A place for discussion of MC 7019 topics and other interesting tidbits in new media.

Wednesday, October 31, 2007

Collective Intelligence in Media and Historical Contexts

Henry Jenkins (2006) in his book Convergence Culture uses multiple studies to make the argument that his definition of convergence is central to how individuals will coexist in popular, political, and civic culture in the near future. Specifically, he focuses on the ideas of media convergence, participatory culture, and collective intelligence. Of interest to me is this third concept, the idea of collective intelligence. I wonder if such communities do not already exist separate of technology.

Each of the studies illustrate how collective intelligence works to enhance the experience associated with media consumption. Jenkins (2006) makes the argument that the "spoiler" culture connected with Survivor is essentially a collective intelligence where individuals all contribute in some small way to solving the puzzle. Individuals will participate by posting clues that they have extracted about the show in order to guess how the coming season of Survivor will play out. Posters establish credibility in these "spoiling" communities through experience and the posting of accurate findings. The community in this case was strong until the emergence of a poster who posted relatively accurate findings without being discredited by the community. Once the game was “spoiled,” much of the community died down because they lost the sense of community success.

In his examination of MIT research of groups who view American Idol together, Jenkins (2006) suggests that collective intelligence works to keep each other up to date on the show, to make fans out of casual viewers, and to bring viewers closer to the show and the affiliate product brands that have ties to the show. Such shows work effectively to bring viewers to the brands sponsoring the show. Of course, I can think of marketing tactics that worked to include or remove brands that sponsors did not want in shows that go back to before reality television, specifically the sitcom Friends.

Jenkins (2006) suggests that The Matrix is a convergent media and one that requires a collective intelligence in order to fully understand the meaning of the story arc. The nuanced, layered content of the franchise requires a group of devoted fans each bringing something to the table in order to learn about everything that is in the story. By sharing knowledge, all members can come to a deeper understanding of the franchise. In this study. Jenkins notes the financial motives behind making The Matrix transmedia, but not the hypocritical impact it could have on the message of the original film. Going from Anti-Hollywood to media franchise is counter intuitive to the first film's message about the dangers of consumer culture (Proffitt, Tchoi, & McAllister, 2007).

In his examination of the Star Wars: Galaxies gaming community, Jenkins (2006) found that collective intelligence helped developers to create a game that fans could better enjoy in game play and in social interaction. Taking his perspective to the next level, Jenkins (2006) suggests that by utilizing the concepts of collective intelligence. We can better understand the politics of our society and hold them accountable. My only question here is whether or not citizens really want to invest that much time or interest in the enterprise of politics. Each of the groups Jenkins examines hold special interests in specialized forms of entertainment media. I can see a group of policy wonks engaging in such a practice, but not society in general.

While I agree that the concept of collective intelligence serves a critical function in each of these cases and that it can further benefit society, I question if collective intelligence is not just a naturally occurring social function. Close-knit communities often come together through neighborhood watches or associations to overcome crime and potential abuses by city officials. Graduate seminars are ideally a collection of students who come together each week and share ideas about the weekly topics to test each other’s perspectives and to expand their understanding of the topics. From a historical perspective, revolutionary elites in the colonial period of the United States came together in a niche community to form ideas about overcoming British policies they disagreed with and eventually formed a government. While Jenkins (2006) makes a great case for the utility of such groupings, I believe that his work could be enhanced by considering the historical foundations for such collective intelligence communities, and how those traditions translate to this technological period.

Thursday, October 25, 2007

Sexualized Gaming and Historical Hacking

This week’s readings in Critical Cyberculture Studies cover a broad spectrum of topics, and a couple of them caught my attention. The focus of this week’s entry is to look a little more closely at each of them, and to raise some questions I have after reading about them.

O’Riordan (2006) focuses her contribution on the visual presentation of female video game heroines in, including characters like Lara Croft and Ananova. She makes the claim that this presentation of women with large breasts and narrow waists is an attempt to sexualize the characters and to commodify the product. This argument seems tautological and an unnecessary inclusion in the conversation. The programmers are infusing sex appeal in the characters, and the morally questionable practice seems to be driven by the desire to make a profit. That said, I am pretty confident that the average consumer can look at a Lara Croft and think “sex symbol for profit” the same way they look at the run of the mill Hollywood actress. This is a problem that exists on a larger scale than the gaming industry. Whether it is movies, games, television, or magazines, we see it everyday in more perspectives than video gaming.

She precedes her argument about image and profit with the claim that creating these young, almost innocent, and attractive female characters for the user to control fulfills a paternalistic function. I have two criticisms of this statement. First, I find it highly doubtful that the average consumer who is swayed by the sex appeal of these characters will think of themselves as their father. Second, what about a Lara Croft or Ananova makes the declaration of “almost innocent” feasible? This perspective seems like a reach on O’Riordan’s part, and one the article could do without.

In general, I think O’Riordan’s (2006) arguments are valid, though I question the meaningful contribution they make. Female characters do suggest an absurd acceptable body image for women who play. A closer examination of female characters in gaming might help to show that the character development does create positive social characteristics for these characters as well. Lara Croft of Tomb Raider is a survivor, is educated in archaeology, beyond the image provides a positive female role model for women because she is portrayed as independent, strong, and confident in her pursuits (Kennedy, 2002). Samus Aran of Metroid fame is a female bounty hunter that tries to save the universe (http://cube.ign.com/articles/096/096588p1.html). Granted, these examples are a bit oversimplistic, but a young girl playing these games gets a positive message from female characters independent of the image that O’Riordan criticizes. I agree we need to broaden the image specturm of pro-social video game heroines. That said, this will not happen without a viable market.

Turner (2006) presents a historical account of the first Hacker’s conference, discusses the code of ethics, and presents an often-discussed element of concern in our readings lately, the debate over presenting innovations to improve society against the need to make a profit. These are both great elements to discuss, but he oversimplifies what it is to be a hacker in a complex context of modern interpretation. Granted, there are those out there who are computer enthusiasts who focus on coding in order to present a better world through computing innovation (e.g., Steve Wozniak).

There is, however, a very viable grouping of hackers that is more directly interested in cracking security systems that may or may not be computer-related, as a form of subversion. Turner references Theodore “John” Draper (a.k.a. Captain Crunch), who had little to do with computers in gaining fame. Draper, in fact, hacked telephone lines for free access to long distance calls. In addition to telephone hacking, many hackers now are engaged in computer hacking for a variety of good or bad purposes.

Hacking for benevolent purposes is typically called white hat hacking, and they will hack a system to determine its weakness and promptly report their findings to the company so they can improve their system. Hacking for criminal (and more subversive) purposes is referred to as black hat hacking, and they engage in hacking that results in personal profit, damage to the system they hack, or general mayhem to promote the decentralization of society that Turner refers to in the hackers’ ethic. A notable figure surrounded in controversy is Kevin Mitnick, who engaged in what he called social engineering from the age of 12 in gaining bus access up until his federal conviction for illegal computer access in 1995 (http://www.cnn.com/2005/TECH/internet/10/07/kevin.mitnick.cnna/index.html). Grey hats are the go between of the above two groups in the culture who may or may not take something, but will never profit and sometimes report the problems they see to companies they deem reputable.

For a brief interview of these three figures in hacking history, check this link out:
http://www.maniacworld.com/original-hackers.htm

Wednesday, October 17, 2007

Ethical Decisions, New Media Campaigns, and Project Vote Smart

Howard (2006) in New Media Campaigns and the Managed Citizen examined the practices and decision-making of several companies that utilized new media to produce campaigns. More than an examination of norms and routines, Howard attempts to discuss the ethical problems that new media campaigns face, as well as the future implications for new media campaigns as well. Specifically, Howard discusses three common decisions that were made in these “hypermedia campaigns” that will have implications for future campaigns, which I will expand upon in this posting.

The first decision is data mining for profit by some of the organizations. Of particular concern is the mining of personal information, including credit charges, addresses, contact information, and other details that are sold to anyone who can meet the price tags associated with acquiring the information. Howard goes into some detail about how the practitioners dealt with an inner conflict between improving democracy and having to make profit to keep the project going. While I agree that generating income is a necessary evil in projects without benefactors like the organizations studied, it would seem that there are better opportunities to generate income than by marketing the credit histories and contact addresses of citizens. Of greater concern is that any data was marketed without the prior consent of citizens who participated on the discussion boards or in polling. In this regard, Howard (2006) is on the mark that this decision is problematic because the need to generate income may in this case undercut the desire of practitioners’ to help improve democracy. Considering the choices made, one has to question how well the organizations thought about how to improve society for its citizens.

The second and third decisions are related. The second decision that concerns Howard (2006 is the choice of practitioners to politically redline citizens by using mined data to strategically target campaigns to mobilize citizens that are most likely to agree with organizations or candidates on issues. The third decision was to focus campaigns in areas where campaigning clout was needed. I agree this was an opportunity to change the status quo from typical political campaigns or communication campaigns in general.

I question, however, the blame Howard (2006) leveled at the companies to who assist campaigns with the information and implants. There is no ethically sound explanation for using the mined personal data to target citizens, but the practice of targeting is a natural part of the campaign process. Campaigns make decisions about which audience to target because of budget and time constraints. Redlining takes place because if a campaign were to tailor messages for all audiences, they would run out of time and money at every critical point in the campaign (Denton, 2005). In addition, the desire to win on an initiative or in an election drives the decision to target campaigns in areas where more of a push is necessary. An immediate example is the use of moral referendums on the ballot in battleground states in the 2004 election (Denton, 2005).

Organizations target elites and contested regions over the general population because they are more viable to help accomplish the goal of passing an initiative or in getting a candidate elected. When new media companies are employed by campaigns to conduct these practices, it is because that is what the campaigns request from them. If critics like Howard (2006) want to reform the practice, we must find a way to get campaigns to address all audiences in a manner that is efficient in time and cost-effective. This problem is institutional in the American political system and the feasibility of running an effective campaign, not only the practices of these companies. Howard (2006) must qualify the blame leveled in this case, as companies seem to use new technology to complete traditionally effective campaign strategies in a more efficient manner. They are not the source of these decisions.

In addition to discussion these three decisions, Howard (2006) also compares the motives and rationale behind each of the four companies examined and how they practiced campaigns. He praises the pseudonominous GrassrootsActivist.org because of their use of technology and information to help citizens and community groups mobilize issue campaigns to help improve society. In this way, they seem to stay closer to the desire to improve democracy. Another current Web site for Project Vote Smart (http:// www.vote-smart.org/) provides a means for politically independent citizens to research candidates for each state and national election, to research policy issues on the ballot, and opportunities for citizens to volunteer, intern, or find work with their organization. This site seems to be morally grounded and interested in empowering citizens in the right ways. Perhaps not the most sophisticated in new Internet technologies, it does provide a variety of in-depth ways to learn the character, ethics, and issue stances of candidates.

Monday, October 1, 2007

Bridges, Bonding, Politics, & Communities in Crisis - 10/4/07

This week’s readings in Society Online examine how organizations with diverse interests utilize the Internet to fulfill their needs in specific situations. The studies included reveal some consistent trends in motives for usage, and some specific examples of why gaps in communication exist on the Internet. Other studies examine the use of the Internet in the political communication context, as well as in the crisis communication context.

Norris (2004) examined the role that the Internet plays in bridging gaps in communication between people of different backgrounds and viewpoints, as well as how it provides a means of helping people with similar backgrounds and interests bond. The findings indicate that the Internet is successful at providing likeminded people with a vehicle for bonding, but is not helpful in bridging the gaps in dialogue between people of different backgrounds and points of view.

Larsen (2004) examined how individuals use the Internet in practicing religion. The findings indicate a strong use for research and offering advice and support to other members in their faith. Similar to the Norris (2004) study, we see a trend that indicates that the Internet works well to strengthen the congregations of churches, but not in opening dialogue between different congregations.

The findings of both studies are indicative of the idea that we are less likely to participate in conversations in uncomfortable environments, whether interpersonally or in an Internet-based context. Perhaps this early scholarship on community building using the Internet could help address why the Internet is becoming particularly useful in political campaigns. Web sites seem quite successful at building vertical consensus on issues, but not in bridging gaps between organizations with different viewpoints. This Internet use seems effective for political parties.

Rice and Katz (2004) examine how the Internet is playing a role in enhancing political engagement in the 1996 and 2000 presidential campaigns. Current uses seem to support where they suggested Internet use would head. A simple examination of the Democratic party’s Web site (http://www.democrats.org/) provides the viewer with access to news and talking points on a variety of issues, the latest campaign and political news, the means to financially contribute, and the ability to search for local organizations that fit their needs.

An examination of the Republican party’s Web site (http://www.gop.com/) begins with a means to sign up as a member of the party, and then takes you to a Web site that provides many of the same features, but also gives the consumer some other interesting opportunities to engage, including a Spanish-language page, the ability to join the RNC’s “Official Facebook Group,” and links that allow readers to write their legislators on issues directly. I would speculate similar avenues for participation are available on individual candidate Web sites as well.

In a study that was a little out in this section, but interesting because of recent personal experiences, Schneider and Foot (2004) examined the role of organization and company Web sites in providing crisis communication to their publics. An allusion to Internet use immediately following the 9/11 attacks prompted me to consider similar Web use following the April 16th shootings at Virginia Tech.

Within the University community, my friends and I used Facebook extensively to get updates on friends (http://lsu.facebook.com/group.php?gid=2472900651), to mourn mutual friends lost in the shooting (http://lsu.facebook.com/group.php?gid=2350888467), or to discuss specific issues relating to the aftermath (http://lsu.facebook.com/group.php?gid=2323364268). In addition to these issues, we also made use of peoples’ individual pages to ask about them as well.

From the organizational perspective, Virginia Tech was diligent in presenting a strong crisis communication strategy to the public on its Web page (http://www.vt.edu/remember/), as well as its affiliate Web pages (http://www.hokiesports.com/). The Internet does serve as an effective means of communication in times of crisis both within an organization and external of it, as Scheider and Foot (2004) illustrate.

Tuesday, September 25, 2007

Comments on Media Access, 9/27/07

This week’s readings in Media Access encompass further scholarship that attempts to address the conditions that help to contribute to the existing gap in technological access, use, or interpretation. Many ideas are well supported, though there are some ideas I have questions about.

McCrery and Newhagen (2004) examine the relationship between the process sphere and the opinion sphere in political communication. They find a less than surprising situation where participants in the political process, highly engaged citizens, and lobbyists are highly attentive to the media. The review of literature they offer in advance of their report suggests citizens who utilize the Internet for political information or communication never utilize the information gathered or disseminated in public discussion. I do not share their position on the Internet’s role in civic and political discourse.

It is my impression that those who engage in political discussion via Internet-based mediums, like blogs or chat rooms are highly efficacious citizens engaging in political discourse. It may be true that politicians do not read blogs like MoveOn.org (http://www.moveon.org), the Huffington Post (http://huffingtonpost.com), or the Drudge Report (http://www.drudgereport.com) when they cover major political events. McCrery and Newhagen (2004) also state in their study, however, that the staff members of the politicians covered are probably reading these blogs and monitoring what is discussed to keep the policymakers informed. This seems indicative of civic and political discourse using the Internet. By the scholars’ admissions, it seems to connect with policymakers, at least through their staff members.

Another issue in question in the readings is the idea of interactivity and how it can impact political participation. Hofstetter (2004) makes the argument that perceived interactivity is critical in understanding the appeal of political talk radio, noting the respondents rank it behind the telephone and Internet in terms of interactivity. He also makes note of the idea that the process of participating is highly screened and leaves little opportunity for citizens to actually engage directly with the talk show hosts or other political pundits on the show. Thinking about it this way, how does this provide citizens with an interactive experience that truly helps them participate in the discourse? Is it more important to make citizens feel like they participate in the process than to allow them to actually engage in it?

It seems that blogging, with the proper applied effort, is a more effective means of interacting in the political process. Perhaps no one will read it, but citizens are putting their thoughts out there in a forum where other citizens or policymakers can read about their ideas and perhaps use it to inform their perspective.

Hofstetter (2004) makes a very interesting point that the level of interactivity that a person perceives will ultimately hinder their ability to discern the credibility. It seems highly questionable that citizens might possibly take a person like Rush Limbaugh at face value (http://www.cnn.com/2003/SHOWBIZ/10/02/limbaugh/).

Is it more likely to consider, however, that the perception of credibility from listeners has more to do with their political viewpoints and that they are listening to talk show hosts or reading the blogs of writers who they identify with politically and ideologically? Perhaps a selective exposure (Klapper, 1960) approach to research is more appropriate in addressing this issue than perceptions of credibility.

Monday, September 17, 2007

Media Access Observations and Comments 9/20/07

Part II of Media Access offers several studies that aim to tease out the less-frequently explored area of the psychological dispositions that might help to explain the digital divide in terms of Internet access, use, and comprehension. There are several positive elements in the studies, as well as some areas that merit further explanation or exploration.

Grabe and Kamhawi (2004) explore how demographic variables interact with other conditions in influencing media access, use, comprehension, and perceived trust of information available on the Web. I did come away with a couple of concerns about their study. First, they measure adults who have some high school education or only a high school degree against adults who are working on graduate degrees to evaluate how education influences media use, comprehension, and trust of information. This seems to be a problematic split, considering the percentage of adults who have completed a Bachelor’s degree that are not examined as a group. It would seem to me that gathering data on college graduates at the Bachelor’s degree level is necessary here for a more representative sample of adults.

The authors are also surprised by the finding that people with higher levels of education trust the news and information provided on the Internet less than do adults with lower levels of education. Would it not stand to reason that as people gain further knowledge of the world around them, they would be more skeptical of the information handed to them? We currently teach undergraduate journalism majors to seek the truth and to question sources thoroughly in order to confirm the validity of the information. Perhaps this area of examination needs further analysis for reasons behind why the educated trust the information less than do lower educated consumers.

Several of the scholars in this section of the book make sound observations about elements we do not commonly address when discussing digital divide research. One idea is that consumers can become easily confused when adjusting to a new form of media like the Internet because of the complexity that some Web sites entail. Consumers who are used to passive interactivity (like flipping through channels on a television) might find themselves lost when dealing with any one of the news Web sites on the Internet that uses dozens of hyperlinks on their front page. Take a look at the daily postings on CNN's Web site (http://www.cnn.com/) or on the Drudge Report (http://www.drudgereport.com/), and it is apparent that their is merit in the sholars' arguments about complexity.

Rojas et al. (2004) provide an interesting observation about why minorities in an Austin high school were having trouble making use of the Internet in their everyday lives. They find that some of the minorities might interact more readily if the content was in Spanish. This suggests that concern over access might be trumped by the need for foreign language content (or at least training for users in how to access the appropriate content). Further study on the language barrier may help clarify part of the problem.

The aforementioned findings are supported in the work of Youtie, Shapira, and Laudeman (2004). They suggest that in spite of free access, use still lagged in a traditional digital divide community. The authors reference Blacksburg’s Electronic Village (http://www.bev.net/). The LaGrange community findings were inconsistent with those of Blacksburg (Kavanaugh & Patterson, 2001).

I believe there are two reasons that might explain the disparity. First, Blacksburg is a community that is well linked to a nationally-recognized University that specializes in technological education, unlike LaGrange. Therefore, it is reasonable to think that there might be a more active educational role in the technological integration process. In addition, Virginia Tech (http://www.vt.edu/) maintains a very strong town-gown relationship with the town of Blacksburg, providing many service and education opportunities to the community. It is reasonable to hypothesize that this interconnection between the two enhances the Internet access, participation, and comprehension of the citizens. Further examples of this interconnection currently exist in the Blacksburg and Virginia Tech community.

Blacksburg now maintains a citizen journalism Web page where Virginia Tech students and Blacksburg citizens provide content, called Planet Blacksburg (http://www.planetblacksburg.com/). The Planet Blacksburg project is similar to Lew Friedland’s Madison Commons at the University of Wisconsin (http://www.madisoncommons.org/). While Planet Blacksburg is more student-oriented than the Commons, it further illustrates the kind of connected relationship Blacksburg has with the University. If LaGrange were the host city for a major University, it might help to decrease the town’s digital divide in the same way previous scholars have found in Blacksburg (Kavanaugh & Patterson, 2001).

Wednesday, September 12, 2007

Cyberculture Research Methodology & Multiple Realities

This week’s readings from Critical Cyberculture Studies offer an interesting mix of ideas about how to research issues in the discipline, whether it involves what is studied, how it is studied, and why it will improve what we learn in the discipline. Baym (2006) puts together what could be considered a reasonable essay on how to qualitatively study the Internet. While some paragraphs early in the chapter more closely resemble a rant of a disgruntled conference reviewer, she offers some perspectives that seem tautological if the reader has any methodological experience.

She makes note that a problem in Internet research is the lack of consideration for existing literature and how every scholar claiming they have found something groundbreaking in Internet research rings hollow, which suggests that scholars are not effectively reviewing literature in order to inform their research. She also notes, however, that this may in fact be due to the absence of dedicated Internet research journals. I would argue that their absence is a problem, but that our current system of Internet-based research indices permits us to look across a broader spectrum of journals coming from a variety of perspectives. This suggests that scholars that do not thoroughly research the relevant scholarship have little room for excuses about what is absent.

Baym also argues that a common problem in Internet research is that scholars make unsubstantiated claims that they are observing consistent trends without sufficient longitudinal research data. Granted, researchers need to walk a careful line when making claims on data that is only a glimpse of what could be a much larger picture. I do, however, question the nature of this problem. In order to talk about trends, Baym argues we need sufficient longitudinal data to discuss trends. If we are conducting research on Internet-based mediums that may be less than a year old, can we make claims of a trend? Perhaps the mediums we can research longitudinally on the Internet are too few for researchers to discuss trends as anything other than preliminary, with the exception of mediums meant for a short period of time (e.g. candidate Web sites during elections).

Fung (2006) examines the relationship between Cyberlife and Real life which I think offers some insights in how it explores our relationships and need to form communities and relationships on the Internet regardless of how many relationships we have in real life. He concerns himself with the commercial evils that are pervading artificial realities. I worry about how we separate our real existences from our artificial realities. A commonly explored realities in the news today is secondlife.org. There are articles talking about how individuals around the world are negotiating two lives, while utilizing the technology to promote their company’s products, like this woman in Oregon (http://www.registerguard.com/news/2007/09/10/c1.cr.secondlife.0910.p1.php?section=cityregion). If you are concerned about the blurring of reality and artificial lives, then it is hard to find comfort in the recent news that HBO purchased the rights to air a documentary on Second Life (http://blogs.guardian.co.uk/organgrinder/2007/09/second_life_and_hbo_uhoh.html). If we are concerned about blurring the lines of reality, how do we negotiate a real-world documentary about the artificial lives of real people?

Another medium that is not without its problems is the World of Warcraft (WoW) role playing game. Previous experience with roommates leaves me seeing it as Dungeons and Dragons with a modem, but others claim it can help your lives as much as hurt them. Our own Daily Reveille covered a story this past year detailing how a young LSU student used WoW to provide relief from the real world in the aftermath of a sexual assault (http://media.www.lsureveille.com/media/storage/paper868/news/2007/02/09/Opinion/warcraft.Is.More.Than.Just.A.Game-2709255.shtml). Is this beneficial, or too much of an escape? Perhaps it is too early to say. South Park has even commented on the detriments of WoW to everyday life (http://www.youtube.com/watch?v=Jukb-gz8gS0).