40. Zimmer, Michael. “The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/2136/1944›. ———. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” Web Search. Eds. Amanda Spink & Michael Zimmer. Berlin: Springer, 2008. 77–99.

You might also be interested in the bibliographies on the topic 'Moral and ethical aspects of Online journalism' for other source types:

Dissertations / Theses Books

To the bibliography
Journal articles: 'Moral and ethical aspects of Online journalism' – Grafiati (2024)
Top Articles
Latest Posts
Article information

Author: Carlyn Walter

Last Updated:

Views: 5980

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.