THE Internet Berg new media series aims to provide students with historically-grounded and theoretically-informed studies of signifcant aspects of new media.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
1K views
Green - Introduction To New Media
THE Internet Berg new media series aims to provide students with historically-grounded and theoretically-informed studies of signifcant aspects of new media.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 257
THE INTERNET
Berg New Media Series
ISSN 1753-724X Edited by Leslie Haddon, Department of Media and Communications, London School of Economics and Political Sciences, and Nicola Green, Department of Sociology, University of Surrey Te series aims to provide students with historically-grounded and theoretically-informed studies of signifcant aspects of new media. Te volumes take a broad approach to the subject, assessing how technologies and issues related to them are located in their social, cultural, political and economic contexts. Current titles in this series include: Mobile Communications: An Introduction to New Media Te Internet: An Introduction to New Media Forthcoming titles in this series will include: Games and Gaming: An Introduction to New Media Digital Broadcasting: An Introduction to New Media Digital Arts: An Introduction to New Media THE INTERNET An Introduction to New Media Oxford New York Lelia Green English edition First published in 2010 by Berg Editorial ofces: First Floor, Angel Court, 81 St Clements Street, Oxford OX4 1AW, UK 175 Fifth Avenue, New York, NY 10010, USA Lelia Green 2010 All rights reserved. No part of this publication may be reproduced in any form or by any means without the written permission of Berg. Berg is the imprint of Oxford International Publishers Ltd. Library of Congress Cataloging-in-Publication Data Green, Lelia, 1956- Te internet : an introduction to new media / Lelia Green. p. cm. (Berg new media series) Includes bibliographical references and index. ISBN 978-1-84788-299-8 (pbk.) ISBN 978-1-84788-298-1 (cloth) 1.InternetSocial aspects. 2.Computers and civilization. 3.Information society. I.Title. HM851.G744 2010 302.23'1dc22 2010004767 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. ISBN 978 1 84520 298 1(Cloth) 978 1 84520 299 8 (Paper) e-ISBN 978 1 84520 769 6 (institutional) 978 1 84520 798 9 (individual) Typeset by JS Typesetting Ltd, Porthcawl, Mid Glamorgan Printed in the UK by the MPG Books Group www.bergpublishers.com For Linda Jaunzems who helps me keep all the balls in the air CONTENTS Illustrations ix Acknowledgements xi Permissions xiii 1 Introduction 1 2 History 19 3 Policy 43 4 Te Digital Divide 65 5 Customising the Internet 79 6 Regulation and Legislation: Pornography and Cyber Stalking 99 7 Te Public Sphere 119 8 Community 139 9 Internet in Family Life 159 10 Conclusion 177 Annotated Guide to Further Reading 191 Exercises and Questions 197 Abbreviations and Glossary 205 References 217 Index 239 ILLUSTRATIONS TABLES 4.1 Internet users as a percentage of a territorys population, for 30 June 2009 66 4.2 Percentage of worlds internet users, and percentage of a countrys citizens using the internet, for the top fve countries in terms of numbers of users, 30 June 2009 67 4.3 Top ten countries worldwide for fxed broadband subscribers, frst quarter 2009 68 8.1 Lines of confict in the HeartNet case study 156 9.1 Opportunities and risks of childrens online activities 163 DIAGRAMS 2.1 A hub and spoke system with sub-hubs 25 2.2 A distributed network 25 2.3 How IMPs and TIPs link to each other, and to hosts 30 2.4 A schematic representation of TCP/IP 33 FIGURES 3.1 An indicative framework for regulation 44 5.1 An outline of Jeanneneys argument against the Google Books project 86 6.1 Morgans metaphors for organisations 102 7.1 Brunss preconditions for the creation of an efective wiki 132 ACKNOWLEDGEMENTS I am extremely grateful to my employer, Edith Cowan University, who allocated the study leave which allowed this book to be written, and particularly to Professors Arshad Omari, Clive Barstow, Brenda Cherednichenko and Julie Warn who approved and managed my absence. Professor Brian Shoesmith, and my PhD supervisors Professors Tom ORegan and Bob Hodge, frst encouraged my interest in this area. Dr Ann Willis, Dr Danielle Brady and Julie Dare have all supported and developed the teaching of units in the discipline, and Ive learned a lot from working with them. A number of Australian Research Council (ARC)-funded projects have informed the research communicated in these pages and I acknowledge the ARCs support, and that of my co-Chief Investigators including Professors Robyn Quin and Mark Balnaves, Associate Professor Trevor Cullen, Dr Debbie Rodan, Dr Leesa Costello, Dr David Leith and industry partners Maurice Swanson, Steve Furmedge and Vanessa Bradshaw. Dr Anne Aly, Jack Seddon, Donell Holloway, Christine Teague and Lynsey Uridge were all involved as Research Assistants or PhD candidates with the ARC research. My co-supervisors, postgraduate students and research associates contribute a continuous stream of relevant, fascinating, information and opinion so I also mention Associate Professor Maggi Phillips, Dr Julie Robson, Dr Teresa Maiolo, Dr Kay Hearn, Dr Uta Daur, Julie Johnson, Jason Noble, Robyn Torney, Christopher Phillips, Alex Bradley, Christina Ballico and Catherine Gomersall. Warm thanks to Dr Judy Clayden for the index. Judy was also generous in shar- ing a librarians approach to fnding quality information on the web, and helpfully critiqued my punctuation. Ken Gasmier was more patient than I deserve as my specialist librarian. Jude Elund crafted the diagrams in the book, and she and Sharron Snader also provided other help. Dave Batley, proving that Wikipedia discussion lists do work, reviewed them from the perspective of a computer programmer and theoretical physicist, although any errors remain my own. I am fortunate to be involved as a joint Chief Investigator in the ARC Centre of Excellence for Creative Industries and Innovation. Tis has brought me into contact with a number of exceptional academics whose work is relevant here, including: a c k n o w l e d g e m e n t s ix distinguished Professors John Hartley and Stuart Cunningham; Professors Jock Given, Gerard Goggin, Greg Hearn, Catharine Lumby and Alan McKee, Associate Professor Axel Bruns, Dr Jean Burgess and Dr Kate Crawford. My international colleagues on the Asia-Pacifc Digital Review, but especially Professor Claude-Yves Charron, and volume editors Chin Saik Yoon, Professor Felix Librero, Shahid Akhtar and Associate Professor Patricia Arinto have, since 2003, provided me with an illuminating introduction to the digital divide as it operates in most areas of the globe, for the majority of the worlds population. As a member of the International Advisory Panel of the EU Kids Online project, 20069, I was among the frst to see the exciting outputs of that 21-nation research network. Im grateful to Professor Sonia Livingstone and Dr Leslie Haddon for the opportunity to take part. Dr Haddon is also one of the two editors of the Berg New Media series, with Dr Nicola Green, and was particularly generous in his support and unstinting in his feedback: thank you Leslie. Commissioning Editor Tristan Palmer was wonderfully fexible in calling in my deadlines and Emily Medcalf intuited a fabulous cover. I am grateful to them, to the Berg Production staf, and to the anonymous reviewers whose comments both challenged and inspired me. Linda Jaunzems, like Dr Haddon, was indispensable to the eventual completion of this book, ofering support, assistance and one-stop expertise. Tis volume is dedicated to her, and to her family. My life is sustained by a network of friends, many of whom have already been mentioned and others of whom include: Claire Andrews, Jenny Benjamin, Jeanette Connolly, Carmel Elwell, Professor Nadine Henley, Dr Larissa Hjorth, Dr Kara Jacob, Heather McLean, Joan Smith, Emily Walker and Susan Young. My mother, also Lelia Green, has fuelled this work with food, drink and love and by creating a refuge from other demands to allow me time to commit myself to writing. My sister, Ginny Weston, has supported me throughout this and other journeys. Anna Weston, Mark Weston and Paul Schutz, all of whom have an important place in my life, have ofered feedback from the students viewpoint. My fnal acknowledgement must go to my two wonderful children, Carmen and Ben Guinery. Tey grew up digital and generously shared the excitement of so doing, together with some details of the journey. Tey tolerated the progress of this book, and others of my consuming passions, with open-minded good humour and large bowls of vegan pasta. Tey tell me this is an Oscar acceptance speech. I would be lost without them. Tanks, kids. PERMISSIONS I am grateful to the following authors and publishers for permission to reproduce their work. For Table 4.1 and Table 4.2, Sr Enrique De Argaez, Editor and Webmaster, Miniwatt Marketing Group and World Internet Stats, published June 30 2009, http://www.internetworldstats.com; reproduced with permission from World Internet Stats. For Table 4.3, Louise Budde of Paul Budde Communication Pty Ltd, 2009, trading as BuddeComm, http://www.budde.com.au, regarding 2009 data from Point Topic on behalf of the Broadband Forum, based on self-reporting by carriers and defning broadband as 144Kb/s; reproduced with permission from Paul Budde Communication Pty Ltd. For Figure 5.1, Jean-Nel Jeanneney, author of Google and the Myth of Universal Knowledge: A View from Europe, 2006, Te University of Chicago Press, for permission to create a fgure based on Jeanneneys arguments; reproduced with permission from the University of Chicago Press. For Figure 6.1, Gareth Morgan, author of Images of Organization (revised edition), 2006, Sage Publications, for permission to create a fgure based on the Contents pages of Morgans book; reproduced with permission from Sage Publications. For Figure 7.1, Axel Bruns, author of Blogs, Wikipedia, Second Life and Beyond: From Production to Produsage, 2008, Peter Lang Publishing, for permission to create a fgure based on pp. 1920 of Brunss book; reproduced with permission from Peter Lang Publishing. For Figure 9.1, Uwe Hasebrink, Sonia Livingstone, Leslie Haddon and Kjartan lafsson, editors of Comparing Childrens Online Opportunities and Risks Across Europe: Cross-National Comparisons for EU Kids Online (2nd edition), 2009, the London School of Economics and EU Kids Online for permission to adapt two fgures on pp. 89 of the second edition of Deliverable D3.2 of the EU Kids Online project; reproduced with permission from EU Kids Online, the London School of Economics and Political Science, London. 1 INTRODUCTION Tis book explores the internet as an introduction to new media. It does so by looking backwards to examine the history of the internet, and by looking forward to its emerging future. It draws upon current evidence from around the world to illustrate diferent aspects of internet use as these refect a range of social, political and economic circumstances. It uses case studies, many based on new research, some of it unpublished, to reveal important aspects of the internet for comment and analysis. While the internet is too big a subject for any book to provide a complete review of its past, present and future, insights from case studies provide a series of snapshots which taken together create a broad picture of the contexts of internet use and illustrate what is happening, how and why. Te Internet (as) An Introduction to New Media examines the internet as itself, but is also a way of examining our everyday lives through our uses of the internet, and linking the internet with aspects of other new media. Many changes wrought by new media swiftly make their way into popular culture, both refecting and building the excitement about new possibilities. Old media the press, radio and television discuss the innovations, and new media become the central element of novels and flms. One example of this, within a popular culture context, would be the flm Youve got mail (Ephron 1998). Te type of context chosen is itself important when considering the internet, since a historical context will provide diferent information, and raise diferent questions, compared with a social context, for example. Te diverse range of case studies covered in this book makes a number of diferent contexts visible. Tese include the way that the internet is used in everyday western life, as well as its technological, political, economic and global contexts. What becomes clear is that the internet, like other new media, is a site of constant reinvention. It has energised creativity, collaboration and novel models for commercialisation. At the same time that the internet makes possible new ways for us to seek information and relate to others, it also ofers another technological medium through which individuals and societies can express themselves and their priorities. 2 t h e i n t e r n e t In many western countries, the internet is pervasive. Tat is to say, almost everybody who wants to do so can access the internet (but see Chapter 4). Tis access will not necessarily always be in the time and place and circumstances that a person chooses, but there are comparatively few people who lack the skills and support to use an internet terminal in a library. It is important to remember, however, that the situation is very diferent in most parts of the world where the internet is still generally restricted to the richer, better educated, younger, males in the community. Tis also used to be the pattern of access in the West up until the early 1990s. Te huge growth in take-up of the internet has both raised interest and created anxiety, a pattern common to each new medium as it is taken up and difuses through society. When printing frst started, and when telephones, radio, the cinema and television all became integrated within everyday life, the lawmakers and regulators of the day were concerned. Even while people are excited by new possibilities and potentials, as we will see later in the book, they may simultaneously be worried about risks, dangers, control, and relative advantages and disadvantages. For these reasons, new media are often associated with fear and panic, and a concern that the technology is too big to regulate. Given the numerous ways in which a book about the internet could be structured, this chapter explains why this book has been approached as it has. Te explanation includes not only why there is a focus upon case studies, but also the logic behind the structure of the book. First, we start of with consideration of the internet as an introduction to new media, including a defnition of the internet, in order to understand what we are focusing upon in this volume of the Berg new media series. Te digital is a critical component of new media, and characteristics of digital goods are compared and contrasted with physical goods. Te chapter goes on to consider how societies choose to use technology and explains the social shaping of technology approach, which is the major conceptual framework used. Tis approach is complemented by the theory that technologies are consumed by the people who use them and become part of a revised, enlarged conception of that persons sense of self. Te benefts of consuming a technology are often communicated through social constructions of that technology, the meanings and understandings about that technology which circulate in the relevant society, while a particular strand within that approach Actor-Network Teory positions people as key actors in networks which form integrated wholes related to technology use. Te internet can be explored using a wide range of theoretical frameworks and while the social shaping approach is not the only method used in this book, it is the main one. To illustrate the ways in which a particular framework makes some research and some evidence more or less important, the discussion of the social shaping of technology is developed in Chapter 2 through the use of a feminist i n t r o d u c t i o n 3 approach. Partly as a way of considering the predominantly male history of the early internet, we examine Wajcmans (1991) argument that technology is a masculine culture. Tis is contrasted with the requirements of a more traditional historical analysis, such as that which characterises most of the material in Chapter 2, which positions key inventors and industrialists as the heroes of innovation. Empirical research forms a vital part of this book and, consequently, there is a brief introduction to case study research methods relevant to a social shaping framework. Tis allows readers to understand the ways in which case studies draw upon and showcase relevant evidence concerning peoples uses of the internet. Tis introduction concludes with a description of the chapters that follow and suggests ways in which readers might like to use the book, since it has been designed to be read in bits and chunks, as well as a single narrative. A dot-point summary draws the threads of the chapter together, and sets the scene for the chapters to come. THE INTERNET AS AN INTRODUCTION TO NEW MEDIA Te term the internet is used here to cover: n the interconnected and networked technological infrastructure that supports the World Wide Web; n proprietary sites linked into the web (such as that maintained by Te Louvre, the world-famous French museum); n open and closed source software and architecture (e.g. Firefox, Wikipedia, Internet Explorer, Google); n computer and everyday languages in terms of making the internet accessible to people of many cultures and literacies; n email, chat and instant messaging (e.g. AOL, MSN); n blogs and social networking sites (e.g. Facebook); n games, communities, environments and worlds (e.g. World of Warcraft, Second Life); n the many ways in which digitally mediated communication has become domesticated and pervasive within the everyday. Not all of these aspects of the internet are given equal attention in this book since many areas, such as computer games and digital arts, are covered in companion books in the series. However, an inclusive notion of the internet, as indicated above, provides the blueprint for this volume. While it is expected that readers not only students and educators but also researchers and policy makers will be familiar with 4 t h e i n t e r n e t using aspects of the internet, this book encourages a critical examination of such individual experiences and places them into a context which includes the past and the future of the internet; as well as the technical and social implications of internet use. A new media approach to studying the internet recognises that digital tech no- logies and environments are convergent. When technologies converge they take on and share the capacities and characteristics of other technologies alongside the core technology. Tis contrasts with everyday goods from pre-digital life, which had separate functions and separate technical characteristics. In the early days, television could not be used as a radio; a telephone could not work as a camera. Once information is digitised, however, it can be handled in consistent and efective ways which allow a blurring of functions and the emergence of hybrid technologies. For example, early computers had started as number crunchers, but became word processors as well as calculators. Increasingly, new media technologies can perform more functions in more varied contexts; such as accessing the internet from a mobile phone to post digital pictures to a social network profle, even as the event recorded is still happening. Refection: Convergent technologies Can you think of a technology in your life that used to be two or more separate technologies? What advantages do you fnd to having a number of functions combined in the same technology? Are there disadvantages? In addition to recognising convergence in the functions of end-user technologies, new media perspectives acknowledge that formerly distinct industries also converge, partly to position themselves strongly as competitors in emerging markets. Te internet itself is sometimes positioned against a background of old media: print culture, which started in about 1439 with Johannes Gutenbergs invention of printing using movable type; and broadcast culture, which is a little over a century old. While old media do ofer starting points for understanding the internet and the World Wide Web (WWW), these perspectives are more relevant to Web 1.0 than they are to Web 2.0, or than they will be for Web 3.0. It might be worth noting here that the internet is not the WWW, although it provides the technological structure which makes the WWW possible. Web 1.0 refers to a stage in its evolution i n t r o d u c t i o n 5 when the internet could be used to access information and relatively static web pages, while Web 2.0 recognises that online environment now ofers opportunities for social connection and interactivity for example, through blogs, wikis and social networking systems and technologies. For people in western countries, Web 2.0 has become increasingly prominent since the new millennium, although the organising principles of both print and broadcasting culture dominate many aspects of corporate content production. As well as including aspects of both print and broadcasting culture, the inter- net marks a major development in the felds of information technology (IT) and telecommunications. One of the reasons for this huge growth in hybrid and con- vergent products, services and markets has been the impact of the digitisation of information in comparison to older analogue broadcasting technologies. When audio, video, data, graphic and multimedia applications are all designed to process digital information then those audio, video and data services can also be man- ipulated, stored and communicated via computers and telecommunications. Te underlying digital structure of these diferent applications allows the outputs to be delivered through a variety of channels including cable, satellite, microwave and other telecommunications systems, with the platform of delivery being less relevant in terms of access and use than the bandwidth capacity of the delivery channel. New media are digital media, they tend to be information and communication technologies (ICTs) and they are hybrid to their core. Te relevance of their digital nature lies in diferences between the characteristics of digital goods and services, and material goods. HOW DIGITAL INFORMATION DIFFERS FROM PHYSICAL GOODS In the physical world, if a package is lost in a journey between London and New York, there is a problem. If it cannot be found, it may have to be replaced. In the digital world, if a packet of information is lost it will be re-sent, automatically, without anyone being aware that the packet has gone missing. Tis is partly because digital information is kept by the source at the same time that it is sent to the receiver. In the digital world you can have your cake, and eat it too! Four characteristics of digital information difer dramatically from the characteristics of physical goods, as identifed by Japanese futurist and information scientist Yoneji Masuda (1981). First, information is not consumable: it continues to exist after it has been used, and diferent people can use the same information multiple times. Second, informa tion is non-transferable: this means that the information can be passed onto 6 t h e i n t e r n e t others and yet still be retained by the original user. Tird, information is indivisible. Every fourth letter-space-punctuation in this book, for example, would fail to communicate a quarter of the meaning. Fourth, information is accumulative. As information is used, for example, entered into a database and then processed using statistics software such as SPSS, so it becomes more relevant and accessible for a range of purposes. Usually the processing information makes it more useful: it adds value. Tis is because accumulation of goods is by their non-use, but information cannot be consumed or transferred (Masuda 1981: 77), thus as information is accumulated, so it has greater use; and as it is being used, so more information is accumulated. Masuda adds that the quality of accumulated information is increased through the addition of further high quality information. Tis is the opposite of material goods, where consumption equates with destruc- tion. Te use of digital technologies to process data magnifes the benefts of these four properties of information. New information can multiply both the value and the amount of existing information through the creation of new knowledge. Refection: How does digital information compare with: n printed information n personal knowledge n material goods? Are all four characteristics of digital information used in internet communication? Masuda (1978, cited in Jones 1995: 186) demonstrates that other astonishing things happen when digital information is combined with information technology. He notes that while information has always had the property of self-multiplication, computer-communication technology has rapidly increased the speed and quality of self-multiplication because the technology itself has added four more properties to information: (1) concentration, (2) dispersion, (3) circulation, and (4) feedback. To these four functions we can, following the invention of the WWW, add (5) searchable. 1. Concentration occurs because ICTs store digital information more efciently than any other means. Tis results in ICT operators being able to work efectively with multiple data sets using just one piece of technology. i n t r o d u c t i o n 7 It also allows many people simultaneously to access huge databases from remote terminals, e.g. international ATM access to credit card accounts. 2. Dispersal allows information to be exported to many diferent sites. Together with inconsumability, this capacity of ICT permits information to be incorporated into a variety of data storage systems for multiple uses by many people. 3. Te circulation of information provides users with additional choices. Even if information is not downloaded onto a drive (as, for instance, would happen with dispersal), access to that information circulates via emails, web-links, etc. 4. Feedback allows ICTs, via their data protocols, to verify that all the in forma- tion sent has been safely received and reassembled. If the sending machine does not receive appropriate feedback verifcation, it automatically re-sends the data: hence the missing packet is replaced before anyone notices it is missing. 5. Searching for data using WWW search engines allows access to constantly multiplying amounts of information, prioritised according to the searchers key requirements. Tis aspect of ICTs will be examined closely in Chapter 2s case study of Google. THE SOCIAL SHAPING OF TECHNOLOGY Having established some key features of the digital information handled on the internet, we now move on to examine the main theoretical frameworks drawn upon in later chapters. Te social shaping of technology approach to new media studies takes a fundamental pair of questions as its starting point: Does technology shape society?, or, Does society shape technology?. Once people have started looking at these questions they fnd others also emerge: How does the shaping process happen? and Is technology neutral?. Tese questions and the discussions arising from them provide a starting point for thinking about the internet and other new media. Tey ofer a way of talking about where people experience power and powerlessness in their uses of technology (MacKenzie and Wajcman 1999). Some peoples everyday experience is that technology changes too fast for their comfort. Tey prefer the old ways of doing things and feel disempowered when asked to carry out their everyday activities online. Tey resent that bank branches are closed down because more people are using internet banking. Tey feel disadvantaged when airline companies ofer special fares for booking on the web. Tey cant believe that a smart-phone menu (Press 1 for . . .; Press 2 to . . .) ofers customer service advantages over the real person who used to answer when they 8 t h e i n t e r n e t called a companys ofce. Such people might feel that the technology itself is behind the changes that make them uncomfortable. Some commentators construct technology as the power which drives social change, impacting upon society. It is almost as if the scientifc rules behind the development and application of technology are more efective and non-negotiable than the social and cultural dynamics that shape the communities and countries in which we live. Since new media technologies conform to the laws of science of electro-magnetics, engineering, digitisation this can be interpreted as indicating that technological change is a given, like gravity. Tere is no point in arguing about whether gravity is good or bad. According to this approach, the only role for society is to adapt itself to the technology, and come to terms with a future that is driven by technological change. Such a perspective sees technology as shaping society. It is called technological determinism because the technology is positioned as the most important element determining peoples lives. Very few theorists these days argue a pure case for technological determinism. Instead, this perspective tends to be aligned with those who argue that certain technologies are inherently bad, and that this contaminates all uses of the tech- nology. Such a perspective can be found in Teodore Roszaks classic criticism of the computer: No matter how high the promise of that [information] age is pitched, the price we pay for its benefts will never outweigh the costs. Te violation of privacy is the loss of freedom. Te degradation of electoral politics is the loss of democracy. Te creation of the computerised war machine is a direct threat to the survival of our species. It would be some comfort to conclude that these liabilities result from the abuse of computer power. But these are the goals long since selected by those who invented information technology, who have guided it and fnanced it at every point along the way in its development. Te computer is their machine; its mystique is their validation. (Roszak 1994: 233, original italics) Refection: Is the internet neutral? Thinking about your own circumstances, at home and in other locations, what rights and opportunities are implied in your use of the internet? Do you see your internet use as neutral? Why? Do you see the internet itself as a neutral technology? What factors are you taking into account? i n t r o d u c t i o n 9 Social determinists agree that technology is an important change agent, but they argue it is not developed outside society but is an expression of priorities and choices that are made within social systems. Tis perspective is part of an overarching philosophy called Social Constructionism, which argues that social forces construct our understanding of the world and frame how we act within it. When discussing the role of technology, social determinists point to the actions of elites in sponsoring, developing and marketing technologies; and claim it is no accident that some technologies are promoted while others never even reach a prototype stage. Tis perspective positions technology as having the power to impact upon everyday life, but it also constructs technologies as the result of social processes. When technology is positioned as an outcome of social dynamics, as it is in the social shaping of technology approach, there is the possibility that technological processes can be made accountable and that the development and deployment of technology can be regulated. Te social shaping of technology perspective is generally a positive one. It says that technology is not beyond the control of social processes. However, it also argues that since technology is part of society, it tends to express the priorities of elite groups in that society. Te elites typically identifed as supporting the development of technology can be remembered using an alphabet mnemonic: the A, B and C of technology change. A Armed forces; B Bureaucracy; and C Corporate power. Tese three drivers of technological change are key promoters of new technology development. Te US armed forces, for example in the shape of ARPA, the (then) Pentagon-based Advanced Research Projects Agency commissioned the work which led to the start of the internet. Bureaucratic drivers are behind innovations such as online tax returns and government portals delivering information and services. Te UK Pension Service (http://www.thepensionservice.gov.uk) would be a contemporary example of a bureaucratically-driven investment in technological development, which would include design and usability studies. Corporate power notes that companies also seek out and develop new products for new markets. Google would ofer many examples of corporate power driving development (Chapter 2). Even where universities are the powerhouses for innovation, the funding for their research tends to come either from defence, the (civilian arm of ) government or business. Traditionally, the A, B, C of technology change ended with these three categories. Latterly, however and excitingly it has become appropriate to acknowledge a D and an E. Tese are less clearly elites, but may be seen as comparatively small groups 10 t h e i n t e r n e t of people within their societies who have special skills and a passion for new media. Te D and E that should be added to the mnemonic are D Distributed collaborators; and E Everyday innovators. It is not the case that D necessarily comes before E (or that A came before B and C) and many would argue that everyday innovators have always been active in customising technology for their own purposes (Marvin 1990; Haddon 1988). Te acknowledgement of distributed networks of collaborators allows recognition of the creative power of harnessing the hive; the community of people engaged in a shared activity. We see these alliances of enthusiasts working creatively and productively in gaming contexts, in wikis and on fan fction sites to name but a few. An everyday innovators category acknowledges the creativity of new media adopters in fnding novel applications for emerging technologies unsuspected by the technology developers. Tis was the case, for example, of SMS texts and the adoption of texting by Finnish teenagers as their major mobile application once it became clear how much cheaper it was to communicate in this way rather than by voice (Kasesniemi and Rautianinen 2002). Tese examples make clear the possibility that the elite associated with a technology can change over time: the corporate designers were supplanted by the cash-poor teenagers who fashioned the uses of the mobile phone to suit their lifestyles, their budgets, and to circumvent the usual communication patterns of their parents and teachers. (See the separate book in this series on Mobile Communication for more.) Clearly some internet advances can be attributed to Distributed and Everyday groups, and the internet is rarely conceptualised solely in terms of its Armed forces-sponsored beginnings. Tese examples introduce the fact that the social shaping of technology approach is an umbrella concept for a range of specifc micro-theories. Teories of specifc relevance to the social shaping of technology approach include the Teory of Consumption, the Domestication of Technology framework, the Social Con- struction of Technology (SCOT) and Actor-Network Teory (ANT). Te theory of consumption, developed by Daniel Miller (1987: 178217) argues that Mass goods . . . are an integral part of that process of objectifcation by which we create ourselves as an industrial society: our identities, our social afliations, our lived everyday practices (ibid.: 215). Tis has been stated more simply as: social identity can be interpreted as a function of consumption (Hearn et al. 1997: 106). Essentially, to the world outside, we are what we consume in terms of products, services and technologies (Green 2001). We fashion our identities in part according to whether or not we go online and what we go online to do. We also change our homes, our schools and our workplaces by engaging in voluntary consumption i n t r o d u c t i o n 11 practices in those spaces. Since the home is the least (externally) regulated of all the places we inhabit, consumption in domestic spaces is particularly indicative of identity. Te domestication of technology is consequently of great signifcance in understanding its consumption. In suggesting that technology is domesticated, the Domestication of Tech- nology framework (Silverstone et al. 1992: 1531) implies that the technology in question goes through a process of being tamed to serve the needs of those people inhabit ing that domestic space. Te classic model, originally focusing on domestica- tion in the home, has four elements and proposes that the households concerned have a porous boundary with the wider society. Te process of appropriation in- cludes developing awareness, interest and desire for the technology, culminating in the action of procuring it for use in the home. Objectifcation involves the creation of a physical space, often within the home, for using the technology. In parallel, incorporation describes how the technology is integrated into the rhythms and the time structures of the household, and the individual lives of the people who belong to it. Finally, conversion explains how the people who consume the technology use it to construct and develop their social identity. Tis may be, for example, by developing good online search skills and becoming not only a better student, but the natural leader in group projects. Alternatively, it may be used to develop an identity as a gamer, or a fan fction writer. Chapters 8 and 9 address these issues in much greater depth. SCOT is generally associated with the work of Trevor Pinch and Wiebe Bjiker (Pinch and Bjiker 1984; Bjiker, Hughes and Pinch 1987) and ofers both a theory and a methodological approach which sets out a series of steps to follow when analysing the uses of a technology. Whereas I have used the term social elites in my brief introduction to the social shaping of technology, Pinch and Bjiker discuss Relevant social groups. Principally the producers and users of a technology, such relevant social groups can also include, for instance, regulators and journalists. One criticism of the SCOT approach is that there are no objective tests as to what constitutes a relevant social group. Instead, the identifcation of any relevant social group is itself the outcome of social constructionist processes. Bruno Latours work on Actor-Network Teory ofers the provocative idea that non-humans are actors in a network alongside humans, and that networks combine diferent entities (human and non-human) to form a unifed whole which can itself be an actor in a network. Tus the internet might include technology, systems, designers, programmers and users; it might also be an actor in the network of people and things that make up a national health system. Tis theory does not assume that networks, once formed, are stable and tends to focus on how networks evolve and disintegrate. It accepts that networks may be temporary, and it assumes that 12 t h e i n t e r n e t networks are characterised by conficts as well as by collaboration. Both human and non-human network actors are implicated in these conficts. Carefully grounded in qualitative case studies, the early formation of ANT culminated in Latours 1987 book, Science in Action: How to follow scientists and engineers through society. Within the social shaping of technology framework, then, SCOT charts the importance of relevant social groups while ANT sees people and non-human actors forming and reforming critical networks of relevant technological activity. Te discussion so far has used a somewhat inclusive notion of technology. As well as assuming that all new media have a technological dimension, this book treats programs and practices as part of the technological whole: alongside the technological product. Te object itself, the systems (e.g. electricity, software) through which that object is made functional as well as the (human) knowledge, skills and expertise through which the technology and its systems are harnessed to create activities and outputs; are all implicated in this inclusive notion of technology. Tese three levels of understanding technology (Wajcman 1994: 6) together constitute one way to consider the question of whether technology is neutral. At the level of an object where an object is as inert as a sculpture with no sense of what it was made for or how it is used technology might be seen as neutral. However, it would be hard to recognise such an inert and mysterious entity as a technology: technologies necessarily have a use. Once that use is known, neutrality becomes impossible as a result of the technology being associated with certain elites, users, outcomes and processes. Further, only certain people have the know-how to use a new technology. When consideration is given to the individuals or groups empowered to use a technology, in which circumstances, in regards to which groups of people, a technology becomes imbued with issues of power, privilege, gender, nation and education: entirely embedded in social and cultural processes. CASE STUDIES We now turn from the analytic frameworks used in this book to consider the role of the case studies that it draws upon. Tese examine many aspects of internet use as a way of addressing and illustrating the relevance of the internet and new media to everyday life. Tey allow us to explore both the breadth and the depth of current and classic research and this approach is one way to deal with the huge diversity of the global experience of new media. By using research-based case studies, peoples uses of the internet are thrown into focus. Readers can examine evidence from their own lives to gauge their experience of the internet compared with other people in terms of points of similarity and points of diference. As the book progresses, students i n t r o d u c t i o n 13 and other readers will learn from the examples given, and analysis ofered, how to construct their own case studies around uses of the internet. Yin identifes three kinds of case study: exploratory, explanatory and descriptive, commenting that the focus should be on a contemporary phenomenon with some real life context (Yin 2003: 1), and that case studies are particularly useful when the boundaries between phenomenon and context are not clearly evident (ibid.: 13). Tis method of presenting research draws upon a wide variety of materials and evidence: documentation, archival records, interviews, direct observation, participant-observation, and physical artifacts (ibid.: 83); and is particularly indicated when matters of how or why are being addressed (ibid.: 9). Te triangulation of research fndings is particularly relevant here (ibid.: 97 99), where two or more research methods are used to illuminate the same issue. Also important is the complementary use of qualitative and quantitative research. A quantitative study may follow on from a qualitative fnding in order to investigate how widespread a particular practice or belief may be in terms of a specifc population. Similarly, a qualitative investigation, answering how and why questions, is often used to investigate in depth a fnding that is uncovered through a quantitative study, which deals with how many and how often issues. For example, we might fnd via a quantitative survey that people over 75 with children are more likely to be internet users than people over 75 without children. Using in-depth interviews, which are a qualitative tool, we could then discover that a major motivator for over-75 internet use is the desire by seniors to keep in touch with adult children, and that these children are often mentors for their parents in terms of helping them develop internet skills. In a case study of over-75s internet use, these two data sources, surveys and interviews, would triangulate to support a fnding that family communication is an important promoter of internet use among older people. Among other benefts, triangulation comes into its own when data from a range of diferent sources or perspectives give similar or overlapping indications as to how or why. Indeed, many detailed case studies try to include a number of diferent sources to make triangulation possible. In terms of this book, a range of data will be addressed in the case studies, but the case studies themselves are also a research tool to consolidate and integrate available evidence in order to triangulate theories about the role and relevance of the internet across a variety of cultures and contexts. Yins view (2003: xiv) is that there are three steps in a case study: defning and designing the study; preparing, collecting and analysing the data for the case study; and drawing conclusions. In the case of this book, considering the internet as an introduction to new media, the case studies have been defned and designed to illustrate the multi-faceted nature of the internet, and give some indication of the range of ways in which organisations, cultures, consumers and prosumers 14 t h e i n t e r n e t THE STRUCTURE OF THIS BOOK Te books structure is pivoted around Chapter 4. Chapters 13 introduce the in- ternet by examining key concepts and theories, the history of the internet and the important policy dimensions that impact upon its use. Chapters 59 start wide and gradually become more specifc in focus, beginning with how the internet is cust- omised for specifc purposes (Chapter 5); attempts to regulate the internet (Chapter 6); the relevance of the internet to the public sphere (Chapter 7); com munities (Chapter 8) and the internet in family life (Chapter 9). Chapter 10, the books con clusion, ties the diferent strands together and also looks forward to the future. Within this structure, Chapter 4 uses one example of a policy issue, the digital divide, as a bridge to move from the policy focus to research upon how and why people do or do not access the internet. A slightly expanded account of the contents of each chapter follows. Refection: Yourself as a case study If you were writing a study of your own use of the internet, where would you start? What motivated you to learn how to use the internet? Who and what infuenced you as you developed your skills and knowledge? (producer-consumers, e.g. Hartley 2006) use it. A list of case studies is included in the contents section and each case study is also accessible via the index. A case study approach can be criticised since each study is necessarily short, and to some degree partial, since these abbreviated vignettes are part of a larger consideration of the internet itself (a cross-case analysis in Yins terms (2003: 148)). However, these studies also mark a starting point upon which further research can be based. All the case studies can be expanded by further research to build additional insights and knowledge. Such further research can be carried out as part of the engagement with the book and will add value to the case studies included here, especially if, paraphrasing Yin, all the evidence gleaned is attended to; alternative interpretations are adequately considered; the fnding(s) of greatest signifcance to the researcher are identifed and addressed; and if the elaborated case study builds upon your own area of interest and expertise (Yin 2003: 137). i n t r o d u c t i o n 15 Chapter 1 introduces this volume and explains some key terms which are constant throughout the book. Tese include the importance of a research-driven approach and the predominant use within the book of the theories of consumption, domestication and the social shaping of technology. Reference to new media implies that we are talking about digital media, and we have introduced some key characteristics of digital information that have helped to promote the dynamic momentum of convergence that underlies many current new media technologies. Chapter 2 is a gallop through the history of the internet in terms of people and places. It uses a vignette and snapshot approach to a story which could be told as a 35mm feature flm, so it is necessarily an overview, with pointers for further research. Te chapter outlines central moments and key people in the development of the internet as we know it today, and takes us to the late-2000s, with more recent material included in the case studies. Chapter 3 provides a technological and policy focus. It examines the policy debates around the internet and introduces and defnes major terms in those debates. It explores the implications of the outcomes of such debates through an examination of the policy environments of Australia and China. A glossary of abbreviated and technical terms is also included at the end of the book. Chapter 4, focusing on the digital divide, includes a consideration of tele- communications policy in the US and the UK. Its case studies examine a range of people who may be seen as falling on the wrong side of the digital divide. Tese include homeless people in Scotland, people in Britain who are the primary carers of (typically) a family member with a disability, and US residents who do not have an internet connection. Chapter 5 examines attempts to customise the internet and develop aspects of it to serve a specifc purpose. Tese processes are illustrated through considering the development of an Irish Gaelic web, the Francophone (French-speaking) resistance to the dominance of English in the western worlds use of the internet, and a vision for the future: Web 3.0 and movements towards the Semantic Web. Chapter 6 considers the challenges of regulating the internet and raises questions of legal jurisdiction over individuals behaviour online. It does this through two case studies. Te frst is a look at the pornography industry; the second is an example of cyber-stalking and online defamation. Chapter 7 looks at the contribution of the internet to the development of the public sphere in terms of free speech (as illus- trated by A declaration of the independence of cyberspace). It also includes case studies on Wikipedia and YouTube. Chapter 8 addresses the search for community both on- and of- line and points to the many cases in which online activity is a way of bonding more closely with existing friendship networks. It does this through three case studies, two of them 16 t h e i n t e r n e t gendered. Te frst concerns young males and online gaming culture; the second looks at young women and fan fction writing in the Harry Potter fandom. Te fnal case study focuses on ethical issues in researching online communities and centres upon the creation of a community to support recovering heart patients. Chapter 9 zeroes in on the family. It examines an attempt within a US family to regulate what they see as an internet addiction, and looks at families that commit to continuous upgrading of their internet experience. Finally, it considers the role of the internet for some of the poorest families in the world: those that depend upon remittances. Chapter 10 brings together the various threads running through the book. It examines what we have learned about the internet in terms of the individual, the household and the community; technology, policy, society and culture. Tis chap- ter forms the conclusion to the book whilst also acknowledging that the internet continues to develop and the readers of this book are well positioned to analyse how this is happening, and the implications of these changes for themselves and their communities. READING THIS BOOK Finally, we can draw attention to how the design of the book enables it to be read in a variety of ways. Te book has a semi-modular structure and a detailed index. Trough the use of the contents table and index, readers can pinpoint particular case studies and examples, reading the book actively to answer specifc questions. Topics and case studies can provide short-cuts to discovering more about aspects of the internet independently of what precedes and follows the section in question. Such an approach requires the reader to mine information by cross referencing the index with the contents, and with the case studies. Tis strategy requires a more active exploratory reading style than simply turning the pages, but a combination of this active searching and conventional reading practices delivers the most detailed and useful way of working with the book. Active reading systems vary (see, for example, Kump 1999) but, to summarise, they include suggestions that the reader can scan, survey, mine, check, recall and review the information required. Tis strategy presupposes that the reader is pur- posefully looking for something in particular out of their reading experience this makes it easier to note or dismiss the information presented. Te refection boxes and the questions and exercises for each chapter may provide useful prompts. 1. Scanning is a skim or fick through technique, to get a feel for a book. Does it have many diagrams, boxed sections, indented quotes, illustrations? Are i n t r o d u c t i o n 17 the chapters very diferent in length, and do they share the same kind of structure? Is there a contents section, an index, subheadings, summaries, references, exercises? You might scan a book in the library or bookshop before deciding whether or not to take it. 2. Surveying goes back over the material to mentally map out the terrain of the book. If the scan indicated that the information required was placed in one or more locations, these are found and noted. Tis is also a chance to look for other relevant areas. Te survey clarifes the features of the book and can include, for example, checking the index and browsing the introductions and summaries of chapters that may include the information required to locate the area(s) where it is dealt with. 3. Mining is the in-depth investigation of the required information, read carefully, and with links to other related topics followed through if useful to the matter at hand. 4. Checking is a quick examination of those areas of the book that were not mined, to make sure that no relevant, or contradicting, information has been missed. Tis deepens the understanding of the context ofered by the book for the core information required. 5. Recall includes writing down the information discovered. It occurs best and most efectively with the book shut. Here it is helpful to remember and link the information found with the reasons why it was sought; connecting these together with other relevant ideas and information. Mind maps (Buzan and Buzan 1996) can be a useful strategy for doing this. 6. Review is a fnal corrective where the reading has been done with a specifc output in mind (a research report, or an essay). Te book is opened again and the mind map checked. Tis step ensures that information has been cor rectly recalled and notes the location at which the information was found: page number, chapter, and details of the books title, author, pub- lisher and copyright date. Schema such as this one can help navigate the contents of a book more efectively than passively reading from the frst page to the last. Tese strategies also have useful parallels with the way we follow an information trail on the internet. Indeed, it was the idea of using a hypertext link to locate, access and open a document on another computer anywhere else on the network that led to Tim Berners-Lee creating the WWW (Chapter 2). In doing this, Berners-Lee not only responded to his way of searching for information, which has parallels with the conventional index, he also patterned some aspects of the internet in a manner that encouraged users to follow suit. 18 t h e i n t e r n e t Summary n This chapter places the internet in the context of other new media and reminds us that the experience of the internet will vary considerably depending upon where in the world you live, and upon your social, economic and educational circumstances. It introduces the concepts of digitisation and of convergence as these apply to the internet in particular and to new media more generally. n By explaining the importance of research for offering a detailed understanding about how we and other people use the internet, the chapter introduces a range of theoretical frameworks which are used in the case studies that follow. In this book these have been generally subsumed under the heading of a social shaping of technology approach. They are: the theory of consumption; the domestication of technology; the social construction of technology and actor-network theory. n Case studies are critical to the way in which this book examines the internet. The use of case studies allows a rich, deep investigation of specifc aspects of the internet. It also means that there are areas not investigated, and important aspects of global history (such as the Cold War) which are examined only in passing, or through the lens of one or more case studies. Any single volume that deals with the internet and its history struggles to reconcile breadth, depth and completeness. This book has chosen to value breadth and depth and indicate the gaps in completeness by drawing its case study examples from a wide variety of countries and contexts. An active reader will fnish this book with tools which they can use to develop their own case studies of aspects of the internet that they wish to probe further. n The chapter ends with an overview of the structure of the book and a suggestion as to an alternative, or supplementary, way in which to read it. In offering a thumbnail sketch of the chapters to follow, this introduction provides a survey of material in the book and an idea of the journey ahead. Chapter 2 offers a brief history of the internet and introduces some key moments, movements and technologies through which it was developed. 2 HISToRY INTRODUCTION New media studies is the exploration and investigation of digital culture. It is an evolving area since the feld is characterised by innovation and rapid change. Nowhere is this clearer than in the history of the internet. As one aspect of new media, the internet is important to all aspects of social, political and civic life; and behind every technological story lies a human story. As this book is written, Google remains in the ascendant and has been, for the best part of a decade. Vise recounts a rueful comment by Microsoft founder, Bill Gates: Google is still, you know, perfect . . ., Gates had sarcastically told the journalists and technology experts Te bubble is still foating. You should buy their stock at any price. We had a ten year period like that (Vise 2006: 252). And Gates is right. Both Microsoft and IBM were once where Google are now. Tree of the short stories in this chapter relate to companies which achieved overwhelming high technology market dominance: IBM with hardware, Microsoft with software and Google with search. Tese companies achieved virtual monopolies to the point where IBM and Microsoft were both prosecuted for using unfair business practices, such as providing services virtually for free that sent competitors broke. Google is next in line (Schonfeld 2009), and as future innovations emerge and dominate so Google will also be knocked of its perch. When we look to the future we need a sense of history to understand what is possible. Tat sense of history includes knowing about companies that dominated the market, but it also includes an appreciation of key points of transformation. Alongside these companies and the beginnings of the internet itself, this chapter covers the invention of the World Wide Web, the emergence of the open source movement, and considers the notion that technology is a masculine culture. Even so, the chapter provides a partial and incomplete picture of a complex history. Completeness is impossible, and this chapter is a starting point for further investigation and discussion. Te internet is pivotal to the way in which people living in the western (minority) world relate to one another. Government policy takes it seriously (see Chapter 3), 20 t h e i n t e r n e t as do stock markets; but it is also important to individuals and families. In domestic contexts we make decisions about whether to get a computer, desktop or laptop and which brand; whether to subscribe to dial-up or broadband; whether to have a wireless or cabled network or a single computer online; and how to decide who uses the computer, and when. Such discussions would have been unthinkable in the middle of the twentieth century, which is when people began to think of building the internet; and they remain equally unthinkable in the majority of the world today. Te history of the internet is generally told as a US-based story of individual heroes and heroic places: places where teams of people made things happen. As a tale, the history of the internet tends to start with a tiny group of (almost all) men who were fascinated by an incredibly expensive, rare, exotic technology: the computer. It was a time when hardware components still needed a soldering iron if functional changes were required; even changes which would later be achieved by soft ware. Te drama took place against the background of a life-and-death fear of nuclear war between the United States and the Union of Soviet Socialist Republics (USSR), and the birth of the internet was heralded by two critical international events: n Te launch by the USSR of Sputnik 1 on 4 October 1957. Tis proved the Soviet Union to be capable of making a satellite that could orbit the earth. Te R-7 rocket launched the Sputnik satellite and was a prototype intercontinental ballistic missile designed to be able to carry nuclear warheads. Te realisation that the USSR had beaten the US to this critical milestone made the political bureaucracy and the science community (especially specialists in physics and maths) fearful. Te Sputnik launch triggered a series of changes in nationally- funded projects and priorities. One of these responses was NASA (the National Aeronautics and Space Administration agency), while another was ARPA the Advanced Research Projects Agency. Both agencies were established in 1958. ARPA was eventually to project manage the formation of the internet. By the end of 1969 it had masterminded the building of a four-node proof-of-concept network known as ARPANET. n Te Cuban missile crisis between the US, USSR and Cuba. Tis started on 15 October 1962 and ended thirteen days later on 28 October 1962. Aerial photographs taken by US spy planes indicated that Soviet missile bases were being built in Cuba. Te revelations triggered a high-stakes stand-of between the US and the USSR, and President Kennedy reiterated the Mutually Assured Destruction (MAD) philosophy concerning nuclear weapons. Intensive diplo- macy involving the United Nations was brought to bear. Tis period has been described as the days the world held its breath. Te possibility of computers across the United States needing to retain control and command functions h i s t o r y 21 (discussed below) is one reason given for the development of the internet as a dis tributed network without a central command hub that could be obliterated in a nuclear attack. Te heroic tale of the internet is used here as a means of defning, describing and discussing various components of internet, its architecture and history. A BRIEF HISTORY OF THE INTERNET Te internets twenty-ffth anniversary was celebrated in 1994 at an event billed as the history of the future (Hafner and Lyon 2003: 260). Te celebrations were hosted by American consulting company BBN: Bolt Beranek and Newman Inc., which was keen to claim credit for itself as a cornerstone of the internet development project. Although ARPA, the Advanced Research Projects Agency at the US Department of Defense, is generally credited with founding the internet, BBN believe they also deserve to be recognised for their 29 October 1969 achievement in installing the frst ARPANET (Advanced Research Projects Agency Network) link between two computers; one at a University of California Los Angeles site (UCLA), and the other at Stanford Research Institute (SRI). Te frst 1969 ARPANET connection was not the frst time a link had been made between computers, but it was the frst time a link had been constructed in a proposed network. It was also the frst link to utilise a switched-packet system which allocated bandwidth on the connecting communication cables in response to the requirements of the message to be sent (dynamic allocation techniques). Prior to switched-packet systems, the usual way to link computers was through pre- allocating a dedicated channel to the connection. Not only were the links fxed, they were not interconnecting. Tey could not talk to each other and this made building a network extremely complicated. To become efcient and efective, the network commissioned by ARPA had to solve issues of interconnectivity by connecting each computer to many others, and fnd a way in which those connections could be simultaneously shared by multiple users. Computers in those early decades were almost custom-made machines. Te way in which an operator programmed a computer, or accessed the information held on it, depended upon the manufacturer and varied with each maker and each model. Indeed, sometimes a computer had to be physically rebuilt to modify its function. Computers were also very expensive. Tey were a rare commodity, and it was a highly specialised skill to use them. Although computers had entered popular culture on television with the UNIVAC prediction of the 1952 US Presidential Election results, and through the publicly viewable working computers in the ground-foor display of IBMs Madison Avenue 22 t h e i n t e r n e t ofces, the number of engineers, physicists and mathematicians keen to use them outstripped the supply of available machines. One of the major computing advances pioneered by BBN and MIT prior to the ARPANET link had been the frst public demonstration of computer time-sharing in 1962, using a DEC (Digital Equipment Corporation) computer: the PDP-1 (BBN 2008). In those days, people wanting to use a computer had to guess the amount of time that was required and book access in advance. Time-sharing meant that a number of diferent computer users, working at separate workstations linked to the same magnetic drum memory, were able to access the computer as if they had the machine to themselves. Partly because of time-sharing, computer scientists were often interested in queuing theory and how queues could be made less likely to block efciency in processing. Tese studies led to the idea of creating packets of information of a fxed size which could be handled routinely and very quickly by the message processors. Another problem with the incompatible range of computers in the early 1960s was that every time there was an advance made by one computer, additional work had to be done to duplicate that advance elsewhere, or harness it to the beneft of users of other computers. Hafner and Lyon (2003: 44) comment that software programs were one-of-a-kind, like original works of art. Tey explain the implication of this as being: If the scientists doing graphics at Salt Lake City wanted to use the programs developed by the people at Lincoln Lab, they had to fy to Boston [where Lincoln Lab was based, at MIT]. Tere was no easy way to send programs backwards and forwards. Hafner and Lyon comment that if the visiting scientists wanted to start a similar project on their own machine, they would need to spend considerable time and money duplicating what they had just seen (2003: 44). ARPANET was designed to overcome the lack of interconnectivity between diferent kinds and models of computers, and allow computer users to share resources, software and ideas. IBM The technological system underpinning the internet starts with hardware, the actual machinery involved. Historically, the abiding brand in computers has been IBM, also known as Big Blue and the PC, the personal computer. IBM was founded in 1924 by Thomas J. Watson (Snr) as the latest incarnation of a company that had started in 1896 as the Tabulating Machine Company. IBM machines in the 1920s were not electronic computers, they were punch card processors: elecromechanical contraptions that sorted, counted, and manipulated data stored on rectangular cards punched with holes (Maney 2003: xxiii). Even so, the processors could handle so much data, so quickly, that the press referred to them as thinking machines and electric brains. They made information processing far more effcient than was possible by clerical work unaided. h i s t o r y 23 The frst modern computer to use binary, on-and-off switches to make calculations (Maney 2003: 332) was invented in 1939 by John Atanasoff, an academic at Iowa State University, together with graduate student Clifford Berry. Initially their machine used physical switches to make the changes between onoff, which was much slower than when vacuum tubes were used to perform the same binary functions in an electronic-digital mode. The vacuum system was used by the pioneer machine ENIAC, the Electrical Numerical Integrator and Calculator, but the ENIAC patent of 1947 was eventually overturned in the 1970s as being too much based on Atanasoff and Berrys work. In 1939, as Atanasoff was developing his machine, Watson was being briefed on how vacuum tubes might be applied to IBMs business. Watson was not a technological visionary. He moved slowly, seeing threats as well as value in much speedier calculations. Even so, Watson decided to invest in electronics. IBMs frst electronic calculator was the 603, launched in 1946 at the New York National Business Show. Its successor, the IBM 701, was developed to compete with Remington Rands UNIVAC. Instead of being a room-sized computer, like UNIVAC, the 701 was a collection of modularised fridge-sized components that could be plugged together into a working assembly. By 1955, IBM had established a lead over Remington Rand in the emerging computer market. At the same time, IBMs near-monopoly in business calculating equipment had become untenable. In January 1956 Watsons son Tom Watson (Jnr) settled a four-year federal antitrust case alleging anti-competitive practices. Following settlement, IBM sold their machines as well as leased them, licensed patents, and allowed competitors to make compatible punch cards. The focus of IBM on the business market meant that a raft of computers targeted at domestic users could be introduced by other companies, almost into a product vacuum, and this happened increasingly from the 1970s onwards (Haddon 1988). New brands included the 1977 Trinity, Tandy Radio Shacks TRS-80, Apple II and Commodore PET, all of which were ready-to-run, a step beyond the self-assembly soldered models aimed at electronics hobbyists. Domestic computers often relied upon the home television set as a monitor, but were more versatile than the popular games consoles which were marketed in parallel with computers. Models powering the take-up of domestic computing in the UK as well as the US included the Sinclair ZX80 (1980, the frst UK computer priced at under 100) and its successors, the ZX81 and the Spectrum; the BBC Acorn; the Atari; the Commodore 64 and the Amstrad. Some of these, the Commodore in particular, were marketed directly to domestic customers in consumer stores, not purely in electronics outlets (Haddon 1988). operating these computers could be a challenge, however. Murdock, Hartmann and Gray (1992: 149) cite the experience of one woman who had seen her husband and son lose interest: they were going to do great things with it [the computer], and make programmes and use it in all sorts of ways. But then they realised what a long time it was going to be to learn to do this, and a long time putting the programme in. They havent had the time. Leaving aside business machines, which had been IBMs special focus, the burgeoning development in computers for domestic applications fragmented the market, allowing many other brands to gain critical mass. From a high of $68.9 billion in revenue in 1990, [IBM] sales fgures began to slip and profts crumpled. IBM lost $2.8 billion in 1991; $5 billion in 1992, and $8.1 billion in 1993 (Maney 2003: 444). CEo Lou Gerstner was able to turn the company around after taking it over in 1993 (Gerstner 2002), but the move to personal computing for a range of non-business applications had already changed the landscape. New media had become domesticated, Tim Berners-Lee had woven the WWW, and the global internet revolution was just beginning. 24 t h e i n t e r n e t Larry Roberts, an MIT-trained electrical engineer, was hired by Bob Taylor of ARPA to prove that the concept of an interconnected multi-computer network could work. Roberts was helped by Paul Barans work at RAND Corporation (Research ANd Development) in Santa Monica, California, which had carried out substantial research for the US Air Force. Baran had been born in Poland in 1928, and his birthplace was under Soviet occupation. He was particularly concerned about security risks to the Command and Control functions of US strategic weapons; indeed, he was concerned about the risks of a few strategic strikes upon any centrally organised communications system. Te vulnerability here was that a Soviet missile attack, such as that feared in 1963 during the Cuban missile crisis, could break down the US communications system underpinning strategic weapons deployment. Such a collapse would compromise the US Presidents capacity to Command a retaliatory attack, or Control (call of) illegitimate and piecemeal responses. RAND had already decided that US long-distance telecommunications systems were vulnerable to a missile strike: Barans vision was to create a robust computer network that could survive one. Te traditional response to the vulnerabilities of a centralised hub-and-spoke system was to construct a range of sub-hubs, each supporting a number of connec- tions (see Diagram 2.1). Tis conferred some protection but meant that each sub- hub was vulner able and a target, while the viability of communication with each spoke entirely depended upon the safety of the hub to which they were connected. Barans idea was to link all the computers in the system via a distributed network, with each computer operating as a node and having several connections into the network (see Diagram 2.2). In efect, every computer would be linked to three or four other computers. Tis meant that if one link were broken, there would still be a range of ways to move a communication forward since every computer would be networked to a number of others. Even low-cost, unreliable links would sufce as long as there were at least three times the minimum number of them (Hafner and Lyon 2003: 59). Tis idea builds redundancy into the network, since there are several times the connections required. It is a very safe approach, but it took several years for Baran to persuade RAND to adopt his vision. Barans other idea was that each message should also be fragmented into packets. Tis idea built on advances in queuing theory developed by Leonard Kleinrock at UCLA. Barans research was carried out independently of, but parallel to, similar work in the UK by Donald Davies, who coined the term switched-packet network. Te idea of a distributed switched-packet network was that each message would be broken up into small packets of information with a standardised header contain- ing information about destination and the sequence for reassembling the whole massage. Te header was communicated along with the data segment transferred in h i s t o r y 25 Diagram 2.1: A hub and spoke system with sub-hubs Diagram 2.2: A distributed network 26 t h e i n t e r n e t the packet. It was the header which switched the packet along diferent links in the network to maximise the efciency of the transit, and each processor in the network would handle this small packet of information very quickly. Each packet would fnd its own way through the distributed network to the fnal destination, and would be reassembled there by the receiving message processor. Te transfer of information across the network would be a little like sending a largish library of books from the Pentagon in Washington DC to Los Angeles in California. Te library would not travel as an entity: it would be divided into truck- loads, and the number of trucks would be noted. Each truck would be given the destination address and would travel a diferent route to arrive there, in accordance with the drivers preferences, weather and road congestion, the towns to be passed through, and so forth. Once safely at the new location it would be easy to check that the right number of trucks had arrived. Finally, the cataloguing system applied by the sender library (for example, the Dewey decimal classifcation system) would mean that all the books could be efciently reassembled into a functional collection in their new location. Te value of packet switching across a distributed network had several elements. It was more secure, since the message was difused; and it was also more efcient, since many messages could share the same network at the same time, with each message broken into properly labelled information packets. Further, in the digital domain, unlike the Pentagon library, the sending computer retains the information forwarded (see Chapter 1 for how the properties of information difer from physical goods). After checking all the received information, the receiving message processor would contact the sender machine to confrm all the elements had been received. Without a confrmation, the sending computer keeps re-sending the message until it gets through. Microsoft Microsoft, from Micro computer Software, is the creation of Bill Gates and Paul Allen, who formed Traf-Data while they were still at school. The program helped to control traffc fows in their native Seattle. When Gates was 15, he and Allen sold the company to city administrators for $20,000. The two entrepreneurs formed Microsoft in 1975 to market a simplifed version of the BASIC programming language for the Altair 8800, an early self-assembly microcomputer. If hardware is a vital part of the internet technological system, software is the element which affects most users relationship with their computer. Microsoft changed the business model by establishing that, for most users, usability was more critical than hardware specifcations. Wohl, referring to the early days of the PC comments: h i s t o r y 27 [W]e were asked to design classes for senior executiveseach to spend three days learning about the PC and then to take one home. The client . . . wanted the executives to learn how to program their PCs. Later we learned that of the several hundred executives who took the course, fewer than 10 ever used their PCs. Programming is not intended to be part of the business users PC experience. (Wohl 2006: 89) Microsoft became one of the most valuable companies in the world by relentlessly focusing on its core mission of a computer on every desk, and Microsoft products running on every computer, says Battelle (2006: 248). In 1981, IBM contracted the recently-incorporated Microsoft to develop an operating system. That IBM application became MS-DoS, the Microsoft Disk operating System. By 1983 the IBM PC, operating MS-DoS, had become the industry standard and Microsoft persuaded IBM that it should be permitted to licence its MS-DoS operating system to manufacturers of PC clones. Microsoft then went on to supply the operating system at a very low unit cost, allowing it to be bundled with virtually all PC-compatible machines sold. Partly because of the interaction of the PC platform and the MS-DoS operating system, PCs held the majority market share in the personal computer market from 1986 onwards (Reimer 2005). Microsofts frst word processor, Multi-Tool Word, was launched in 1983. This software developed into Microsoft Word, the core of an integrated suite of offce applications, noted for its commitment to what you see is what you get (WYSIWYG). This meant that the printed document strongly resembled the document as it appeared on the screen: a bonus since the program was the frst PC-based application to offer easy changes in font and typeface. Additionally, Word made use of a wheel-mouse, a Microsoft innovation, and customers could purchase a mouse-plus-Word package. Initially, these products were not directly marketed to consumers, but were licensed to other parties for sale under their own brands for a range of machines and platforms. When Microsoft developed the Windows 3.0 operating system for its 1990 introduction, it did so partly as a way of distancing itself from the IBM alliance. Windows 3.0 was to become the default operating system of the early 1990s, bundled with almost all non-IBM PC clones, much cheaper and more versatile than the IBM products, and it also supported a large range of hardware which made it more attractive to domestic users. By the time Windows 95 was launched, the WWW had captured popular attention and the launch was also used to promote MSN, the Microsoft Network, which by 1997 included MSN Hotmail and, from 1999, MSN Messenger. Microsofts Internet Explorer 1.0 was initially available as add-on software for Windows 95 and both the Windows and Explorer applications were typically bundled with new PC clones. Early browsers, such as Netscape Navigator (see the World Wide Web, below), had been used prior to Internet Explorer and the aggressive marketing of Internet Explorer, especially when bundled with Windows which supplied no uninstaller, led to what have been called the browser wars (Wang, Wu and Lin 2005). The US Justice Department fled an antitrust suit against Microsoft in 1998, the year Netscape offcially closed doors and was bought by AoL (America online), and the year Google was incorporated. In June 2000, a federal court judge found that the bundling of the Internet Explorer browser within the Windows operating system violated antitrust laws. During the trial, Microsoft founder Bill Gates was depicted by prosecutors as a bully and a monopolist (Vise, 2006: 96). The European Commission, starting with a 1993 complaint from Novell, also sought to make Microsoft build their products to allow compatibility with other companies software. In 2003 they found Gates guilty of anti-competitive practices. 28 t h e i n t e r n e t To get over the problem that diferent computers could not communicate with each other, the scientists building the internet decided that the network would operate with a sub-network. According to a scheme proposed by Wes Clark, who had built the TX-2 at MITs Lincoln Lab, each computer would have its own IMP (Interface Message Processor). IMPs were initially based on the early Honeywell 516 computer. Efectively, the host computer only had to communicate with its own IMP; not the other computers. Te IMPs formed a sub-network which was inter- connected but autonomous, with each IMP separate from (but linked to) its host computer(s), and with the network under the control of ARPA. IMPs operated like modern day routers. Tey didnt read the message itself: only the header concerning sender, receiver, packet order and data integrity. Tis made it simpler for each packet to be pulled into the IMP, processed quickly and sent on its way. Sub-network elements were invisible. Tis design made the network fast, free of congestion and extremely reliable (Hafner and Lyon 2003: 99). Roberts published a groundbreaking position paper on ARPANET in 1967. Te fact that this project was open for discussion, rather than top secret, meant it could inspire excitement throughout the computer science community. His paper (Roberts 1967) explained that as each packet arrived at the IMP, it would instantly send a copy forward to the next IMP on its way to the destination computer. Te forward node switched to by the sending node was eventually based on a continuous evaluation within the network of the least-delay paths, considering both line availability and queue lengths (Roberts 1978). Tis process was called hot potato routing because no machine held the information for very long. Te efect was near-instantaneous. Data would zip in and out of the nodes so quickly, and the response time from a human perspective would be so rapid, that it qualifed as a real-time [system] (Hafner and Lyon 2003: 75). Te receiving machine would check that no errors had crept into the data and confrm safe receipt, stopping the node from re-sending the data. Tis error-checking process employed a technique called checksum, in which the received data is checked to ensure that it sums to a given amount. Te same system is often used with bar codes to confrm accurate scanning. Refection: Is market dominance inherently unfair? Why do you think that regulators in the US and EU thought that Microsofts near-monopoly was a problem? Do you think that the bundling of software gives them an unfair advantage? What are the implications of your views? h i s t o r y 29 In 1968 BBN won the contract to build the IMP network from existing doc- uments and ideas, and began publicising the initiative among graduate students around the US. Young computer scientists at the frst node, UCLA, were particularly excited. Starting a collaborative consultation process that still thrives in computing circles, Steve Crocker, a UCLA graduate student, initiated the frst ever Request for Comments: RFC1. Crockers RFC concerned the host-to-host protocols to get host computers talking to their IMPs, and thus to each other. Te frst applications written were for login and fle transfer, and the full host-to-host protocol was named the Network Control Protocol (NCP). Te studentfacultybusiness military collaboration worked well. By the end of 1969, BBN had added UC Santa Barbara and the University of Utah to the frst link between the Sigma-7 host (at UCLA) and a SDS 940 at SRI. BBN itself was the ffth ARPANET site, connected into the network early 1970, and the frst on the East Coast. As well as featuring a robust matrix of inter- connections with the redundancy provisions originally envisaged, BBNs design also featured diagnostic elements and allowed for some remote maintenance (Hafner and Lyon 2003: 162). Tis speeded up further development and improved reliability, also enabling the network engineers to spot when the problem lay with the telecoms connections or signal quality, rather than with the IMPs themselves. Te network was adding about one node a month and by the end of 1970 the BBN contract with ARPA had been extended, and the network had moved from an experimental to an operational system. Meanwhile demand for greater access per IMP led to the development of Terminal IMPs (or TIPs) enabling the network to be accessed from terminals, rather than solely via mainframes. Tis meant that a number of terminals could connect to an individual TIP. It was decided that the frst International Conference on Computer Com- munication [would] be held in Washington in October 1972 (Hafner and Lyon 2003: 176). Tis was the ideal opportunity for a public demonstration. At that point there were 29 nodes to the network with multiple terminal connections per node and people had begun to refer to the system as the Net, rather than ARPANET. Te demonstration was a huge success; for hundreds of participants it brought to life the potential ofered by computer networks. It was almost like the rail industry disbelieving that airplanes could really fy until they actually saw one in fight, said Kahn (Hafner and Lyon 2003: 185). Te same could be said about electronic mail. Although the network had not originally been designed with email in mind, this application was soon generating huge quantities of trafc and made the internet a sociable and lively place to be. 30 t h e i n t e r n e t Refection: The genesis of the internet The internet started life as a military project. Have the millions of different uses and users changed its character? Diagram 2.3: How IMPs and TIPs link to each other, and to hosts Te ARPANET was not the only developing computer network. In particular, Daviess UK network had started at NPL, the National Physical Laboratory, and was growing strongly, as was the French equivalent, Cyclades. Named after the group of 220 Greek islands which interconnect as a functioning whole, Cyclades was the brainchild of French computer scientist Louis Pouzin (1973). It had grown out of Pouzins early association with MITs work on CTSS, a Compatible Time-Sharing System, and Pouzin had a strong positive relationship both with European re searchers and with his counterparts in the US. Cycladess operating principle was opposite to h i s t o r y 31 ARPANETs, however, in that host computers were responsible for check ing the data transmitted had been safely received. Te host computer would keep sending out full copies of the data, broken into packets, until it received information from the destination computer that the message had been safely received and reassembled, with all elements checked and found present. Te original ARPANET design had made data integrity a part of the IMPs store-and-forward role, but Cycladess end- to-end protocol greatly simplifed the packet switching operations of the network. Te UK and the French systems were interoperable, and by 1976 Cyclades had 20 nodes plus connections to the British and Italian networks. Meanwhile, work in the Hawaii archipelago had made it clear that networks could operate using a range of communication platforms. Across the US island state, it didnt matter whether nodes were connected by cable, microwave radio, satellite or (later) by fbre optics, digital information could pass between connection points and then use a diferent platform for the next leg of the journey. Te Hawaiian experiments also had implications for connecting the US armed services during manoeuvres: an important priority for ARPA in the Vietnam era. Te desire to see all available networks capable of talking to each other prompted the creation in 1972 of the International Network Working Group. BBNs mathematician Bob Kahn had moved to ARPA, (now DARPA, Defense Advanced Research Projects Agency) in early 1972. Kahn and Vint Cerf, one of the original UCLA grad students who had worked on the protocols for the frst ARPANET link, collaborated on the challenge of integrating the diverse international networks. Links between networks had to be transparent to users re- gardless of the communication platform they used, the equipment they ran and the speed at which they operated. ARPANET, Cyclades and NPL had to be able to interconnect. Kahn and Cerf came up with the idea of a gateway which would look like a straightforward host computer to each of the diferent networks, but which would allow messages to pass between networks. Te problem was the diferent organising principles of the separate networks. Intrigued by Pouzins success with Cyclades they looked carefully at the French system. By May 1974, having discussed their ideas with British and French collaborators, their paper was ready. Tey called it A protocol for packet network intercommunication (Cerf and Kahn 1974). Te idea was to adopt several principles from Cyclades and invert the ARPANET model to minimise international diferences. Te host computer was to keep a copy of the entire message while the packets traversed the system, and would re-send it as necessary. All computers on the internet would wrap their messages inside a protocol which would be recognised at gateways and handled efciently. Tis meant that it did not matter if the ways in which messages were communicated difered, providing they were contained in the standard envelope. 32 t h e i n t e r n e t Kahns new system was called the Transmission Control Protocol (TCP), but slowed down message transmission at the point where a message moved from one network to another, because it involved the gateways performing more tasks than solely routing the message. Having moved to DARPA in 1976 to work with Kahn, Cerf continued to work on the problem and it was eventually decided to split the part of the protocol dealing solely with the movement of the packet through the gateway into a smaller program to be called the Internet Protocol (IP). Tis meant that gateways between the networks were cheaper and easier to build since all that was required of them was to receive a packet from one network and pass it into the next one. All other issues to do with standardising packet sizing, sequencing and confrmation, so that each packet could travel any network, were to be handled by the host using TCP. By 1978 TCP/IP Transmission Control Protocol/Internet Protocol had been proposed as the universal standard. It was the internet in Internet Protocol that was to give the internet its name (Hafner and Lyon 2003: 244). In 1983 every ARPANET computer switched from using the initial Network Control Protocol to the new TCP/IP. Even though some governments and European users favoured a rival protocol (OSI: Open Systems Interconnection), TCP/IP was tried and tested, bundled with a number of popular computers and was eventually adopted universally. By the time that TCP/IP had been totally accepted, ARPANET had been closed down: it was no longer needed as a research project. In 1989, around the twentieth anniversary of the beginnings of ARPANET, all the IMPs and TIPs were decommissioned from the network and the computers were migrated across to bigger, faster networks like NSFNET (the National Science Foundation Network). At this point Tim Berners-Lee was pondering the possible implications of integrating HTML and computer networks and was on the verge of creating the WWW. Te internet as we know it today was about to take shape. The World Wide Web Tim Berners-Lee, the inventor of the WWW, believed it should be available to everyone. Berners-Lee was British, a physicist by training, and the key elements of his 1990 invention were put in place while he was working at CERN, a European particle physics research centre based near Geneva on the FrenchSwiss border. Michael Dertouzos (1999: x), director of the MIT Laboratory for Computer Science where Berners-Lee now works comments: Thousands of computer scientists had been staring for two decades at the same two things hypertext and computer networks. But only Tim conceived of how to put those two elements together. The h i s t o r y 33 difference between the pre-1990s version of the internet and one with the web lies in Berners-Lees realisation of the internets potential for providing an accessible, connected web of information with pieces scattered on many different computers. This vision depended upon the standardisation of relevant protocols so that travel between networks, servers and documents could be seamless. All networked computers should be able to contribute to the web; and all information should be accessible to any user. People were interested but apart from Robert Cailliau, a colleague at CERN, generally unconvinced. There had been previous unsuccessful attempts to achieve this kind of idea, and Berners-Lee had yet to prove that it could work. In 1990 Berners-Lee used a NeXT computer, an innovative machine from a new company set up by Steve Jobs co-founder of Apple Computer Inc, to start mapping out the programs and protocols needed to link information held on different machines. The functionality he wanted to achieve was a point-and-click browser/editor (Berners-Lee 1999: 29), so that a user would be able to click on a hypertext link within a web page to move through to a different page with more detailed information. The person creating the hypertext link did not need to have created the page that it clicked through to, nor would it matter where in the world that page was held, so long as it was accessible. Berners-Lee started by building the client, the software shell into which he would ft the other elements of his system. The client program would establish that his computer was requesting information from another machine. The next element on Berners-Lees to do list was the writing of HTTP: Hypertext Transfer Protocol. HTTP allows the client machine to use Transmission Control Protocol (TCP) to request access to a hypertext document held on a website located on a remote server. Its through HTTP that one machine accesses the material held on another. The server machine then communicates back to the user-client, ideally providing access to the web site or the document requested. (There are a number of HTTP error codes for when things go wrong, including the frustrating 404 Not Found response.) Berners-Lees point-and-click browser/editor, running HTTP, would only work if it was possible to identify the location where the information wanted was held. A destination had to be given when requesting access to material, so Berners-Lee developed the URL, or Uniform Resource Locator, in order to identify each destination uniquely. Every site to be included on the web would require its own URL, so that the client machine could use the HTTP language to access information held Diagram 2.4: A schematic representation of TCP/IP 34 t h e i n t e r n e t there. Each URL provides details of exactly where the desired information is stored and typically starts with http://. Next, Berners-Lee wrote the HyperText Markup Language (HTML) program to make the web pages containing hypertext links. HTML allows a person reading a web page to click through to another document or website. Following the HTML protocols, Berners-Lee wrote the software for the web server, defning which part holds the materials to be accessed by other people using the web. Finally, he set up the frst website: http://info. cern.ch. (It still exists.) At this point, Berners-Lees NeXT machine held the only web browser, and was both the frst client and the frst server on the web. It was time for the next step. Robert Cailliau bought his own NeXT machine and we revelled in being able to put our ideas into practice: communication through shared hypertext (Berners-Lee 1999: 29). The program-writing period had taken three months, october through to December 1990. It had been a busy time! There was another problem. Berners-Lee wanted people accessing the web to fnd something worth reading. He reprogrammed his web browser, which had been designed to work with Macs, PCs, mainframes and all other computers, to access FTP (fle transfer protocol) materials as hypertext. FTP resources included many public posts and discussion forums occurring within established networks, often using the decade-old Usenet system. This step meant that people who were accustomed to the complexities of accessing Usenet materials were able to experience the functionality of the web, as well as discovering that much more information was accessible. Within the frst months several servers were set up across Europe by CERN collaborators. A year later, December 1991, the frst US server was established at the Stanford Linear Accelerator Center. In November 1992 the worldwide number of servers had risen to 26; by the start of 1993 there were approximately 50 web servers in the world (Berners-Lee 1999: 67), and by late 1993 there were over 500 known web servers, and the WWW accounted for 1% of internet traffc, which seemed a lot in those days! (The rest was remote access, e-mail and fle transfer.) (CERN 2008). Between 199193 the hits on Berners-Lees CERN server increased exponentially: 100 hits per day in Summer 1991 1,000 hits per day in Summer 1992 10,000 hits per day in Summer 1993 (Berners-Lee 1999: 75) In 1993, Marc Andreessen, a student at the National Center for Supercomputing Applications (NCSA, University of Illinois at Urbana-Champaign) and Eric Bina, a faculty member, created the web-browser Mosaic. Andreessen went on to develop Netscape which was publicly launched in 1995, with its share price more than doubling on the frst day of trading from US$28 to $71 (Berners-Lee 1999: 106). The browser was much more developed than Berners-Lees had been. It made the web much more accessible. By the end of 1994, according to Burman, there were about 10,000 servers connected to the Web, and as many as 10 million users worldwide (2003: 25). Battelle comments that: from 1993 to 1996, the web grew from 130 sites to more than 600,000 (2006: 40). The introduction of the web marked the transition from an internet designed predominantly for universities, researchers and larger organisations (Berners-Lee 1999: 80) to one which could be used at home by individuals. The WWW reached across the globe and into peoples homes and everyday lives. h i s t o r y 35 As the European Union makes clear in its rulings against Microsoft, it is ex- tremely important that there is enough information about the internets software and hardware components for entrepreneurs to create compatible new products. No company will purchase a new media player, for example, if that means that all their existing computers need to be changed. Te barriers to entry become too great to allow new manufacturers to produce products, and this breaks some of the rules regulating markets since it prevents the development of a vibrant and competitive industry. Both IBM and Microsoft became big by guarding access to, and secrets about, their products. While this is usual business practice, once a company becomes so big that it almost has an monopoly of an important industry, the regulators become involved. We look at government policy and regulation of access to the internet in Chapter 3, and at attempts to regulate the content of the internet in Chapter 6. Tere are also mechanisms for the international regulation of the internet. Even though the internet evolves in unpredictable ways, some critics complain that there are continuing reminders of its US beginnings, and too much opportunity for US control of future development. One recent example is the controversy surrounding the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN was created in 1998 as a way of part-democratising decisions that had previously been the direct responsibility of US government authorities, but the organisation is accused of failing to give sufcient weight to non-US perspectives. One example is given by Coopersmith (2006: 13): In 2005 the George W. Bush administration upset [ICANN] by refusing, at the last stage of the process, to allow ICANN to issue an .xxx domain, rising anew concerns about American dominance. Te Bush administration intervened because the proposal for an Adults only .xxx generic top-level domain (gTLD) was a highly controversial one for some US citizens and lobby groups. Te news that ICANN had approved it triggered an unprecedented level of protest within the USA (Wired 2005). Tis protest was strengthened because people believed that the US administration had the power to stop the .xxx plan. Wired comments that the US Department of Commerce has veto power over ICANN decisions given the US governments role in funding early Refection: The implications of a non-commercial WWW What might have been different if Berners-Lee had patented his idea of the WWW? How might development of the internet been affected? 36 t h e i n t e r n e t development of the internet (Wired 2005). Critics of the .xxx proposal argued that, since the Bush administration could stop the creation of an adults only domain, it would show US government support if it went ahead. Tere were some other international concerns as well as the US domestic protests, but when ICANN efectively reversed its earlier position and did not create the .xxx gTLD this was seen as a sign of US control. Following the .xxx debates and other controversies around ICANNs cost struc- ture and the pricing of services, there was speculation that the UN might try to take over ICANN. Given US opposition to such a UN takeover, this proposal triggered fears of splitting the internet. Instead, the 2005 World Summit on the Information Society called for an international Internet Governance Forum, IGF, which frst met in 2006. Te IGF has an advisory mandate, rather than a decision-making one, but is structured to be a strong infuence on ICANNs activities. Te IGF is further evidence of the importance placed by global users of the internet upon having a voice as part of policy-formation and decision-making processes. Google As the internet grew to include unimaginable amounts of information, it needed a way for people to fnd what they were looking for, even if they did not know where to look. This is the role of the search engine. Early search engines included Alta Vista, Lycos, Yahoo and Excite. Like Google, Yahoo and Excite were started by entrepreneurs linked to Stanford University, in the heart of Silicon Valley. Battelle (2006: 45) comments that there are three elements to the traditional search engine: the spider (or crawl), the index, and the search software and user interface. The spider is a computer program that hunts in a methodical and deliberate way for specifc pieces of information, gathering these together for later use. Any terms and all strings of words noted during the spiders crawl across the web can become a point of linkage to a whole document. These items are indexed for subsequent use. Powerful search engines scour their indexes of all words in sequence on all pages of the web. There may be thousands of documents found, however, so a search engine also needs to rank results according to importance. If I put we want our notion of relevant to only include the very best documents into Googles Advanced Search using the this exact wording or phrase option, for example, I discover the words are from The Anatomy of a Large-scale Hypertextual Web Search Engine (Brin and Page, n.d.). Larry Page and Sergey Brin invented Google, and their paper relates to the theory behind the way it works. Todays search engines link web users with the words of all accessible pages. Apart from password protected and secure content, search engine indexes provide links to the words, phrases and complete contents of all websites. Critical alongside the frequency and accuracy of the spiders crawl, and the power of the engines index, h i s t o r y 37 is the speed of response. Users dont want to wait for long. They also want the best sites for their purposes to come up frst. For example, searchers will almost always want to access the original Brin and Page paper, rather than documents that refer to it, like this one. Googles frst impact was the way it ranks sites in its search results. It ranks each site according to the number of other sites which are linked through to it. The number of sites linking to a site or document was taken to indicate its relative importance. Larry Page and Sergey Brin launched their prototype search engine via their uni website in 1996. Both were graduate students in the Computer Science Department at Stanford University. Their fascination for mathematics was clear from the start, and Google is a play on Googol, the mathematical term for 1 followed by 100 zeros, which is a Very Large Number. Pages PhD research was into web page linkages. When someone surfs the web they follow the links forward, but Page was intrigued by the fact that there was no way to search backwards. For any specifc web page it was impossible to tell how many other pages linked through to it, or which pages these were. In 1995 Page addressed this problem by developing a crawler to fnd the links to each page. The crawler was called BackRub and its role was to identify every link in the entire web. At one point the BackRub crawler consumed nearly half of Stanfords entire network bandwidth . . . . And on at least one occasion, the project brought down Stanfords internet connection altogether (Battelle 2006: 78). Brin, intrigued by the scale and ambition of the project, got involved. Both inventors soon decided they needed to value links differently. one link might be from a school kid, another from a University and it was important to differentiate between the two. Page and Brins breakthrough was to create an algorithm dubbed PageRank after Page that manages to take into account both the number of links into a particular site, and the number of links into each of the linking sites. The effect of this was that more popular sites rose to the top of their annotation list, and less popular sites fell toward the bottom (Battelle 2006: 75, 76). The measure of a sites relative importance, alongside its search engine function, became Googles unique selling point. In 1998 Page and Brin incorporated their company as Google Inc and concentrated on their business venture rather than their PhDs. Vise (2006: 214) suggests this date of incorporation was the reason why Microsoft didnt target Google early on. He comments that Microsofts 1998 antitrust lawsuit, resulting from the bundling of the Internet Explorer browser with Windows 95, hung over the company and distracted senior Microsoft management as Google seized the Internet. Googles growth has continued ever since, and has the dual strategy of fostering new products inside the company while also buying successful start-ups. For example, Google purchased YouTube in 2006. The launch of the G1 Google phone in 2008, with accessible software to allow user-innovation, is a direct response to Apples iPhone; while Google Desktop Search challenges Microsofts dominance over the internal operations of individual computers. In 2004 Google went from being a company owned by Page and Brin and their venture capitalists (angel investors) into one in which people and companies can hold shares. This was done by an IPo (Initial Public offering) which took the form of a geek in-joke when the company announced it had $2,718,281,828 worth of shares to sell. It was a seemingly meaningless sum which was instantly recognisable to serious math enthusiasts as the frst ten digits of the mathematical number for e, an irrational constant and the base of the natural logarithm. Within a year the company was worth over $70 billion; about a quarter of the market capitalisation of Microsoft (Vise 2006: 251). 38 t h e i n t e r n e t Such success comes at a price, however. Googles workplace motto Dont be evil was adopted back in 2001, before it was a listed company, before it grew tenfold, and before it had acquired many of its current business initiatives and international links. The slogan became far more controversial following Googles move into China (see Chapter 3), with organisations such as Amnesty International using it to challenge Google and try to call it to account. There are also concerns over products such as Google Maps Street View: Privacy groups are up in arms because Google has not made a frm commitment to obscure faces and number plates, says Moses (2008), referring to the highly detailed, panoramic photos which provide a street-level view of cities the world over, and which have led to a number of people being unwittingly snapped in embarrassing or compromising positions. Google, listing after the dot.com crash in 2000, is the newest mega-player in internet start-ups. Battelle, comparing Googles experience with Yahoos, comments that Yahoo was humbled by its experience of the tech- wreck days. It had to watch its stock drop from highs of more than $500 to lows of less than $10 . . . Google has never known anything but success. The only thing Google has failed to do, so far, is fail (2006: 236). Refection: The ethics of success Is it possible to be a globally successful company and hold fast to a dont be evil philosophy? TECHNOLOGY AS A MASCULINE CULTURE Tis history of the internet almost entirely features men. Tis domination by one gender is not accidental. Judy Wajcmans ground-breaking book Feminism Confronts Technology (1991) uses both a social shaping of technology framework and feminist analysis. At that time, two things were already clear to feminist researchers. First, computers were a vital part of society, and second, they were used overwhelmingly by white, middle-class, well-educated men living in western economies. Wajcmans argument is that women are excluded from involvement in emerging technologies because of the ways in which society creates meanings around (constructs) technology and gender; and controls and allows access to new technologies primarily h i s t o r y 39 for the beneft of men. She comments (1991: 144) that In our culture, to be in charge of the very latest technology signifes being involved in directing the future and so it is a highly valued and mythologised activity. Essentially, argues Wajcman, high-technology use is a masculine activity. One reason for this dominance of men in technological felds is that the construct of woman is oppositional to man. Wajcman (1991: 159) sums up the situation as being: Technical competence is central to the dominant cultural ideal of masculinity, and its absence is a key feature of stereotyped femininity. Men hold greater power in society and claim a range of attributes as being particularly male. One such aspect is technological competence. Feminists argue that men see themselves the dominant given in terms of gendered behaviours, while women are positioned as other. Tis division between men/technological and women/not-techological is underlined in our social systems in two main ways. First, technological skills that are culturally assigned to women are not defned as technological: for example, cooking, knitting, using domestic machinery: Grays technologies of service (1992: 169). Second, access to high technology is expensive, restricted and requires training and resources which are disproportionately assigned to men. Tis is not to say that its impossible for women to work in high technology or contribute to the develop- ment of hi-tech inventions, but it is to say that women who manage these feats have to overcome a range of challenges and constraints not faced by men in equivalent situations. In her more recent writings, Wajcman (2004: 14) discusses why repeated at- tempts to recruit women to hi-tech careers in computing, programming, network and systems development, etc., have not been more successful. Suggesting that most strategies to promote such careers construct the problem as being womens social- ization, their aspirations and their values, she comments that these approaches do not ask the broader questions of whether, and in what way, technoscience and its institutions could be reshaped to accommodate women. Wajcman notes (2004:. 1415) that most women who work in felds such as computer sciences are required: to exchange major aspects of their gender identity for a masculine version with- out prescribing a similar degendering process for men. For example, the current career structure for a professional scientist dictates long unbroken periods of intensive study and research that simply do not allow for child care and domestic responsibilities. In order to succeed, women have to model themselves on men who have traditionally avoided such commitments. Some of these issues will be highlighted in future case studies. 40 t h e i n t e r n e t open Source The growth of the internet has led to the recognition of a new phenomenon: the productivity of skilled people who are willing, indeed eager, to work on a shared task for uncertain benefts. Herz (2002) has called the process of building products using a collaborative dynamic Harnessing the hive; and she refers to the benefts produced as harvesting the honey. Bruns talks about large communities of users, who act without an all- controlling, coordinating hierarchy [and] operate along lines which are fuid, fexible, heterarchical, and organized ad hoc as required by the ongoing process of development (Bruns 2008a: 2). In contrast to a pyramid-like hierarchy of power; heterarchy describes a fshnet-like arrangement of workers who are theoretical equals. In heterarchical structures no-one is given a position: roles are developed as a result of ability and commitment. We will be considering some heterarchical communities later in the book, in terms of gamers and fan fction writers, as well as through some of the internets newest and most vibrant brands. These include Flickr and YouTube, Facebook and Twitter. At this point we address the frst hive communities to develop, the pro- am (professional-level skills acting in an amateur capacity) prosumers who continuously improve open source software. The term open source refers to a situation where the source codes for a software program have been made openly available. open source software is developed for people to share by programmers whose own software development processes include sharing their successes and problems. open source is often linked to socially friendly versions of the hacker movement, and to the more or less continuous and self-conscious technical culture of enthusiast programmers, people who built and played with software for fun (Raymond 2001: 3). Talented software developers are frustrated that the source code behind proprietary systems like Microsofts Windows cant be legitimately accessed. People cant legally share proprietary programs with friends. Further, bugs in licensed software take a long time to fx, compared with what some programmers think should be possible. In 1983 Richard Stallman, a software developer with MIT, formed the Free Software Movement. He resigned from his programming job in 1984 in order to write GNU to be a complete Unix-compatible software system which . . . can be given away free to everyone who can use it (GNU n.d.). GNU stands for Gnus Not Unix, and in 1985 Stallman founded the charitable Free Software Foundation (www.fsf.org), which attracted widespread voluntary involvement from other software developers. In addition to working on completely copyright-free software, such as GNU, communities of programmers formed around specifc software products, or categories of software, such as operating systems. Linux, which has its roots in GNU and in Unix-compatibility, is one well recognised example of such software. Developed from work by Finnish software developer Linus Torvalds in 1991, Linux is the current leader in open source software platforms for operating systems, alongside Apache for Web servers . . . MySQL for databases, Firefox for browsers and the World Wide Web itself (Tapscott and Williams 2006: 22). Controversy continues over the magnitude of the debt owed by Linux and other open source software to GNU. Commenting on this controversy in 1999 while a visiting scientist at MIT, Jim Gettys of Compaq said, There are lots of people on this bus; I dont hear a clamor of support that GNU is more essential than many of the other components; cant take a wheel away, and end up with a functional vehicle, or an engine, or the seats. I recommend you be happy we have a bus (Gettys 1999). h i s t o r y 41 Eric Raymonds online analysis of the dynamic nature of the development of Linux is distilled in The Cathedral and the Bazaar: Musings on Linux and open source by an accidental revolutionary (Raymond 2001, rev. edn). Streeter (2003: 659), analysing Raymonds metaphors, comments that the core trope is to portray Linux-style software development like a bazaar, a real-life competitive marketplace. A bazaar is a market of separate, yet complementary, traders each displaying their wares and trying to compete with others. This contrasts with Microsoft-style software production [which] is portrayed as hierarchical and centralised and thus ineffcient like a cathedral. The open source movement has been credited with infuencing Netscape to release the source code for its browser in 1998. Why would companies, talented software developers and gifted amateurs donate their work in this way? Raymond (2001: 53) thinks that part of the answer lies in ego satisfaction and reputation among other [peers]. Essentially, open source operates as a gift economy where developers gain recognition for their talents, and also get personal satisfaction at having solved a problem or written beautiful programmes (2001: 68). Voluntary cultures that work this way are not actually uncommon . . . e.g. science fction fandom, which unlike hackerdom has long explicitly recognized egoboo (ego-boosting, or the enhancement of ones reputation among other fans) as the basic drive behind volunteer activity (Raymond 2001: 53). Summary n Chapter 2 examines the history of the internet. It does this in two ways: through a narrative of the development of the frst ARPA network and through fve snapshots of key technological developments and affliations related to the internet: hardware, software, the World Wide Web, search and the open source movement. n The internet has its roots in the Cold War between the western world and the communist bloc, primarily between the USA and the USSR. A response to the Soviet launch of the frst Sputnik rocket in 1957 and to the Cuban Missile Crisis of 1962, the internet was originally developed as a US military project. Some people think that the USA administration still controls aspects of the internet. n The history of the internets development, and of many web-based brands, mostly involves the work of men. This has led some feminists to question the ways in which power in society is refected in terms of access and opportunity in relation to high technology. n In terms of an account of the history of new media, this book is positioned to complement other volumes in the series which deal with mobile phones and communication; interactive gaming; new media, arts and cultural production; and digital broadcasting. Chapter 3 examines policy, offering a comparative study of internet policy in Australia and China as well as considering the relevance of telecommunications infrastructure and pricing. 3 PoLICY INTRODUCTION In every country there are policies in place that decide who provides internet services, who can access the internet, and what the costs are. In free market economies, these policies have often been formulated following public debate and with the input of committees and hearings. Unfortunately, many people fnd policy debates boring or irrelevant. To them, these debates may simply be about politicians arguing that their ideas are better than anyone elses. Tis perception may mean that everyday citizens are put of getting involved in policy debates. Policy is a vital element of any technology take-up. Its also a riveting indicator of what aspects of technology the powerful and privileged elites in a society think are important. Te sorts of priorities that infuence the policy agenda include national interest issues such as defence, and social priorities such as the opportunity for people to beneft from technology to improve their own circumstances and to increase the countrys wealth. As we see below, social policies, including issues of civil liberties and human rights, can also impact in unexpected ways upon a nations ability to be creative and to innovate, in technology as well as in the arts. Indeed, a landmark book by Richard Florida, Te Rise of the Creative Class (2002), argues that economic development and creativity is highest in areas that embrace cultural and social diversity in terms of acting inclusively towards people of diferent backgrounds, sexuality and bohemian lifestyles. Florida (2002: 249) suggests that Technology, talent and tolerance [are] the 3 Ts of economic development . . . Each is a necessary but by itself insufcient condition: To attract creative people, generate innovation and stimulate economic growth, a place must have all three. Te social impacts of policy and regulation also afect creativity and technological development. When we look at the history of a technological development, as we did in Chapter 2, we might usefully ask ourselves what kind of policy environment supported the developments in question. Tere is a problem here, however. Te retracing of the historical events that lead over time to the emergence of a technological development 44 t h e i n t e r n e t seems to create a single path from the present back to the past without acknowledg ing the many points at which things might have turned out diferently. Science historian and philosopher Tomas Kuhn wrote an infuential book called Te Structure of Scientifc Revolutions, originally published in 1962. In that book Kuhn noted (1996: 1) that public ideas of science are drawn mainly from the study of fnished scientifc achievements even though, he adds, a concept of science drawn from them is no more likely to ft the enterprise that produced them than an image of a national culture drawn from a tourist brochure. If Kuhn is correct, there is no inevitable path of progress: it just seems that way looking back. In contrast, Florida suggests that certain circumstances can help foster creativity and innovation. We start this chapter by examining the possibility that, with diferent policy circumstances, computers and the internet might have frst been developed in the UK. Policy issues impact upon levels of creativity and innovation. Tey also impact the regulatory environment. Legislators in most western countries respond to changing circumstances by tailoring the development of policy and regulation to maximise benefts, as they see them, and to minimise harm. Tis is fundamentally a reactive model with seven components. It is a continuing process with components overlapping and with the sequence repeating, as outlined in Figure 3.1. Each component in the cycle constitutes a sequential focus, rather than an ord- ering of absolutely separate/sequential events. Tus the establishment of desirable outcomes and the frst steps in formulating policy may well be undertaken alongside information gathering. In democratic countries, regular elections give people the choice of supporting diferent parties which identify certain issues as important and 1. Identifcation of problems 2. Information gathering regarding the problems 3. Identifcation of desired outcomes 4. Formulation of policy to achieve desired outcomes 5. Enactment of policy 6. Implementation of policy and regulatory regime 7. Evaluation of policy outcomes which leads to: 1. Identifcation of problems 2. Information gathering regarding the problems [etc.] Figure 3.1: An indicative framework for regulation (based on Green 2002: 135) p o l i c y 45 then put forward possible policy responses to them. For example, in many countries a growing problem has been recognised with some people not having access to the internet, while a majority of the population does. Tis situation has been called the digital divide and it is the major focus of Chapter 4. After looking at the history of Alan Turing and how the internet might have been developed outside the US, this chapter goes on to consider aspects of Australian public policy regarding access and infrastructure for internet use and compares the Australian situation with that of China. Te aim here is to show how countries difer in the ways they handle matters of policy, and also to demonstrate in context the technical terms generally used in the debate so that readers of this book are better placed to contribute to policy discussions. Te fnal case study in this chapter, setting the scene for discussions on the digital divide in Chapter 4, concerns telecommunications policy and provision in the UK and the USA, with a brief glimpse at India. International debates provide pointers to issues which drive policy development in other nations. Some terms in this chapter may seem very technical. Tey are explained as they arise, but they are also included in the Glossary, at the end of the book. ALAN TURING AND THE AUTOMATIC COMPUTING ENGINE Could the internet have developed outside the United States? Some people think it almost did. From the 1940s to the 1960s, at the time when modern computers and the internet were in conceptual and physical development in the US, parallel research was going on in Britain. One example of this was Alan Turings secret work on code-breaking at Bletchley Park during WWII (the background to the movie Enigma (Apted 2001)), and his pre-war theoretical work on computable numbers and a universal machine which could be programmed to work with diferent rules (Turing 1936). Tese ideas developed into plans for ACE, the Automatic Computing Engine, which ultimately informed the development of a Pilot ACE computer in the UK in 1950. Turings ideas arguably pre-dated work by John Atanasof and Cliford Berry who, in 1937, developed the AtanasofBerry Computer (ABC). Tis was subsequently identifed as the frst computer since it was built and shown to work in 1942. It was not programmable, however, and served primarily to prove that the concept worked. Although Turing was excited, after the end of the war, to be joining the UKs National Physical Laboratory (NPL), work on the realisation of the ACE ground to a halt, stifed by bureaucracy and secrecy. Even so, Turings work in the NPL 46 t h e i n t e r n e t brought him into contact with a young scientist called Donald Davies whose work on computer networks became important from the 1960s onwards. In the 1960s, Daviess exploration of ways to transmit data down existing telephone lines led to the concept of packet switching. Te same kind of research, with a diferent rationale and name, was being carried out in the US by Paul Baran. Barans work eventually informed plans for the interconnected matrix of ARPANET computers which seeded the internet. Daviess work doesnt generally get much recognition in accounts of the internets formation (but see Roberts 1978) because the internet is a US invention and US researchers tell its story. British scientists and researchers have parallel stories about conceptual developments which, due to government policy including the Ofcial Secrets Act, lack of investment and other inhibitors, were destined never to realise their full potential. Polish scientists, meanwhile, argue that British accounts of Alan Turings secret code-breaking successes at Bletchley Park do not acknowledge adequately the work of the Polish Cipher Bureau, which was frst to crack the Enigma code and which passed on vital details to France and Britain in the weeks leading up to WWII. How might the US environment in which the internet was eventually developed difer from that in the UK at that time? Some people trace the foundation of the Advanced Research Projects Agency, which funded the development of the internet, to President Eisenhowers appreciation of scientists and his keenness, as a man with a military past, to separate some American scientifc enquiry from direct military control. Eisenhowers lead science adviser, James R. Killian, had been recruited from his role as President of the Massachusetts Institute of Technology, and he attributed past US science achievements to the free wheeling methods of outstanding academic scientists and engineers who had always been free of any inhibiting regimentation and organization (Killian, cited in Hafner and Lyon 2003: 18). Efectively, this creative approach is in line with Floridas ideas for promoting innovation. Circumstances in which the ARPA scientists were to work, collaboratively involving graduate students and networking with business and academia, were very diferent from the situation in the UK. In the post-WWII years, for example, not only was Alan Turings theoretical work on the ACE computer classifed as secret but, even so, he was forbidden from incorporating his Bletchley Park experience since this would have revealed his secret code-breaking background. He had to pretend to have a purely theory-based knowledge. Tese regulations added to the frustrations of several years delay in building the ACE prototype. Impatient, Turing left NPL in 1947, moving to the University of Manchester in 1948 to work there with Professor Max Newman, who had been Turings mentor during his studies in Cambridge and had worked alongside him at Bletchley Park. While NPL had p o l i c y 47 foundered, Manchester had built the worlds frst stored-program digital electronic computer the Manchester Baby (Anderson 2007: 76). At Manchester, Turing used the computer to investigate artifcial intelligence. From there he went on to explore pattern formation in nature, especially as this relates to Fibonacci numbers, where each number in the sequence is the sum of the preceding two. Te secrecy regime was not the only issue Turing had with the UK authorities. Turing was homosexual, which was illegal in England and Wales until 1967. In 1952 he was charged and convicted of gross indecency, the legal term used at that time. His security clearances were removed, meaning that he was no longer able to collaborate with a number of other scientists in his areas of interest, since they remained bound by the Secrets Acts and Turing was now classifed as a risky contact. Tis happened even though Turing had been meticulous about keeping secrets secret, and even though he was so open about his homosexuality that there was no real prospect of his being a blackmail victim. As an example of his absolute discretion in terms of national secrets, the judge knew nothing about his Bletchley Park role in breaking the Enigma code, which could have made him a national hero. Tat remained hidden until the 1970s. Turing preferred to accept treatment for his homosexuality rather than a prison sentence. In 1952 such treatment in- volved an experimental oestrogen regime, which worked as a chemical castration, psychoanalysis and probation. Turing had been a world-class marathon runner, but his lean body grew fat and he developed breasts and became depressed. He com- mitted suicide by eating a cyanide-laced apple in 1954 (Hodges 1992; Holt 2006). Turings prosecution, his problems with the UKs secrecy regime and his loss of security clearances are not raised here as part of a debate about whether the UK or US was more or less homophobic. Te USA was also homophobic at that time. Te reason for including this section is to illustrate how regulation and policy debates may seem unexciting but can have far-reaching and sometimes unexpected implications. It is intriguing to speculate, for example, whether diferent UK policies on security, secrecy and technology in the late 1940s and early 1950s might have led to diferent outcomes in the development of computers and networks. In particular, had Turings time at NPL been productive, and his work with Donald Davies prolonged, and if that collaboration had become the magnet for the post-Bletchley code-breakers, instead of Manchester, then events might have progressed diferently. By the late 1950s to 1960s, the US situation had become entirely unlike that of Turings post-war UK. Killians views about collaborative work, the involvement of learner graduate students in the ARPANET project, and the harnessing of outside opinions and ideas through strategies such as Steve Crockers open Request for Comments all provided a creative milieu which, for their day, aligns well with Floridas 3 Ts: technology, talent and tolerance. 48 t h e i n t e r n e t REGULATING THE INTERNET: A COMPARATIVE EXPLORATION OF AUSTRALIAN AND CHINESE APPROACHES Can you imagine the efect upon the internet if every website needed approval before it could be posted, or if voluntary moderators required a specialist qualifcation say in technology, ethics and psychology before they were allowed to host a chat room or discussion board? Perhaps under-18s should get their parents consent before going online, or have the internet equivalent of a drivers licence before surfng the web? Tese kinds of restrictive regulations could have meant that the internets explosive growth might never have happened. Tey would characterise a highly restrictive regulatory regime. Te fact that our experience of the internet is very diferent is a refection of the policy approach our governments take, and the regulations that put those policies into operation. Tis is not to say that the internet is unregulated in the western world. Prosecutions of people who use the internet to access child pornography, for example, demonstrate that web trafc is closely monitored by police where law enforcement authorities have reason to suspect that a crime is being committed, such as in creating and circulating images of child sexual abuse. Even so, control of the internet in most free market societies is via light touch regulation. Light touch regulation means that an activity is essentially self-regulated by the industry concerned, usually under the scrutiny of a statutory body. A statutory body is an organisation set up by the government to regulate an industry. It usually includes industry and consumer representatives on its committees. Te process of self-regulation means the system requires no intervention beyond the consumer, the service provider and the industry body unless the consumer is unhappy with the response or the manner in which the response is handled, in which case they would typically contact an elected representative, or write to the papers or take legal action against the regulator. Refection: Links between social diversity and creativity Why might Florida and others argue that societies that embrace diversity and difference support creativity and innovation? Why might creativity and innovation be important in todays society? p o l i c y 49 In Australia, for example, light touch regulation means that industry bodies such as the Internet Industry Association are required by the regulatory (statutory) body, the Australian Communications and Media Authority (ACMA), to draw up codes of practice and minimum standards. All Internet Service Providers (ISP) within Australia, and other industry players with Australian connections, must subscribe to these codes and standards as part of their industry membership. If the public have complaints, they pursue these through the relevant industry association. Once regulators have approved the codes of practice and the dispute resolution processes, the statutory body only become involved when industry self-regulation fails and consumers have a legitimate complaint that has not been addressed, relating to content that falls within Australias jurisdiction (ACMA 2008). Often, where a complaint might be legitimate, the ofending material is produced by a non-Australian company and held on a server outside Australian control: in that case Australian law allows the server to be blocked, making it inaccessible to Australian ISPs. Policy-makers are out of the communication loop unless an issue is identifed that is not covered by the codes of conduct and which the industry body is unwilling to address voluntarily. Critics of this model of regulation argue that it is unfair that individual citizens are required to battle industry associations since the relative diference in power and resources is so great. In western nations, the emphasis is generally on encouraging people to use the internet, not stopping them from doing so. Tis is not the situation in many countries with diferent legal and regulatory systems. Highly regulated countries include Myanmar (Burma), Saudi Arabia, Iran, North Korea, China and Vietnam, where citizens have been arrested and imprisoned for a range of activities which would be permitted in western countries, including claiming the right to free speech to criticise their government. Although Australian law allows the blocking of some content from outside Australia, the system of waiting for a complaint before action is taken means that some forbidden content is occasionally seen by some people. Te 2007 Australian election saw the Labor Party pledge to introduce an ISP-level internet flter to eliminate illegal content from the internet. However, the defnition of illegal was unspecifed and later seemed to constitute the kinds of materials which ACMA has blocked in the past or required to be taken down. Since very few of these cases are prosecuted, their illegality has not been tested in court. A conservative regulatory fltering regime efectively removes many freedoms of choice from internet users, as well as slowing internet speeds across the board as a result of a universal ISP- level fltering process. Te Labor Party was elected and this proposal caused huge controversy as its implications became clearer. Further, it led to downward pressure on Australias digital freedom rating on the HarvardTorontoCambridgeOxford 50 t h e i n t e r n e t universities-sponsored Open Net Initiative. Tis international watchdog had already labelled Australia as having some of the most restrictive internet policies of any Western nation (ONI Australia n.d.) on the basis of the blocked internet sites. Even if Australia is a poor performer in terms of its citizens digital rights and internet access, it clearly remains in a dramatically diferent category from the heavy regulation practised by repressive regimes such as China. In the early years of the internet, the Chinese government feared that giving people access to more information would change the political dynamics and risk destabilising the status quo. Te authorities tried to anticipate the problems that might arise in order to develop policy and regulations to prevent these problems occurring. Te frst form of internet regulation adopted [in China] was slightly less than total black out of the new technology, says Endeshaw (2004: 41). Strategies for ensuring compliance took the form of laying criminal charges against people for undesirable internet activity, and the use of prosecutions and court cases as means of intimidation. In terms of the policy cycle (see earlier this chapter), identifcation of the problem is followed by gathering information to evaluate the extent and seriousness of the issue to be addressed. For many countries, the internet has raised issues in terms of childrens use of the technology and their willingness to interact with strangers. Te fear is that their openness makes children vulnerable to cyber predators who seek out minors on the net in order to befriend them. Pornography is a totally separate issue from cyber predators, but it also causes huge concern in some countries. In highly regulated nations like China, Saudi Arabia and Iran, it is illegal to access pornography; no matter whether it is delivered on the internet, or in terms of printed materials or flms. In all countries it is illegal to access images of child abuse (although the defnition of child may vary in diferent countries with the legal age of consent). In many countries there are concerns over whether it is too easy for children, including young people under 18 but over the age of consent, to access pornography, on purpose or by mistake including content which would be legal if it were accessed by an adult. Tese totally separate concerns about cyber predators, images of child sexual abuse and illegal, inappropriate or accidental access to adult-only content all drive regulatory activity in the East and the West. Other concerns which have diferent impacts in diferent countries include on- line gambling, hate sites with racist or misogynist content, violent images, terror sites and perceived over-use (internet addiction) of the technology to the point where it interferes with everyday life. Once concerns have been identifed and agreed, policy is developed to respond to these concerns and, hopefully, eliminate them. Strategies used to gain support for the enactment of new policy include: public hearings; government committees (some of which may not be public); p o l i c y 51 harnessing and responding to pressure group advocacy; soliciting comments from individuals, community groups and from elected parliamentary representatives; monitoring debates in the media and other discussion in the public sphere (chat sites, for example, and online petitions). Once new policy is agreed and passed, its efects are evaluated to ensure that it achieves the ends desired and that there are no unintended outcomes. In China, there were two major problems that arose from the decision to all but ban the internet. Some people continued to use it privately, even though that was against government policy. Also, given the benefts western countries appeared to be gaining, Chinese lawmakers gradually decided that the nation might be putting itself at a competitive disadvantage by forbidding young people to use the internet. China soon discovered that its attempt to choke the Internet for fear of what it might do to the political establishment clashed with its commitment to open up the economy to foreign investment and trade (Endeshaw 2004: 41). China changed it policy. Te decision to open up the internet had already seen 137 million Chinese users by the end of 2006 (ONI China n.d.). Te number of Chinese citizens online overtook the number of US users in 2008, and China now has more internet users than any other nation on earth. In terms of embracing the internet in the national interest, Chinas approach has some similarities with that adopted by Singapore where there is a hierarchy of heavier vs. weaker regulation in diferent social spheres . . . Heavier regulation in the home, rather than business, difers from the expected priority of many western countries (Green 2002: 124). Singapores reversal of the usual western order, where western regulators see the home as private and thus less regulated than business, refects Singapores export priorities and recognises that a competitive business strategy might involve businesses operating under a more lenient regulatory regime. Ang and Yeo (1998: 17) comment that Information for the home is considered less critical so censorship of such information is deemed to have less deleterious efect. Chinas policies balance a desire for stability within its national boundaries with an ambition to be hugely infuential on the international stage. Leonard (2008a: 113) comments that: some Chinese hope to build a global order in Chinas image. Given this, there is considerable Chinese eagerness to understand what is cur- rently making the global order tick, and the internet is an important element of that dynamic. Indeed, Ernkvist and Strm (2008: 98) talking specifcally about Chinese control of online gaming, in a manner that can be extrapolated to general online activity, argue that there are three critically relevant aspects of state policy: (a) information control, (b) technonationalism, and (c) social fears/pragmatic nationalism. Technonationalism here indicates a Chinese view that since the internet was developed in the US, it needs to be re-imagined in a way to make it 52 t h e i n t e r n e t more culturally Chinese and to ensure that most profts stay in China. Control of digital information, in combination with the promotion of a nationalist ethic, drives much of what China tries to do in its internet policy-making. Dubbed the Great Firewall of China (e.g. Guardian 2008), the nationwide fre- wall controlling Chinese citizens access to the internet prevents people reading sensitive information, including: sites run by international human rights groups; accounts of past events such as the Tiananmen Square clampdown; and dissident calls for autonomy and independence for Taiwan and Tibet. Information about Falun Gong has also been banned. Kalathil and Boas (2003: 26) comment that the authorities have adopted two main strategies: fltering material and the promotion of self-censorship through regulation, policing and punitive action. Service providers are required to enforce restrictions: ISPs are forbidden to allow politically sensitive information to be circulated via the internet. Tey also have to report on internet users. Website administrators are required to hire censors, known as cleaning ladies or big mammas, to screen for and quickly remove ofensive material from bulletin boards and chat rooms (Kalathil and Boas 2003: 26). Such regulations apply equally to western internet corporations operating in China, such as Google and Yahoo, as to domestic companies. Although innovative libertarians in the East and the West continually develop technology and practices for countering Chinese state censor- ship, it remains a risky activity for a Chinese citizen to venture beyond the Great Firewall. Although many countries, like China, have decided that they want more of the next generation of workers to be digitally literate, the appropriate way to achieve that outcome will difer from country to country. In Australia, for example, the Labor government formulated a policy to achieve an education revolution with every schoolchild in years 912 (ages 1417) having access to their own school- based computer: computer technology is no longer just a key subject to learn, it is now the key to learning in almost every subject (ALP 2007). Most western countries aim to educate young people to enter a digital workforce. In China, the desired outcome includes greater business efciency. Wong and Nah (2001, cited by Endeshaw 2004: 51), comment upon Chinas desire to meet the challenges of the information economy by embracing rapid development of high-technology sectors. Further, Chinese factories make many components used by other nations to embrace a high-technology future. Policy formation and policy enactment processes also depend upon the political system in place. Te multi-party democratic debate practised in many western nations is entirely at odds with the authoritarian role of the Chinese Communist Party, yet commentators are increasingly indicating that there is considerable debate within the Party. Tis debate is supported by the outputs of think-tanks and of p o l i c y 53 higher education institutions. A wide variety of opinion seems acceptable, pro- vided the debates do not include a range of taboo topics, from Falun Gong to Tibet, Taiwan and Tiananmen. Te dignity and interests of the state (Endeshaw 2004: 46) are also jealously protected. In 2005, the US internet company Yahoo earned international condemnation by providing Chinese authorities with the details of one of their account holders, Shi Tao, who was subsequently imprisoned by China for ten years for illegally provid- ing state secrets to foreign entities (Amnesty International n.d.). Te state secrets concerned a Chinese Communist Party memo to the domestic press warning them against fuelling unrest by reporting social disturbances around the anniversary of the Tiananmen Square massacre. Shi Tao had sent this directive to contacts in the US, who then publicised it. Subsequently, Yahoo, Google, Cisco systems and Microsoft were summoned to explain their companies policies in China to a US Congress subcommittee. Te internet frms argued that enabling a censored Internet to grow in China is better than having no Internet at all, or one controlled by Chinese search companies (Gunther 2006). Opposing this view, Congressman Lantos, a Californian Democrat, commented afterwards: Tese companies tell us that they will change China. But China has already changed them (Gunther 2006). However, in January 2010 a cyber attack on google.cn prompted it to stop censoring Chinese search results (Zetter 2010). Although political repression compromises the potential of the internet to lib- eral ise Chinese society, there are signs that a discussion is becoming more open while avoiding the most sensitive topics. Mark Leonard, executive director of the European Council on Foreign Relations and author of What Does China Tink? (2008b), describes his astonishment during a 2003 trip to discover that the Beijing- based Chinese Academy of Social Sciences (CASS) had 50 research centres covering 260 disciplines with 4,000 full-time researchers (Leonard 2008a). Tis contrasted favourably with the sum of all Europes think-tank researchers, which Leonard estimated as being in the low thousands, while his view was that even the US think- tank heaven . . . cannot have more than 10,000. Further, the 4,000 researchers in CASS are a very small fraction of the Chinese think-tank workforce. Tere are another dozen or so think-tanks in Beijing alone, along with others elsewhere (Leonard 2008a). In some respects these think-tanks are having a signifcant impact: Inside China in party forums, but also in universities, in semi-independent think-tanks, in journals and on the internet debate rages about the direction of the country: new left economists argue with the new right about inequality; political theorists argue about the relative importance of elections and the rule of law; and in the foreign policy realm, Chinas neocons argue with liberal internationalists about grand strategy. (Leonard 2008a) 54 t h e i n t e r n e t It may be a surprise that policy in China is so fercely discussed. However, dis- agreement is not readily recognisable as such since certain key issues are not talked about at all; political dissenters face persecution; and the kinds of freedom granted involve the Chinese arguing about whether it is the intellectuals that infuence decision-makers, or whether groups of decision-makers use pet intellectuals as informal mouthpieces to advance their own views (Leonard 2008a). In any case, for some aspects of Chinese social and political life, a range of possible options is considered and debated in a more open fashion than might be the case with an adversarial Westminster model of debate. Tis openness might be attributable to that gap between a top-down process in which the Chinese Communist Party has almost absolute power to implement policy as it sees ft, and the equally important negotiated process whereby power is highly fragmented and infuenced by a number of actors at diferent levels with conficting interests (Ernkvist and Strm 2008: 102). Tink-tank members are some of these infuential actors and are experimenting, among other things, with new forms of Chinese-style democratic engagement. Refection: How much do we know about China? China is a huge country with a complex history. It seems to have the capacity to change very quickly, and appears to welcome a range of social and civic experiments. If were surprised to learn about the number of paid thinkers in China, as Leonard seems to be, what does that say about our everyday understandings of the nation? Surprisingly for many free market nations, some Chinese political scientists and think-tank researchers believe they have identifed a range of problems with western democracy. Tese include: falling election turn-outs; disillusionment with elected leaders; declining political party and trade union membership; and a rise in opinion poll politics. Some Chinese commentators go so far as to suggest that western-style politics is essentially a failing model. Fang Ning, a CASS political scientist, argues that western democracy is like a fxed-menu restaurant where customers can select the identity of their chef, but have no say in what dishes he chooses to cook for them. Chinese democracy, on the other hand, always involves the same chefthe Communist Partybut the policy dishes which are served up can be chosen la carte (cited in Leonard 2008a). Te small town of Zeguo in Wenling City ofers one example of this la carte approach. Zeguo decides its budget priorities on the basis of a model of democratic consultation based p o l i c y 55 upon an original Athenian democratic process called deliberative polling (Fishkin et al. 2006). Te results of this experiment with inclusive, community-based demo- cratic engagement have caused signifcant interest in China and the West, and have clear possibilities for online models of democracy. As is the case with Zeguo, Chinas la carte ideas are often trialled in specifc circumstances, such as the Shenzhen economic zone on the border of Hong Kong, with the possibility that they will then be allowed to spread organically. Similarly, a Chinese free-market economy was trialled for many years alongside a state- controlled market until by the early 1990s, almost all products were sold at market prices (Leonard 2008a). In China, the identifcation of desired policy outcomes and the formulation of policy to achieve these are extensively canvassed by researchers, advisers and intellectuals behind closed doors. To a limited extent such debate is also in public, on the internet, since the internet is generally freer than the print and broadcast media. In both the West and in China, the enactment of policy and its implementation leads to further consideration of the costs and benefts of these as the implications of policy development and change become visible and are evaluated. In both systems countries seek information about the ways in which other nations have handled the problem. For some Australians, facing the prospect of ISP-level fltering, their government has borrowed too much from the Chinese approach to regulation. TELECOMMUNICATIONS POLICIES AND TECHNOLOGIES Good internet services depend upon good telecommunications and, like the inter- net itself, telecom services are afected by government policies. In most western nations since the 1980s, for example, telecoms monopolies have been broken up. Tese massive changes in telecom policies were grounded in the 1970s realisations that free-market economies were increasingly information-based (Bell 1973). Tis meant that the wealth of developed economies was becoming more dependent upon information processing and information-linked employment, including education and management as well as computing and media, than it was upon manufacturing, resources and agriculture. As society became more dependent upon advanced communications to access, manipulate, and add value to important information, so more pressure was placed upon the telecommunications infrastructure. Privatisation of telecoms was one way in which to raise money to power investment. In many majority-world (developing) nations, by contrast, telecommunications remains a monopoly that is regulated by the government, rather than by market forces. 56 t h e i n t e r n e t In richer countries across most of the twentieth century, the twisted copper telephone lines and manually-operated telephone exchanges served the everyday needs of communications across distance. With STD, the Subscriber Trunk Dialling system in the UK, known as DDD or Direct Distance Dialling in the US, a level of automation became possible. Tese technologies made manual phone exchanges obsolete and enabled the Plain Old Telephone Service (POTS) to support an increased range of applications and automatically connect long-distance calls. With the accelerating transition from analogue communications to digital communications, other ways of moving information could be explored. Digital information is communicated via an unambiguous sequence of numbers which form a data stream. Tis difers from analogue information, which resembles the original source characteristics and is continuously variable. Tus an analogue telephone call occurs as a result of the sound waves of the voice causing vibrations which are translated into electronic signals that pass along the wires. In a digital call, the voice is digitised into discrete units of information, with the fdelity of trans mission and reproduction depending upon the precision of the samples of information coded. Tus an analogue-to-digital converter that samples 4,000 times per second would have higher fdelity to the original that one which samples 2,000 times per second (Brain n.d.). A communications channel that can handle the digitised version of a voice can also handle other digitised data; for example from a television channel, or email, or any other digital application. Te fact that channels which carried digital voice data could also carry digital information from computers and other communication technologies meant that one channel could handle inputs and outputs from many diferent information sources, communicated for a variety of diferent reasons. Te technologies themselves began to share important characteristics too, since a key function of digital tech no logies was the conversion of information into, or from, digital form. Developments in computing and communications in the 1980s and 1990s gave rise to buzzwords such as convergence to note the ways in which more and more information was becoming digitised, and thus amenable to being handled in consistent ways using diferent technological platforms across a spectrum of uses. Essentially, convergence marked the blurring of borders between: n Information Technologies (IT: digital processing) n Telecommunications (information carriage), and n Media (content the meaning of what was communicated) Consistency of handling allowed the packaging and repackaging of digital in- formation within computer networks, and the seamless transfer of data between them, even though the networks could vary in signifcant ways. Further, the p o l i c y 57 Increasingly, a diferentiation arose between the products, services and data avail- able to consumers with broadband access compared to those with dial-up. Dial-up access depends upon older and cheaper technology, generally using external modems connecting the computer to the analogue phone lines that service an internet connection via access to the consumers Internet Service Provider (ISP). Modems are modulator-demodulators, translating the digital information from the computer to an analogue form suited to transfer over the POTS. When received at the ISP in analogue form, the ISP modem translates the information back into digital data for ISP network connection to the internet. Dial-up connections are much slower than broadband and are unsuited to data-intensive services such as streaming video, online game play and the sophisticated graphics and animated sequences of high-specifcation websites. When they can aford to do so, keen internet users tend to migrate from dial-up services to broadband with the efect that relative US rates in late 2008 indicate the 57 per cent of US citizens have broadband in the home compared with 9 per cent on dial-up (Horrigan 2008a). Tis is one reason why broadband take-up rates are often used as an indicator of relative economic development. Defnitions for broadband services tend to focus on minimum data speeds. Tough these have increased over the years and can be delivered at a low level through the POTS, high-speed broadband requires more of the data journey to be via fbre-optics than by cable. Such systems are often referred to by acronyms such as FTTN (fbre to the node). Tis is not as fast as, but is much cheaper to install than, FTTH (fbre to the home) or FTTP (fbre to the premises). FTTN is cheaper because nodes are junctions which then radiate out to service a range of individual homes and ofces, like telephone exchanges do. FTTH takes the high- speed connection that one step further by using fbre to connect the home to the node, as well as the node to the backbone. At a minimum, broadband requires DSL (digital subscriber line) connection technology interfacing between the domestic computer user and the POTS deregulation of telecommunications meant also the de facto deregulation of many elements of media and IT. Refection: The Problem of Jargon Is there a problem with having to learn jargon to take part in policy debates? What happens if policy discussions are restricted to the well-educated? 58 t h e i n t e r n e t infrastructure. Alternatively, it may use the bandwidth of cable television services already provided to the home: even though these cable services may actually use satellite delivery (OECD 2008). In contrast to a broadband service, the computer signal travelling via a dial-up service monopolises the phone connection, meaning that the POTS provides either a computer link or a voice link at any one time. With broadband, the DSL operates at high frequency in contrast to the low frequency voice service, so that voice and broadband internet can be accommodated simultaneously. Te Wests emerging digital economies in the 1980s and 1990s placed immense pressure upon existing communications networks. Te carrying capacity of the older infrastructure elements, such as twisted copper wires, was revolutionised by innovative products. For example, in the 1990s Asymmetrical Digital Subscriber Line technology (ADSL) made it technologically feasible and economically attractive to deliver as many as four video channels and high-speed digital data services in addition to voice to the home over the twisted copper networks of the telephone companies (Estabrooks 1995: 127). ADSL is a particular kind of DSL service that allows greater speeds (hence the asymmetricality) of download than of upload, a feature that was initially a problem with peer-to-peer fle-sharing software until the development of Bram Cohens open source BitTorrent protocols in 2001 (Tompson 2005). Whereas twisted copper wires had historically been used to service homes, telecoms providers increasingly laid more coaxial cables. Tese had previously been used for transmitting large numbers of simultaneous voice calls, for example, in submarine cables with regular booster points, and their use more generally had allowed a dramatic increase in the volume of information carried. Like twisted copper wires, coaxial cabling required physically laying or stringing between points to be serviced, and rewiring cities became expensive. Even so, Estabrooks (1995: 88) comments that: the broadband nature of coaxial cable made it feasible to carry as many as one hundred [cable television] channels. Although coaxial cable and twisted copper were well-established technologies by the second half of the twentieth century, there were still many places without a cabled infrastructure. Further, the breakthrough which allowed the innovation of new products such as bank Automatic Teller Machines (ATMs), was based on a revolutionary new technology, fbre-optics. Tese fbres used light signals to transfer data and could transmit data at higher transmission rates and with lower losses and [were able] to do this at lower error rates (Mercury 1992). During the 1990s, older cabling technologies were replaced or augmented by fbre-optics, which also needs laying; and by satellite and microwave communications which work on point-to- point transmission and reception without the requirement for hard-wire connections between those points. Broadband services can be delivered using one of a range of technological platforms (OECD 2008), or a combination of these. p o l i c y 59 New technologies and technology upgrades magnifed the capital cost of pro- viding ICT infrastructure and services, while making them generally more accessible, and growing the market. Governments came under increasing pressure from business and consumers to allocate more money to state-owned monopoly telecoms providers, or to privatise these so that the corporations could raise capital from private investors. Tese pressures came to a head in the 1980s in the Reagan (US)/Tatcher (UK) era, and over the fnal decades of that century most of the worlds developed nations deregulated. Tis meant that the telecoms institutions were freer to set their own priorities and invest in the areas which they felt were experiencing greatest demand and ofering greatest market growth. Sometimes this kind of deregulation is called liberalisation, since the organisation is freed up to respond to market forces in a laissez-faire, or lets see what happens, environment. Essentially, liberalisation and deregulation are free market policy approaches that let the ICT market players themselves determine the costs and oferings of telecom products and services, rather than a government deciding these. For a market to operate freely, which is to say unfettered rather than at no cost, there has to be competition. Where competition is lacking, the single business pro viding the service is called a monopoly. Since it does not have to compete for customers, a monopoly can set its own prices according to how it sees its market. Sometimes a company might decide that its more proftable to deliver very expen- sive services to a small number of people or organisations at a high proft per client, rather than delivering more afordable services to a larger number of people at a smaller margin per consumer. Tis view would have clear implications for economic growth. In practice, most national telecom companies were heavily regulated by their governments and required to service large segments of their populations. Some people argued that governments were not the best organisations to run telecom companies, and that an organisation with a monopoly becomes inefcient and complacent and is generally unwilling to invest in new technologies. Tese various considerations meant that many of the traditional monopoly telecom carriers were broken up from the early 1980s onwards with diferent sections of the fragmented monopoly competing against each other. Tis was the case with the UK 1981 break-up of the British postal, telegraph and telephone (PTT) service, to form Te Post Ofce and British Telecom (BT). In the US, the break-up of the American Telephone and Telegraph Company (AT&T) had started with an antitrust case in 1974 and resulted in the 1982 division of Ma Bell into seven regional Baby Bells. Additionally, or alternatively, strong telecommunication companies from other jurisdictions were allowed to enter many national marketplaces. 60 t h e i n t e r n e t Te advantage of monopoly telecom carriers, and one reason why they lasted for so long, was that such companies argued they needed the whole market in order to provide universal service. An early motto of Ma Bell, for example, was One policy, one system, universal service (Nohe 1995). Te notion of universal service implied that anyone who wanted a service, in this case a phone connection, could have one for a reasonable charge. Afordability was guaranteed by using general revenue to cross-subsidise hugely expensive connections: for example, remote households in rugged country. For many, this cross-subsidisation was an essential element of the carrier being able to deliver services according to their community service ob- ligation (CSO). As communications became more important in everyday life, so the implications of an individual being excluded from the telephone service (or later, the online environment) became greater. Some telecom carriers described this need to reach everyone as the universal service obligation (USO). While governments generally accepted that it was in the public interest to promote widespread phone access, they began to listen to businesses who argued otherwise. Corporate customers complained that international competitiveness was threat- ened because their national telecoms supplier was over-charging for services in order to cross-subsidise unproftable consumers. Tey maintained that monopoly providers fail to introduce new technologies quickly and at an appropriate price because they do not need to worry about competition. Further, they suggested that greater public good was achieved where business was as competitive and as proftable as possible, thus employing more people and building local wealth. Tey argued it was in the public interest to break the telecommunications monopoly. Te breaking-up of monopolies delivered consumer choice at the expense of the principle of universal service. Te telephone service was no longer provided as a right to citizens under the USO, instead people qualifed for a phone service by having the income and status to be a customer. Desirable customers found themselves benefting from price competition and service improvements, while less-desirable consumers found themselves waiting a long time for connections and repairs which were only delivered at signifcant cost. In many countries the government tried to balance the disadvantage experienced by the dismemberment of the monopolies by placing conditions upon telecoms companies as part of the licensing regime. Such conditions might include the maintenance of public phone boxes, or provision of mobile phone services to small communities and isolated homesteaders. Generally this approach has led to confict, since the telecom carrier argues that such regulation imposes an unfair constraint on trade and proftability. Another approach has been for the government to subsidise the services it wants to see delivered, so that high costs of access are transferred to the tax payer, rather than the individual telecoms customer. p o l i c y 61 After liberalisation via the break-up of the monopolies, and the introduction of competition, many telecommunications carriers found themselves privatised. Tis was the case for BT in the UK, and Telstra in Australia, and meant that the capital value of the corporation was divided into shares, which were ofered for sale on the local stock exchange. Te money raised usually went to the government to ofset the public investment in the company which was now owned by shareholders. Privatisation also allowed the previous monopolies to raise money on the stock markets to fund modernisation of their infrastructure and to invest in new products to expand their markets. It is through the mechanism of privatisation that the capital value of publicly-owned (sometime, nationalised) companies becomes the property of private individuals and fnancial institutions, and can be traded on the local stock exchange. More recently, many of the old telecommunications systems have had their markets decimated by mobile technologies. As Passerini et al. comment, Wireless connectivity is driving innovation and business opportunities (2007: 25). Tese developments can be dated back to the 1970s and the development of frst gen- eration mobile (1G) technology. Second generation (2G) mobile phones allowed voice and SMS/texting services, but change accelerated at the start of the twenty-frst century with the introduction of third generation (3G) capability, which marked the introduction of mobile access to the internet and coincided with huge increases in revenues, contributing to the US$1.2 trillion spent on telecommunications in the US alone in 2004 (Passerini et al. 2007: 25). In the early years, 3G capability was promoted as linking subscribers with the 3Gs, girls, games and gambling, recognising that these are key drivers for many masculine early-adopters (Layden 2003; Skeldon 2002: 18). Futurists foresee both a 4G (fourth generation) and a 5G before 2020 (Ohmori et al. 2000: 134). With each generation, data speeds increase, as do functionality and choice of features; with dynamic competition between service providers and handset manufacturers prompting spiralling adoption rates. Te discussion of telecommunications deregulation (or re-regulation if you see the market as taking over the regulatory driving seat, instead of the government (Palmer 1994)) is an example of changes in policy leading to changes in regulatory practices. Governments attempted to balance diferent claims upon the public interest, universal service or vibrant industry growth, for instance, with a commitment to protect those most likely to lose from the shift in the market structure. For the majority of people living in western countries, deregulation of telecommunications prompted a dramatic fall in the cost of services and an improvement in service delivery. It also set the stage for the burgeoning growth of the domestic internet. For people in poorer countries, however, it is the continuing growth of afordable mobile 62 t h e i n t e r n e t communications that has ofered the greatest potential to revolutionise lives in terms of digital access, as we discuss briefy now. In many countries that were too poor to lay traditional telecommunications cables, mobile phones ofer a way to bypass piecemeal technological incrementalism. Tis means that instead of a technical infrastructure being gradually replaced with newer technology, the country has leap-frogged into advanced technology. Passerini et al. argue that the rapid adoption of 3G technologies, [means China is] skipping entire generations of technologies and products (2007: 27). Elsewhere, in the continent of Africa and in India, the adoption of mobile phones has been compared with the invention of the telegraph in terms of its virtually unregulated but revolutionary impact on markets (Carey 1988). Between 2005 and 2007, the number of mobile subscribers in India doubled, resulting in over 150 million mobile customers compared with fewer than 50 million landline subscribers (Abraham 2008: 9). Abrahams research showed that even 2G capability has the potential to transform markets in poor economies. Specifcally, in Kerala, fshermen use their phones at sea to fnd out demand and price for catch, and then fsh to order according to market requirements. Tis strategy conserves time, fuel and fshing stocks. Out on the water, the fshermen would also send out alerts on the mobile phones if large shoals were found . . . reducing the number of fshermen who had to spend time idling on shore (Abraham 2008: 12). India would be a classic example of a nation which is currently experiencing a digital divide, both internally and between India and the richer countries of the West. At the time of Abrahams research, only 3.5 per cent of Indias population was online, and this networked population was judged to constitute 3.7 per cent of global internet users (Computer Economics 2007). Tis compared with 69.9 per cent of the US population, and 62.3 per cent of the UKs (Computer Economics 2007). Even though technology users in marginal and emerging markets are comparatively disadvantaged, in India and elsewhere they are resourceful and imaginative, making ICTs work to their beneft. For those unable to take advantage of the ICT environment, however, new media greatly magnify the likelihood and the severity of the digital divide. It is to the social implications of the digital divide that we next turn. p o l i c y 63 Summary n Chapter 3 looks at policy as this affects the internet. It started by considering differences in the regulation of social and political life that directly infuenced the development of computer technologies in the UK and the US, particularly as these impacted upon one key British scientist, Alan Turing. n The second case study compared and contrasted aspects of internet regulation in Australia with analogous circumstances in China. Some commentators suggest there is more debate in China than has generally been accepted, as well as some interesting experiments in local democracy. Such comments specifcally exclude certain categories of dissent which attract draconian sentences. In contrast, although Australia is generally thought of as a liberal democracy, it seeks to control the internet more than most western nations. n Finally, we looked at telecommunications policy, which has particular relevance in terms of delivering the internet to consumers. Although the focus of the case study is mainly upon telecom policy in the US and the UK, it also includes an aside about the exciting potential of mobile phones to transform communications in the worlds poorer countries. Chapter 4 focuses on how a digital divide separates rich countries from the poor, and rich consumers from people who cannot afford to consume. 4 THE DIGITAL DIVIDE INTRODUCTION Are you a digital native? Do you feel at home on the internet? Te chances are that people born since the 1980s, reading this book, have grown up alongside the World Wide Web. Even so, theyre only likely to be totally familiar with the internet if they were born into one of the globes wealthiest countries. According to Internet World Statistics (2009), the top 20 countries in terms of their contributions to the overall global population of internet users, account for 76.8 per cent of the worlds internet users. Tis fgure demonstrates that some 175 countries between them have the remaining 23.2 per cent of the worlds internet users. Interestingly, the total number of countries is a disputed fgure. Te UN has a total of 192 members, but excludes Taiwan, Kosovo, the Vatican City and some nations like Scotland and Greenland which are not fully independent (UN 2009; Rosenberg 2009). Te table below also uses data from Internet World Statistics (2009), but the information has been reworked to put the countries and various non-autonomous regions in order of the percentage of their citizens who have internet access. Te top fve countries (plus a semi-autonomous region), and the bottom fve for which records are available, are shown in Table 4.1. A country-by-country account of ranked internet participation indicates that internet sources are largely concentrated in a small number of countries, while the huge majority of nations share ever decreasing tiny fractions of overall internet population. Such a distribution graph is described as featuring a long tail. While Table 4.1 indicates that Iceland, Norway and the Netherlands are the three nations with the highest percentage of their population online, with well over 4 in 5 people participating in the internet, a global graph of population participation would have countries like East Timor and Myanmar, both at 0.1 per cent of their population using the internet, close to the end of the tail. Participation here considers not just what we possess but also what we can do, the extent to which we can fulfl various social roles which in itself refers back to older discussions of social rights and citizenship (Somerville, 1998 cited in Haddon 2000: 389). 66 t h e i n t e r n e t Further down this ranked list of percentage of the population participating in the internet, the UK has 79.8 per cent internet users, New Zealand 79.7 per cent, Australia 79.6 per cent, South Korea 77.3 per cent, USA 74.1 per cent and Canada 71.7 per cent. Clearly, percentages difer from raw numbers. If we change the focus from the percentage of each countrys citizens that have access to the internet (Table 4.1) and instead look at the top countries in terms of the percentage they contribute to the global community of internet users (see Table 4.2), we see that the lists of countries are very diferent. Te top fve countries in each list have no overlaps, implying that it may be easier for smaller, richer countries to reach maximum internet take-up, but very hard for such countries to make much impact on the global population of internet users now that really populous nations such as China and India are coming online. Te inclusion of China and India in the top fve countries, in terms of their contribution to the overall population of internet users in the world, demonstrates dramatic diferences in the percentage of citizens able to access the internet in a national context. Taken together, these fgures indicate interesting information about internet access and opportunity for diferent people living in diferent countries. In 2008, Table 4.1: Internet users as a percentage of a territorys population, for 30 June 2009 Population Population using internet % Internet users Falkland Islands* 2,483 2,400 96.7 Iceland 306,694 273,930 89.3 Norway 4,660,539 3,993,400 85.7 Netherlands 16,715,999 14,272,700 85.4 Denmark 5,500,510 4,629,600 84.2 Andorra 83,888 70,040 83.5 216 nations and territories [. . .] Ethiopia 85,237,338 360,000 0.4 Sierra Leone 5,132,138 13,900 0.3 Bangladesh 156,050,883 500,000 0.3 Myanmar (Burma) 48,137,741 40,000 0.1 Timor-Leste (East Timor) 1,131,612 1,500 0.1 [. . .] 15 entities with 0 users Source: Data derived from Internet World Statistics, 30 June 2009, Miniwatts Marketing Group, http://www.internetworldstats.com/top20.htm. Tis list includes territories as well as autonomous countries, with [*] indicating a semi-autonomous territory. t h e d i g i t a l d i v i d e 67 China overtook the USA in terms of the number of its citizens online, but only one in four Chinese citizens can access the internet compared with three in four US citizens. India has the worlds fourth largest internet-user population, but nine in ten of its citizens (93 per cent) are not online. Such fgures address all access to the internet and do not diferentiate between dial-up services, which historically have dominated the market, and the more expensive broadband services. Nowadays, broadband take-up is often used as an indicator of economic prosperity and, as Table 4.3 illustrates, the number of broadband subscribers around the world is still comparatively small. Leaving aside diferences between broadband and dial-up, half way through 2009, only 24.7 per cent of the worlds population was online (Internet World Statistics 2009). Tree in every four people globally did not have access to the internet. Tese global citizens fall on the wrong side of what is termed the digital divide: a somewhat problematic term used to indicate that there are haves and have-nots in the digital world. Te divide itself marks the parameters which prevent the have- nots from joining the haves. Tis pattern of relative privilege not only re-inscribes the gender and power debates from the early years of the internet in the West, but ofers grounds for an argument of cultural imperialism (see Chapter 5) whereby western patterns of training, behaviour and infrastructure are required to keep, for example, a bank headquarters running, with 24-hour electricity supplies, western- trained technical support, high-level security protocols, and communication and network infrastructures that construct this locale as a node for a network developed and controlled elsewhere. Tis is the issue identifed by Wambi (cited in Bissio 1990), Technology is like a genetic material. It is encoded with the characteristics of the society which developed it, and it tries to reproduce that society. Table 4.2: Percentage of worlds internet users, and percentage of a countrys citizens using the internet, for the top fve countries in terms of numbers of users, 30 June 2009 % of the worlds internet users % of nations population using the internet China 20.3 25.3 United States of America 13.6 74.1 Japan 5.6 74.0 India 4.9 7.0 Brazil 4.0 34.0 Source: Data derived from Internet World Statistics, 30 June 2009, Miniwatts Marketing Group, http://www.internetworldstats.com/top20.htm. 68 t h e i n t e r n e t Many nations sufer from being on the wrong side of the digital divide and this lack of e-knowledge and infrastructure has implications for their economy and their society. Tis is one reason why, as we saw in Chapter 3, China dropped its policy of repressing internet use and moved instead to a policy of heavy regulation of the internet. China, like most growing nations in the world, wants a digitally literate population. As well as being an issue internationally, the digital divide is discussed here in terms of national policies as a challenge for governments within individual nation- states. Even in wealthy countries like the USA and Japan, the poorest 2025 per cent of the population is likely to have no internet access (Horrigan 2008b). Although western governments generally want their citizens to participatwe in high technology communications such as internet use, their markets tend to be deregulated. Te provision of ICT goods and services is usually left to the big companies that make up the market, moderated on occasion by specifc government regulations concerning access and coverage. Tis approach to providing information and communication goods and services means that the internet becomes available to those elements of national populations which are cost-efective to service, and who can aford to Table 4.3: Top ten countries worldwide for fxed broadband subscribers, frst quarter 2009 Country Subscribers (million) China 88 USA 83.9 Japan 30.6 Germany 24.1 France 18 UK 17.6 South Korea 15.7 Italy 12.4 Brazil 10 Canada 9.5 Source: Data from BuddeComm (2009), http://www.budde.com.au, Key Broadband Statistics, Table 20, Based on Point Topic research for the Broadband Forum, 2009. Broadband defned as a minimum speed of 144Kb/s. Fixed broadband includes wireless but is diferentiated from mobile services. Figures based on self-reporting by carriers. t h e d i g i t a l d i v i d e 69 pay. ICTs are not always available to those who need them most. Unlike countries, companies construct their client-base as being customers rather than citizens. Within the generality of the digital divide there are groups of people who are specifcally disadvantaged as a result of changed circumstances (Warschauer 2003; Rooksby and Weckert 2007). Tese are people who have had access to the internet in the past, but whose circumstances have changed, sometimes termed the nouveau information poor (Green 2002: 1039). Examples would include the newly un- employed, the recently retired on low incomes, some people who are divorced or separated, some migrants, those who relocate to remote or lesser-serviced areas and young people moving away from afuent homes (ibid.: 1067). Tese internet- experienced individuals sufer at several levels: not only do they lack access to the internet, they have a clear idea of how the internet could transform their circ- umstances and, fnally, they appreciate how the internet could provide a resource through which other people can ofer support while they negotiate the realities of their reduced circumstances. Every country includes a number of citizens, like those indicated above, who do not make desirable customers for big ICT companies. Such citizens live in inaccessible places, such as in remote locations with residency numbers too small for a viable service, or they are too poor, elderly or socially and culturally marginalised. Typically, these less serviceable citizens are unable to access the internet except through publicly funded resources such as libraries. In this chapter we examine some aspects of the digital divide as it afects people living in wealthy countries. We address digital inequality in the US and we also examine the circumstances of people who care for others in the UK. First, however, we consider the ways that some homeless people in Scotland use ICTs. Refection: Being a digital native Do you think of yourself as a digital native? How does your communication life compare with that of your parents when they were your age? ICTS IN THE LIVES OF SCOTTISH HOMELESS In the context of three in four of the worlds population being excluded from the internet, the role of the mobile phone as the globes major technology for connection and agency should come as no surprise. When we examine the lives of the poorest 70 t h e i n t e r n e t people in the rich minority world, the same pattern is evident. Claire Bure (2005) carried out a small research project investigating ICT use among homeless people in the Scottish cities of Edinburgh and Glasgow, focussing specifcally on mobile phones and internet access. internet access was via a drop-in space for homeless people; mobile phones were usually hand-me-downs, although they may have been gifts from case workers, or sometimes they were stolen. Homelessness is a name given to a variety of complex circumstances which is generally associated with a heightened level of chaos, vulnerability and un pre- dict ability. In some cases the people in Bures research were living in dormitory or borrowed accommodation; in others they were literally on the streets. In these situations, the mobile ofered the valuable beneft of being portable and thus at hand, which could be especially important in an emergency or when the user felt under threat. Te accessibility of mobiles contrasted with the comparatively fxed locale of internet access points. Phones also had the advantage of tradeability: they could operate as a currency in extremes and be swapped for drugs and alcohol. Although phones are valuable, there was a preference among the homeless for older, bulkier mobiles. Tis was because new, smaller phones are highly vulnerable to being stolen by other people, requiring vigilance. For these and other reasons, homeless people moving towards stability in their lives were more likely than the newly homeless to hold onto a phone and experience it as a stable advantage. Consequently the mobile phone also operates as an indicator of status and reliability. Te usefulness of the mobile phone as a technology to enable responsiveness is underlined by the description of the lifestyle of homelessness as typically transient, nomadic and built on the immediate gratifcation of needs, so activities tend to be planned on a minute-to-minute basis (Bure 2005: 117). Te purpose of Bures study was to investigate whether digital inclusion, which is to say access to ICTs such as mobile phones and the internet, built social inclusion. As Haddon points out (2000: 389), Te very words social inclusion have the merit that they capture this sense of avoiding social isolation. Social inclusion is the term used for being integrated within wider social and support networks including family, pre-homeless friends, and social and welfare services; participation in everyday public activities such as shopping and conversation; and individual agency, experiencing ones life as autonomous and self-directed. Te internet was useful in these circumstances, especially for those looking for accommodation, but was comparatively hard to access. It ofered homeless people the advantage of an email address as a fxed point of contact in a world where there are few fxed points and not many reliable contact opportunities. On the other hand, the chaos of homelessness introduces its own challenges reminiscent of the illiteracy issues of the majority world: one young homeless respondent who admitted that he was a t h e d i g i t a l d i v i d e 71 regular drug user claimed that he had fve or six (he couldnt be sure) email addresses because he could rarely remember his passwords (Bure 2005: 119). A mobile was seen as ofering its user a greater opportunity for sociality and privacy [and it] allows that person to be contacted, irrespective of their physical location, thus improving the chances of the homeless person being able to maintain their family networks (Bure 2005: 122). Even so, challenges such as battery life, pay-as-you-go costs, and lack of credit mean that access to a mobile is not a cure- all for the communications problems of homeless people, even if other problems of a chaotic lifestyle could be addressed. Bure concludes that it is clear that ICTs alone do not provide an avenue to social inclusion, although they may have positive implications (2005: 125). Nonetheless, access to mobile phones confers more, and more fexible, advantages for those in highly chaotic circumstances compared with the requirements of fxed access to the internet. Typically, this requires hardware, software, a weatherproof location and reliable power. If global use of the internet is going to reach the worlds poorer citizens, the chances are it will be via cheap, simple mobile phone access (see Chapter 9, Remittances). Even with equitable access to telecommunications, which means diferent things as new technologies become available, a number of issues remain, both for the Scottish homeless and for poorer people across the globe. Tese challenges include the fnancial, technological, skills and support resources required to be a competent internet user. In many countries gender is an issue too, with men more able than women to gain access to the resources required to use the internet. Such issues are as much a matter of social policy as technology policy. Tis kind of digital divide tends to be addressed in two ways. First, people are trained to be internet users through the education system and through work. Second, informal public access and training is encouraged through community locales such as libraries, and through private enterprise such as internet cafs. Additionally, those who feel excluded from online access may lobby and protest so that further avenues for engagement are opened up. Refection: opening up access to the internet Why do you think that the worlds poor are more likely to have access to a mobile phone than access to the internet? Do you think poor people will eventually be able to access the internet through their phones? Why? 72 t h e i n t e r n e t DIGITAL INEQUALITY IN THE US In the time gap between the election of President Obama, and his inauguration, a number of community associations, pressure groups and research agencies joined industry and business lobbyists in suggesting the kinds of priorities that they would like to see the incoming administration adopt. Te Pew internet and American Life Project was one such research organisation. Its website describes its mission as: Pew internet explores the impact of the internet on children, families, communities, the work place, schools, health care and civic/political life. Te project is non-partisan and takes no position on policy issues (Pew 2009). Reports date back to 2000 and provide an invaluable source of processed and analysed information, as well as making raw data available to researchers. In December 2008, identifying a range of ways in which the US had fallen behind leading countries in terms of digital infrastructure, including its ffteenth place in world rankings in terms of broadband take-up, John Horrigan, the Pew internet Projects Associate Director for Research, suggested that there have been four phases of internet development to date. Tese are: n A 1990s vision of one-to-many communication (such as telemedicine, or online teaching, where an expert is able to communicate to an audience); n A late 1990s engagement with many-to-many online communities; n An early to mid-2000s adoption of many-to-many societal conversations, such as blogging; and n Mid- to late 2000s many-to-many collaboration (Horrigan 2008b). Whereas it might be hard to see an earlier/later temporal boundary between societal conversations and collaboration, with Twitter (2006) more of a conversation than anything else, and Wikipedia (2001) highly collaborative; it is certainly the case that post-2000 has seen a burgeoning of collaborative and Web 2.0 (see Chapter 5) innovations including such phenomena as MySpace (2003), Second Life (2003), Flickr (2004) and YouTube (2005). Alongside his discussion of the ways in which the internet is being developed by prosumers to address their needs and interests, Horrigan also notes (2008b) that one in four US residents, 25 per cent of the population, do not have online access. He identifes a range of reasons for diferences in internet adoption and advancement, including technological availability (some areas do not have the technological infrastructure to ofer broadband), and inclination (some people do not see digital connectivity as relevant to them). Horrigans other two reasons the costs of internet access, and the difculties of using the technologies required are core characteristics of the digital divide. His suggestion is that the Obama program might decide that t h e d i g i t a l d i v i d e 73 government can play a catalytic role in nudging industry to improve usability and relevance through procurement, thus building the incentive for citizens to be active online and reducing the barriers to doing so (Horrigan 2008b). In a more detailed study of the respondents who did not use the internet, this population was identifed as being older than the norm, with a median age of 61, and more than twice as likely as users to live in low-income households (Horrigan 2008a). Whereas 18 per cent of non-user respondents had used the internet at some time, only 10 per cent of the people who werent connected indicated that they would want to have an internet service. Further questioning about reasons for a lack of interest indicated that about 9 per cent of people who arent connected see the internet as too difcult or frustrating, and 7 per cent see it as too expensive. Given that people who are classifed as older and poorer are less likely to have the internet connected, how consistent is the data on the opposite population the people most likely to use broadband in the home? Totally consistently, over each year from 2005 to 2008, male respondents were always more likely than females to say they had broadband internet. In 2008, males reported 58 per cent adoption, females 53 per cent. Broadband was also consistently associated with age across four age groups. Tus, in the 2008 broadband take-up fgures by age, 1829 year olds had 70 per cent take-up; 3049 had 69 per cent; 5064 year-olds 50 per cent, and 65 plus year olds had 19 per cent. Te younger the respondent, the more likely they were to have a broadband service. Education was also consistently linked to broadband adoption. Tis may be partly because advanced education increasingly requires students to master internet skills and use internet equipment to gain a qualifcation. Te higher the level of education, the more likely the respondent is to have adopted broadband. Te diferential here is 79 per cent for those who have undertaken post-college qualifcations, compared with 28 per cent adoption for respondents who did not complete high school. Income is also consistently linked with home broadband connections. Of upper income US respondents, defned as earning more than $100,000 per year, 85 per cent had a broadband connection compared with 25 per cent of those earning less than $20,000. High income was more likely than age, education or gender to be associated with the take-up of domestic broadband. Tis 85 per cent adoption rate indicates the potential upper level for interest in the internet if all other factors (such as time, money, support and motivation) could be successfully addressed. Te older-age, lower-income profle for non-users suggests that more support to develop relevant skills, and reduced costs combined with content that motivates online engagement, could be key to increasing take-up. As might be expected, dial-up users are also typically older and less well-of than their broadband cousins, to a slightly less dramatic level than is the case with 74 t h e i n t e r n e t non-users. Of the dial-up sector, 29 per cent have less than $30,000 per year income compared with 14 per cent of broadband users; the ratio for age is 43 per cent of dial-up respondents were over 50, compared with 29 per cent of broadband users. Te Pew internet Project research cited here (Horrigan 2008a) tells us how many and what percentage. Te fact that aspects of the research are repeated over time also makes it quasi-longitudinal; we can begin to see how things may have been changing. However, as a quantitative study, this research does not tell us why US broadband users and internet non-users fnd themselves in their current circumstances. People prioritise the things that are important to them. For example, as we see in the Chapter 8 case study on HeartNet, older people are more likely to choose email to communicate digitally rather than via blogs, discussion boards or instant messaging. Email is one internet application that is comparatively well-serviced by dial-up. It is possible that this group of dial-up users, being older and more likely to be female, are mainly internet users because they are email users. Until and unless they see a reason to want to do something else with the internet, such as watching television programmes that they have missed, which broadcasters are increasingly making possible (BBC iPlayer 2008), they are content with the level of service provided by dial-up. Marketers and sales professionals often discuss the pattern of technology take-up in terms of Difusion of Innovations theory (Rogers 2003 [1962]). Tis theory has also been applied to high-tech situations, with a Silicon Valley-based study pub- lished in 1984 (Rogers and Larsen). It was Rogers who frst suggested that new ideas and technologies are difused through a society by a process whereby diferent proportions of that population, with diferent characteristics, decide to use the new product or process and then infuence others to do so. He identifes fve categories of adopter: innovators (frst 2.5 per cent); early adopters (next 13.5 per cent); early majority (further 34 per cent); late majority (34 per cent); and laggards (last 16 per cent). Te term laggards has a negative tone: it might be just as legitimate to call them contents, or happy as they are. Indeed, some people resist getting the internet since they see the impact it has upon friends and families. A content label indicates that digital divide issues may not always exist as a problem to be solved; at least, not so far as the people themselves are concerned. Sometimes slow technology uptake is an indication that people feel no need to adopt the new technology and cannot see how it will enhance their lives. Te challenge of policy designed to minimise the digital divide is that user-choice should be the only inhibition to take-up. Skills development, technology support and afordable pricing should all be built into the adoption packages of policy-makers who would like to see more people able and motivated to use the internet and, ultimately, broadband. t h e d i g i t a l d i v i d e 75 CARING FOR OTHERS IN THE UK: A DIGITAL DIVIDE In the UK, and in countries around the world, many people with disabilities are cared for in their own homes by close family members who are neither professionally trained, nor professionally paid, for this caring role. Indeed, such families often live in poor fnancial circumstances. Although the carer may be entitled to some social welfare support from the state, the expenses incurred in supporting a disabled family member are generally very high. When the costs of caring for a disabled person are combined with the fnancial implications of withdrawing from the workforce in order to carry out the caring, the result is a signifcantly reduced income. Te impact of this reduction is felt both in the present and in the future, since carers are generally unable to contribute towards a personal pension for retirement, and are often at a signifcant disadvantage if looking for employment, even after their caring role is over. For these reasons, households which include a disabled person and their home-based carer tend to have a lower income and fewer resources than the general population. Tese factors indicate that carer households are likely to sufer signifcantly from the digital divide. Blackburn et al. (2005) carried out research with carers in the UK. Tey surv eyed approximately 8,000 adult carers (the number was uncertain since many question- naires were forwarded through voluntary groups) and received 3,014 responses. Tese responses indicated that the study cohort included more women and a greater proportion of older carers (over 55) than was generally the case in the UK carer population. Further, there was an over-representation of carers bearing substantial responsibilities (caring for more than 20 hours per week) and carers who had been caring for a long time (more than ten years). All of these dimensions are factors which might be expected to impact upon internet use. At the same time, these factors indicate a population which might especially require information and support delivered in an accessible way to the time and place where it is needed. Te lack of resources available to these carers means that they are likely to be information poor, and sufer from information poverty. Blackburns study was carried out against the background of a UK government commitment to increase online services for carers. Tis policy commitment raised some concerns that if new online provision absorbed resources, services provided through other media (for example, print or telephone) might be reduced correspondingly. Information and help is particularly crucial for untrained family- based carers yet Blackburn et al. comment upon high levels of unmet need for services and that carers are not provided with essential information at a time when 76 t h e i n t e r n e t they need it and in a form that they can make use of (2005: 202). Other studies have associated the carer role with a higher risk of depression and a sense of strain (Molyneux et al. 2008), while Blackburn et al. also suggest that carers are vulnerable to isolation and social exclusion (2005: 202). People sufering from depression often fnd everyday activities such as shopping and banking highly stressful and this is likely to be made worse if the shopper is also juggling patient care. General online services would help here. Access to the internet has the potential to redress issues such as the lack of information, absent professional support and social exclusion. It would also ofer choices to carers and help make their lives easier. Even so, in Blackburn et al.s study, with 2003 data, half the 3,014 respondents (50.5 per cent) said they had never used the internet. Of the 1,489 carers who reported using the internet, 896 (29.7 per cent of the total cohort) reported that they used the internet once or more per week. Tis was judged to be frequent use. Male carers and younger carers were much more likely to use the internet, while people with fewer resources and lower socio-economic status were less likely. Not being in paid employment or living in rented or other accommodation reduced the odds by two, Blackburn et al. commented, continuing that Age of the person cared for also appeared to be a predictor, reducing the odds by two for those caring for someone aged 18 years or older (Blackburn et al. 2005: 206). Tey indicate that carers of children and young people under 18 are more likely to have some free time because of their dependents educational commitments. Carers of older charges, however, often have extremely limited time for developing and using new skills. Te respondents to Blackburn et al.s study who had never used the internet (50 per cent), or used it only rarely (20 per cent), can be considered substantially disadvantaged. Refection: What issues are faced by those who have no access to the internet? Thinking about your own country, what problems arise, and what issues are faced, by people who do not currently have internet access? t h e d i g i t a l d i v i d e 77 In related US research, a Pew internet and American Life project (Madden and Fox 2006) surveyed adults online to fnd out how many had helped a friend or loved one cope with a major health crisis or serious health condition in the previous two years. Of the cohort questioned, 12 per cent had ofered this kind of help and identifed the internet as playing a crucial or important role. Tese respondents were classifed as e-caregivers. Madden and Fox then asked the e-caregivers questions about the specifc role played by the internet at the time. Some 36 per cent identifed the internets role in helping to fnd general advice and support; 34 per cent said it had helped provide specifc professional and expert advice, while 26 per cent reported that it provided information and helped the e-caregiver compare options. When asked about all of the diferent sources of information they used, 58 per cent of e-caregivers said the most important source was something they found on the internet. Only 38 per cent said the most important source was one they found ofine (Madden and Fox 2006: 23, emphasis in original). Te notion of accessing the internet to achieve these positive outcomes of integrating carers within social, professional and informational networks is more than a matter of providing a computer, however. DiMaggio and Hargittai (2001) identifed fve factors relating to internet inequality: (i) access to appropriate technology and equipment; (ii) autonomous use (the capacity for people to use the internet where and when they wished); (iii) skill levels; (iv) social support in the area of internet use; and (v), the purposes for which the internet is used (where economic drivers might trump social ones, for example). Isolated carers, vulnerable to social exclusion, as well as being older and economically disadvantaged, are likely to rate poorly against these fve factors. Blackburn et al. suggest that a range of measures is required to redress the balance. Supported access projects for carers who are older adults or in poorer socio-economic circumstances, which provide home- based training and support programmes and cover equipment and online costs may be important ways of widening internet access (2005: 208). Te take-home message here is that carers represent a population with specifc information and support needs. Even though carers are more likely than most to beneft from internet access, Blackburn et al. (2005) indicate that for reasons of age, gender and socio-economic status they are less likely than the general population to be able to access and use digital information. As more services go online, the implication is that existing inequalities will be magnifed. Even as the absolute numbers of people excluded from internet access decreases, the relative disadvantage sufered will be greatly increased. 78 t h e i n t e r n e t Summary n This chapter has moved on from the consideration of policy issues to the discussion of peoples lives, and their uses of ICTs. We start our exploration of the internets importance by noting that many people in the world, in rich countries as well as poor ones, do not have access to the internet. This is the case for three-quarters of the worlds population. n The frst case study in this chapter concerned the relative value of mobile phones and internet access to homeless people in Scotland, and the uses they made of these technologies when they were able to access them. n People in the USA who do not go online are often deterred by the costs of internet access and the diffculties of acquiring the skills, knowledge and experience required for profcient internet use. n A case study on UK carers illustrates some challenges faced by the information poor. Although internet delivery of information can be very cost effective, this is not a beneft if the key publics to be reached have limited access to the web. Chapter 5 moves from an examination of people who are excluded from the internet to a consideration of people who feel their culture is absent, or under-represented on the internet. We will also be considering the distinctions between Web 2.0, Web 3.0 and the Semantic Web. 5 CUSToMISING THE INTERNET INTRODUCTION Does your internet use refect who you are? Is it as individual as your fngerprint? How much is it determined by what you see as your work? How much by your leisure and play choices? Tis chapter examines what we mean by Web 2.0, and the ways in which we tailor our uses of the internet to express ourselves and to explore the issues and ideas that excite us. Our experience of the internet depends signifcantly upon our economic resources, education and expectations, and refects our social, cultural and historical circumstances. We have previously considered some arguments supporting the idea of technology as being socially constructed. Tese arguments also apply to the internet. Our idea of the internet is, to some extent, what we make it. Tis is not to deny the importance of the inventors, developers, designers and manufacturers of the hardware and software we use to engage with the internet. Nor is it to understate the role of the regulator and public policy in reconfguring the bounds of the internet to which we have access for example,: in China, as we saw in Chapter 3. Deliberate interventions to customise the web and shape our internet experience have their roots in particular historical and socio-cultural circumstances. Tose who design and create internet access tools and experiences for us exercise choice, and do this for political or entrepreneurial reasons. Tey aim to ofer something specifc and diferent from other products available to us. Tey seek to identify a way to cut through, to reset the default activity of key user groups. Tis chapter examines some relevant examples creating a web environment to promote the use of Irish Gaelic, and the struggle by French-speakers to resist the dominance of English. We recognise our power to choose as part of our participation in markets for goods and services. Brands grow bigger or decline in response to this power, as in 2008 when the number of people using the social networking site Facebook overtook those who use MySpace (Techtree 2008). We respond to the choices ofered to us by corporations and marketers through selecting our preferred way of engaging with the internet, given our specifc circumstances. In western countries we choose 80 t h e i n t e r n e t our Internet Service Provider from a range of possible companies; then we opt for dial-up or broadband access. Our browser choice also says something about us. Do you choose Internet Explorer, the Microsoft megalith, or the increasingly prevalent Mozilla Firefox, an open source application and thus a product of the Bazaar, rather than the Cathedral (Raymond 2001)? In the West, internet users tend to think in terms of Google or Yahoo, or equi- valents, when they want to search the web. In China, however, three-quarters of the online population use Baidu (Chmielewski 2007). Baidu is a locally developed Chinese search engine, and is also the frst Chinese company listed on the US- based NASDAQ-100. Founder Robin Li has a Computer Science degree from the State University of New York, Bufalo, and he worked at InfoSeek in 1997 before returning to China to set up Baidu in 2000. By 2007, Baidu had 74 per cent of Chinese online searches against Googles 18 per cent, even though the time a Google search takes a Chinese-speaking enquirer is signifcantly shorter: 30 seconds versus 55 seconds through Baidu (Chmielewski 2007). It may be that consumers are motivated by Baidus patriotic slogan We know Chinese best; or it may be that they are ofended by the Google approach to the Chinese censorship regime which fags to users whenever they try to access a prohibited site that cannot be displayed because of local laws. According to Chmielewski (2007), who cites an anonymous Chinese source, Te Chinese people were quite indignant . . . Tats like coming hereand saying, Im in your house, Ill eat your food, but let me tellyou upfront that I dont particularly like it. In China, choosing to use Google as your preferred search engine would be a very specifc statement. Alongside these service and software choices, and our consumer decisions about which computer we use and why, stands our relationship with the internet itself. We respond to the internet by prioritising diferent activities which refect our interests and our experience. Do we predominantly use the internet to connect to others via email or chat, to research information, to post to blogs or contribute to wikis, or to engage with others through social network sites or in online game play? Each person has a diferent pattern of engagement. Herbert Schiller, who was an infuential critic of US media, often wrote from a perspective that constructs capitalism as a form of control. In his refection upon the global pervasiveness of US culture, he decided it demonstrated that western lifestyles have a hold on the imaginations and energy of majority, poorer, countries. Our technology computerized weapons systems, medical scanners, the Internet sets the standard to which developing countries aspire (Schiller 2000: 149). Even prior to the widespread take-up of the internet, Schiller had argued that the old colonial imperialism has been replaced by a soft cultural and commercial imperialism which included: c u s t o m i s i n g t h e i n t e r n e t 81 the English language itself, shopping in American-styled malls . . . the music of internationally publicised performers, following newsagency reports or watching the Cable News Network in scores of foreign locales, reading translations of commercial best-sellers, and eating in franchised fast food restaurants around the world . . . Te domination that exists today, though still bearing a marked American imprint, is better understood as transnational corporate cultural domination. (Schiller 1991: 15) Te implications of Schillers construction of a pervasive soft imperialism are particularly serious for smaller nations trying to preserve their language and culture. English operates as a global lingua franca; a default language spoken by people who do not share a mother tongue. Magnifying the power of the language, the US is the dominant exporter of global popular culture and these media products have signifcant infuence on people around the world (e.g. Miller 1994). In line with UNESCOs 2002 Universal Declaration on Cultural Diversity, a number of nations are working to balance this infuence by using the web to communicate alternative priorities and languages. For the Irish, the ubiquity of the web has spurred calls for the greater development of Irish Gaelic content to support the maintenance and advance of a language rescued from extinction. For the French, the Google Books project became the catalyst for an international campaign. We will consider both of these examples of cultural self-defence before turning to the construction of social and cultural capital through Web 2.0 technologies, particularly as these relate to social networks such as Facebook; and the micro-blogging practices of Twitter. Refection: Do you agree with the idea of soft imperialism? Does US culture have a big impact on the way other countries do things? Is this a problem? EXPLORING NEW MEDIA USE IN RELATION TO IRISH GAELIC Irish Gaelic (Old Irish), one of the Celtic tongues, had been in decline for some centuries following the English colonisation of Ireland. After huge loss of life and forced migration during the Great Famine of 184549, at the time of the frst census to include a language question in 1851, the proportion of the population claiming to speak Irish as their only language was 5 per cent. Te Gaelic League 82 t h e i n t e r n e t was set up in 1893 to halt the decline but remained so marginal that even the 1916 Declaration of Independence was written in English (Walsh 2001: 2). By the 1920s, the pro portion of the population claiming any competency with Irish at all had fallen to 18 per cent (ORourke 2005: 274). Te Gaeltacht, or Irish-speaking areas of Te Republic of Ireland are in previously isolated regions to the north, south and west of the country, and account for 2.4 per cent of the population (Fleming and Debski 2007: 85). Historically these rural areas have been extremely poor and generally peripheral to the national economy. As the twentieth century progressed and economic conditions improved, people began to predict the death of the Irish language (Hindley 1990). Since the formation of the Gaelic League, a number of other strategies have been employed to help revive Irish. Tese include the launching of an Irish-language television station TG4 (Kenny 2005), and bilingualism in the Irish school system with considerable growth in the number of schools outside the Gaeltacht in which Irish is the medium of education. Te rise in the number of Irish-medium schools from sixteen in 1972 to 176 in 2000 indicates the symbolic importance of the language to the country, and a keenness among non-Irish speakers to see their children educated in a specifcally Irish context (Walsh 2001: 2). Additionally the Irish sought, successfully, to have the language adopted as one of the ofcial working languages of the European Union. Recent census data indicates that 43 per cent of Irelands residents claim competency in Irish; and linguistic research indicates that 510 per cent use the language daily (ORourke 2007: 275). Given that as the level of exposure to the language decreases, so too does the level of communicative usage, internet use in Irish has been recognised as a critical element in language maintenance and development (Fleming and Debski 2007). Fleming and Debski (2007) examined the internet and SMS texting habits of Irish children in three diferent educational contexts. Tey constructed internet use, in clud ing searching, chat and email, along with mobile phone texting, as being net worked communications. Some of the research participants attended an Irish language school in an Irish-speaking area where about a third of the students spoke Irish at home and English was a taught subject (Irish dominant). Others were from an English background attending a school where Irish is the medium of instruction (Mixed language). Te third group comprised children from an English background, attending an English language school in which Irish was taught as a subject (English dominant). Two separate classes from each of these three linguistic contexts took part in the research; one at primary level (1012 years old) and one at upper secondary (1618 years old). Students from theses six classes were involved in completing a self-report survey that involved some open-question responses, gathering qualitative as well as c u s t o m i s i n g t h e i n t e r n e t 83 quantitative data, with a total of 125 children participating. All the participating secondary students, and two-thirds of the primary students, had their own mobile phone. Fleming and Debskis hypothesis, which is to say the idea they were exploring through their research, was that if Irish was being used for communication in new media contexts then it might reveal itself as a modern language and a living language of communication (Fleming and Debski 2007: 88). Te two new media questions that Fleming and Debski wished their research to address were: What are the patterns in [schoolchildrens] use of Irish through networked communications? and How can these patterns be useful in making recommendations for the use of modern technology in language maintenance?. Most children reported that they almost never logged onto Irish websites. Tis was true for 97.5 per cent (English dominant), 90.5 per cent (Mixed language), and 85 per cent (Irish dominant) of respondents. Te main reason [given] for children not accessing sites through Irish was that they did not know of any. English was generally seen by them to be the language of the Internet (Fleming and Debski 2007: 94). English-dominant children never, or rarely, used Irish for sending emails, whereas 5 per cent of Mixed language and 12 per cent of Irish dominant children reported sometimes or often using Irish in email communication. In their responses the children indicated that they sent emails in Irish to friends and family with whom they would speak Irish in face-to-face situations (Fleming and Debski 2007: 94). More Irish was used in online chat by all three groups. While not being especially high, respondents reported using it for words and phrases that sound better in Irish, for salutations [and . . .] [u]sers tend to use Irish in international chat rooms, both to show of and to communicate with Irish people without being understood by others (Fleming and Debski 2007: 94). Even in text messaging, where at least some children from all three contexts sometimes used Irish to text, their usage appears to be specifcally related to those times when they communicate with people with whom they speak Irish face-to-face, including at school. When the two groups of children from Irish language schools were asked why they texted school friends in Irish, they tended to answer along the lines of Id send them in Irish because it might be something to do with school. Fleming and Debski consider that this response demonstrates the children consider Irish their school language (2007: 95). A fair to moderate statistical correlation was established between participants texting behaviour in Irish and the amount they spoke Irish outside school. Tat is to say, there is a correlation between the amount of Irish that is spoken in voluntary contexts and the likelihood of using it as the language of a text communication. Only one in eight of the children who lived in English-speaking areas had ever tried to use the internet to learn or improve their Irish, while the Gaeltacht 84 t h e i n t e r n e t respondents had almost never done so (one in 39). Te children reported several barriers to the use of new media in supporting their Irish language communications. Tese barriers included the lack of text prediction on mobile phones, and the absence of spell checkers for Irish in word processing. Additionally, Irish diacritical marks the little signs like French accents that help distinguish one word from another, and which can alter the sound spoken, and which diferentiate between words are generally not available on mobile phones and are comparatively inaccessible on computers. In summarising the fndings, Fleming and Debski noted that children from schools where Irish is the medium of instruction were more likely to change between using English and Irish, whereas those from the English language schools had higher tendencies to interject Irish constructions into their everyday speech (Fleming and Debski 2007: 96), rather than fully use the language. Classifying the reported usage patterns of the Irish language as generally token- istic, Fleming and Debski comment that these patterns demonstrate that the Irish language used is often simplifed, or takes a small interjections form. Even so, this informal use would suit it to new media communications if the established disadvantages of diacritical marks, spell checkers and text prediction could be over- come. Fleming and Debski express concern that in the schools they studied there are no Irish language computer-based networks connecting children with other Irish speakers. Such larger digital networks can encourage the children to use the language in their online communications. Similarly, there is a comparative dearth of Irish language content on the internet. Fleming and Debskis concern is that the lack of everyday opportunities to use Irish outside school means that school students language abilities will diminish over time. Tey need more services, media and documentation to be made available in Irish, so they see it as still being relevant to their lives after they leave the school domain (Fleming and Debski 2007: 99). Tis case study establishes one aspect of the perceived threat to a minority language posed by the widespread use of English on the internet. It calls for the creation of better Irish language resources on the web, and specifc Irish language networks to link Irish speakers and encourage language use in new media contexts. As we see in Chapter 8, resource development is rarely a simple matter of if you build it, they will come (Bonniface et al. 2005, 2006a). Given the widespread community support for the revitalisation of Irish Gaelic, however, better web resources coupled with an appropriate policy environment may help build bilingual competencies and further integrate the minority language into everyday life. Te next case study concerns attempts to resist the power of the English language medium to determine the resources available online. It argues that the fact that most of the big internet companies are English-language based (as Google is) has the potential to magnify comparative diferences in language usage. c u s t o m i s i n g t h e i n t e r n e t 85 LA FRANCOPHONIE, EUROPEAN CULTURE AND THE GOOGLE BOOKS PROJECT In 2004 Google announced its ambition to digitise the worlds books. Working originally with fve libraries four in the US and one in the UK Googles stated aim was to digitise and make available on the web every book which is no longer in copyright. Te initial target was 15 million volumes in six years, becoming 30 million volumes in ten years. Googles plan for copyright books was to digitise them to make them searchable at the level of full text contents, including unique strings of words, with limited portions of the whole available for viewing (Google Books n.d.). Depending upon Googles agreement with the copyright holder, the person making the search would be able to access snippets (no agreement with holder) or whole pages (if so agreed) of the copyright book. At each point, the page or the snippet displayed would be determined by the word or word-string searched for. In efect, Google was suggesting that they would create a digital archive of the printed word. According to Ron Rotunda (n.d.), Professor of Law, the project would narrow the educational divide by giving every child with web access the ability to search the collection of the greatest library online. Even so, there was an outcry from publishers over possible copyright infringement. Te publishing industry went on to initiate legal action (McGraw Hill v. Google). In 2005 Google announced an opt-out provision whereby copyright holders could withdraw their books from the project. Tis failed to placate complainants who argued that it presumes consent whereas the burden should be on a potential infringer to respect the rights of copyright holders (Jordan 2007: 33). In addition to the action from publishers, McGraw-Hill having been joined by others, including Penguin, Pearson, Simon and Schuster and John Wiley, Google faced legal action from the Authors Guild in the US, and from other groups internationally, who believed that Googles activities breached their copyright. Most of these cases are still pending (Justia.com n.d.) although Google had a win in 2006 when German publisher WBG dropped their action after being advised that it was Refection: The language of the web Although Mandarin Chinese is now the majority language on the web, English is used as the default international language. Should this be a big concern to speakers of other languages? 86 t h e i n t e r n e t unlikely to be successful. At the same time, the idea of a web library electrifed librarians discussions worldwide. Blake (2004), a US Librarian blogger, comments: If the web is a library, why do we need a building full of books? Why do we need librarians? Tats an easy question for us to answer, but I dont think it is for much of the population, and that should scare us. Jean-Nel Jeanneney, President of the Bibliothque Nationale de France (the National Library of France), while recognising the dream that a treasure trove of knowledge, accumulated for centuries, would be opened up to the beneft of all (Jeanneney 2006: 5), had diferent concerns. Tese started with Googles perceived Anglo-centric bias, which is always an issue for La Francophonie: the French-speaking world, and extended from there. Specifcally, Jeanneneys argument developed into fve key points, as indicated in Figure 5.1. (i) that the selection of books to be digitised is overwhelmingly English- language based; (ii) the presentation of snippets and pages entirely driven by key-word searches of (iii) Google-digitised books is culturally, contextually and organisationally questionable; (iii) the ranking of results has a strong English bias and does not take into account factors outside the Google algorithm, such as scholars judgements of importance; (iv) agreements between Google and source libraries leave the digitised texts in the hands of Google, a private company, when it is in the public interest to have these more accessible; and (v) the US provision for fair use under copyright laws differs signifcantly from equivalent laws which operate in Europe. (Bearman 2006) Source: Adapted from Jeanneney (2006) Figure 5.1: An outline of Jeanneneys argument against the Google Books project Jeanneneys frst concern, about the primacy of the English language, led him to say that there is a need to defend at all costs . . . the other European languages bearing diverse and complementary cultures (2006: 7). He goes on to assert that Googles choices will amount to a prioritisation of ideas and arguments that ft into the US view of the world. Choices and priorities are inevitable since the initial goal of 15 million books represented a fraction of the printed works of the globe, with c u s t o m i s i n g t h e i n t e r n e t 87 Jeanneneys estimation of published books in the West alone running to over 100 million. Commenting that non-English speaking European scholarship includes much work translated from English, he expressed concern that there was little balance in English-speaking scholars evaluations of non-English speaking scholarly contributions. Indeed, only 3 per cent of the annual published output of the US is in translation from other languages. Te weight of American publishers may be overwhelming . . . the dominance of work from the United States may become even greater than it is today (Jeanneney 2006: 6). Second, the issue of context caused Jeanneney signifcant concern. Addressing the matter as if it were a scientifc endeavour, where the sample to be searched is representative of the whole, Jeanneney commented (2006: 68) that Googles value as a search tool is hard to judge since the service is accompanied by no precise information about the limits of the search or the representativeness of the corpus in which it is carried out. Within a week of Googles announcement, Michael Gorman (2004), who was to become President of the American Library Association (2005 6), underlined concerns about unrepresentative extracts, this time at the level of the book. [T]he books in great libraries are much more than the sum of their parts, he said. Gorman went on to distinguish between information and knowledge: When it comes to information, a snippet from Page 142 might be useful. When it comes to recorded knowledge, a snippet from Page 142 must be understood in the context of pages 1 through 141 or the text was not worth writing and publishing in the frst place (Gorman 2004). Tird, it seemed possible that Googles AdWords auction system, a major income stream for the company which determines top dollar for key advertising placements on relevant web pages, might introduce commercial elements that have a further distorting efect upon Googles ranking system. Googles PageRank algorithm, discussed in Chapter 2, is a patented and commercially secret property. It operates according to assumptions and instructions that may introduce unacknowledged distortions and biases. PageRank values websites according to the number of websites linking to each of them, not by any particular indication of quality. Its likely that a search about vampires, depending upon the terms used, would prioritise Stephenie Mayers website well above the site of a world authority on vampire mythology. Tis would be because Stephenie Meyer is author of the best-selling Twilight series and would have many fan links. Even though a recognised world authority might have written as many books, and would have academic credentials, they will inevitably be less popular. (See Chapter 7 for more about the public sphere.) According to Jeanneney, his early 2006 searches for Cervantes (the author of Don Quixote [1605]), used the Spanish Google site. Te search curiously frst brought up fve works in French, followed by three works in English, before, in the ninth 88 t h e i n t e r n e t and fnal position, there appeared a collection of excepts of Don Quixote in the authors own language [Spanish] (2006: 12). Up to the point of digitisation, noted Jeanneney (2006: 30), books had been the only commercial medium not to carry advertising, but the Google Books project would frank results to favour Googles advertisers. Google asserted that their service was not distorted by their advertising. Tey suggested Google Books provided readers with the beneft of putting them directly in touch with booksellers and with libraries able to supply the book in which they were interested, and added there were no plans to charge libraries or booksellers for these introductions. Googles reassurances did not placate their critics. Fourth, given that Google is a commercial enterprise, and citing the example of Netscape which had been very successful and then was suddenly no more, Jeanneney questioned what would happen to the digitised collection of the Google Books collaborating libraries were Google to cease trading. Te implication here is that the online resource is too important to leave solely in the hands of a private corporation, to be disposed if at its own discretion. Further, Bearman (2006) comments that None of the contracts with Google made public thus far permit value-added reuse of scans made for Google in products and services ofered by others. Tis is important because for old and rare books the act of scanning implies possible risk and degradation, and thus the results should be available for as many uses as possible so that further scanning is not required. Fifth, and fnally, Jeanneney points to the critical importance of liaison between digitisers, publishers, authors and translators. No success in this feld is imaginable without the agreement of publishers [. . . and] the protection of the material and the moral and intellectual rights of the author (the latter rights, insufciently defended in America, are critical in Europe) (2006: 79). Tis remains an issue in Europe. In the USA, Google reached a settlement with the Authors Guild and the Association of American Publishers towards the end of 2008, subject to US court approval. Objectors to this settlement, which include Microsoft and Amazon, had until September 2009 to lodge their grounds (Singel 2009). Although any court-approved settlement would only be valid in the US, a number of governments, including Germany, Canada and New Zealand, also registered objections (Albanese 2009). Raising the stakes, there are indications that US government lawyers are scrutinising these Google Book developments with a view to possible future antitrust actions (Schonfeld 2009). Jeanneneys response to the threat from Google Book was not simply to repudiate the Google vision, but to help foster a Europe-wide response by an appeal to the sensibilities and the civic-mindedness of European citizens. His suggestion of a digital archive of European print material was swiftly endorsed when twenty-two of the twenty-four national libraries in the European Union signed the motion he had c u s t o m i s i n g t h e i n t e r n e t 89 proposed (Jeanneney 2006: 10). Te European Digital Library (BNE Bibliothque Numrique Europenne) was conceived as a corrective to the apparent excesses and exclusions of the Google project, and has similarities with initiatives from Yahoo and Microsoft, and Amazons Search Inside feature. Te European Digital Library project, as fnally funded, integrated the catalogues and the digital collections of the National Libraries of [nine European nations] into the European Library: thanks to the project, all EU countries are now members of the European Library service (EDL Project n.d.). Tis response underlines the importance nations place upon the social and cultural content of the internet, and the value they see in providing resources from a wide range of languages. Having discussed two attempts to rein in some aspects of internet development, while promoting others, this chapter considers developers attempts to rewrite the internet to make it semantic. It is to this project of customisation that we turn now. WEB 2.0, WEB 3.0 AND THE SEMANTIC WEB What is Web 2.0? What do people mean when they talk about Web 3.0 or the Semantic Web? Defnitions of these terms are extraordinarily diverse, and heavily dependent upon whether they are ofered from a technological, or social sciences, or a humanities perspective. Even so, with some caveats relating to the Japanese iMode service discussed below, Web 2.0 is generally positioned as comprising the web-based and user-based innovations that followed on from the crash in hi-tech stocks after the 2000 Tech Wreck (BBC News 2000). Web 2.0 initiatives include collaborative endeavours such as Wikipedia and peer-to-peer fle-sharing protocols such as BitTorrent, as well as social networks such as those created through Flickr and Facebook. Addressing the nature of Web 2.0, Hendler and Golbeck (2008: 15) suggest that Te fact that the sharing of content can be enhanced by personal connections, rather than primarily via search or other query techniques, has emerged as a major, and perhaps defning, aspect of successful Web 2.0 applications. Hendler and Golbeck support this argument using the example of YouTube. Videos on YouTube (see Chapter 9) do not become popular as a result of users one by one tagging their content following on from millions of individual, disconnected searches. Instead, YouTube videos are made prominent through sharing popular posts via emails, blogs, social network sites and other recommendations made by key individuals, who often act as opinion leaders (see Chapter 8). Where these communication practices are harnessed to commercial ends and promote products to consumers, they are often called viral marketing or word-of-mouth promotion. 90 t h e i n t e r n e t In the context of Web 2.0, such linking mechanisms constitute social activity which builds personal relationships and develops or strengthens networks and taste cultures: people who share similar views about videos they enjoy. Japanese-style anime might be an example of one taste culture. Once a video has made it, getting many thousands of views, it can become a popular node in the network of videos, which are linked by a number of metadata features (who they are by, what the main subject is, where the content originated, etc.). Search in YouTube is primarily enhanced by the social context, not by the semantic content of what is in the videos (Marcus and Perez, 2007). While automated technologies to create indexes of these videos are being sought, the primary indexing comes through the social overlay of the site. (Hendler and Golbeck 2008: 15) Te web before Web 2.0 was not called Web 1.0 at the time, it was just the Web. In retrospect this web, as it was created by Tim Berners-Lee and as it developed over its frst decade, can be considered to be Web 1.0. Te frst web was defned by the creation of web pages that linked through to accessible content, and by the development of efective search and index strategies to uncover and use that content. Much of the growth of Web 1.0 can be attributed to user-created content, consequently work done by users in creating digital content is not a new feature of Web 2.0. Instead, Web 2.0 is defned by new levels of sociality and collaboration, where users build upon the activities of previous users. In Web 1.0, a surfer might have accessed a great site and then emailed their friends about it. Te friends might also access the site, perhaps by copying and past- ing the address into their browser. Possibly the site had a counter to indicate the number of visitors, but a user could not generally gauge its popularity before click- ing through. In Web 2.0, an email would include the link so someone could click through seamlessly. At the same time, the promo image for site, video, book, etc. often presents star ratings from other users, along with the number of views, and these tools help someone decide whether or not to access the material. Trough accessing a site, and then linking it to a personal blog or social network page, the user contributes to a network dynamic. Te online activity produces links between the users social network and the site that afect the likelihood of other people also fnding, accessing and valuing the same material. Given the importance of these background linkages to the development of social networks, users produce value through accessing sites, as well as through crafting, tagging and uploading specifc content onto them. It is fortunate that what Hendler and Golbeck term the social overlay of a site has inherent value, since users tagging practices are inconsistent. Tags are not an efective c u s t o m i s i n g t h e i n t e r n e t 91 organising tool for most social network sites. In Flickr, the social network centred upon sharing photos and videos which was bought by Yahoo in 2005, the millions of content-providing members can organise their 3 billion photos and videos (as at November 2008) around such themes as photographer, tag, time, text, and group, and . . . place (Flickr 2009). It is the tag function that allows the content-provider/ photographer to categorise an image or video, to enhance its searchability and allow the fle to be organised alongside millions of others. Tags categorise the visual content of all fles posted. Information about a photo is itself part of the content, and is called metadata: data about data. Once an image has been posted, depending upon its access parameters, other users of the site can also add tags. Tis continuing expansion of metadata is sometimes said to create a cloud of information around the core data, providing a context for it (Bruns 2008a: 173). It is through searching the metadata including time, place and photographer, as well as content, that much non-verbal material, such as videos and photos, can be organised. Other parameters that can be included in searches, and in the metadata about the content posted, include information about the links to and from diferent items and the activity of browsing itself. Flickrs tagging criteria uses a folksonomy, defned by Tapscott and Williams (2006: 42), as essentially a bottom-up, organic taxonomy that organises content on the web. Whereas taxonomy was the term originally applied to the categorisation of biological specimens and living species, folksonomy is an ad hoc process relying on generic practices of tagging existing content using randomly, manually chosen keywords (Bruns 2008a: 173). Most established taxonomies use an internal hier- archical organisation. As an example, humans are a species (homo sapiens) and part of the order of primates. Te primate order also includes the chimpanzee species, and that of the ring-tailed lemur, along with many others. Te classifcation hierarchy makes it evident that, while all humans are primates, not all primates are human since the order primate includes a number of species. Folksonomies are non- hierarchical; they are fat, and no term has any predefned relationship with any other. Tis makes it much harder to organise information and relationships other than via the social overlay of the social network, informed by folksonomy tags. Even though people who use similar tags are likely to have overlapping interests (Tapscott and Williams 2006: 42), problems arise in terms of the lack of specifcity of the tags used. Ambiguity can prevent powerful links at the content level. For example, Hendler and Golbeck note that many common tags on Flickr include terms like dad (80,000+ photos), Fred (90,000+ photos), and My (something) (over 80,000,000 photos). Clearly these terms are not very useful outside specifc contexts (2008: 16). With Web 2.0, where the tag-terms leave of the social network takes over. 92 t h e i n t e r n e t It is notoriously difcult to look into the technological future, but every era tries to do so and the visions say as much about the people who share them as they do about technology or the future. Te vision for the Semantic Web, or Web 3.0, is that it may eventually be able to address Web 2.0s lack of connectivity at the content level. According to some ways of looking at the web, Web 2.0 builds rich, deep networks at the level of social actors. Web 3.0 aims to develop equivalent rich, deep linkages for content, which can be processed in a meaningful way by machines (Vossen and Hagemann 2007: 282). Te idea is that Web 3.0 adds a machine- processing activity to the power already provided through social networks. Web 3.0 is Web 2.0 plus the Semantic Web. Tese visions have a good pedigree, but are yet to become reality. Tey have been developed by the webs inventor, Tim Berners-Lee, and explained in Te Semantic Web A new form of Web content that is meaningful to computers will unleash a revolution of new possibilities (Berners-Lee et al. 2001). Te use of the term semantic relates to the communication of meaning. It re- quires data to be machine-processable, where the semantics determine what a mach- ine can do with the data beyond simply reading it (Vossen and Hagemann 2007: 289). Berners-Lee et al. (2001) address this requirement for meaning by sug gest ing that semantic content will be built into new web pages at the time of their creation as appropriate languages and protocols are developed and become more gen erally available. Te aim is to make semantic tools easy to use for non-specialists. [T]hese developments will usher in signifcant new functionality as machines become much better able to process and understand the data that they merely display at present (2001: 31). In contrast to the fat organisational structure, the heterarchy of folksonomies, the aim of the semantic information is to create hierarchical taxonomies of in forma- tion. Acknowledging that it is impossible to create a fexible taxonomical model that also provides a rigid structure, Berners-Lee et al. argue that developers should accept that paradoxes and unanswerable questions are a price that must be paid to achieve versatility. We make the language for the rules as expressive as needed to allow the Web to reason as widely as desired (2001: 32). Te example given of the kind of paradox that the Semantic Web would need to be able to handle is the status of the paradoxical sentence Tis sentence is false. Although Berners-Lees 2001 vision of the Semantic Web is still under con struc- tion, some of its component parts already exist. For example, Internationalized Resource Identifers (IRIs) will provide unique, global identifcation which can be used to structure information in the Semantic Web (Vossen and Hagemann 2007: 292). Tese IRIs can be built upon existing URLs (Uniform Resource Locators), which often start with http:// to indicate that they take the form of a hypertext transfer protocol. One application of the IRI approach is the proprietary Digital c u s t o m i s i n g t h e i n t e r n e t 93 Object Identifer or DOI system. Tis allows the web to link, not to a location as accessed via a URL, but to a specifc object, document, image or entity. Te DOI system works regardless of broken web links and the objects actual location. It is like the diference between dialling a mobile phone number compared with a landline that requires an area code and a number string which indicates the telephone exchange centre. Te developing schema for the Semantic Web would ensure that each element of meaning would have its own IRI which would be understandable to the machines that process it. Hendler and Golbeck (2008: 19) sum up the potential thus: For the Semantic Web, the [. . . IRIs] provide a set of semantic linkages that applications are starting to take advantage of . . . [F]inding ways to combine (link) the social structures of the Web 2.0 applications with the semantic structures of the Semantic Web is a compelling way to bring together two diferent networking spaces, allowing the total value to increase enormously. Te plan is for the heterarchy, the same-level linkages of Web 2.0 social and collaborative networks, to be balanced and made powerful by the hierarchy of Semantic Web applications. In theory, this combination of heterarchy and hierarchy will create a Web 3.0 experience that is much greater than the sum of its parts. Although this is an interesting idea, new visions of the future are constantly evolving and we can be certain that accurate predictions are achieved as much through luck as through knowledge. SOCIAL NETWORKING, WEB 2.0 AND MOBILITY Along with defnitions of Web 2.0 that foreground the sharing of content, as argued by Hendler and Golbeck (2008: 15); or defnitions that privilege metadata tags (Pesce 2006), some attention should also be paid to the increasing social and cultural implications of mobility of access to the internet. For most western consumers, this development was spearheaded by the BlackBerry, which was introduced in 2002 to provide mobile phone services, web browsing, email, and other wireless applications. Developed by Canadian company Research In Motion (RIM), their BlackBerry Connect software is also sometimes used to enable other companies mobile products to connect to the internet. Mobility of internet access in North America and Europe thus coincided with the development of a range of Web 2.0 companies, including collaborative endeavours like Wikipedia and BitTorrent protocols (both started in 2001) and early social network sites, such as Friendster (founded in 2002). 94 t h e i n t e r n e t Globally, however, the mobile-access concept had already been proven in Japan where iMode launched in 1999. Within two years, iModes parent company NTT DoCoMo (Nippon Telegraph and Telephone do communications over the mobile network) had developed a [US]$187 billion market capitalization, the highest of any company in Japan (Mullins 2007: 29). Internet-enabled mobile phones dramatically impacted upon Japanese connectivity rates. At the point of iModes launch 12.2 per cent of the population had internet access, compared with 39 per cent of the US population, 21 per cent of the British population and 23 per cent of the Korean population (Mullins 2007: 30). By 2001, two years later, internet subscribers ac counted for 44 per cent of the Japanese population (Aizu 2003: 120). As well as allow ing text-based communication and camera-phone mobile users to email images and post them to the net, the mobile phone has the potential to gather and transmit its location, and make available services in the vicinity, says Goggin (2006: 197) adding: Weather forecasts, tourist attractions, landmarks, restaurants, gas stations, repair shops, ATM locations, theatres, public transportation options (including schedules) are some examples of the information provision fltered to the user location. (Fraunholz et al. 2005: 1445; cited in Goggin 2006: 197) Such services are increasingly provided via new generation mobiles such as the iPhone. Tese applications require 3G technologies (third generation, see Chapter 4), while the information sources discussed are generally internet-based. Opport- unistic access to in-the-minute information is increasingly able to enrich everyday activities with cultural and social information, such as using a 3G phone for map directions. Mobile phone access to the internet is associated with greater sociability, according to Castells et al. citing Ishii (2004: 56), in contrast with high-intensity users of the PC Internet . . . , heavy users of the mobile Internet are actually more active in interpersonal communications and socializing (2007: 92). Even so, it is only recently that mobile technology has generally supported members of social networking sites such as MySpace, Bebo and Facebook who wish to use their phones to interact with their online profles, and those of their friends, while in transit. Nicola Green discusses interactional aspects introduced by mobility (collectively viewing texts and images on a mobile phone while on the move as well as sending them to other mobile devices, or the posting of an account of everyday travels through a city while conducting them) (2009: 274). Among the multitudes of possible applications for these services, mobile internet access helps recruit citizen scientists to report bird sightings to ornithologists websites (www.birdguides. com). All these aspects of interactivity indicate the value of internet-enabled mobile phones for those participating in online social network sites, on-the-move blogging, feld reporting and citizen journalism (see Chapter 7). c u s t o m i s i n g t h e i n t e r n e t 95 Twitter is a cross-over social network/micro-blogging service, founded in 2006, that is reminiscent of SMS (Short Message Service) texting practices of 2G phones. Permitting messages of up to 140 characters, the constraints upon a tweet (a Twitter message) are similar to those placed upon SMS texts in the early days of mobiles when the upper limit was 160 characters. Te aim of Twitter is to write in the moment of everyday actions, habits, experienceseveryday trivia[since] this forges connections between individuals who are physically remote from each other (Crawford 2009: 250). Sometimes these micro-moment posts are also used to provide up-to-the-minute information about chaotic and breaking news, as was evident in the Mumbai attacks of November 2008 where Twitter users ofered some of the on-the-ground citizen-journalism reporting. People connected into a Twitter network can choose to access their incoming tweets through a variety of digital media and applications, including email, SMS, instant messaging clients and the Twitter website. Crawford discusses the dispersed sense of intimacy generated by regular contact with a wider circle [. . . of ] friends, acquaintances, colleagues fostered by the sharing of the everyday (2009: 2512). Indeed, Crawford cites Moyal (1989 [reprinted 1995]) and Rakow (1992) as evidence that sharing the banalities of the everyday is a form of care-giving. Although Twitter can be very personal and intimate, it is also possible to read global exchanges across the continents and in multiple languages via the internet (Twittervision n.d.). Viewed in this way Twitter makes a surprisingly moving conversational collage, showcasing both diversity and specifcity. Lev Grossman in Time magazine describes Twitter as the cocaine of blogging or e-mail but refned into crack (Crawford 2009: 255). Given that Twitter is a relative newcomer, as well as being a hybrid between a micro-message blog and a social network site, the major mid-2000s Web 2.0 social networks were Facebook and MySpace. Te services ofered by Facebook are outlined as allowing: [U]sers to create profles and articulate connections with other users, who are then listed as friends. Certain other features, like testimonials, the ability to join groups of shared interest, and the ability to post pictures are also increasingly incorporated into online social networking software (Lampe et al. 2006: 167). Refection: Everyday mobile access to the internet What do you see as the implications of untethering the internet to the point where it can be accessed cheaply and easily by mobile phone? 96 t h e i n t e r n e t Social network members were also critical of the take-up of a number of other Web 2.0 oferings, with such activities as photo and video sharing occurring both within tools provided in the sites architecture and via specialist sites. MySpace users were so heavily committed to posting and reviewing YouTube content, for example, that 17.5 per cent of the video-sharing trafc was linked back to MySpace social network members at the time of YouTubes sale to Google in 2006 (Tancer 2007). In terms of the social and cultural implications of Web 2.0 social networks, these are clearly signifcant, if hard to quantify. Tere is some disagreement, for example, as to whether social networks are primarily used to stay in touch online with people already known in ofine contexts, or vice versa, or whether these dynamics change over time and refect specifc circumstances (Lampe et al. 2006). danah boyd (who eschews capital letters in her name) diferentiates between the social network notion of friending, partly attributable as a verb to the activities of the frst established social network site Friendster, and the actual processes of making and being friends: While some participants believe that people should only indicate meaningful relationships, it is primarily non-participants who perpetuate the expectation that Friending is the same as listing ones closest buddies . . . Friendship helps people write community into being in social network sites. Trough these imagined egocentric communities, participants are able to express who they are and locate themselves culturally. In turn, this provides individuals with a contextual frame through which they can properly socialize with other participants. (boyd 2006) boyd is making oblique reference here to the idea of social capital. Social capital is much talked about, and defned in a number of ways. Te notion of capital constructs these social processes within a notionally economic framework whereby people invest in their social networks with the expectation that they will be able to draw upon these networks in difcult times. Adler and Kwon ofer a recent defnition (2002): Social capital is the goodwill available to individuals and groups. Its source lies in the structure and content of the actors social relations. Its efects fow from the information, infuence, and solidarity it makes available to the actor (2002: 23). boyds comments also indicate how activity on social networking sites has im- plications for the cultural project of diferentiating the self through our individual consumption of goods and services, as explained by the theory of consumption (Miller 1987). Te goods and services consumed include those implied both by the social network site and the networks of friends and acquaintances. Tese activities of self-exploration, community-building and relationship-contexting, carried out while on the move or in comparatively stationary environments, are central to the c u s t o m i s i n g t h e i n t e r n e t 97 Summary n This chapter discusses how each of us has an individual experience on the web. We construct our own online environment through a range of deliberate choices that are also affected by where we live, the services that are available and affordable, and the regulatory environment. n It includes two examples of where the internet has been constructed as a possible beneft for, or a possible threat to, the development of national culture. The examples chosen were the support of the Irish Gaelic language in Ireland, and a French librarians response to Google Books. n Differentiating between the web (by default, Web 1.0), Web 2.0 and the Semantic Web, the discussion addresses deliberate attempts to create new web functionality. one example is the way in which new media technologies, such as the iPhone, are being used to access the internet while on the move. Twitter, and social networking sites such as Facebook, particularly beneft from in-the-minute access. Chapter 6 introduces some problematic uses of the internet which can act as triggers for legislation and regulation. Pornography and online defamation will be considered in this context. cultural work necessarily performed as part of our engagement in social networks; as part of our activity in building social capital. Notions of community, and especially web-based community, are explored further in Chapter 8. 6 REGULATIoN AND LEGISLATIoN: PoRNoGRAPHY AND CYBER STALKING INTRODUCTION What meanings do you associate with the internet? Even acknowledging our discussion about how everyone confgures their own experience of a technology, that may seem like a funny question. Given the time spent in previous chapters investigating the internets beginnings, it is tempting to answer in a technological or historical or policy framework. Yet these explanations may not quite capture the meaning that the internet has for you. Your experience is likely to relate to what has strongly infuenced you in your activities on the internet. You might feel passionate about game play, for example, or connecting with family and friends through Facebook; or you may feel fearful having been traumatised by a cyber stalker or identity thief. Whatever the case, we can assume the meanings youve constructed for your narrative of the internet difer in signifcant ways from other peoples. While our ideas of the internet may difer, the chances are that the concepts we hold overlap sufciently for us to have a sensible conversation about it. Te essential details of the internet are agreed; it is the discourse around those details that difers from person to person. If we agree to difer about the meanings we have made in relation to the internet, what do we mean by discourse? Jonathan Cullers (2002 [1981]: 189, 190) defnition ofers a useful starting point: [T]he theory of narrative requires a distinction between what I shall call storya sequence of actions and events, conceived as independent of their manifestation in discourseand what I shall call discourse, the discursive presentation or narration of events [. . . Te story is] an invariant core, a constant against which the variables of narrative presentation can be measured. 100 t h e i n t e r n e t Another way of saying this is that people can look at the same series of events and choose to explain them in diferent ways. Going back to our difering notions of the internet, the details of what we believe the internet to be will be the core, or the story; the way we think and explain the core to ourselves and others is the discourse, and it is the narrative that determines the kinds of discourse we use. One persons internet narrative might focus on exploration; anothers on community; a third on being swamped by an avalanche of information. Te recognition that discourses difer leads to the relevance of discourse analysis as a way of exploring and exposing the principles underlying the use of a specifc narrative or a range of narratives. Discourse analysis is one research tool used by social constructionists to explain the complex dynamics of social and cultural meaning-making. Tis is examined further in a frst section below. Tis chapter investigates the internet as if it were a risky place requiring regulation, legislation and care. For some people, some of the time and in some circumstances, internet use can lead to a number of risky and unpleasant outcomes. Laws and regulations are in place to limit exposure to signifcant risks. Some of these risks were a focus of EU Kids Online, a multi-country research network led by Professor Sonia Livingstone and Dr Leslie Haddon at the LSE and co-sponsored by the LSE and the European Community Safer Internet Plus Programme. Between 2006 and 2009 researchers from twenty-one European Union countries collaborated to examine the fndings of national and international studies of children and young peoples use of the internet. Te EU Kids Online project conceptualised risk according to three main categories (Hasebrink et al. 2009: 8): Content, in which the user is the recipient of a mass communication; Contact, in which the user participates in risky interpersonal communication; and Conduct in which the user does things which might have risk, such as revealing personal contact details, posting compromising images, meeting up with strangers, infringing copyright or hacking into a network. Tese issues are further examined in Chapter 9 in relation to children in the family home. To illustrate diferent ways in which the internet is portrayed, Haddon and Stald (2008), both part of the EU Kids Online project, conducted a 14-country review of press coverage concerning the internet for the months of October and November 2007. Teir research demonstrated that press coverage of internet risks was much higher than press coverage of internet opportunities and benefts. With the exception of Denmark, where 81 per cent of press coverage concerned leisure/ play/entertainment stories, and Bulgaria, where it was judged there were too few stories to categorise, the remaining twelve countries Austria, Belgium, Estonia, Germany, Greece, Ireland, Italy, Norway, Portugal, Slovenia, Spain and UK had the largest proportion of their press stories in the category concerning legal/crime/ r e g u l a t i o n a n d l e g i s l a t i o n 101 police content. No country had the largest share of their press coverage relating the internet to education. Although the press may generally focus their internet coverage on legal/crime/ police stories, domestic perceptions of the internet are often presented as a competition between its educational value and its potential for fun and entertainment. Back in 1997, David Marshall had noted that parents consider computer literacy is the passage to a comfortable future [. . . but] Te arcade game dimension of the computer shifts its value from information source to entertainment site (Marshall 1997: 71). Parents bought computers because they saw them as educational, while children wanted computers because they saw them as fun. Tese diferent perspectives on computers and the internet refect diferent ways of conceptualising the internet. Tis chapter looks at two examples of risk as these afect adults, and for which there are regulatory and legislative remedies where the risks become substantial. Pornography is an example of a content risk where a judgement of legal or illegal content can depend on the participants birth dates, upon the informed consent of the parties involved in the making of pornography and upon the age of the viewer. Further, there is some indication of commercial risk (see the discussion of Prodigy below) in that restricting and regulating online interaction to exclude the possibility of sexual content can be a risk for the service provider. Consumers may head towards more liberal and less regulated environments. In contrast, cyber stalking is an example of a contact risk. Even though there may be no physical danger, it may be difcult to ensure that an individuals right to protect their reputation, and to communicate in open and respectful ways, is upheld. Tese case studies on pornography and cyber stalking are preceded by a discussion of discourse analysis, developing the theme introduced above, because it is in constructing and discussing the internet as a place of risk rather than a place of creativity, education and fun that we open up a number of debates, while closing down others. Tis consideration of narrative theory and discourse analysis will help make that process clearer. Refection: Whats your biggest risk? Are you aware of taking risks in your online behaviours? Would these be content, contact or conduct risks? What might be the consequences of the risks you run? 102 t h e i n t e r n e t DISCOURSE ANALYSIS When we look at the ways in which people see the same thing diferently it can help us to understand the complexity of experiences and associations. Parents might see the computer as an educational tool, children might see it as a games machine or a way of chatting with friends. Te media might see computer use as a risky activity and discuss it predominantly in terms of legal, crime and police stories. Howard Rheingold rationalised his early experiences of a mid-1980s internet community, the WELL (or Whole Earth Lectronic Link), in terms of a groupmind. He used the notion of the brain to explain the synergies in knowledge and experience resulting from internet users getting together in cyberspace and tapping into this multibrained organism of collective expertise (Rheingold 2000: 109). Here the terms mind, brain and organism are being used as metaphors. Metaphors can be useful for communicating meaning through discourse. One important feature of metaphors is that they dont have to be either/or, they can be and/also. Multiple metaphors can indicate a range of appropriate and interesting discourses. Gareth Morgan (2006) developed a series of metaphors to help people understand complex organisations. He argues that we can use a range of metaphors to help construct our understandings of organisations, as indicated in Figure 6.1. (i) machines, with different parts functioning together as an effcient whole; (ii) organisms, growing and evolving; (iii) brains, with self-organising and interconnecting properties; (iv) cultures, with their own social realities; (v) political systems, with confict, competition and regulation; (vi) psychic prisons, controlling the ways that inmates talk, think and act; (vii) continuously changing and constantly in states of fux and transition, and fnally (viii) instruments of domination, whereby the organisation becomes a tool of suppression. Source: Based on Morgan (2006) Contents Table Figure 6.1: Morgans metaphors for organisations r e g u l a t i o n a n d l e g i s l a t i o n 103 Morgan suggests that not only is it possible to construct meanings concerning a single organisation according to a number of these metaphors, but also that there is value in so doing. Multiple metaphors reveal multiple aspects of the organisation that might otherwise be hidden and not addressed. A willingness to see a range of possibilities also protects against a belief in certainty: [T]here can be no single theory or metaphor that gives an all-purpose point of view. Tere can be no correct theory for structuring everything we do (Morgan 2006: 338). Discourse analysis helps us to see the role played by metaphors in a text. Discourses can also frame a range of viewpoints: for example race, class, gender and culture all provide diferent perspectives for examining and analysing texts. Te use of discourse analysis acknowledges that people make sense of information using diferent strategies, perspectives and experiences. When we talk about a range of possible discourses, we talk about diferent dis- cursive approaches. Discursively, the history of the internet might be seen as entirely a project of the US Armed Forces given, as is the case, that ARPA/DARPA is an agency within the Department of Defense, and the frst beginnings of the internet were as a result of work commissioned by people who were employed and funded by the Pentagon. It would have been entirely consistent with the facts if the narrative in this book had strongly emphasised the militaristic aspects of this development, especially in view of the Chapter 1 A to E mnemonic of the fve power groupings behind the development of technology, which places the armed forces frst. Te narrative presented in Chapter 2, however, was far more centred on the passion that early internet developers felt for their work, and the ways in which they collaborated across military, university and business lines. Tis discursive approach to narrating the story/core of the beginning of the inter net is somewhat distanced from a construction of the internet as a repressive outcome of a militaristic plan. Instead, the narrative history of the internet ofered in Chapter 2 concentrates upon what technology tells us about ourselves and each other in terms of peoples behaviour and practices with it. Tis is also the function of the case studies to follow. PORNOGRAPHY In terms of a product or service that drives uptake of the internet, spawns new business models and prompts service and technology upgrades, pornography has some times been called the killer app. Tis indicates its role in single-handedly driving consumer demand for an increased range of delivery mechanisms including new and emerging technologies. Even in a post-feminist world pornography is 104 t h e i n t e r n e t generally acknowledged to be a product predominantly aimed at males, and in some circumstances this constructs porn consumers as a desirable advertising demographic. For many pornography users, the internet is simply a more convenient and accessible way to obtain material that might otherwise be procured via magazines, videos and DVDs. Te benefts of internet-delivered pornography can include round-the-clock access, some free products paid for via advertising, and privacy of consumption (Fisher and Barak 2001; Albury 2003). Online pornography use is sometimes an activity that complicates the everyday life of the adult entertainment user, especially when pornography is accessed through work-based resources, by under-age youth, or in jurisdictions where it is illegal. Constructing the internet as a pornographic delivery system might seem to position the technology predominantly as a means of accessing media content in private space. Te digital trails that link pornography with the consumer have the capacity to make the private very public, however, sometimes at signifcant social and legal cost. Te reverberations of accessing online pornography thus do not always end with the consumption of the pornography itself. Sometimes porn consumers experience secondary efects of their construction of the internet when they are traced via digital trails and called upon to account for their use of work time or employers technology, or their afliations with certain legal or illegal taste cultures in pornography. Te adult entertainment industry, as the pornography business prefers to be known, generally sufers from a bad press. It has been constructed as exploiting and de grad ing the women who work in porn, demeaning those men that use it, and making satisfying relationships harder to achieve in real life (RL). Recent research with porno graphy users (McKee et al. 2008) indicates a more positive picture. Over 1,000 pornography users completed a survey that showed 57 per cent of respondents thought it had a positive efect on their lives, with a further 35 per cent saying that it had no efect on their lives (McKee et al. 2008: 83). (One per cent said it had a large negative efect, and 6 per cent that it had a small negative efect.) Te kinds of positive efects attributed to pornography use by these respondents included making users more relaxed and comfortable about sex, making them more open-minded and willing to experiment, and making users more tolerant of other peoples sexual pleasures (2008: 85). McKee and his co-authors suggest that negative perceptions of porn continue to circulate because many porn consumers are relatively closeted, if not actually ashamed, when it comes to their porn consumption (2008: 178), and this might explain why such a large consumer group about one-third of all adults in western countries, according to Roy Morgan and similar commercial research organisations (McKee et al. 2008: 25) is comparatively silent. Research also indicates that r e g u l a t i o n a n d l e g i s l a t i o n 105 about 10 to 20 per cent of porn users are women, often consuming porn with their partners as part of their private sex lives (2008: 27). Such fgures suggest that over half of adult males in western countries may consume pornography, conforming with a social stereotype that: Every ordinary man likes porn. We know this because of magazines like Ralph and Loaded, semi-pornographic mens magazines that are all about booze, babes and balls (McKee et al. 2008: 25). Voss attributes the stigma associated with the adult entertainment industry to the heightened and paradoxical reactions surrounding the non-normativity of sexuality and commerce (Voss 2007: 6). Tis perception refers to a general public construction of sexuality as private, and not appropriately commercialised, even if signifcant numbers of people use online interactions and resources to foster their private sex lives. Tree-quarters (76 per cent) of the people surveyed by McKee et al. (2008: 34) spent less than three hours per week using pornography, with 41 per cent of all respondents accessing porn for less than one hour per week. Te researchers note that most of their respondents were recruited to their study via a mail-out to customers by an adult entertainment DVD/video company. Smaller numbers re sponded to McKees online survey, so these fgures may not fully represent the experience of people who use the internet to access porn. As well as noting the paradoxical elements of the hidden market in porn, which seems to be much larger than public discussion and self-identifcation would indi- cate, this chapter considers porn as a major driver for the uptake and adoption of new technologies. Several studies have indicated the central role pornography plays in driving the development and uptake of new technologies (Coopersmith 2006; Voss 2007). Tere are four main reasons for this. First, consumers of pornography are often young adult males: the Ralph and Loaded reader stereotype. Tis is also the demographic for people most likely to be early adopters of new technology and can indicate comparatively high levels of uncommitted income (Coopersmith 2006: 3). Tere appears to be a mutually- reinforcing linkage between a willingness to use new technology, a capacity to pay for it, and a desire to access pornographic content that creates an incentive to adopt. Second, pornography use sometimes involves a social stigma (Voss 2007). Tis means that users have an incentive to access pornography discreetly and to consume it in private. Both discretion and privacy of use can be supported in many domestic online environments. It should be noted here underlining the perception of stigma, and encouraging the closeted use of porn that some employers have successfully sacked workers for accessing legal pornography using work computers (McKee et al. 2008: 49). Although it is arguable as to whether access to pornography would count as a civil liberty; in a number of countries pornography is heavily censored or illegal. Tese are often countries where take-up of the internet is less pervasive 106 t h e i n t e r n e t or comparatively public, with high use of cybercafes, for example. Such countries include China, Iran and Saudi Arabia. Tird, new technologies ideally require a stable income stream to keep the sector growing while a more varied suite of content products is developed and marketed. Tis means that people who make and market pornography typically experiment with technological innovations and are allied with early developers of products and services. Tis is in contrast with many other media markets. For example, as the large music producers were trying to rein in the peer-to-peer networks such as Napster, so the pornography industry was developing its wares. Instead of fghting fle sharing, some in [the porn] industryestimated to be generating $750 million to $1 billion per year in revenueare quietly fnding new ways to proft from it, commented San Francisco Chronicle writer Benny Evangelista (2003), quoting Grokster President Wayne Rosso as saying Te porn guys are smart, theyve fgured out how to use the technology. Finally, porn consumers are motivated to upgrade equipment, services and their technical skills to take advantage of new services and products such as high-speed downloads and portable mobile phone content. Tey also choose to engage with technology in a comparatively anonymous way, preferring to access online sex-related forums using pseudonyms. Commenting on the mid-1990s competition between online services Prodigy, CompuServe and AOL, Kara Swisher argues (2003: 401) that it was the policy of allowing users to develop their own online spaces in private that allowed AOL to dominate the emerging online market: AOLs anonymous screen names, unmonitored chat rooms and easy attachment of graphical fles [. . .] set it apart from the other online services. She adds that a Prodigy executive told me in 1996, that AOLs privacy policy in chat rooms was [the reason] why AOL has eight million members and Prodigy had faded to a shadow of its former self (ibid.: 41). Unsurprisingly, given the prevalence of pornography on the web, and the en- thusiasm of some internet users to access it, sex-related terms are amongst the words most frequently searched for. Indeed, most search engines ofer two separate reports for purchasers of information about search word frequency: with adult flter on (which excludes sex-related terms) and without the flter. Frequency of word search has commercial currency since the use of appropriate search terms can increase relevant trafc to commercial websites, and thus increase click-through rates and proftability. Coopersmith (2006) comments that, when all search terms are included, Wordtracker found that the frst 6 of the top 10 and 10 of the top 20 search terms on several web metacrawlers over a four-month period in late 2005 were pornographic (2006: 5). r e g u l a t i o n a n d l e g i s l a t i o n 107 In an earlier report, a 2003 study of peer-to-peer network Gnutella indicated that 42 per cent of the 22 million searches during the 18-day period investigated were for pornography, compared with 38 per cent for music (Evangelista 2003). Te predominantly teenage male LANing communities, where members set up self- contained Local Area Networks (see Chapter 8), generally have game play as their primary purpose. Additionally, members often use BitTorrent sites to access porn and then swap it from hard drives to hard drive in face-to-face (F2F) LANfests, while taking part in gaming marathons (Green and Guinery 2006). Peer-to-peer porn sharing ofers dual benefts to users. It normalises porn access and use, since the material downloaded is also being used by people known to the downloader: peers in similar circumstances. Further, it by-passes some of the negative associations of accessing porn using commercial websites, such as explicit pop-up porn and mouse-trapping (opening multiple porn sites that viewers are unable to click out of ) (McKee 2008: 186). Voss argues that the stigma associated with the adult entertainment industry has afected innovation, including technological innovation, in a number of ways. It afects the recruitment of people into the industry, with people concerned about the efect of a period of employment in the porn business upon their future career prospects and their social and emotional relationships (Voss 2007: 9). At a business-to-business level, even frms which did not directly deal in adult content but provided third-party services, such as billing and marketing could sufer from an association with porn companies, with managers describing how people from mainstream companies might respond by backing away slowly and making the sign of the cross (Voss 2007: 10, italics in original). Within the industry itself, however, there is signifcant interaction and sharing. Tis occurs both on industry-specifc online message boards (ibid.: 11), where managers and employees get themselves known and promote their own companies and expertise both publicly and using private instant messaging, and at regular trade shows. One implication of this is that, since the porn industry is a relatively stigmatised one, people working in it are likely to get their next promotion, or their next job, with a competitor so the public and private links are generally kept positive. Te cross-industry networks work vertically (following the company hierarchy of ICT employees, managers, CEO, etc.) and horizontally, with links between people working in equivalent roles or positions. [N]ews about which new types of billing programmes, content presentation technology (e.g. high-defnition streaming) and other tools being used by competing frms across the sector is quickly disseminated across the industry (Voss 2007: 12). Voss comments, however, that employees working on new technology development are generally absent from such exchanges in an attempt to keep leading-edge development secret. She attributes this relative 108 t h e i n t e r n e t exclusion both to the importance of new technology, products and services to the porn industry, and to the long hours and overwork of many technology developers in the industry. [K]nowledge about technology development, and the individuals who generate and embody such knowledge, is kept frmly away from the network (ibid.: 13). Although the porn industry is prone to copycat new ways of delivering pro ducts, the secrecy allows some competitive advantage since the details of how to make the innovation work are not always evident from the end product. Voss suggests that there is an inadequate understanding of intellectual property (IP) law and practice in the porn industry, possibly as a result of people with this expertise choosing to work in other sectors. Te lack of knowledge in the industry about legal protection of products of innovation inadvertently leads to widespread appropriation (which ironically acts as a further driver towards secrecy) (Voss 2007: 17). Tis suggests that the rapid adoption and creation of technological advances by porn producers and distributors may be as much due to market pull and disregard of IP as it is to factors intrinsic to the adult entertainment industry. Coopersmith comments that the [m]ost innovative use of the new online tech- nology was the referral or pass-through ring, which swapped [porn site] visitors with competitors (2006: 8). Te funding model was a micro-fee for the referring organisation, or a commission if the referral made a purchase. Tis approach has parallels with the Amazon model where associated websites pay Amazon a small fee for customers who access their sites through the Amazon.com link, or vice versa. Benefts include customer access to a wider range of products, prices and producers and the beneft to businesses that their products are more likely to be seen by more consumers. Te porn industry had early success with linked web sites. Journalist Gareth Branwyn commented in 1999 that Te most trafcked Web rings are found in the amateur e-porn and adult Webcam communities. A web ring connects a necklace of linked sites with each site sharing common navigation features. In theory, consistently clicking previous or next will bring the user back to the site from which they started. Tis is made more likely by having a host site that connects with all the other sites and stands in for any of them where a site may have gone ofine or been discontinued. Some hosts charge for providing web services; others provide a free service as a marketing strategy. Branwyn documents almost 58 million unique visitors visiting free host Porn City in January 1999. Porn City provided free server space for adult content in return for guaranteed advertising rights in prime locations on the web pages. Server space is a particularly valuable commodity in the porn industry since hosts have to be able to handle the special hardware, bandwidth and security requirements of adult content (Branwyn 1999). r e g u l a t i o n a n d l e g i s l a t i o n 109 XXX websites also attract the usual income streams, including advertising and subscriptions. Model subscription packages began as a basic monthly fee, or a cost per download from a single site, but period subscriptions to a ring of sites became increasingly popular once a credit card payment combined with the AVS (Adult Verifcation System) allowed access to a wide range of free and commercial products from multiple companies without further charge per view. Participating commercial sites found that it made better fnancial sense to share subscriptions from many consumers signing up for a large variety of services rather than fghting other providers to gather up small numbers of individual customers who were entitled to access only a few sites. Echoing concerns about stigma, many online payment options specifcally exclude services which may possibly include pornography. Early webcam pioneer Jennifer Ringley broadcast continuous images of her life in her fat 24/7 from 1996, including her relocation from Pennsylvania to Washington DC, and then from Washington DC to California. Her motivation, credited with seeding the idea for Big Brother and other reality shows was simply to allow others an insight into a virtual human zoo . . . I keep JenniCam alive not because I want or need to be watched, but because I simply dont mind being watched (Burkeman 2004). She also amassed a fortune from her annual US$15 subscriptions. Eventually, the internationally famous JenniCam closed in January 2004: Visitors with nothing better to do than watch her cameras for hours on end occasionally caught sight of her naked, contravening PayPals regulations and forcing closure of the site (Burkeman 2004). Although the payment channels may be restricted, adult entertainment sub- scription fees tend to increase with interactivity options and the suite of services available (Coopersmith 2006: 8). Tis mimics what AOL had discovered in the mid- 1990s, to their beneft (Swisher 2003: 401). Te move towards persuading users to pay more for an increased range of premium services is an example of upselling. Cross-selling persuades a consumer to buy what they had originally intended, plus an additional item, whereas upselling persuades the consumer to buy a more expensive product than the one originally planned. In order to achieve advertising cut-through with the multiplicity of adult sites available, successful hosts have to be prepared to spend big on their publicity. Even in the early days, as Branwyn noted (1999), it was expensive to buy online advertising space linked to premium search terms. Te kind of desirable internet real estate came into play when consumers typed certain words into the bigger search engines. Tis meant that when a specifc word was typed, it would trigger an advertisement, presumably for an adult entertainment service: Words like sex, anal and blowjob can sell for six fgures (Branwyn 1999). 110 t h e i n t e r n e t Not all pornography on the web is commercial. McKee et al. identify two main strands: glossy, expensive couples porn and boy/girl-next-door amateurs porn (2008: 182). Domestic porn production has blossomed since accessible and afordable technologies were developed which allowed images to be recorded and edited, then posted on the web. Tis democratization of pornography is part of a larger trend of innovation from below by users (as opposed to innovation from above by manufacturers) and the rise of technical hobbies and do-it-yourself projects among American males of all classes . . . Now anyone canand many docreate and distribute their own pornography because barriers to entry and transaction costs have been greatly reduced. (Coopersmith 2006: 10) McKee et al. argue (2008: 131) that amateur porn, as a comparatively new phe- nomenon, allows its creators and users to straddle the boundaries of paired dualities: celebritiesordinary people; porn starseveryday sexuality; kinkdomesticity; and publicprivate sexuality. Tey cite Barcans (2002) research on Keith, a domestic porn producer, as indicating that amateurs are performing their ordinariness, rather than their stardom and suggest it is this which helps their audiences relate to them and which makes them attractive (McKee et al. 2008: 132). Barcan comments that Tis style brings with it a powerful trio of viewer associations and expectations the expectation of truth, the sense of intimacy, and the mobilisation of voyeurism. Te absence of a commercial superstructure to this interaction with everyday porn makes the development of online taste communities and interactive chat much more straightforward and afordable. Addressing the ways in which sexuality is lived in everyday life, Rival, Slater and Miller (1998) compared ethnographic work on sexuality in Amazonian soci- eties, Trinidad, and on the Internet. Teir paper includes Don Slaters accounts of feldwork on early cybersex sites that feature the swapping of sexpics and syn- chronous IRC (Internet Relay Chat), where people use the internet to exchange lines of text, in public or private contexts, similar to instant messaging conversations. Sexpics IRC is introduced in terms of its unreality: no material cares or dangers . . . no enduring commitments; performance is unproblematic; desire is inexhaustible, as is desirability (Rival et al. 1998: 301). Nonetheless, this disjuncture between the unproblematic online and the invisible ofine is more apparent than real. Slater talks about the cross-over between online and RL as being about far more than sexuality, since participants often venture into IRC discussions of their RL. Te everyday tends to be characterised as boring, a drudgery of maintaining self and family . . . a lonely place, a place where one is aware of ones separation from others including ones partner and family (ibid.: 304). Te purposes of the juxtaposition of online and ofine by those who take part in sexpics r e g u l a t i o n a n d l e g i s l a t i o n 111 IRC seem to take one of three main forms: escapist fantasy play, an exit strategy which might one day actually be used in RL; or an aphrodisiac for real life (ibid.: 304) to stimulate and enliven the daily reality of domesticity. Even constructed neutrally and, primarily, as a trigger for online engagement, there is no doubt that some pornography and some uses of pornography are problematic for society and for individuals. Pornography made without consent, or with those unable to give consent involving children, for example, or bestiality is illegal in almost all global jurisdictions. Violent pornography, where participants are or appear to be emotionally or physically abused, is likewise illegal in many countries. For these and other reasons, access to pornography and the content of pornography is extensively regulated and policed. McKee et al. ofer a Manifesto for Ethical Porn (2008: 1867) which includes sex education for young people and internet flters to reduce the chances of under-age access; regulation of access and content, ethical production practices including safe sex and commitments to performers positive physical and mental health, and ethical marketing and distribution. Tey also comment that No one should ever be exposed to porn (or any kind of sexual interaction) against their will (ibid.: 186). For those porn consumer who may feel their pornography use has become problematic, and who wish to alter the ways in which they relate to pornography, McKee et al. have a range of suggested responses to ethical dilemmas arising from these perceptions (ibid.: 179181). Tese are not limited to (but do not absolutely discount) the suggestions of the anti-porn lobby to stop consuming porn entirely (ibid.: 178). Another source of information on this area is the Center for Internet Addiction Recoverys (2006) resources on Cybersex/Cyberporn Addiction. Defnitions of cybersex and cyberporn difer, but cyberporn consumption might be constructed as a subset of cybersex activities. Cybersex would also include consensual erotic interactions between sexual partners using texting, webcam and other digital technologies. Such interactions would take account of those between people who are partners in long-term sexual relationships, as well as between people who have yet to meet F2F. As we have seen here, discussions of pornography, as with discussions of sexuality itself, raise important issues quite apart from those of the technical delivery of content. Refection: Worrying content Some people worry more about hate sites and violent images than they do about pornography. Which do you see as most concerning? Why? 112 t h e i n t e r n e t CYBER STALKING AND DEFAMATION Cyber stalking, cyber harassment, and cyber bullying all refer to the behaviour of an aggressor to a victim using digital technology. Te terms are generally interchangeable in everyday life, while the notion of defamation whereby someone has their reputation attacked has a specifc legal meaning. Tis case study examines a real- world case of cyber stalking and harassment that partly took the form of defamation. It is drawn from life to demonstrate the comparative unpredictability and the wide- ranging afects of this form of attack. While few people have the time and energy to be dedicated cyber stalkers over the long term, as reported here, victims who are persecuted in this way fnd it an immense challenge to continue their daily life unafected. Cyber harassment raises vital issues about the pervasiveness and unity of the internet in comparison with the piecemeal nature of legal and regulatory responses. It also touches upon the relative importance of the right of free speech, sometimes in direct opposition to the right of individuals to be protected from unwarranted attack. Tis case study examines these issues in terms of a specifc stalker, Mr Bill White, a US citizen, and his attacks upon his one-time colleague and Australian academic, Associate Professor Trevor Cullen. It addresses some of the remedies attempted by Cullen, a professional journalist and communications academic, and their relative inefectiveness up to (and beyond) Whites eventual death in 2004. Tis case study is based on work carried out by Ms Julie Dare for her Honours thesis (2005), and her resulting publications. Both Cullen and Dare have given their permission for their experiences and their work to be detailed here. An internet search for Dr Trevor Cullen produces a series of complex, and as it happens ironic, results as well as some hundreds of hits. Te frst site listed is a MAKO site (Movement Against Kindred Ofenders), an Australian organisation dedicated to publicising sex ofenders, their crimes, sentences and known whereabouts. Te MAKO site identifes child sex ofender Trevor Cullen, a one-time Brisbane dentist. Dentist Cullen was convicted in 2004, having frst come to the attention of the police in 2000. Te irony of this circumstance is that since the late 1990s, White had been making similar and unfounded allegations about a diferent Trevor Cullen, a priest and academic. Whites harassment began through the use of fax machines, and progressed to the internet as that became more accessible. (Hereafter, all references to Cullen are to the innocent victim of cyber stalker White.) Many of the posts on the frst pages of the Trevor Cullen search results chart the attempts of Cullen to defend himself against untrue and defamatory allegations of paedophilia, at a time when Cullen was still serving in holy orders as a Catholic priest as well as teaching in a tertiary journal ism program in a small Roman Catholic r e g u l a t i o n a n d l e g i s l a t i o n 113 university in Papua New Guinea (PNG). White and Cullen had worked together briefy at the Divine Word University (DWU) in Mandang PNG in 1996. One semester into his three-year contract, White was sacked for spreading untrue and malicious rumours about other members of staf. After his dismissal, and with time on his hands as a result of persistent unemployment, White carried out his harassment of current and past DWU stafers, and upon any people (like Professor John Henningham, Cullens highly respected PhD supervisor) who defended them. White registered hundreds of websites in the names of his victims and opened numerous email accounts. Sir Peter Barter, a former Acting Governor-General of PNG, and a member of the Governing Council of DWU, was one such victim. He commented: Mr White has at least 80 email names addresses registered, he has sent countless messages to infuential people, the media and even messages in my own name to myself (Barter 2002). Indeed, White often stole the email identities of his targets in order to further embarrass and harass them. Te saga linking White to Cullen seems to have begun when Cullen responded to a series of troubling posts by White on the Pacifc Forum website a year or so after Whites sacking. In July 1998 Cullen wrote to the web maestro (a non-gendered reference to people who might otherwise be termed webmasters) asking that action be taken against Whites abusive and defamatory postings. Instead, his [Cullens] letter was posted on the website, and within two days White had created a web page in Dr Cullens name alleging he was a paedophile and had committed academic fraud (Dare 2005). Since Cullen was at that point in the middle of his PhD research at the University of Queensland, examining the impact of HIV/AIDS reporting upon the growing South Pacifc epidemic, such allegations were calculated to have a devastating efect upon Cullens developing academic career. Cyber stalking is not a rare occurrence, but it is difcult to counter efectively. CyberAngels (2009) was launched in 1995 by volunteer citizen support group, the red-beret Guardian Angels, to help promote internet safety. Tey run mainly US- based workshops on handling cyber harassment and cyber bullying. WiredSafety (n.d.) is larger than CyberAngels and has less of a vigilante image. It ofers, among other services, free internationally accessible web-based training programs to promote safety on the internet for educators, families, law enforcers and other citizen and community groups. Along with organisations such as Google and Microsoft, WiredSafety is a member of the Harvard University-based, Berkman Center for Internet and Society-supported, Internet Safety Technical Task Force (ISTTF), whose report on Enhancing Child Safety and Online Technologies was set up specifcally to address the challenges posed by social networking sites and released early in 2009 (SNS Safety 2008). Teir fnal report on safeguarding young 114 t h e i n t e r n e t people from online risks addresses the development and promotion of technologies and techniques that aim to create a safer environment for young people using the internet. WiredSafety ofers a range of resources for victims of cyber stalking and cyber harassment, including individualised help, a self-paced interactive guide and online tutorial materials. Teir advice to people sufering the kinds of attacks perpetrated by White upon his victims is that Ignoring the communications sent to you is the best frst step to stopping most cyberstalking/harassment. Unless your situation involves a truly obsessed or depraved harasser, most will lose interest quickly if they dont get the reaction they seek (WiredSafety n.d.). Unfortunately, White was such a depraved harasser. So how did Cullen handle the situation, and with what efect? White was so obsessional that, in addition to Cullen himself, everyone who worked with Cullen and whom White judged to be supporting him was also sub - jected to his attacks. Tis list included colleagues, employers, student guilds, journal- ists, lawyers and research partners. Te scale of these attacks enabled the dev elop- ment of an informal victim support group whereby the people that White attacked banded together to support each other. Even so, the attacks continued grow ing in pace and scale, to the extent that White at one stage had Cullen linked to sixty-four defamatory sites. Cullen and his co-victims decided to retaliate, initially in a low-key way and in measured terms for public consumption, along the lines of exercising a right of reply. Tis was the role played by many of the publicly posted documents, some of which are still found on the web. As a result of the harassment, Cullen and his co-attacked found themselves spending signifcant time and money learn- ing about the internet and the intricacies of web site construction and legal redress. In addition to this drain on his resources, Cullen was asked embarrassing ques- tions by his students and others who did not know the story, and he was concerned about the impact of the defamatory attacks upon his quest to fnd an academic position. In both 2001 and 2003, Cullen went to the Australian police who advised him that they were powerless to act unless there was a credible likelihood of White physically attacking him in Australia in person. Tis was not foreseeable since White lived in the US, had limited fnancial resources, and was unlikely to travel internationally. At about this time, Cullen, who had recently gained a position at Edith Cowan University, was spending signifcant sums of money researching his legal options. His new colleagues had begun to attract Whites fre, and a new set of students were asking questions. In April 2002, having successfully gained permission to serve White with legal documents at his Californian home, Cullen sued him for defamation through the Western Australian Supreme Court, seeking to stop the attacks, remove the defamatory materials and gain fnancial redress for the harm r e g u l a t i o n a n d l e g i s l a t i o n 115 done by his comments. Te situation was complicated by the fact that defamation at that time was a state matter in Australia and the law consequently varied across Australias diferent legal jurisdictions. Court costs in the region of Aus$8,000 were kept as low as possible by a supportive lawyer who donated signifcant time to the ground-breaking case. White did not appear at the proceedings, nor did he raise any defence to the defamatory statements. Dr Cullen was awarded $70,000 in compensatory damages and a further $25,000 in exemplary damages, in recognition of the deliberate nature of Whites attacks (Dare 2004: 11). Indeed, the judge commented that the damages should be sufcient to signal to the public the vindication of his [Cullens] reputation (Newnes J cited in Dare 2004: 17). Tere was considerable publicity for this outcome: at the point that the judgment was delivered it was the largest internet defamation award ever handed down in Australia. Newspaper articles appeared in Te West Australian (OLeary 2003: 13), Te Sunday Times (of Perth) (Hellard 2003) and Te Los Angeles Times (Hyman 2003). Tere was also broadcasting coverage, including an item on Australias ABC 7.30 Report (ODonnell 2003). Even with an Australian judgment in Cullens favour, however, approaches to Whites ISP site hosts, to US domain-name suppliers and to search engines such as Google resulted in no positive action. Given that freedom of speech is vigorously defended in the US as the First Amendment cornerstone of the Constitution, it seems that the right of a US citizen to defame took precedence over the right of a non-US citizen to protection from defamation. Cullen was advised that only a US Court Order would authorise the removal of the defamatory material. Tis would have been an extraordinarily expensive and drawn-out process since the Australian judgment would not have been accepted in a US court, but would have been subject to an essential re-hearing of the case under US law. White meanwhile had linked together many of his sites attacking Cullen and his related victims. Tis ring of sites often has the efect of maximising search engine visibility, moving a site or collection of sites higher in the order in which they are displayed after a search. Subsequently, and the genesis is uncertain although it is not Cullens work, one of Whites victims developed Bill White Exposed (n.d.). Tis website may seem somewhat ofensive in itself, but that isto a lesser degree and with diferent intentfrom the web sites through which White attacked his victims.Te content becomes serious half- way down, after the animated image of the smiling toad, and begins to outline some of the substantive issues as well as identifying White and his actual address. Te Bill White Exposed site is the remedy often promoted as an appropriate right of reply to defamatory material: an equivalent attack in similar terms. Tis right of reply redress is sometimes suggested as the best possible response to cyber stalking since it preserves the notion of the internet as a locale for free speech. 116 t h e i n t e r n e t Dare comments (2005) that: Many critics accuse plaintifs of using the legal system to stife freedom of expression, efectively chilling robust debate, and situate the debate within a David and Goliath context, wherein wealthy individuals and corporations use defamation laws to stife opposition. Te term chilling here is widely used as in www.chillingefects.org to refer to inhibiting forces that infuence what is posted. Te efect of this chill is to make online comments more conservative. It also leads to self-censoring and the withholding of views. Chillingefects.org has a special section on defamation and ofers university Law Clinic-based advice on how to avoid viewpoints being frozen out of internet debates. Often, defamation actions are interpreted as an attack on free speech, rather than a right to defend ones reputation against baseless lies. Most discussions of defamation start from the premise that the action is brought as a way to chill debate or end it altogether. Dare argues diferently in this case. She suggests that defending Whites right to defame on free speech grounds fails to ack nowledge the impact of Whites postings in suppressing free speech, and in disrupting interaction on public discussion sites, such as the Pacifc Forum. Further, as victim Henningham argues, to the extent that Whites defamatory state ments about corruption and illegality were believed, it is possible that Whites Cullen-related attacks on missionaries, medical doctors, aid workers and charitable organisations had harmful impacts upon thousands of people who might otherwise have received assistance (cited in Dare 2005). Te impact of Whites activities in inhibiting free speech also afected the press. When the media began to take an interest in Cullens forthcoming court case, a number of journalists contacted White for his side of the story. Tey and their editors were subsequently subject to their own abusive websites once White realised they did not see matters as he did. Te hard copy of Te West Australian story (OLeary 2003) was not posted in the online version of the paper, even though this would have been expected. Dare (2005) comments that according to the journalist who covered the story, the newspapers proprietors decided the risk of attracting Bill Whites attention was too great. Concluding that Whites defamatory postings by themselves created a de facto restriction of free speech on the internet, Dares view (2005) is that: whereas defamation laws operate within a transparent system of laws and regulations, and are open to debate and review, Whites form of regulation is completely arbitrary . . . the insidious nature of the threat posed by individuals such as White a threat that often escapes the notice of the broader public and the media represents a greater risk to an active and engaged public sphere than traditional defamation suits. r e g u l a t i o n a n d l e g i s l a t i o n 117 Dares contribution to this debate was such that Te Honorable Jim McGinty, Western Australian Attorney-General at the time, asked her permission to circulate a copy of her Honours thesis to the Standing Committee of [Australian] Attorneys- General (SCAG) Defamation Working Group. Tere is no doubt that White, and stalkers like him, have direct efects upon the lives of those they harass, even where the risk of physical harm is minimal. It is also clear that conventional remedies, such as a resort to law, further punish the victim through extracting costs, fees and stress in circumstances that rarely allow a realistic prospect of recovering those expenses. Victims with a professional reputation to protect may also fnd themselves under considerable pressure from employers and social institutions to sue the defamer, since this is one of the few efective ways to demonstrate to third parties that the defamatory allegations are without substance. All these circumstances are made more complex where the harasser and the victim are located in separate legal jurisdictions. Te alternative remedy, which is using the internet as a vehicle for a right of reply, is also an impost upon the victim who is required to continually monitor the attacks and develop the skills and knowledge to respond to them appropriately. In this case, however, Whites death eventually led to the cessation of most of his websites but only once the contracts he had agreed with the ISPs hosting them ran out. Refection: Free Speech on the Internet Do you think its more important that internet-communicated speech is free or fair? Who gets to decide what constitutes free or fair speech? Summary n Chapter 6 considers constructions of the internet as a risky place, with a specifc focus upon content risk (pornography) and contact risk (cyber harassment). n Discussions about the internet as a risky place raise issues about narrative theory, discourse analysis and metaphor. These are briefy addressed before examining the major case studies of the chapter. n The internet is considered as a major conduit for accessing pornography and this is constructed as a risky activity in some circumstances. Pornography is acknowledged as one of the internets killer applications, 118 t h e i n t e r n e t and as a major driver of technical advance. It can be commercially risky for an organisation to regulate so heavily that pornography is not accessible via the internet. n The case study on cyber harassment is based around the experiences of a real person, Associate Professor Trevor Cullen, whose fght to clear his name involved a range of strategies in response to the attacks of his persecutor, the late Mr Bill White. n This chapter has raised issues concerning the public sphere: in terms of media coverage of childrens use of the internet; in terms of narrative and discourse analysis; and in terms of the importance of free speech relative to the right not to be defamed. Chapter 7 focuses upon the relationship between the internet and the public sphere. 7 THE PUBLIC SPHERE INTRODUCTION Chapter 6 considered claims that the internet should be a space for free information exchange, but also a place that might need to be regulated to protect people from risks, harassment and lies. Tis chapter continues that discussion by examining the notion of the public sphere as: a realm of our social life in which something approaching public opinion can be formed. Access is guaranteed to all citizens. A portion of the public sphere comes into being in every conversation in which private individuals assemble to form a public body. . . . Citizens behave as a public body when they confer in an unrestricted fashion that is with the guarantee of freedom of assembly and association and the freedom to express and publish their opinions about matters of general interest. . . . Te public sphere as a sphere that mediates between society and state, in which the public organises itself as the bearer of public opinion, accords with the principle of the public sphere that principle of public information which once had to be fought for against the arcane policies of monarchies and which since that time has made possible the democratic control of state activities. (Habermas 1989a: 734) At the time that Habermas was developing his theory, the media of the public sphere [. . . were] newspapers and magazines, radio and television (1989a: 73). Today, this list would include the internet. Habermas was careful to distinguish between mere opinions (cultural assumptions, normative attitudes, collective prejudices and values) [that] seem to persist unchanged in their natural form as a kind of sediment of history and public opinion which can by defnition come into existence only when a reasoning public is supposed (1989a: 74). Tese aspects of Habermass theory have triggered huge debate. Te idea of a reasoning public implies that some publics are less reasonable than others, and that judgements can and need to be made about where reasoning starts and ends in order to accord legitimacy to public opinion. Indeed, Habermas defnes public opinion as the tasks of criticism and control which a public body of citizens informally and, in periodic elections, 120 t h e i n t e r n e t formally as well practices vis--vis the ruling structure organized in the form of a state (1989a: 73). Public opinion formation in Habermass mind is a grave and serious responsibility. Habermas positions the public sphere as growing out of a specifc phase of bourgeois society in the second half of the eighteenth century, starting more or less with the revolutionary movements in America (17751783) and in France (1789 1799). Te bourgeois in this sense can be loosely defned as wealthy, educated men, usually merchants and writers, who were not part of the ruling class and consequently not involved in parliament. Tese men were also not caught up in day-to-day fghting or working and had the luxury of being able to participate in protracted debate. Tey met in the cofee houses of London to read the newspapers and political pamphlets and discuss the implications for commerce and politics of the days events, and of revolutionary ideals. At that point, society was a private realm occupying a position in opposition to the state (Habermas 1989a: 75), but it was clearly no longer a private domestic authority since it came into existence through the formation of public opinion. Habermas argues that the proper functioning of the public sphere was lost when it became a feld for the competition of interests . . . Laws which obviously have come about under the pressure of the street can scarcely still be understood as arising from the consensus of private individuals engaged in public discussion (ibid.: 77). In particular, when the public sphere expanded beyond the bourgeoisie, it lost not only its social exclusivity but also the coherence created by bourgeois social institutions and a relatively high standard of education (ibid.: 77). Many commentators accept the notion of a public sphere but object to Habermass reservations and qualifcations about the contemporary public sphere. Some particularly highlight concerns that the original cofee house culture excluded women and people who had to work for their income, and was mainly fnanced by wealth generated from the slave trade. Its a big debate which is summarised, synthesised and developed by McKee (2004), among others. Alan McKee (2004) particularly disagrees with claims that the concept of a coherent public sphere has been compromised by its expansion beyond the bour- geoisie, and the inclusion of popular culture and the mass media. He argues that accusations of the contemporary public sphere becoming trivialised, commercialised, turned into a spectacle, fragmented and creative of political apathy are evidence of the public sphere becoming more inclusive and moving away from a cultural space dominated by white, Anglo, middle-class, serious, educated, masculine values. Trivialisation, according to McKee, is simply conservative speak for womens per spectives, some of which are emotional as well as political. Commercialisa- tion relates to middle-class-based judgements about what interests working-class t h e p u b l i c s p h e r e 121 audiences, and is sometimes implied in discussions about the dumbing down of media content. McKee (citing Aaronovitch 2003: 23) comments that programs such as Big Brother and Wife Swap remind you of that most easily forgotten thing of all; the possibility of something else. Te chance that there is, after all, an explanation for the behaviour of people from backgrounds diferent from your own (McKee 2004: 102). Such diversity of perspectives efectively enriches culture. A complaint against spectacle, in McKees mind, is a complaint against the way in which matters are addressed in popular culture, as well as the topics discussed and the content presented. Discussing the political communication purposes of Black rap music, specifcally the Public Enemy video of By the time I get to Arizona, McKee comments that the visual, aural and bodily communication of the message is as critical to the Black public sphere as written rational modes of communication are to traditional western philosophers (ibid.: 107). Similarly, the complaint against fragmentation is constructed as a serious, educated regret that not all people engage with the same material in the same middle-class orderly way at the same time; and that diferent taste cultures McKees focus is on Queer communities choose to embrace diversity rather than uniformity (ibid.: 146). Te value of this embracing of diversity is evident in the legitimising of a range of publics: each entitled to their own overlapping, or competing, or diametrically opposed, public sphere. McKees fnal defence of the contemporary public sphere is to argue that popular culture does not produce political apathy. Using youth culture as his example, McKee suggests that the problem is one of defnition: political action has been redefned but the status quo has failed to notice. Whereas political action might once have meant campaigning for legislation to distribute resources more equitably, it now aims to change culture rather than legislation, and hopes for recognition rather than redistribution (ibid.: 174). Te citizen-produced information, knowledge and cultural products available on the internet are evidence of a huge surge of creative and culture-changing energy unleashed over the past decade. Overall, McKee suggests that the public sphere in contemporary culture has moved on from Habermass restricted ideas concerning the bourgeoisie. Tese days it is multi-class; emotional; inclusive of genders, sexual orientations, and educational in/experience; diverse and fragmented. Tis is one way to see the internet and the kinds of information, knowledge and culture on display. Moving on from discussing the concept of public sphere, this chapter considers three case studies. Tese are the Electronic Frontier Foundation (EFF), which campaigns for freedom of speech and other civil liberties in the digital domain; Wikipedia and YouTube. But frst we will look at the comparatively new phen- omenon of blogging and citizen-journalism as a way of investigating the identifca- tion of quality information accessible via the web. Te sheer diversity of information 122 t h e i n t e r n e t ONLINE RESEARCH AND ASSESSING THE VALIDITY OF INFORMATION ON THE INTERNET: THE EXAMPLE OF CITIZEN- JOURNALISM Given the opportunities for free speech on the internet, it becomes important to recognise that not all information is equally valid or equally relevant for any given purpose. Indeed, much of the information on the internet is incomplete or wrong and some is actively dangerous and misleading. Selecting appropriate information for any given purpose requires critical assessment of the uses to which it is to be put. Using the internet to carry out research is a continuous exercise in critical analysis. People who search for information do so with a variety of agendas. For example, someone with a serious illness who has been told by their medical team that there is nothing more to be done using conventional medicine might deliberately seek out the details of alternative remedies and support groups which most medical authorities would suggest that patients avoid. Similarly, people trying to fnd out the on-the-ground implications of the Iraq War, which started on 20 March 2003, soon learned about a citizen-journalist Iraqi blogger writing in English, known as Salam Pax. Tis was not an ofcial source of record, as the well-established quality available raises a critical question: how do we know which information to pay attention to, and which to discard? Te web is a repository for scholarly knowledge, and academic researchers use it to gather reputable information on subjects as diverse as Anglo-Saxon culture through to the use of zoological parks to support endangered species. Te web is also chaotic, misleading, fragmented and includes a range of opinions and superstitions which no commercial publisher would ever consider dignifying in print. Given the immense amount of information on the internet, we will shortly consider how to decide which information is reliable, following on from some further thoughts concerning the public sphere. Refection: The public sphere Habermas thought that the public sphere was important for democracy, facilitating participation in society. one argument supporting internet use might be that it enhances democracy by allowing more voices to be heard. What do you think about this argument? t h e p u b l i c s p h e r e 123 newspapers see themselves to be: papers such as Te Times of London, the New York Times and the Washington Post. Paxs blog was alternative news. He wrote about his daily life in Iraq and ofered a very diferent perspective from the western media and from Al-Jazeera, the Arabic-language news network. What was more, he juxtaposed what he and relatives witnessed with what was reported in mainstream Western and Arab news media (Haas 2005: 388). Te model for establishing validity in the blogosphere is a very diferent process from that which applies to the western mass media. Bruns (2008a: 6980) discusses how the conventional media adopt a gatekeeper approach, where newspapers editorial teams select the staf and the stories that appear in the paper. Written material is fltered and sub-edited to check quality frst, and then published. Tis hierarchical and controlled process is contrasted with the approach of blogging and community-based media production, which is characterised as being publish frst and then the reader checks the quality afterwards (ibid.: 74). It is a kind of caveat emptor buyer beware. If this seems like an archaic term, Google gives 1,180,000 web references for its use. Brunss view is that news blogging works because stories produced by citizen- journalists set out to achieve diferent ends from those produced by the mass media. Te story itself is not the fnal product, its just the starting point, because ultimately the goal of every story is to start discussion, to start a lot of people saying what they think about it (Foster, quoted in Bruns 2008a: 81). News blogger Salam Pax provided a personal and credible view of the war as it was experienced in daily life on the streets of Baghdad, but it was clear that Salam Pax was a pseudonym. Both words mean peace: the frst in Arabic, the second in Latin; and there was a clear question of the authenticity of the person behind the name. Tis issue was sufciently important for Te Guardian newspaper to track Pax down at the end of May 2003 to establish that there was a person (Salam al-Janabi) behind Salam Paxs alias (McCarthy 2003). Like Paxs blogs, McCarthys newspaper story is vivid with the detail of an eye- witness encounter. Unlike Paxs accounts, it also has the brand of an authoritative media source, the UKs Guardian newspaper. McCarthys story provided evidence that Pax existed and that his contribution was important, but it was not an analysis of his relevance or a discussion of why he became a phenomenon on the internet and a much-quoted personal perspective on the Iraq War, used by the western mass media. For analytical and critical information of that kind it is appropriate to refer to more refective works such as Hamilton and Jenner (2003), or the scholarly contribution of Haas (2005), or the Literary Criticism account of the importance of the frst person I autobiographical statement in Gillian Whitlocks (2007) book Soft Weapons: Autobiography In Transit. 124 t h e i n t e r n e t Over the past three paragraphs, this chapter has critiqued the relative validity of Salam Paxs blog according to a range of parameters and purposes, while demonstrating some of the processes by which it is possible to gauge the acceptability of source material. Te frst purpose in this critique was to introduce the notion of the citizen- journalist blog, which is an important internet-related innovation not extensively discussed elsewhere in this book. As with the various IMC (Independent Media Center, Indymedia) sites (Indymedia n.d.), whose slogan is dont hate the media, be the media, the internet has made Paxs contribution to the public sphere much more relevant and accessible. Tere will have been many diaries kept by articulate, English-speaking Iraqis, but Paxs is particularly important because it impacted upon the events as they were unfolding. It provided an on-the-ground view during the second Gulf War which was read by soldiers and military strategists, as well as by middle-class intellectuals, schoolchildren and pacifsts. For many people, Paxs blog was a useful additional source for framing opinions and informing discussion while the war was in process. Tis was also the case with citizen-journalist coverage of the Mumbai attacks in November 2008, and is likely to be a recurring pattern in future incidents of unfolding public trauma. Allucqure Rosanne Stones (1991) classic case study of the mature-aged disabled online confdante Julie, who was in fact a persona created by a middle-aged male psychiatrist, demonstrates how easy it is to be deceived about important matters of fact when the only evidence for the existence of someone is their internet-based communication (see Chapter 8). Consequently, in 2003 when Pax frst became important, and in 2009 when evidence was being collected to develop the example used here, it became critical to seek proof of authenticity. A frst step was accessing Wikipedia. Tis was only a frst step since the purpose of the preliminary search is purely to defne the kinds of authoritative materials that might be available. A search engine like Google might also have been a starting point had Wikipedia not produced valuable information. In fact, it was Wikipedia which contained the useful information that In May 2003, Te Guardian newspaper tracked the man down and printed a story indicating that he did indeed live in Iraq, with the given name Salam (Wikipedia Salam Pax n.d.). Te Wikipedia entry linked to Te Guardian, giving access to their website (2009). Tis enabled a search for Salam Pax using the guardian.co.uk search function. A careful scrutiny of stories referring to Salam Pax published in May 2003 revealed the article by Rory McCarthy cited earlier. Its worth noting here that Wikipedia made a credible starting point, but not an end point. In academic research it is rarely appropriate to cite Wikipedia articles when the evidence supporting the entries, the primary sources, can be accessed simply by following relevant links or hunting further afeld or with diferent search terms. t h e p u b l i c s p h e r e 125 McCarthy, as a journalist working for a respectable, globally-recognisable news- paper, is an authoritative source for most purposes. Unfortunately, a single news- paper article is generally not sufcient for a piece of academic writing. Since this in forma tion search was being carried out as part of an academic writing process, the McCarthy article required further back-up before it could be used with confdence. Newspaper editors commission and then vet journalists stories and there is no reason to disbelieve McCarthys contribution, but the article was not produced according to the gold standard of academic writing, which is via informed/expert peer review. When scholarly articles are subject to double-blind peer review this means that all information that might identify the author is removed, and the article is sent out for assessment by at least two readers or reviewers. Readers are selected by the journals editor on the basis of their expertise in the feld to which the article contributes. Te author has no say in which readers will be asked to read the article, and the readers are not told who the author is. Te idea of the double-blind review is that the article is judged on the basis of merit, rather than the reputation of the author. For most academic purposes, scholarly articles from well-known academic journals are the best possible sources to inform a persuasive, well-founded argument. Libraries at schools, colleges and universities have a range of databases which make it possible to search for references to Salam Pax in scholarly journal articles. Tese databases are available to students and university staf and use various key terms to help identify relevant information published about Pax in academic journals, and when. Further, many academic institutions make it possible for library members to use Google Scholar to access a range of materials online. Google Scholar, like Google and Google Books, is a full-text database. It can be accessed by clicking on the more tab on the Google homepage, which releases a drop down menu including both the Scholar link and an entry point to Google Books. Te full-text database means that every word in every article or book is stored separately and can be searched for individually, or as one or more of a string of words in specifc order. By using the advanced search function, in particular the with the exact phrase feld, it is possible to ensure that the Google Scholar database is searched for the term Salam+Pax rather than one word or both separately. At the point when this search was carried out, Google Scholar identifed 391 separate articles or sources with the term Salam Pax held on the database. Te same end would have been achieved in the normal Scholar search by enclosing the term Salam Pax in inverted commas: thats one way to bypass the need to click through to the exact phrase feld. Academic libraries often hold online subscriptions to scholarly journals, as well as collecting and ofering hard-copy print versions of articles. Among the references ofered by Google Scholar to the search term Salam Pax were several articles held on secure databases that could be accessed immediately via a researchers personal 126 t h e i n t e r n e t password, which authenticates the inquirer as a member of an institution with a valid subscription to the journals. Given this choice, it was possible to select between available references in the knowledge that a subsection was easily accessible to online. Google Scholar, based as it is on the same kinds of principles as Larry Pages PageRank innovation, which underpins the Google search engine itself (Chapter 2), not only references the full text of articles but also includes all the references that each of those articles cite. Tus, as it displays information about the articles on its database which refer to Salam Pax, so Google Scholar also displays information about articles that have referenced the article featured. Indeed, the order in which the 391 database items were ofered in response to the Salam+Pax search term privileged articles that had been multiply cited. Among the frst three articles (most of the highest ranked sources were books based on his blog written by Salam Pax himself ) were two with International/Policy Studies titles (Foreign Afairs, Foreign Policy). Tis feld of study is somewhat removed from the expertise in new media, cultural studies and communications that had prompted the search, so the status of those journals is not immediately clear to a researcher with a new media background. Given this, it makes more sense to look further. Ultimately it was decided to refer to Hamilton and Jenner (2003) for the three paragraphs that introduced this section, implicitly comparing their account with the scholarly contribution of Haas (2005). For new media research, the Hamilton and Jenner article might not appear fully authoritative for academic purposes since the journal Foreign Afairs is published by the Council on Foreign Relations and is described as both a journal and a magazine. A magazine implies commissioned work and a lack of arms length peer review. Together with the fact that the paper at 2,702 words is short for a peer- reviewed scholarly article, raises the possibility that the Hamilton and Jenner piece might not itself be peer-reviewed even though the authors biographies certainly positioned them as academics. Further, since the Council on Foreign Relations has been in existence since 1921 and is a nonpartisan and independent membership organisation (CFR 2009), it seemed likely that there was no direct university afli ation. A university sponsorship might have made it seem more scholarly to a university researcher, somewhat ignorant of the International and Policy Studies feld. Finally, Hamilton and Jenner had commented (2003: 131) that Salam Paxs authenticity has since been validated by an American newsperson. Tis non- specifc statement seemed hard to prove or disprove, whereas a number of sources (Wikipedia, Te Guardian and Haas 2005) had provided verifable information that Paxs identity had been confrmed by a Guardian reporter (who might also be an American newsperson). Where possible, when accuracy is particularly important, the rule of thumb that a piece of information should be checked across three or more separate sources ofers some defence against hearsay and woolliness. t h e p u b l i c s p h e r e 127 Having noted those details about the Hamilton and Jenner (2003) piece, it is prudent to pay comparatively closer attention to the Haas article (2005). Haas had been published in Journalism Studies, published by Routledge, and was an appropriate source for a communications and cultural studies scholarly reference. Had the research required been more wide-ranging, perhaps informing an in-depth article on blogging, with particular reference to Salam Pax, more references would have been required, and more ideas considered for incorporation. A frst step here might have been to examine other references ofered in response to the Salam+Pax search, coupled with clicking-through on the Google Scholar link from the Haas article to the 23 articles that had cited it. Usefully, by using citation links, and the citations linked to the citations, a researcher can check the updated arguments in the feld as well as reassuring themselves that the debates around the topic are still current. A diferent strategy that might have been followed to prepare the frst three paragraphs of this section would have been to use the Advanced Scholar Search function to identify articles by specifc authors, such as Axel Bruns, who is a speci- alist on blogging and the author of a recent book in the area (2008a). A quick search indicates that Bruns has had an article published mentioning Pax: referenced in this book as Bruns 2008b. Further, it would have also been useful to check how current it is to write about Salam Pax by stipulating that Google Scholar list relevant Salam+Pax articles from 2008 onwards. Tis is achieved by inserting 2008 into the frst box on the line marked Date: Return articles published between . . . According to the Google Scholar website, there were 16 articles referring to Salam Pax published in 2008, and 25 published in 2007. For the purposes of the section published here, however, the single Haas (2005) reference is sufcient. Even so, it was still worth making a separate query via Google Books. Books is accessed via the same drop down menu as Scholar; triggered via the more button on the Google homepage. Advanced Books Search again allows the option of with the exact phrase for Salam+Pax. Google Books provided 302 links to materials in the database referring to Salam Pax, some of which provided snippet view. Snippet view shows the reader four or fve lines with the sought-for term in the centre of the snippet. Conroy and Hansons book (2007) was the most highly ranked reference apart from the books written by Pax himself. It ofers snippet view and had three snippets visible plus the information that Salam Pax appears on four pages. Tere are snippets from pages 20, 21 and 22. It is quite possible that the fourth snippet-view page is the index. Te next book in the Salam+Pax Google Books list was Whitlock (2007). It ofers a limited view, which is more extensive than a snippet view. Te page ofered, 27, had fve references to Salam Pax in a scanned-in text of the full page. Limited view 128 t h e i n t e r n e t also has a Search in this book facility. Entering Salam Pax (with inverted commas) yielded a number of page references (without a summary of the total number on ofer) from which it was clear that Whitlocks (2007) study of Soft Weapons: Autobiography In Transit, although a literary criticism text, takes a specifc interest in the eye-witness, frst person account which had particularly recommended Salam Pax to his readership, and which had been also remarked upon when discussing the McCarthy (2003) account of Paxs identifcation. On the basis of the information provided, it could have been worth requesting the book via the library as something that is likely to be relevant to a larger study of Salam Paxs contribution. At this point the basic facts had been established, and a reasonable amount of theory covered. On the basis of information gleaned it was possible to sketch out a writing plan. To check that the search strategies had been reasonably comprehensive, however, it was also worth googling Salam Pax. Googles information is less processed than Wikipedias; it is mainly raw web materials and relatively hard to vali- date, except through reference to other entries followed by a step-by-step verifcation trail to arrive at authorities that can be accepted as trustworthy for a given specifc purpose. Te short-cuts to determining quality in the results of a Google search mainly rely on the authority of the site indicated, or the author of the material, or both. Tere were 84,300 Google hits for Salam Pax. Te frst was a piece by Pax, the second was the Wikipedia entry which had already been used, and the third was the McCarthy piece from Te Guardian, 30 May 2003, about how Salam Pax had been sought and found. Tis indicated that Googles ranking system was working in line with the priorities already followed, even though Google results difer with country and with language. It was not until the second page (screen) of Googles 84,300 references that sub- stantially diferent material was ofered. Here, there was a BBC story. Te BBC Newsnight (2008) account allowed Salam Pax to update his readers, revealing that he and his family had left Iraq and were living in the UK. Some measure of quality is ofered by the BBC website, as would also be the case with a recognised newspaper or a report from an organisation afliated with a university, with a national govern- ment, or with a major library. Also on the second screen was a transcript of an ABC (Australian public broadcasting) in-depth interview program called Enough Rope (2004). Tis provided a very personal insight into Salam Paxs life, and revealed that he was gay and his mother was Shia Muslim while his father was a Sunni. However, it was clear that the Wikipedia, Google Scholar and Google Books searches had already revealed the really valuable kinds of scholarly information required by an academic research task. Clearly this account of how someone might seek quality information on the internet relies on a range of research tools which might at any stage need revisiting: t h e p u b l i c s p h e r e 129 THE ELECTRONIC FRONTIER FOUNDATION Some members of the online community construct the internet as the ultimate place for free speech and open access to information. In choosing the name Electronic Frontier Foundation at its foundation in 1990, EFF created a sense of afnity between the internet as it was emerging in the last decade of the twentieth century and the mythological frontier freedoms of early pioneers. In the frst half of the nineteenth century, communities such as the Mormons were motivated to move west to land that eventually became the State of Utah, to establish their own territories where they could live as they chose under their own rules. Efectively, these pioneers set up a new frontier in the search for freedom. Te implication of the EFF title was that people in search of freedoms that were now circumscribed by everyday life might fnd what they were looking for in the electronic frontiers of the internet. Te EFF was set up specifcally to protect freedom of speech on the internet; to promote peoples civil liberties, and to defend them (EFF 2009). One of the co-founders of EFF was Grateful Dead lyricist John Perry Barlow who, along with his co-founders, was a member of the WELL online community. for example, if Googles Scholar site were closed down, or if it stopped being free or was no longer linked to a librarys oferings. Tere are also a number of books about using the web to fnd good information which ofer a more extensive and rounded set of options. Tese include Alan Novembers (2008), Web Literacy For Educators, which is as valid for general students as it is for the educators of the title. Te important thing to remember when using the internet to carry out research is the standard required for the task in hand. Scholarly work should draw upon scholarly work, rather than upon Google or Wikipedia. Academic books and journals are retained and accessible in reliable and permanent ways, whereas Wikipedia is subject to continuous change (see below), and material accessed via Google can be deleted at any point. Fortunately the web is an efective doorway to much scholarly work, although not all of it, which is the point made by Jeanneny (2006: ch. 5). Refection: What makes an information source trustworthy? What evidence do you look for before deciding to trust information from the internet? 130 t h e i n t e r n e t Te early euphoria about the potential freedoms of the internet was challenged by the reality and the power of government regulation, especially as these were exercised in attempts to control web-communicated images of pornography. On 8 February 1996 the hugely controversial US Communications Decency Act (CDA), a sub-section of the Telecommunications Act 1996, was signed into law by President Clinton, prior to subsequently being declared unconstitutional by the US Supreme Court in 1997. On the same day, and explicitly linking the action to the CDA legislation, Barlow wrote A Declaration of the Independence of Cyberspace (Barlow 1996). Te title of this statement concerning the principles of internet autonomy tapped into the emotive history of the US Declaration of Independence and its association with the struggle for freedom from colonial oppression. It reads as a liberationist manifesto: We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth. We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity. Your legal concepts of property, expression, identity, movement, and context do not apply to us. Tey are all based on matter, and there is no matter here. (Barlow 1996) Material or not, the digital world has proven susceptible to government regulation, as indicated by the discussions on Chinas controls over the internet (see Chapter 3). Further, experience has taught that one persons free speech can translate into the unacceptable persecution of another through cyber-harassment and defamatory comment, as discussed in Chapter 6. Even so, EFF is an efective champion for the rights of people on the internet, and it has links with equivalent country-based campaigns in most of the worlds democracies. Its relevance here is to remind us that information on the internet includes many singular beliefs, and this needs to be taken into account when deciding what to trust. It is also a reminder that in some jurisdictions, such as Myanmar (Burma), Vietnam and Iran, even widely-held beliefs cannot be safely communicated using the internet. Refection: A declaration of the independence of cyberspace How realistic is Barlows declaration? How independent is the internet from the politics and governments of the countries in which it is accessed? t h e p u b l i c s p h e r e 131 WIKIPEDIA Wikipedia is the best known and most successful agenda setter in the wiki-based prosumer-driven category of web content. Wikipedia is also social in the sense that it gets better if more people use it, since more people can contribute more knowledge, or can correct details in existing knowledge for which they are experts (Vossen and Hagemann 2007: 57). Axel Bruns sees both blogs and wikis as key drivers of Web 2.0 development (see Chapter 5). If citizen journalism such as that practised by Salam Pax is an example of a blog, and blogging is a foundational Web 2.0 application, wikis are another. Bruns also sees key diferences between wikis and blogs: Where blogs are founded in the frst place on a temporal organization and classifcation of their contents (customarily listing the most recently created articles in the most prominent position), and therefore proceed from a time- based logic, wikis instead implement a space-based structure. Wikis enable their users to create a network of knowledge that is structured ad hoc through multiple interlinkages between individual pieces of information in the knowledge base; they represent, in short, a rapidly changing microcosm of the structures of the wider Web beyond their own technological boundaries. (Bruns 2008a: 102) Wikis also include mechanisms to see the changes made to pages over time, features to notify key people when a page is changed, and discussion pages which are tied into entries where issues can be addressed: as well as other pages for setting policy and norms (and their associated history and discussion pages) (Stvilia et al. 2008: 986). Tese features are central to the Wikipedia quest for information quality. Wikipedia arose from the ashes of Nupedia, a project which intended to harness the skills of volunteer experts but involved professional paid checkers of the content. Jimmy Wales, founder of Nupedia in 2000, and the later Wikipedia in 2001, was intrigued by the emerging open source movement and unsure whether the principles would work in areas other than software, so he set up an online encyclopaedia to see if it could be done (Pink 2005). Tis was achieved using a seven-step validation process of article assignment, fact checking, review, copy-editing and approval. Two of these processes involved back-up open collaboration: open review and open copy- editing; in both cases the review and copy-editing was ofered to the public only after professionals had taken the lead. After 18+ months and $250,000, Wales says, we had 12 articles (Pink 2005). Soon afterwards, Wales found out about wikis. Tese allow anybody with Web access to go to a site and edit, delete, or add to whats there. Wales started a wiki version of the encyclopaedia. Within a month, they had 200 articles. In a year, they had 18,000. And on 20 September 2004, when the Hebrew edition added an article 132 t h e i n t e r n e t on Kazakhstans fag, Wikipedia had its one millionth article (Pink 2005). Wales had demonstrated that open-source principles could work for encyclopedias if the software and the organising principles were right. Tere is signifcant administrative work, but its almost all done by volunteers. Tere are duties such as administering pages, developing software, fnding copyright-free photos, moderating conficts, and patrolling for vandalism. With only fve paid stafers, volunteers perform most of it (Tapscott and Williams 2006: 72). Wales has noted, however, that Wikipedia is not primarily a technological innovation, but a social and design innovation (Wales cited by Hendler and Golbeck 2008: 15). Bruns, who uses the term produser where some might use prosumer, argues that the success of the Wikipedia project indicates four preconditions for efectiveness, as outlined in Figure 7.1. 1. Trust in the potential capacity of the contributors to meet the demands of the project in a non-hierarchical way, with barriers to engagement set as low as possible to include as many produsers as possible; 2. Solve problems through enabling contributors to work on challenges that interest them, in ways that interest them, rather than directing people to work on tasks that someone else has decided are critical; 3. Set up granular content-creation practices; small, separate tasks requiring a limited set of skills and a limited degree of user investment. If the consequences of task failure are low and reversible then produsers can learn on the job and administrative direction is minimised; 4. share ownership of processes, tasks and outcomes with equal access to information, and reject infexible production models. Source: Based on Bruns 2008a: 1920) Figure 7.1: Brunss preconditions for the creation of an effective wiki Additionally, there are general principles that Wikipedians should adhere to. Tey should be unbiased in what they write, and act in good faith to improve the encyclopedia. Te guidelines are sometimes summed up as Neutral Point of View, Verifability and No Original Research (Bruns 2008a: 113). Just in case not everyone follows the rules, a number of semi-protected articles have watch-lists: people who are notifed when the entry is changed. Watched entries include the t h e p u b l i c s p h e r e 133 biographies of political fgures and religious faiths and movements. Te watchers are vigilant. A study by MIT and IBM found that cases of mass deletions, a common form of vandalism, were corrected in a median time of 2.8 minutes. When an obscenity accompanied the mass deletion, the median time dropped to 1.7 minutes (Pink 2005). Te Wikipedia process has produced a self-correcting, continually updated site. Further, in 2005 it had over 500,000 articles in English compared with the 80,000 on ofer in Encyclopedia Britannica. By 2007, the number of articles in English had risen to two million (Bruns 2008a:107), while some commentators estimate that an average of almost 2,000 new articles in English is posted every day (Tapscott and Williams 2006: 76). So why is Wikipedia generally unacceptable as a stand-alone, academic-quality reference for research papers and essays? Wired journalist Daniel Pink provides an answer: Encyclopedias aspire to be infallible. But Wikipedia requires that the perfect never be the enemy of the good. Citizen editors dont need to make an entry fawless. Tey just need to make it better. As a result, even many Wikipedians believe the site is not as good as traditional encyclopedias (Pink 2005). A study by Nature magazine of 42 science entries revealed that Wikipedia was less reliable than Britannica, but neither was perfect. Britannica had three errors per article, Wikipedia four (Tapscott and Williams 2006: 75). Wikipedia swiftly corrected the errors identifed. As a compensation for always being a work in progress, Wikipedia content is constantly growing, changing and responding. During the days in which the 2008 Mumbai attacks were in progress, 2629 November, Wikipedia provided a record of the unfolding events. Tis was less a critique of the mass media, which tends to be the focus of citizen-journalist blogs, but was instead a chronicling of history as it happens (Bruns 2008a: 104). For many people who watched the three-day horror unfold, including professional journalists, the new pages on Wikipedia, the tweets on Twitter, and images on Flickr and YouTube, ofered an organic multi- dimensionality missing from the polished, packaged, professional news services. According to Wales, wikis let people who share a passion also share a project (Pink 2005). A revitalised prosumer-driven public sphere is emerging from that passionate participation. YOUTUBE Google bought YouTube in a $1.65 billion share deal in October 2006, valuing the smaller company at approximately 3 per cent of Google. When the deal was announced, Eric Schmidt, Google CEO, stated that YouTube complements Googles mission to organize the worlds information and make it universally accessible and useful (Google 2006). Implicitly, the information Schmidt referred to in terms 134 t h e i n t e r n e t of YouTube was digital video: both prosumer-made and paid-professional. In improving the searchability of the YouTube archive, and ofering YouTube video sources as relevant items of information alongside websites, pdfs and other language- based documents, Google was arguably adding value to what was already a vibrant and growing video community, and improving the services Google ofered to its core search clients. Since that time searches on Google increasingly ofer relevant YouTube content, and there has been signifcant integration of written and visual data sources within the Google databases. At the point where it was acquired, the YouTube service was growing exponentially with more than 100 million video views every day with 65,000 new videos uploaded daily (Google 2006). It had come a long way for an idea which was not yet two years old. YouTube was started in February 2005 by Chad Hurley, a graphic designer and user interface expert, Steve Chen a Taiwanese-born engineer, and Jawed Karim a computer scientist who had migrated from Germany to the US in his early teens. Tey had all previously worked for PayPal, and had become millionaires when that company was bought by eBay in 2002. Teir idea was to set up a site that allowed registered users to upload short digital videos, of less than ten minutes, typically from cell phones, cameras and camcorders, for other people to access. Anyone could access the open content, but only community members could post. Indicating that the YouTube community was an important element in the deal, Google announced that the YouTube management team would continue to operate the company independently. By April 2008, there were over 80 million YouTube videos (Burgess 2008: 102). When Google bought his company, Hurley claimed that Our community has played a vital role in changing the way that people consume media, creating a new clip culture (Google 2006). Like Wikipedia, YouTube had dramatically rewritten the possibilities for interactive participation in the public sphere. Building upon the social networking potential, leveraged to a signifcant extent by the social networking site MySpace, which was providing 17.5 per cent of all YouTube trafc at the point of sale (Tancer 2006), YouTube registers the total number of times each video has been viewed and ofers users the opportunity to rate and comment on videos they watch. Given the huge audience accessing the service, and the tens of thousands of videos uploaded daily, YouTubes community members were readily able to fnd content of interest and share it with friends while still gaining a sense of an overall YouTube brand and service. YouTube was not a fle-sharing service in the ways in which Kazaa and Napster had been, however. When YouTube users access the material that interests them, the video is not downloaded onto viewers computers, thus avoiding some of the legal issues associated with peer-to-peer systems. Instead, images are streamed from the t h e p u b l i c s p h e r e 135 YouTube site but the links to access specifc video content can be easily embedded in blogs, websites and emails and forwarded virally from one person to another. Because YouTube controls the videos posted on its site, they are in a position to remove pornography and other material banned by the sites rules. Tey can also respond to cease and desist notices from copyright holders. Even so, one strategy adopted by YouTube to minimize friction with old media such as flm and television companies is a range of forward-looking agreements under which some copyright material is allowed on the site. As BBC News business editor Tim Weber indicated: According to the theory of the long tail where niche content can attract relatively large audiences by being fndable and available on demand it could create a win-win situation. Old media conglomerates can fnally reach the audiences that have abandoned them for the on-demand world of the internet. (Weber 2006) Writing about Viral video, YouTube and the dynamics of participatory culture, Jean Burgess (2008: 101) defnes viral marketing as the attempt to exploit the net- work efects of word-of-mouth and internet communication in order to induce a massive number of users to pass on marketing messages and brand information voluntarily. YouTube ofers examples of viral video and internet memes (a meme is the smallest possible element of culture, analogous to the gene in biology), artistic fragments and ideas that are adopted by large communities of users and then employed as part of the indicators of community membership. Burgess notes that internet memes spread and mutate via distributed networks in ways that the original producers cannot determine and control (2008: 101). Indeed, according to Burgess, these memes sometimes become the mechanisms via which cultural practices are originated, adopted and (sometimes) retained within social networks, and cultural value can be attributed to the extent that it [the meme] acts as a hub for further creative activity by a wide range of participants in this social network [YouTube] (2008: 102, italics in original). Burgesss example, All your chocolate rain are belong to us builds upon a turn of the century viral Flash animation of the opening sequence of the European version of the Japanese game Zero Wing, where the plot of the game is explained in a poorly translated context scene in which the beleaguered captain of a battleship is told All your base are belong to us. Like the LAN clan Big Dikk Pimpzs (BDP) REPRESENT!!1 grafti (Green and Guinery 2006), the in-joke comes from enjoying a claim to authority which includes a display of inadequacy (see Chapter 8). In the case of REPRESENT!!1, the failing is that, in demanding the audiences respect (as do the Nas lyrics for the song of the same name), the author has let slip the Shift key so that the fnal exclamation mark has become 1. In the case of All 136 t h e i n t e r n e t your base are belong to us, the fun lies in appreciating the poor translation within the claim. In a site of over 80 million videos, and rising, very few can reach a level of prom- inence equivalent to, say, Harry Potter in the world of publishing. Te YouTube equivalent to the fan fction communities (Chapter 8) are those which take a popular text and rework it to create something new that speaks in a diferent way to the fan community. Tis is the case with Tay Zondays user-created music video Chocolate rain (Zonday n.d.), an anti-racist self-penned song which had been viewed over 47 million times as at February 2010. According to Burgess it was the combination of oddness and earnest amateurism that caught the attention of an internet community 4chan.org whose members swarmed YouTube to push Chocolate Rain up the rankings initially, motivated . . . around absurdist and sometimes cruel frathouse culture (2008: 104). Once the song had achieved some salience, a number of parodies, remixes and mash-ups followed. Tese include a Star Wars/Vader spoof drawing attention to the fact that Zonday turns away from his microphone to breathe; Vanilla Snow, which is a white response to the chocolate black; and All your Chocolate Rain are belong to us (All your . . . n.d.) a mash-up of the original song. Te term mash-up here borrows from the notion of a major trafc pile-up, indicating that images from two or more sources have been combined together to create the revised, or re-imagined, work. In this case, the mash-up edits Chocolate Rain with the fash sequence from Zero Wing, while the resulting melange advertises itself on YouTube as Te worlds most nonsensical mistranslation in the style of the worlds most nonsensical anti- racism song. Starting out as a small element of a larger study of 4,300 highly popular YouTube videos, undertaken with Joshua Green (Burgess and Green 2009), Burgesss analysis of the Chocolate Rain meme argues that the textual hooks and key signifers that catch the attention of the audience cannot be identifed in advance of community take-up. Once they have been widely celebrated, however, the hooks and signifers are available for plugging into other forms, texts and intertextsthey become part of the available cultural repertoire of vernacular video . . . even apparently pointless, nihilistic and playful forms of creativity are contributions to knowledge (Burgess 2008: 106). Te point that Burgess makes here is that the success of these prosumer videos lies not in their professionalism, or necessarily their inherent qualities of production or performance, but in their capacity to ofer cultural material, a meme, that can be appropriated and circulated by the audience/community. Sometimes, the audience/community is recognised by a professional performer taking a popular internet meme and making a song from it. Tis reverse experience was the case with the Numa-Numa meme, remixed by Rihanna (Milian 2008). t h e p u b l i c s p h e r e 137 Summary n This chapter introduces and critiques Habermass notion of the public sphere before considering how we can be confdent in the usefulness of information we fnd on the internet. The work of the Electronic Frontier Foundation is used to underline the variety of singular views accessible through the internet, as well as reminding us that some people are unable to use the internet to circulate even mainstream views because of repressive governments. n Blogging and wikis are identifed as particularly representing the new dynamism of Web 2.0. Blogging is addressed in the case study on Salam Pax, which also examines how to evaluate web-based information, while the history and operation of Wikipedia is discussed separately. n The case study on YouTube introduces the notion of the internet meme through a consideration of Burgesss work (2008) on the chocolate rain meme. Chapter 8 builds on web-based social networks to look at online communities. Te community is not a passive recipient of the user-created viral video. Instead, community members do necessary and additional work by essentialising elements of the video in a manner which allows the cultural fragments to acquire specifc meanings in new contexts. Such circulation typically takes the form of an in-joke, as with the BDP REPRESENT!!1 image (Green and Guinery 2009). Tis would be a meaningless text to people other than gamers. Te value of the joke lies in the fact that the only people the BDP LAN clan are interested in impressing are other gamers. In creating and sharing new popular culture meanings from older materials, communities and social networks are also creating new ties between members and setting boundaries of practice that distinguish them from outsiders. Refection: User-led culture How does your use of YouTube, Twitter, Facebook and other social network-based sites differ from conventional information-driven internet searches? 8 CoMMUNITY INTRODUCTION What is your view of community? How does it interrelate with your view of the internet? Do you use the internet and its various elements of social media: IM [instant messaging], chat rooms, social network sites, email, blogging (SNS Safety 2008: 21), as ways in which to build and maintain community? For most readers of this book, the internet is a key element in the development and maintenance of community. Clearly, there are any number of internet-related case studies that could have been considered in this chapter. Many organisations use websites and email lists to build communities around a shared passion: some succeed. One of the most infuential and extraordinary examples of the building of an internet-based community of interest is the US MoveOn organisation. Set up in 1998 by internet start-up millionaires Wes Boyd and Joan Blades, MoveOn.org originally arose out of their desire for the Clinton administration to move on from the scandal surrounding President Clintons afair with Monica Lewinsky and return to a left-wing political agenda. Te movement attracted the attention of seriously wealthy George Soros and also gained support from other left- inclined citizens. By 2003, claims Wolf (2004), MoveOns email list had reached 2.3 million subscribers. Although this momentum did not unseat President George W. Bushs bid in the 2004 Presidential elections for a second term, it may have been part of the dynamic that tipped the balance in favour of a more radical agenda with the election of President Barack Obama in 2008. At that point, MoveOn claimed 4.2 million members (Move On 2008). Obamas presidential campaign has been celebrated as the moment when the internet came of age in mobilising everyday citizens across the US, both to work for the eventual Democratic win and to contribute huge numbers of small donations to fund the costs of the campaign (Miller 2008). MoveOn.org was only one part of that dynamic, but it is an important indicator of the potential for bringing together communities of like-minded individuals. Indeed, there were over 1,000 election parties in towns and other geographical communities across the US facilitated by 140 t h e i n t e r n e t MoveOn in the wake of Obamas success. Te MoveOn.org phenomenon has also spawned equivalent organisations in other countries. One example is GetUp.org.au in Australia (Get Up 2009), while Avaaz.org (Avaaz 2009) operates in 14 languages and has a mission to raise international awareness about global issues and matters of social justice around the world. In the UK the TeyWorkForYou.com organisation is another way in which the internet is being used to enable voters to scrutinise and infuence the democratic process by making the actions of members of parliament more visible, and making elected representatives more accountable (Tey Work For You 2009). But are these coalitions of interests and political agendas really communities? Are they movements, but not communities? Te answer to these questions depends in part upon how people defne the terms they use, how they feel about the com- munication they experience and how emotionally invested they are in the groups concerned. Certainly, one persons online group can be another persons community. In the frst half of the twentieth century, research on community often started with, and overlapped, research on family. Tus Arensberg and Kimballs (1940) Harvard-sponsored study of Family and Community in Ireland and Young and Willmotts study of Family and Kinship in East London (1957) examined working-class communities in rural and urban settings, respectively, underlining the importance of family within community. In contrast, Talcott Parsons (1943) essay Te kinship system of the contemporary United States, theorised that the dominant feature of American society was that of the isolated nuclear family, and triggered extensive research for several decades to determine whether or not the nuclear family was isolated from their extended kinship network (Sussman 1965), or whether support and care continued through mechanisms such as a sense of mutual obligation and a desire to get together (Anderson 1971). To some extent research in these decades examined community either as an adjunct to co-located family, or as a local replacement for distant family. In part- icular, the ofering of small services, such as child-minding required proximity. Where family were distant or unavailable such services tended to be exchanged within the community on a reciprocal basis, building social networks and communal obligations. Over time it was recognised that many functions of community are also carried out at a distance, using technologies including ICTs and the car, and that the focus on locality may have been overemphasised (Litwark and Szelenyi 1969). In particular, family would travel to care for a distant family member in times of illness, stress or turmoil (Baldassar 2007). In the early days of the internet there was substantial discussion about whether online communities could ever have the richness and depth of physical, geographical communities (Green 1999). People talked about their experiences online in terms of c o m m u n i t y 141 the quality of connection. Howard Rheingolds defnition that virtual communities are social aggregations that emerge from the Net when enough people carry on those public discussions long enough, with sufcient human feeling, to form webs of personal relationships in cyberspace (Rheingold 2000: xx), suggests that com- munity is brought into being through afective investment. Shawn Wilbur also sees emotional engagement as central: for those who doubt the possibility of online intimacy, I can only speak of . . . hours sitting at my keyboard with tears streaming down my face, or convulsed with laughter (Wilbur 1997: 18). A complementary opinion, that community is related to perception rather than grounded in location can be drawn from the work of Benedict Anderson (1991 [1983]), who comments in Imagined Communities that every community, including those located in geographical space, is imagined because the members of even the smallest nation will never know most of their fellow members, meet them, or even hear of them, yet in the minds of each lives the image of their communion. He goes on to comment that all communities larger than primordial villages of face-to-face contact (and perhaps even these) are imagined (Anderson 1991: 6). Finally, Daniel Miller and Don Slater carried out ethnographic feldwork in Trinidad, in the West Indies, to examine Trinidadian uses of the internet. Tey con- cluded that online community was not a shadowy placeless substitution for real community, but a way in which Trinidadians could engage with an existing com- munity diferently. In particular, online community allowed deeper (more spiritual) engagement, with greater opportunity to absorb the impact of a communication and to craft a reply, without slowing down the exchange as a letter does (Miller and Slater 2000: 1823). Trinidadians also found it easy to integrate internet use into every day family and community life. Te implication of Miller and Slaters work (ibid.) is that the internet is part of real life: theres nothing virtual about it; and the communities found on the internet are similarly authentic communities operating in a diferent context from face-to-face communities. Often the two contexts complemented each other, as with the use of the internet to unite members of the global Trinidadian diaspora with their friends and family still living on the island. Tere is continuing research attention being paid to how online communities function and organise themselves and the benefts they deliver ofine to their online members. Tree case studies are used here to explore diferent aspects of online community and how these relate to face-to-face communities. Korean LANing takes the (generally masculine) culture of interactive gaming and examines how this has been celebrated and made into an event phenomenon in South Korea, and what this says both about cultural specifcity of online communities and about the public investments made by Koreans in their internet infrastructure. Te generally masculine case study of online games is contrasted with that of fan fction writers 142 t h e i n t e r n e t LAN CULTURE Te Republic of Korea (South Korea) has adopted computer gaming in a way unlike elsewhere. For example, compared with other game-invested countries, like the US (36 per cent) and Japan (39 per cent), 65.9 per cent of Korean women play online games (Carr et al. 2006: 163). In a country with a population of around 50 million, but with a popular culture reach well beyond its borders, Lineage II is Koreas answer to the American title World of Warcraft, and second in global reach (Beavis 2007: 545). Tese Massively Multiplayer Online Role-Playing Games (MMORPGs) attract millions of subscribers (Carr et al. 2006: 27). In 2005, the Korean online game market was worth US$1.4 billion, accounting for 56% of the entire Asia Pacifc market share (Jin and Chee 2008: 38); by March 2007 this amounted to 32% of the worlds online gaming market (ibid.: 42). Korean citizens commitment to online interactivity in domestic contexts and at PC bangs (Korean internet cafs) mirrors an over-arching national commitment to digital technology. According to Hwang and Park (2009: 234), in 2007 the South Korean IT industrys share in total GDP exceeded 16.9 per cent and its contribution to GDP growth was 30 per cent. While there were only 100 PC bangs in 1997, at the time of the 1990s Asian economic crisis, the fight to small entrepreneurial businesses as a way of avoiding unemployment has been credited with fuelling the growth in PC bang numbers to 25,000 by May 2002. At this point, the market peaked before stabilising at 20,000 in 2005 because of market saturation and the growing access to broadband services in the home (Jin and Chee 2008: 48). Approximately 90 per cent of Korean households were connected to broadband services by 2007 (MIC 2007). and readers, who are typically young women and teenage girls. Te fnal case study, HeartNet, has been chosen to interrogate the notion of whether online communities can ofer support for older internet users that are beyond the everyday capacity of most ofine communities. Is there a particular advantage to building up social capital in an online community? Refection: What makes a community? Do you see yourself as belonging to one or more communities? What is it that makes a community, rather than a neighbourhood or online group? c o m m u n i t y 143 Te research, development and national priority given to a fast broadband infra- structure make online connection easily accessible and comparatively cheap, driving high participation rates. Te average Korean citizen enjoys fast, afordable access and download speeds unparalleled elsewhere apart from Japan (BuddeComm 2009). Another element of the dynamic which supports online game-play is attributed to historical and socio-cultural factors in that Korea was colonised by Japan in the early years of the twentieth century, and many console games are produced in Japan. Although the ban on Japanese cultural products, including console games, flms and music was lifted in 1998, the historic tension between the two countries has proven persistent and difcult to surmount, especially since such global console game companies as Sony, Nintendo and Sega are Japanese (Jin and Chee 2008: 47). Tis avoidance of Japanese cultural products has helped to promote the growth of online gaming in Korea, which is part of a burgeoning global market for video games that seems to withstand economic crises, even while other entertainment sectors falter. Tracey Jennings, a Canadian partner in consultancy giant Price Waterhouse Coopers, comments that the global video games market still shows signifcant growth: 18 per cent in 2008 is quite remarkable when you contrast that to the num- ber of [entertainment] segments that have been contracting. She attributes this resilience to: video games not being dependent on advertising revenue; the con- tinuing popularity of newer platforms such as the Wii, Nintendo DS, XBox 360 and PS3; broadband adoption since this enables better engagement with MMORPGs; and the take-up of wireless which facilitates smart phone gaming, as with the iPhone (Jennings 2009). Just as not all computer games involve internet access, not all players play the same kinds of games. For instance, many Korean women play online puzzle and card games, rather than the mainstream titles advertised on television or lining the shelves of computer game retailers (Carr et al. 2006: 2), while their sons might play militaristic FPS (frst person shooter) titles. Diferentiation in the games market means that not all gamers have the same potential attraction to marketers. Commercial games developers tend to invest in high profle games with massive production budgets. Such games . . . continue to be aggressively marketed at youthful, male consumers (Carr et al. 2006: 2). In Korea, the Ministry of Culture and Tourism (MCT 2004) has identifed on- line games as being the central industry that will complete the IT revolution due to the combination of content and high technologies (ibid.: 6). Seoul held the frst ever World Cyber Games in 2000, attracting a feld of 174 competitors representing 17 countries, and continued hosting the games for the next three years, with the number of countries increasing to the point where 74 nations were represented in the 2007 competition in Seattle, Washington (Hutchins 2008: 855, 856). E-game 144 t h e i n t e r n e t skills and competencies are honed in Koreas local PC bangs through engagement with LAN culture, typically involving groups of adolescent boys and young men. In the early days of the internet, LANs were Local Area Networks (usually housed in a set of connected spaces, such as a school, or the foor of an ofce block) (Green and Guinery 2006), although LANs and their Wide Area equivalents, WANs, are now subsumed into generic networks, [t]he LAN title has now been appropriated by LANers, and recognises their reinvented skills which allow them to setup a temporary, portable network in a specifc locality (ibid.). Such activities require extensive collaboration both in terms of technological skills and game-playing. Te assembled computers are all connected and powered up so that they are both interlinked and online. LANers also wear headsets to keep their aural feed localised so that they can still hear each other when shouting out comments, instructions and witticisms during a game (ibid.). Jin and Chee (2008) credit the engagement in games and similar activities with assisting Korean youth to construct tight-knit communities . . . [they have] become another channel of human relationships, in other words, part of peoples actual lives (ibid.: 39). Writing about Malaysia, Nichols et al. (2006: 13) record the testosterone-fuelled dynamic of players engaged in the LAN arena: Tis huge dimly-lit cavern is flled with more than a thousand PCs, each with a trendily-dressed young gamer, all with headphones clamped to their heads, hunched over keyboard and mouse, frantically clicking and tapping. Some have small groups of friends behind them, egging them on; others are playing solo. . . . What is happening here is not immediately obvious to the uninitiated. It might appear that these gamers are wrapped up in their own little fantasy worlds, oblivious to everyone around them. In fact, theyre not. Most of them are playing games as part of teams composed of several others in the room. Te LAN or local area network means that all the computers you see are linked together . . . there are a great many games being played back and forth across the network [and the internet] all at the same time, each with its own rhythm of triumph and defeat, exhilaration and disappointment. Along with acknowledging that much online gaming is an important communal and community-building activity (Morris 2004), recent writing has as often focused on the positive social impacts of gaming as any perceived negative ones. Te out-dated perceptions of Nintendo (no-friend-o) (Marshall 1997) have been countered by researchers as diverse as journalist Steven Johnson (2005) and psychology professor Kevin Durkin (Durkin and Barber 2002). Tese commentators argue that online games can be highly interactive and educational, and that games players are likely to be sociable, with strong friendships and positive parental relationships. Tis perception has been underlined by Jin and Chees (2008) ethnographic study of PC bangs. c o m m u n i t y 145 Noting that the PC bang is a de facto community centre to which young people are drawn during their journey from school to home, or to one of the after-hours cramming colleges, Jin and Chee comment that almost all youth interviewed talked about their online activities in relation to obligation and duty, whether it was to their friends and promised times for logging on or [whether it was] to their guild, clan or band of blood brothers (2008: 50). Costs are reasonable, at US$1 per hour playing, but the sociability access means that not all participants would be playing all the time, as with players who are watched by friends. Carl, a gamer, explained why he chooses to play at PC bangs, even though he has his own computer at home: Te diference is that home is alone and the PC bang is with people. . . . PC bang can be more together, and you know, Koreans like to be together . . . so that makes PC bang culture. When we play the [same] game at home we feel something empty (Jin and Chee 2008: 51). Tere is also an online micro- economy in building virtual game items for sale on Korean gamer site Itembay.com and its equivalents. Tis can lead to incomes of US$100 per week for dedicated players. In a community with 93 per cent unemployment in the 1519 age group, and a job market distorted by compulsory male service in the armed forces, this makes online competency a credible skill for young people who are out of work, and possibly an act of celebrating civilian life, since, according to Carl, there is no Internet during army service (Jin and Chee 2008: 512). Games are therefore implicated in issues of autonomy, self-esteem and social status, as well as ofering intrinsic rewards in terms of skill development and incremental achievement. Tese insights are reinforced by participant-observer work with a teenage male Australian LANing clan BDP which operates in domestic rather than internet caf contexts (see Chapter 7). In a more privileged environment, albeit with slower internet speeds, middle-class LANers gain efective online access as part of a family broadband and telecom subscription, and set about persuading their parent(s) to increase the download quota. At this point the gamer has access to any other non-fltered communication channels available from MSN, chats, blogs through to porn and engagement in the copyright infringing download communities accessing music, flms, TV programming and alter native digital media. Such investments in online materials become a status point for the young person concerned the person in a given peer circle with the greatest internet access, and the largest capacity for storing downloaded materials, is in a good position to develop key-guest status for the evolving LANparty culture . . . Alongside the playing of the game, the interconnected gamers set up a peer- to-peer fle sharing network allowing the accumulation of desired wares (TV, flms, games, music, photos and other digital media) from each others hard drives. (Green and Guinery 2006) 146 t h e i n t e r n e t While gaming skills are often honed in known friendship circles, real recognition is ofered by impressing strangers. Tis can either happen at LANfests, weekend- long community LAN parties which resonate Nichols et al.s description of the Malaysian LAN arena (2006: 13), cited earlier, or online. Te trick online is to use the games programs to identify servers with active games in progress that are not located so far away as to slow the play down, as indicated by the ping rate. Desirable games also have enough players to make the game interesting, but do not have so many gamers online that individual game-play techniques are lost. One of the biggest compliments that can be paid to a teenage gamer is for a clan leader to ask the LANer if they are interested in becoming a clan member (Green and Guinery 2006). Among the reciprocal community commitments incumbent upon join ing a clan of strangers is the undertaking on the part of a new member to be avail able at certain times and for given hours, and to upskill, developing an under- stand ing of clan strengths and strategies. In return there is an implied undertaking that the senior clan members will mentor the newbies (n00bs). LANing culture as with hacker culture, open source, blogging and wikipedia culture valorises excess and builds in tests of commitment (Green and Guinery 2006). It also builds community. In the same way that diferent clan members will have diferentiated skills and separate roles as part of the online clan, so they also have complementary areas of technical expertise. It becomes important for each clan to have access to a LANer who has the skills to pimp their machines, modifying them to the highest possible gaming specifcations (specs) by improving, for example, the graphics resolution. Judging between fast, powerful, ft-for-purpose machines is one of the tests of strength often trialled at LANfests. It is the equivalent of a shoot out. Speccing a machine involves increasing the hard drive capacity to allow for the storage of an ever-greater downloaded library of material and priming the machine to make it operate faster than specifcations would usually allow thereby increasing frame rate (Green and Guinery 2006). Tese modifcations might run the risk of overheating the CPU, central processor unit, which consequently requires a range of cooling solutions from fans through to heat sinks. At the ultimate, gamers aspire to water-cooled computers, to fat screen non- refective monitors and enhanced video graphics cards to optimise the game aes- thetics (and the blood splatter patterns) . . . with sound-surround audio and neon illuminated working computer innards. It is at LANfests, surrounded by local gamers with all their hardware, fles and games on display, that participants are introduced to new games, technology and downloads. Te community-based LANs become a clan of clans (or a group of groups). Red Flag LAN (RFLAN) is one such LAN community, immortalised as many are in a YouTube documentary (RFLAN 2006) (Green and Guinery 2006). c o m m u n i t y 147 Tis gaming case study refers to the construction of game communities online and ofine by gamers who make appointments in real-time contexts to go online to serve a specifc role in shared enterprises with established collaborators. Often these engagements start out involving friends and acquaintances already known ofine at home, at school, and from PC bang environments. Gaming clan members tend to develop a range of complementary online specialisations; in a FPS context one might be a radio operator, another could be an armaments specialist. When playing online, good gamers might be spotted and recruited by clan leaders not personally known to the gamer, and inducted into a new online clan: a community with a range of rights, responsibilities and obligations. Gamers activities also have implications for the community development of their technology skills. While FPS gaming culture is often pervasive among young male players in the western world, RTS (real-time strategy) culture is particularly marked in Korea where the most efective gamers are national celebrities. Boxer, the gamer alter-ego of Lim Yo Hwan, has a fan club of more than half a million members, and professional gamers act like any other celebrities, marrying supermodels, making vast amounts of money, and engaging in other such activities deemed worthy of spectacle and intrigue (Jin and Chee 2008: 49). Refection: The value of online video games Even though many games are criticised for their violent content, and for being a waste of time, do you see any value in developing skills in online game-play? FAN FICTION COMMUNITIES With their beginnings in original 1930s fan communities dating back to the early days of Hollywood, and to science fction fanzines (Tomas 2006: 226), fan fction communities do more than get together online to talk about their passion: they produce and consume materials which reinforce aspects of their fan identities, allowing them to enjoy richer, prosumer fan experiences. Henry Jenkins, writing about Convergence Culture (2006), uses the stand-out Harry Potter (HP) fan community to discuss fan fction. One reason why the HP community is so huge is the power of the brand itself, based on the books by J.K. Rowling, and the fact that the fans include millions of teenage readers willing to experiment with innovative ways of communicating using new media. Green and 148 t h e i n t e r n e t Guinery (2004), in a participant-observer account of a fan fction community, noted that the phenomenal growth of the HP fandom can be directly related to take-up of the internet, and to middle-class readers internet access. Harry Potter frst made an appearance in 1997, in Te Philosophers or Te Sorcerers Stone, depending upon the publishers market. At that time, the character of Harry was eleven, and much of his audience was of a similar age. Tey were about to discover the internet. In many western countries, a majority of two-parent families with school-aged children were online by 2000 (e.g. ABS 2001). From the parents point of view, this may have been to support the kids education: from the childrens points of view, this new connectivity opened many possibilities to explore aspects of culture that they had already found interesting. One area of engagement for HP fans was the online fan fction communities. Communities depend on individuals engaging with the general exchanges, pro- jecting themselves and their identity in an ongoing conversation. Tis dynamic was aided by the unfolding HP narrative, which did not conclude until the pub lication of the seventh and fnal book, Harry Potter and the Deathly Hallows, in 2007. In an earlier era, Nancy Baym analysed the importance of the space between episodes of soap operas to the Usenet fan groups who discussed them: Te viewers relationship with characters, the viewers understanding of socio- emotional experience, and soap operas narrative structure, in which moments of maximal suspense are always followed by temporal gaps, work together to ensure that fans will use the gaps during and between shows to discuss with one another possible outcomes and possible interpretations of what has been seen. (Baym 1995: 143) Te HP universe comprised an increasing number of books and flms, but there were spaces between these long spaces, as far as the fans were concerned. Speculation, analysis and fantasy in these spaces fuelled the rampant growth of many fan fction sites, and a proliferation of stories. For example, between 16 August and 4 October 2004, HP fan fction writers posted an additional 9,196 stories on one general fan fction site, fanfction.net, at a time when the HP node had 147,067 stories, compared with its nearest rival, Lord of the Rings, with 33,189 stories (Green and Guinery 2004). Fanfction.net writers form only one of a number of HP communities, as the discussion of the Sugar Quill site indicates below. Tere are critical diferences between many of these groups in terms of whether the HP focus is a specialist node in a general fan fction site (as with fanfction.net) or whether it caters only and specifcally for HP fans (as Sugar Quill does). Other dimensions include whether anyone can post anything, or whether all stores are read and polished prior to acceptance: do they need to go through a beta-reading c o m m u n i t y 149 process? Beta reading takes its name from beta testing in computer programming: fans seek out advice on the rough drafts of their nearly completed stories so that they can smooth out bugs and take them to the next level (Jenkins 2006: 179). Tis mentoring and support improves the writing of both the mentor and the mentee. Some sites only take narratives entirely consistent with J.K. Rowlings vision, indicating a fully moderated site in which assessors make informed judgement. Others accept related stories, or stories that accept part of the canon, for example, popular author Midnight Blue gives the setting of her evolving fan fction Te Mirror of Maybe as after Harry Potter and the Goblet of Fire and as an alternative to the events detailed in Harry Potter and the Order of the Phoenix, [this] is a Slash story involving Harry Potter and Severus Snape (cited in Green and Guinery 2004). A further diference between sites is whether the stories posted are suitable for all ages, or whether they are categorised as suited for adults only (no matter the age of the author). Unlike the Adult Verifcation System that goes hand in hand with credit card use for porn sites, however, fans can access 18-plus sites such as restrictedsection.org through declaring themselves to be adult. Authors are asked to indicate what makes each story adult-only: for example, Please put a warning if your story contains content that may be ofensive to some authors [sic], such as m/m [male-on-male] sex, graphic sex or violence, violent sex, character death, major angst, BDSM [Bondage, Dominance and Sadomasochism], non-con (rape) etc (cited in Green and Guinery 2004). Adult-content HP fan fction includes a range of specialist pairings such as Twincest: incest between one of the sets of HP twins; or Weasleycest: incest within the Weasley family. Tosenberger comments that the sheer size of the fandom means it is a collection of subgroups, and each subgroup can churn out its own stories for its own audience with impunity (2008: 191). Trough their construction of the HP narrative, and their conjectures about motives and consequences, fans present themselves as identities with whom others might agree (positive afrmation), or disagree (ofering the chance for engagement through exchange). Even now that the over-arching narrative of the Harry Potter canon is concluded, fans can still explore pretty little tree-lined side streets ancillary to the accepted story. As Sweeney Agonistes, editor of Sugar Quill, (n.d.) put it in an interview, fan fction writers are not correcting J.K. Rowlings text but delighting in it: I dont write to fanfc to fx things, I write it to . . . speculate on what might have led up to something, or what could result from some other thing. A story that leaves these wonderful corners isnt a story that needs fxing, its a story that invites exploration (Jenkins 2006: 1812). Tat exploration is most enticingly carried out in a community context. Many HP communities have been started and run by teenage fans. One such, central to Jenkinss account of the HP Fandom, was Te Daily Prophet, www. 150 t h e i n t e r n e t dprophet.com, a newspaper circulating at Hogwarts School of Witchcraft and Wizardry and part of the HP canon. Heather Lawver, the sites founder, was home- schooled so lacked an everyday exposure to school newsletters but had a clear idea about what her paper should look like and how to coordinate her hundreds of HP fan-contributors around the world. She also knew how to market the scheme to journalists parents. As she explained it in her open letter To the adults, Te Daily Prophet brings the world of literature to life . . . exploring books, diving into the characters and analysing great literature . . . By creating this faux world we are learning, creating, and enjoying ourselves in a friendly utopian society. Te site has experienced many down times, partly because of Lawvers health problems and possibly because of Warner Bros professionalization of the Daily Prophet title, but the fan newspaper is only one of the contributions Lawver made to HP fandom. Te other involved her contribution to cross-site community action against Warner Bros when they instituted what came to be known as Te Potter War. Te Potter War began in 2000 after Warner Bros bought the merchandising rights to everything apart from J.K. Rowlings books. Its legal department followed standard operating procedure. Treatening letters were automatically sent to site owners who [had] registered Web domain names that included trademarked words from the Potter universe, wrote Weise in USA Today (Weise 2001), adding But most of these were fan sites set up by children and teens. Tey were terrifed by ofcial letters demanding that the domain be handed over lest the matter be referred to company lawyers. In the UK, a Warner Bros letter to British teenager Claire Field informed her that her site Te boy who lived was likely to cause consumer confusion or dilution of intellectual property rights. Field and her father hired lawyers to negotiate with Warner Bros and went public, circulating negative publicity about the action in the mass media (Bringers n.d.). Alistair Alexander, a seasoned web campaigner, set up potterwar.org.uk (now defunct) to support a number of teenagers in the UK and internationally who had received Warner Bros cease and desist notices. In the US, Lawver set up her own Defense Against the Dark Arts campaign (dprophet.com/dada) Protecting Fans From the Real You-Know-Who and led a fan boycott of all HP merchandise. Lawver commented that Warner Bros under- estimated how interconnected out fandom was. Tey underestimated the fact that we knew those kids in Poland [an example shed given Jenkins] and we knew the rinky dink sites and we cared about them (Jenkins 2006: 186). Te HP community had developed links across the various subgroups; including language, culture and national afliations, with a particularly efective trans-Atlantic axis. Eventually even Warner Bros got the message: We didnt know what we had on our hands early on in dealing with Harry Potter . . . as soon as we realized we were causing consternation c o m m u n i t y 151 to children or their parents, we stopped it (Warner spokeswoman and brand manager Diane Nelson, quoted in Jenkins 2006: 187). In fact, the action against Claire Field lasted over three months before Warner Bros dropped the demand for the transference of the domain name. Trough her involvement with Te Daily Prophet, Lawver, the home-schooled Potter fan, had learned about: coordinating an international online community; writing and editing a digital newspaper; educational and pedagogical arguments for prosumer involvement; organising and running public relations campaigns; and copyright law. Outside the fan communities, educators began to argue about whether prosumer activity was a threat to a childs learning (it distracted them from their studies: the displacement argument), or whether it was an almost ideal collaborative learning milieu. Spurred on by Jenkinss (2004) remark that some of the best writing instruction takes place outside the classroom in online communities, teacher-educator Angela Tomas investigated online community Middle Earth Insanity to explore the social processes of fan fction engagement. She comments that the range of practices within the community is quite astonishing: collaborative writing of fan fction, the teaching of each other about the intricate details and specialised knowledge of the feld . . ., and dealing with management issues related to a 200-member community, adding that For a group of predominantly 1317 year-olds the level of writing, discussion and negotiation involved in these practices is remarkably sophisticated (2006: 229). Notwithstanding Sugar Quill Sweeney Agonistes view that fan fction does not set out to fx the canon, Tomas notes (2006: 234) that Middle Earth Insanity, which is partly based on Star Wars, includes a number of female Jedi knights which is at odds with Lucass original epics. Similarly, she comments that slash fction . . . in which same-sex relationships are explored can, for some young prosumers, provide a medium for exploring these issues and for seeing themselves refected in texts that might otherwise marginalise them (Tomas 2006: 236). Naturally, for predominantly teenage and young adult prosumer communities, romantic attraction, desire, love and sex are major themes. Once stories deviate dramatically from the accepted canon, with a romantic pair- ing of Harry Potter with Draco Malfoy, for example, the oeuvre is referred to as fanon the non-canon world according to fans creative, minority or subversive engagements with the text. Given that many members of fan communities engage with other members in face-to-face contexts such as schools, as well as online, what people are prepared to write or not write; or read or not read; becomes part of their public persona. Te range of identities that can be constructed using the many online HP FF [fan fction] genres, however, permits wide scope for FF members to identify with dissident constructions of the HP narrative and helps to add to the 152 t h e i n t e r n e t momentum with which his fame increases (Green and Guinery 2004). At the same time, fanon dissenters occasionally feel embraced by the mainstream canon. One such moment is linked to the scene in the flm of Harry Potter and the Prisoner of Azkaban where Draco blows Harry an origami bird in a Defence Against the Dark Arts class. It looks like a blown kiss, and the Harry/Draco slash prosumers certainly read it that way. Another instance is Rowlings indication that Dumbledore was gay and had loved Grindelwald . . . Slash fans are often accused of distorting or misreading texts, so this public validation of their method of reading is a somewhat rare pleasure (Tosenberger 2008: 187). Linking back to Chapter 6 and discussions of the mainly male audience for visual pornography, Tosenberger notes that most writers of slash fan fction indeed, most writers of all fan fction are female. Te existence of slash complicate[s] conventional notions about womens interests in erotica in general and the types of erotica women were supposed to be interested in (i.e. heterosexual romance novels) . . . PWPs (Plot? What plot? or Porn without plot) abound (2008: 189, 194). Tosenberger also argues that the large slash communities allow safe space for the exploration of queerness and non-hetero sexuality in the company of supportive prosumer communities in a way that celebrates the exuberant bliss (jouissance: 201) of young adult sex: In an era when representations of adolescent sexuality are both exploited and policed, Potter fandom is an arena in which fans of all ages, genders and sexual orientations can tell stories to satisfy their own desires; this freedom is especially valuable for younger fans, whose self-expressions are heavily monitored in institutional settings . . . Potter fandom is a lively, intellectually stimulating, and tolerant interpretive community. (Tosenberger 2008: 202) Refection: Nurturing the fans Do you agree that organisations which buy popular culture products need to protect their investments? Should fans be exempt from the usual constraints of Intellectual Property law? HEARTNET AND SOME ONLINE RESEARCH ISSUES Many avid gamers and fan fction writers have grown up alongside the internet and have integrated online connection into their communication repertoires, relating c o m m u n i t y 153 digitally with their F2F friends, as well as forming communities with people they are unlikely to meet in person. Diferent communication issues impact upon com munity membership for those who come to the internet as mature adults. HeartNet Australia, heartnet.com.au, was set up as an online research community to investigate these communication dynamics. Jointly funded by the ARC, Australian Research Council and the NHFA, National Heart Foundation of Australia (WA division), HeartNet was designed to help people recovering from heart disease to support each other in adopting heart-healthy attitudes and behaviours in a semi- moderated environment, where the lay (not medically-trained) moderator checked in every few hours. Te concept of moderation is critical to most well-run communities. It implies that there is a group of people with administrator rights: able to remove objection- able posts, or exclude people who repeatedly contravene the rules from further participation in the community. Moderators are usually volunteers drawn from a pool of keen community members. Tey may be paid, but the necessity to secure an income stream or raise enough money to fund salaries means that the website tends not to be controlled by members, which can afect the sense of community that develops there. Volunteer moderators are likely to take on roles in addition to the disciplining of participants and the control of content. Many moderators in fan fction communities, for example, will also be beta readers and prosumers in their own right. In HeartNet, the key moderator and administrator has been the PhD student working on the project. Tere have been two; Leesa Bonniface (now Leesa Costello) and Lynsey Uridge. Supporting the research students are the projects Chief Investigators and a number of specialist web administrators. At one point, when the community had grown to ten times the size originally anticipated, four members were invited to become moderators. Tis case study part- icularly concerns two of these, Rich and Francis (not their real names). In addition to members who act as moderators, most sites have rules and recommended operating procedures. In a community such as HeartNet there is a combination of warnings and terms and conditions. Warnings include the instruction to participants not to act upon health or medical information posted on the site without frst consulting their physician. Terms and conditions include the informed consent provisions required by a research project: letting participants know that they can leave at any time, and that the site is for research and posts may be published provided the community member is not identifable. In the past, most research into online communities was carried out on sites which were not designed as research projects. Tis raised a number of ethical issues such as: is it all right for a researcher to quote from a public discussion board even if none of the people involved in the discussion have agreed to be quoted? If a sites moderator 154 t h e i n t e r n e t and administrator have agreed to the research, does everyone else involved have to agree too? For university-based research most of these issues are discussed between the researchers and the Faculty or University Human Research Ethics Committee. Tese precautions are taken in part to prevent the sense of betrayal recorded by Stone (1991), when an early group of internet-users discovered that the online friend they thought was a disabled older woman Julie was, in fact, a male psychiatrist. When Julies confdantes learned abut the deception, their reactions varied from humorous resignation to blind rage (Stone 1992: 82), and some felt totally betrayed. Full disclosure of the research process at the outset of the online relationship is deemed to protect against such distress. Te fact that the internet is accessible round the clock, assuming technology and connectivity, means that online support is more accessible and available than via other avenues. Given that this is not a medicalised community, in that moderation is by the community and not by medical workers, HeartNet members know and share the reality of the daily challenges of living with heart disease, rather than promoting an idealised medical model of care and rehabilitation. Phase 2 attracted many positive comments, reassuring to the researchers and to HeartNet members: (Jane): I discovered this site while surfng the net. I havent really sought much support since my heart attack which was nearly a year ago, but wish I had since it would have made those darker days a lot easier to get through. An American heart patient . . . joined the community (Sam): I have a lot to be positive about and feel grateful to have found this site full of caring people. Further, some returnees, who had experienced the frst iteration of the site, were warm with acknowledgement (Betty): the site is taking of in leeps [sic] and bounds. You should all be so proud. (Bonniface et al. 2005) In line with Rheingolds views (cited earlier), human feeling would appear to be a touchstone of community. Tat feeling may be intense, and is not always positive. For example, in the second year of the sites successful operation, it became all too clear to the research team that the fostered community had indeed become organic: it split over a high-stakes dispute, over some six to eight months, between two groups of community members which led to ofcial proceedings, social welfare investiga- tions, psychological assessments, indications of a suicide risk and, unsurprisingly, extensive Ethics Committee involvement (Green and Costello 2009: 462). Te split represented the fracture in the previously strong friendship between Rich and Francis. Te word members, above, is put into inverted commas because several of the afected parties resigned from HeartNet. Tis may have been because they were unhappy at the researchers and moderators attempts to defuse the situation, or c o m m u n i t y 155 possibly so that moderators would no longer be able to intervene in the continuing incendiary exchanges via private message. (In online community terms, these pro- tracted altercations are often called fame wars.) Additionally, there were issues with authenticity. Upon joining, members had been advised to use only nicknames and the internal private messaging system to communicate with other people, and to protect their privacy in the public domain of the discussion board. Tis worked well in theory, but had soon given way to authentic communications including face-to- face meetings and community walks, which are clearly of beneft to heart patients. Indeed, such authenticity had also been seen as indicative of community-creation (Bonniface et al. 2006b). So, what had caused the fracture? In brief, Rich was a keen sportsperson and a positive competitor, while Francis had excellent IT skills. Rich, looking for some beneft side-efects to patients medication regimes, to counter the many negatives, posted a comment about one of his drugs: It is little wonder that this medication [specifed earlier] is a BANNED SUBSTANCE by the IOC [International Olympic Committee]. It helps to stop tremors. I recently completed the semi automatic mini 14 assault rife course as a sniper with the [. . . Service]. I managed to secure 29 kill shots out of 30. . . . I can only put this level of accuracy down to the fact that I didnt develop the shakes as most shooters do. (Green and Costello 2009: 466) Gavin, a friend of Francis, replied to this post, suggesting that Rich needed to be retrained when he came of the medication in case someone was killed as a result of inexpert sniper fre. Although Francis was not involved in this exchange, Gavin had identifed himself as Franciss friend. He was later removed from the community when he failed to provide any means of contact other than a free web-based email. Gavins phone and address details both had errors in them, and he was not prepared to communicate with any of the research group. Since his bona fdes were impossible to determine at a time of rising tension, this led to exclusion. In the meantime, the situation continued to escalate with Leanne, a friend of Richs, responding to Gavin that Rich had shot well before his heart attack and continues to shoot well following his heart attack and suggesting that if Gavin was worried about Rich killing someone then he had better stay out of the way (Green and Costello 2009: 467). Tis was interpreted by Gavin and Franciss group as a death threat and the research team were asked to exclude Leanne, which they declined to do, arguing that her statement might be ill-advised, but it was not a threat. Given the strong bonds of friendship that had existed between the parties, Richs up-front personality, and the regime of regular but intermittent moderating, there had been occasions when Rich has posted to the discussion boards and signed of 156 t h e i n t e r n e t with his own photo and his real name instead of his avatar. It was very simple for any well-established member of the community to have enough information on Rich to contact his employers. Someone did this anonymously and in guaranteed confdence, reporting to Richs employers that he had been talking about his sniper training, his work and his professional life inappropriately on the site. Tis had devastating consequences. Richs gun licence was removed pending an internal investigation and psychological reports. Rather than, as he saw it, let down his team by being unavailable for armed duty, Rich took leave while the investigation proceeded. Te site exploded with accusations and retaliations. Gavin, Francis and their supporters were criticised by other community members who suspected that they had been involved in shopping Rich, even though Francis obtained a letter from Richs employers warranting that the person who had contacted them was not Francis. Table 8.1: Lines of confict in the HeartNet case study Rich, a sportsman. Francis, an IT expert. Leanne, a friend of Rich. Gavin, a friend of Francis (excluded when his identity could not be established and he refused to respond to administrators except via a free email service). Jackie, a friend of Francis. Other of Richs friends resign when an anonymous tip-of, apparently from a HeartNet member, leads to Richs employers investigating Richs posts on the site. Some of Franciss friends tell researchers that confict on the site is afecting their health. Researchers exclude them on these grounds, although non-members are still able to visit as guests. It was about this time that some members of the disputing parties informed the research team that the stress of the situation was making them ill. Teir view was that some of the attackers should be expelled. Instead, the team took the view that if the stress was afecting members health, then the research injunction to frst do no harm had to apply and the members who felt unwell should be excluded on medical grounds. Although one member was subsequently reinstated with a doctors letter, this person experienced the tension as starting again, felt physically afected and was again excluded. Tis person immediately set up a competitor site and invited their supporters to split HeartNet and join them. At this point Francis and his supporters c o m m u n i t y 157 had left the site; while a number of Rich supporters also resigned at what they saw as a breach of privacy and integrity, with the content of Richs posts having been frst made public to his employers, by the anonymous complainant, and then subject to discussions between the employers investigation committee and the research team. Ultimately, Rich was reinstated in his professional work role although reprimanded. Te strain had clearly taken a toll and his posts were far less personal thereafter. It seemed as though things had calmed down until a dynamic of negative reciprocity came into play. One of the benefts of a functional online community is the development of reciprocal gifting whereby members give each other time, regard, concern and support. Such gift economies (Cheal 1988) entail emotional investment and build social capital. Te opposite dynamic also works, sucking regard, concern and support from a social system. Tis was the spiral in which HeartNet was unravelling. Past-members, who had resigned or been asked to leave on health grounds, nonetheless kept returning, either to the site, or in communications with the re- search team. In particular, Francis was continuing to receive hate mail from people who had resigned from HeartNet. He wanted to see them expelled, but the research team explained this was impossible since the named perpetrators were not cur rently members. Administrators gave an undertaking not to readmit the ofending ex- members to membership, but this was deemed unsatisfactory. Jackie, one of Franciss friends, and at that point still a member, started to contact senior fgures in the Heart charity, the university and the research funding organisations demanding that justice be done and Rich supporters be expelled. Francis joined in some of these communications. Te situation escalated to the point that some senior leaders of organisations associated with the research received literally dozens of emails from Jackie, some of which stated that her own health was under threat. Reluctantly, and with support from ethics advisors, the team decided to terminate Jackies membership on the grounds of her burgeoning health stresses. Francis posted to a blog that he knew was read by site members that he was so unwell as a result of the stress that he was unable to work and was living on disability benefts. Jackie was also known to be living on single-parent benefts: Both were thrown into turmoil when the social welfare agencies responsible for administering their payments launched an investigation as a result of a tip- of alleging that they were an undeclared couple living together, which had direct implications for their level of social support and the rules of their income streams. Further, Franciss landlord was contacted by social welfare investigators and averse to trouble the landlord gave Francis notice, telling him that his lease would not be renewed at the end of its term. (Green and Costello 2009: 470) 158 t h e i n t e r n e t Francis and Jackie assumed that the source of the tip-of, which the social services accepted as justifed, had been one of the Rich supporters. Jackie felt that she needed to move towns to establish her status as a single person, while Francis argued that HeartNet had made him homeless. Tere were also a number of other developments that continued to reverberate for another year. However, a partially successful attempt at conciliation, involving the University Ethics Ofcer and the Chair, Human Research Ethics Committee, has allowed the site to return to a quieter version of its former self for the time being. What this case study makes clear is that communities are brought into existence in new media contexts and they behave in both good and bad ways, like human communities in other settings. Tere has been a lot of discussion (including a num- ber of publications from the HeartNet project) about the positive benefts and round-the-clock accessibility of online communities. Tese perspectives are valid. Less publicised are the consequences of major discord among community members. Researchers in the feld intending to fnd ethical ways to investigate these issues would be wise to consider worst-case scenarios. Refection: the role of moderators Do you think that online communities need moderators? Which people or organisations operate as moderators in F2F community? Summary n This chapter examined the notion of online community and placed it in the context of being a collaborative space where people offer each other support and emotional engagement. n The frst two case studies typically involve gendered groups of teenagers and young adults. LAN FPS online game-play culture is traditionally male, whereas fan fction writing and reading is more likely to attract young women. Both involve the development of expertise and skills in collaboration. n The fnal case study investigated a crisis in a research community set up to support recovering heart patients. The crisis was unable to be resolved satisfactorily and the community fractured. It is suggested that this parallels processes that also happen in F2F community. Chapter 9 moves the book forward from considering community to a consideration of family contexts for internet use. 9 INTERNET IN FAMILY LIFE INTRODUCTION Tis chapter is concerned with the internet in everyday life. It is in the home that internet use is most likely to express the choices, pleasures and preferences of the user; rather than the requirements of their employment. Even so, the home is a site of work for some members of the family; especially the mother, but also including children at school who have homework. For these domestically bound workers, the internet can be a home away from home a place of relaxation within the world of domestic labour. According to Morley, For many men, the home is principally a site of leisure and rest (in contrast to their work obligations in the public sphere); for many women (if not most) the home is a site of labour (both physical and emotional) and responsibility (Morley 1995: 316). An examination of ICT use in families with children provides a wealth of information about power and priorities across axes of age/generation and gender. A generation ago, Livingstone argued (1992: 113) that: Te accounting practices through which people understand and explain the role of domestic technologies in their lives refect their gender relations and family dynamics. Talk about television or the telephone, for example, is imbued with notions of who lets who use what, of moral judgements of the others activities, of the expression of needs and desires, of justifcations and confict, of separateness and mutuality. Te same dynamics are equally true of the internet as they were of television and the telephone, particularly in homes where there is only one computer online. Researchers addressing technology fows into and out of the domestic sphere often refer to the Domestication model ofered by Silverstone et al. (1992: 19), discussed in Chapter 1, involving appropriation, conversion, objectifcation and incorporation. Whereas appropriation examines the processes through which a technology enters the home, conversion marks the exporting of the benefts of the technology from inside the household to the wider public sphere. It demonstrates that ICTs ofer signifcant social benefts, as well as educational and entertainment opportunities. 160 t h e i n t e r n e t While better grades in school may be one way of benefting from the conversion of domestic ICT access, ICT use is also harnessed to build social status and networks of interactions, sometimes through such activities as opinion leadership (see below). Tis dynamic is evident in the discussion of LANing circles in Chapter 8. According to Silverstone (1994: 130), conversion defnes the relationship between the household and the outside world the boundary across which artefacts and meanings, texts and technologies pass as the household defnes and claims for itself and its members a status in neighbourhood, work and peer groups in the wider society. Silverstones discussion of texts and meanings underlines the fact that the diferent frameworks used in this book can interrelate with each other. A technology is integrated within the home sitting on a table, connected to a specifc power socket spatially located through the process of objectifcation. In a complementary manner, incorporation describes the way in which use of the tech- nology is integrated within the temporal rhythms of the households daily life. It also marks the way in which the household, or its members, incorporate themselves into audiences and communities that produce and consume the chosen media and technologies. In this way, the members of the household can be related to various online communities such as those discussed in Chapter 8. For example, using a computer to access 24-hour coverage of a Big Brother household, and contributing to chat, converts online access into an audience membership as part of an imagined community of viewers and participants (Anderson 1991). Audience participation provides access to information and opinions that, through conversion, can be traded in F2F discussions and social exchanges in the days to come (Hill 2002). Refection: Applying the domestication model Thinking of your most recent ICT acquisition, can you identify the processes and decisions through which it was appropriated, incorporated, objectifed and converted? Many commentators have investigated the gendered dimension of domestication processes, and one particularly useful contribution to this debate is that of Ann Moyal. In researching peoples uses of communication technologies, Moyal (1995) draws a useful distinction between instrumental and intrinsic uses of technology. An instrumental use occurs when the technologys role is to achieve a particular outcome such as making appointments, shopping, seeking information, timetables, entertainments, making business arrangements, dealing with emergencies, accidents i n t e r n e t i n f a m i l y l i f e 161 [and] household crises (Moyal 1995: 285). ICTs and digital media permit further value-adding over and above other instrumental communication channels. One example of this might be the utilisation of web-based business directories that allow potential clients to browse catalogues and order online. E-tailer Amazon, through its use of cross-selling to market book B to purchasers who have already bought book A, is one example of an online service that has product advantages for many consumers. Online shopping services such as Amazon can simplify complex instrumental activities such as researching, wish-listing and ultimately acquiring goods. In contrast, Moyals intrinsic uses included personal communication with relat- ives, friends, volunteer work, counselling, and intimate discussion and exchange (Moyal 1995: 285). Te fact that instrumental and intrinsic uses are very diferent was indicated by Ann Moyals in-depth interviews plus diaries of phone use. Two hundred Australian women aged from 15 to over 75 were involved in the research. Except for those who worked from home, who made 1012 instrumental calls per week, women averaged 26 instrumental calls over a seven day period (ibid.: 287). Tis instru mental activity contrasted with 2028 intrinsic calls per week averaging about 1520 minutes, but which could last up to an hour (ibid.: 288). Tere is likely to be regional and generational variation here, especially since Moyals work was carried out before the domestication of internet access, but the grounds for distinc- tion between instrumental and intrinsic are likely to apply across ICTs. Te major purpose served by Moyals respondents intrinsic calls was kinkeeping (Moyal 1995: 289). Tis was the term she used for the process by which callers used prolonged and frequent communication to maintain and strengthen their links with family and friends (kith and kin). Kinkeeping means that people who are emotionally connected with one another are also closely aware of what is going on in each others lives. Friendship and afection are strengthened and deepened as a result of extended contact. Moyal identifed a major gender aspect to this emotional work, whereby kinkeeping was particularly recognised as womens business. She cites Lana Rakows (1988) US studies to comment that intrinsic phone calls are both gendered work and gender work, in that it is work that women do to hold together the fabric of the community, build and maintain relationships, and accomplish both care-giving and receiving functions (Moyal 1995: 304). Tis pattern of kinkeeping usage continues into internet activities, where women are far more likely than men to be found using email, chat and Skype in intrinsic ways (see, for example, Dare 2006). Tis kinkeeping communication, carried out between women to strengthen and nurture them in their emotional and relational labour of supporting friends, families and each other, extends the domestic sphere beyond the confnes of the home and constructs a virtual domestic environment in which the private and personal of the everyday fows freely and easily. 162 t h e i n t e r n e t In addition to including case studies that address the internet in domestic family life, debates around internet addiction and the importance of innovation in family uses of ICTs, this fnal section of the book highlights how much the majority worlds experience of technology difers from that of the Wests. In particular, this chapter considers ways in which families, separated by nations and sometimes continents, use ICTs to sustain dependencies and supportive relationships. For example, remittances sent from family members in richer countries to their relatives in poorer ones span transnational distances and link migrants in new countries and their partly dependent relatives left behind. First, however, we return to the consideration of online risk, frst encountered in Chapter 6, to investigate further the who lets who use what dynamics of childrens use of the internet in domestic spaces. Te focus now moves to the parentchild relationship in terms of the regulation of risk. FAMILY REGULATION OF THE INTERNET Does someone you know worry about the time you spend online? Are they concerned that your digital life is impacting badly upon your everyday life? Maybe time seems to disappear when youre on a social network site, or in a game, or blogging, and other priorities are left untouched? Tese are displacement issues. Te fear in dis- placement is that time spent online may take the place of more valuable activities, and such concern is grounded in a notion of an appropriate balance between the time spent online and the time ofine. Once issues of values and appropriateness are raised in a discussion, it becomes clear that we are talking about subjective judge- ments. Judgements indicate a struggle over possible choices and they replay old arguments that have also been applied to other media such as the time spent watch ing television, or playing music, or reading books. You, or the people making the judgements, are constructing an image of what life might be like if you used the internet less, or diferently. Such judgements are one way to communicate peoples priorities. Maybe you see the idea of a distinction between online and ofine as an old- fashioned throwback to the 1990s: after all, internet use is real life, and the two aspects blur. It can be the same with perceptions of positives and negatives. What one family perceives to be the development of technical skills and media literacy, another may judge to be internet addiction. As we saw with the discussion of press coverage in Chapter 6, and the classifcation of content, contact and conduct risks, people are more likely to worry about negative consequences of the internet while taking positive benefts as a given. Hasebrink et al. (2009: 89) identify the positives and negatives of childrens online activities as indicated in Table 9.1 i n t e r n e t i n f a m i l y l i f e 163 Many issues of greatest concern to parents and policy makers, although they may occur infrequently, involve a range of risks. For example, a child might access in ap pro priate content, and then go on to use chat and messaging services to talk about what they have seen. As a result, they might come into contact with strangers and conduct themselves inappropriately, possibly revealing personal informa tion, publishing personal photos or agreeing to meeting ofine. Te fact that some of these risks are experienced within the childs home might make the activities seem less real or less dangerous. Further, Lobe et al. (2007: 17) argue that childrens lives are often lived in the interstices of adult spaces and timetables, and . . . children may be expected to circumvent, evade or subvert adult expectations or norms for their behaviour. It can be suggested that risk-taking is a normal part of child development. Discussions of these kinds of online stranger danger risks rarely emphasise how infrequently they occur, that their incidence in the US, at least is heavily in decline. Schrock and boyd (2008: 10) cite Finkelhor (2008) when they say the Table 9.1: Opportunities and risks of childrens online activities Opportunities Risks Motivations Consequences Motivations Consequences General usage Technical skills, media literacy General usage Time addiction, dependency Education and learning Knowledge, skills, career advancement Commercial interests Financial consequences, exploitation of personal data Participation and civic engagement Civic engagement Aggression Harm, anxiety, aggressiveness Creativity Creative skills Sexuality Personal contact with strangers, harm, sexual concerns Identity and social connection Identity and social connection Values, ideology Distorted understandings (of health, politics etc) Source: Based on Hasebrink et al. (2009: 89). Note: Figure 9.1 adapts two Hasebrink tables that also integrate the perspectives of: Content, child as recipient; Contact, child as participant; and Conduct, child as actor, roles. 164 t h e i n t e r n e t [minus] 53 per cent change in reports of sexual ofences against children from 1992 to 2006 . . . is both signifcant and real. Te fnal report of the Internet Safety Technical Task Force, commissioned by the State Attorneys General of the United States in response to a perceived increase in risky behaviour as a result of childrens participation in social networking sites notes that children at risk online are also more likely to be at risk in other situations: Depression, abuse and substances are all strongly correlated with various risky behaviors that lead to poor choices with respect to online activities. A poor home environment that includes confict and poor parentchild relationships is correlated with a host of online risks (Wolak et al. 2003; Ybarra and Mitchell 2004; SNS Safety 2008: 20). Tere is also concern that young people growing into adulthood risk being judged by future employers and others on the basis of their teenage postings, photo graphic and otherwise, on public or password-protected websites. Tis happened to 22-year old Ray Lam, a New Democratic Party candidate for an elected role in Canada, whose Facebook party photos were the centre of a media storm and provoked his resignation from the provincial election (CBC News 2009). Consequently, risks of online activity can be projected into the future as well as being located in the present. Such risks have led to work from, for example, Ann Cavoukian (2009), the Information Privacy Commissioner for Ontario, to educate younger users about their privacy, including the creation of an interactive website MyPrivacy, MyChoice, Mylife (Youthprivacy.ca). It is unsurprising that in a context of the internet being a risky place, most parents attempt to regulate the ways in which their children go online. Tis is often done in terms of the placement of the internet-connected computer for example, by putting it in a public area, and by restricting when it can be used and what it can be used for. Te fnal report of the EU Kids Online project cautions, however, that Rules and restrictions do not ft well with the ethos of modern parenting, especially in some countries, and it is unclear that parental strategies are efective in reducing childrens exposure to risk or increasing their resilience to cope (Livingstone and Haddon 2009: 4). Later, the report goes on to say that parents adopt a range of strategies for mediating online activity: First, imposing rules and restrictions; second, social approaches watching, sharing, talking about the internet with their children; and third, using technical tools such as fltering, monitoring (Livingstone and Haddon, 2009: 27). Often, family rules centre on the use of the internet for specifc activities. Te use of social media such as internet messaging, chat, social networking, email and blog ging (SNS Safety 2008: 21) tend to be the top online activities [. . . of ] youth who are solicited and harassed, according to Ybarra and Mitchell (2008), and these activities are often regulated within the family. It should be noted that the majority of i n t e r n e t i n f a m i l y l i f e 165 cases of sexual solicitation and harassment are thought by the victims to be people of their own age (minors) or of unknown age, and some of these could be construed as firting (SNS Safety 2008, pp. 1516). Harassment is not straight-forwardly related to the amount of time online, however, since youth who are not solicited are much more likely to indicate that gaming is one of their top Internet uses as compared to those who are solicited (Ybarra and Mitchell 2008) (SNS Safety 2008: 445). Tis is an interesting inversion of many media-sponsored moral panics (Cohen 1980) about games taking over the lives of adolescents. Such stories are often circulated by the old media, in newspaper articles and on television, even though there is growing evidence that online game play may ofer benefts. Although we looked at gamer communities in Chapter 8, we have not addressed the pervasive media commentary about problems associated with online game-play. Such reports stretch back to at least 1993 (Kelly and Rheingold 1993) and can be readily uncovered with an internet search (e.g. Freeman 2008), although there are alternative perspectives that counter this dominant trend (Johnson 2005) arguing that many adolescents gain considerable social and educational benefts from game- playing. As well as links into their peer group community, gamers are more likely to be sociable teenagers with positive family relationships (Durkin and Barber 2002). Telephone research conducted by the Pew Internet and American Life project with 1,102 children aged 1217, and their parents, suggests that Fully 97 per cent of teens age[d] 1217 play computer, web, portable or console games . . . for most teens, gaming is a social activity and a major component of their overall social experience (Pew 2008: i, iii). In making positive statements about the social aspects of gaming, researchers do not always have a high opinion about the actual narrative subtlety of such games as Grand Teft Auto: the actual content of the game is often childish or gratuitously menacing . . . much of the role play inside the gaming world alternates between drive-by shooting and princess rescuing (Johnson 2005: 3940). All these issues are brought to bear in the family context because of contests over power and autonomy; the intentions and responsibilities of parents to supervise and regulate online activity, and the fun and freedoms of maturing adolescents, chafng against family restrictions. Parents and children negotiate these parameters, which change over time as children get older (ACMA 2007: 14). Interestingly, many parents say they trust their children to choose appropriate internet activities most of the time. In a 2007 Australian study of 751 households, involving telephone interviews with parents and 1,003 children of the households aged between 817 completing diaries, researchers found that Most parents trust their childs judgement about the internet and, at least some of the time, leave it up to him/her to choose what is done on the internet (83 per cent). Tis includes two-thirds who trust their childs judgement all/most of the time (66 per cent) (ACMA 2007: 21). 166 t h e i n t e r n e t Tis does not mean that there are no rules around internet use in the home. Many families include some or all of the following rules and restrictions: [not allowed to] talk to people they dont know online, use email, instant messaging, chat rooms, create profle, access certain websites, download music, flms, games, buy online, give out personal information (Livingstone and Haddon 2009: 28 n.26). Such strategies may become less viable as more houses adopt wireless connectivity and as more teenagers get mobile access to the internet. Further, no domestic regime can guarantee to prevent childrens access to undesirable material, since restricted children will often access the internet in other locations, such as the homes of their relatively less-supervised friends. Indeed, there is often disagreement between parents and children about the very kinds of rules that are in place. Livingstone and Bober (2005) found that: children and parents gave diferent answers to questions of the incidence of risk (children report more online risk than parents) and to questions of domestic rules (parents report more rules about internet use than children) (summarised in Lobe et al. 2007: 24). Parents accept that children change as they mature, and parental rules and be havi- our refects this. For example, in a qualitative Australian research study involving in depth interviews with parents and children, separately, one parent commented that He used to let me see the [onscreen] conversations but he wont let me see them now. But thats fne. If I come up and talk to him, he clicks the button and takes the screen of (Green et al. 2004: 90). Domestic rules about internet use reveal the ways in which the family unit prioritises and models particular behaviours and attitudes. Tey are a locale through which family relations are tried, tested, negotiated and changed; particularly around axes of gender (ACMA 2007: 7), age (ACMA 2007: 10), and generation in terms of an ongoing discussion between children and their mothers and fathers; together and separately. Parents attitudes to online activity can usually be placed on a continuum from seeing their children as autonomous individuals who are able to make appropriate choices, through to more authoritarian approaches where parents know best. As supervisors, parents negotiate their childrens access to the internet and work to develop agreement around a hierarchy of uses. Tis hierarchy includes parents preferred and promoted uses of the internet for work and study purposes, acceptable leisure activities, and forbidden or illegitimate usage of the internet. In the qualitative study mentioned above, given that parents are generally trusting of childrens activities, the most common concern they express is that children spend too much time online. Interviewing parent and child separately reveals the difering perceptions at work (Holloway et al. 2004): Father of two, Xavier, expressed his concern about (what he perceived as) his teenage sons excessive use of the internet: Well I think theres far too much i n t e r n e t i n f a m i l y l i f e 167 time . . . Gavinll spend a whole day on it. I try to get him to come to the footy on Sunday. No. Hes available for friends [for online gaming and chat on the internet]. Hell spend all day on the computer (Xavier). Son Gavin (16), in a separate interview, anticipated that this criticism had been made and felt compelled to counter it: Well he [dad] makes comments like saying Im not ft enough cause I spent too much time on the computer but I play soccer a lot. Like, I do sport perhaps everyday at school . . . I mean, I think, such a piece of crap (Gavin). Father and son here are in an age-old contest about who wants whom to do what when. Te internet is just one location in which these family-life dynamics are explored, and the son, Gavin, is clearly aware of the explicit accusation that he spends too much time on the computer. For some parents, and their children, the accusation is that the child is actually addicted to game-playing. INTERNET ADDICTION Lobe et al. argue that, in addition to various forms of specifc content, contact and conduct risks, a perceived risk of internet use is the possible development of time addiction, dependency (Lobe et al. 2007: 9). Tere has been considerable discussion over the past decade as to whether the internet in general, and online gaming in particular, is addictive (e.g. Widyanto and Grifths 2007). A part-UNESCO- funded report which looks at the efects of game-playing on gamers comments that addiction in a non-medical sense is an extremely controversial concept . . . for example, the concept is almost exclusively used by people who perceive the activ- ity in question as a deviation from the norm and a deviation from the desirable (Nordicom 2004: 34). While such statements leave open the possibility that people can become addicted to the internet, they highlight the fact that people make judge ments about others internet activity. Such judgements can lead to complicated inter personal power struggles, especially between older children and their parents, and result in confict and concern. Allison et al. (2006) discuss at length the clinical case of an 18-year-old North American student from the Pacifc Northwest. Mr As parents referred him for psychiatric assessment concerning his online game playing; initially in Diablo II and subsequently World of Warcraft. He had been playing games for several years at the point where his parents and he had sought psychiatric assessment: Mr As parents were particularly hoping that the evaluation team would view his game playing as a manifestation of treatable obsessive-compulsive disorder (OCD), but they worried that it might be a form of addiction. Mr A reported that his life had been taken over by the game-playing: I play 1216 hours a day, I do not sleep and Ive never had a girlfriend. (Allison et al. 2006: 381) 168 t h e i n t e r n e t While Mr As internet activities were certainly associated with a range of behaviours that impacted upon his family relationships and his everyday life, the issue of cause and efect was left unresolved in the analysis. Te case study stops short of arguing in favour of the existence or otherwise of a clinical condition of internet addiction and instead leaves open the possibility that Mr As extensive engagement with online games might be a coping strategy which allowed him to avoid a range of psycho- logical challenges identifed by the clinical team, none of which could clearly be established as an efect of his game-playing. Instead, there was some suggestion that Mr As early experience of gaming was as a retreat from the pressures of his parents continuous house moves (14 times in 18 years) and a refuge from problems at school. In the early days of public take-up of the internet, Storm King, a US online theorist, asked a key question: Is the internet addictive, or are addicts using the internet? (King 1996). Case studies of internet addiction tend not to deal with this salient perspective. In particular, they discount the pleasurable efect for some internet users of identifying an activity in which they are recognised for their skill and competency. Tis sense of enjoyment is likely to be heightened where other aspects of an internet users life make them feel powerless or marginalised. Refection: Internet addiction Do you know anyone who you would say is addicted to the internet? Does their online life offer them an opportunity for recognition and respect? INNOVATIVE FAMILIES Families with school-aged children are a site for a huge amount of innovation and creativity. Two reasons help account for this. First, parents try to equip dep- endent children with access to the technologies and experiences that they feel are important for their childrens future. Second, as children grow older and develop their own income streams, they often use that money to buy goods and technologies that enhance their lives, add value to the equipment provided in their parents household(s) and establish their status as people with independent spending capacity. Tese dynamics prompt the acquisition of new and upgraded technologies and the family dynamics supporting technological innovation are considered here. We have already noted the power contests between parents and children as children mature and claim autonomy and independence. We have also noted, in i n t e r n e t i n f a m i l y l i f e 169 Chapter 8, the importance of peer groups in the lives of young people. Essentially, in forming the tight-knit communities (Jin and Chee 2008: 39) characteristic of much teenager society, young adults are negotiating a family of peers able to ofer support as they move into the next stage of life and prepare to leave home. Te success with which older children negotiate this leaving home phase is important to their parents sense of self-esteem as well as their own. Research carried out among parents indicates that self evaluations in the middle years of adulthood are strongly linked to perceptions of adult children, particularly childrens personal and social adjustment (Ryf et al. 1996: 417). It is relevant here that parents value their childrens perceived happiness, rather than narrower measures concerning their fnancial success. Teenagers and young adults are often in paid employment, part-time or full- time, while still resident in their parents family home. In these circumstances young adults in afuent families may enjoy disposable resources that will not be matched for some decades in terms of discretionary spending power. With the infrastructure expenses of daily life accommodation, food and services mainly funded by their parents, most of what they earn can be spent as they choose. Many young people are consequently in a key position to be innovators and early adopters of new technologies. Te characteristics of such technology users include: being risk-takers (they are less likely to perceive risk, and are more able to cope with loss) opinion leaders, younger, educated, with a higher disposable income, socially mobile (upscale) and socially involved (in formal and informal groups). Tey are active information seekers in their area of interest and likely to be less dogmatic than non-innovators, more open-minded and inner-directed (follow their own judgement). Tey may seek variety and stimulation. Tey may need to feel (or self-identify as) unique. (Green 2002: 31, citing Schifman et al. 1997) Tey are also most likely to be male (Wajcman 1991). Te fortuitous economic circ- umstances of some older children still living in the family home coincide with strong pressures to keep up with other members of their social circle, as well as to make a specifc contribution to collective activities, such as improved technology for one person that can then be accessed by the group. Internationally, in western countries, the demographic most likely to have internet access are couple-families with school-aged children (Kennedy et al. 2008). Te relevance of the couple, rather than the single parent household is one of resources: couples usually have more money. In a recent study, being a couple with children at home was an equivalent indicator of internet access as having high education qualifcations (88 per cent) and being in the highest income bands (89 per cent) (ABS 2008). Maria Bakardjieva (2005) cites one of her Canadian interviewees as saying When we got the computer frst, it was basically for the kids (ibid.: 93). 170 t h e i n t e r n e t Although there are likely to be more fnancial resources available to couples of the same age who do not have children, couples with children are more likely to have internet access. Its the presence of children that increases internet access rates. Tis perception is underlined by the fact that although internet access is high in these couple-with-children households, it is not necessarily driven by the parents usage: Te high access and lower usage rates for people aged 3554 years may be related to the presence of children in the household. Parents may acquire internet access for educational and entertainment purposes for their children, but may not use it themselves (ABS 2008). Parents feel a sense of obligation to provide the best possible start for their children. It is comparatively easy for both parents and children to tap into this desire to be future-proof through profciency with new and emerging technology (Kennedy et al. 2008). Children and their parents are involved in social and work-based circles that introduce them to the benefts of technological advances. For example, many schools and workplaces introduced broadband technologies in advance of most homes, introducing workers and students to the benefts of speedy access to online materials. Such exposure outside the home has domestic implications. As 16-year- old Evana, an interviewee in a qualitative study of Australian families internet use, commented, regarding her fathers thoughts about upgrading to broadband, We might be getting broadband cause hes in real estate so he needs it for his work to catch up with other companies sales and everything (Green and Holloway 2004: 180). A mother, whose children lived during the week with her ex-husband told re- searchers that she was the only parent with access to the internet: a lot of times, the kids will ring us during the week and say Ive got an assignment to do. Ive got to use the internet, so I go, pick them up and they do their assignments here (Jasmine) (Green and Holloway 2004: 180). Tis study indicated that the usual priorities in the home for access to the internet were: paid work, followed by study needs, followed by entertainment, chat and games. In practice, there was some stratifcation in time bands since children could often get unfettered access to the internet after school, before parents got in from work, and they tended to use the computer for fun activities at that time, especially if they had friends over. A desire to regain the family phone line proved a signifcant driver for families to transfer from dial-up to broadband. Once broadband is connected in afuent households, the irritations of slow internet speeds and competing requirements for the domestic phone connection soon give way to frustrations with having to share a single computer connected to the internet. Whereas during the 1990s most families had only one computer in the home, this changed in the 2000s according to the age of family members and the occupations of parents. Given increased laptop reliability, i n t e r n e t i n f a m i l y l i f e 171 and with students and some employees taking portable computers between home and work, many households soon had more than one computer, and some had one computer per person. In these circumstances, where there was only one broadband connection point it became increasingly frustrating for family members to wait their turn to go online. Tis set the scene for replicating the dynamic of the 1970s TV access. Moving from black and white reception in the 1960s, to colour in the 1970s, middle-class families also began to buy more television sets to help settle arguments about who was going to watch what when programme choices clashed. Te profusion of diferent sets in diferent rooms helped solve this problem in the days before the widespread take-up of videotape technology allowed time-shifting. Although the access point has recently narrowed again with the adoption of cable TV services (Holloway and Green 2008), there is a pressure within families to avoid situations in which people have to queue for limited access to a service if there are alternative options available. For a family home serviced by a broadband connection, that alternative solution was either to install a local area network or a wireless modem. Te advantage of wireless was that family members with laptops could work anywhere in the house they chose, within signal range. Tis always on for everyone wireless capability does not let children escape from their parents priorities and regulation, however. One tech-savvy family, where the children and parents each had their own laptops, still felt the need to restrict internet access for the oldest son, Teo, who is in his fnal year at high school, [and] consistently challenges the implicit work/study/entertainment hierarchy within the home by participating in long gaming sessions with online friends. His mother Jenny, who oversees her childrens educational activities, spends time tutoring Teo in his weakest subjects in preparation for his fnal school examinations. She considers his computer use (gaming and 3D modelling) excessive in that it interferes with the time Teo needs to study and get adequate sleep for the next days schooling. (Green et al. 2004: 98) In an interview setting, Teo was philosophical about the restrictions. I understand it. I dont like it. I know its [the right thing], Id be happy just playing games (Green et al. 2004: 98). Naturally, such parental control does not go unchallenged. Leslie Haddon discusses how research has demonstrated childrens creativity in overcoming parental controls (2005: 62) using some examples from mobile use. Unwilling to be contacted by their parents, children claimed that the mobile signal was lost, the mobile battery was dead, or else they sent parents calls directly to voice mail. In internet usage, children soon learn to: minimise questionable screens; argue that multiple screens are required for active research; that they are using 172 t h e i n t e r n e t Internet Messenger to get tips for homework; and to delete search histories from their web browsers. Citing Nicola Greens work (Green 2001), Haddon comments that approaches such as these are all part of parent management strategies to avoid surveillance and gain some privacy (Haddon 2005ibid.: 623). Within this culture of technology adoption and innovatory use, people can be identifed as lead users (Haddon 2005: 56); those who lead others by modelling new and emerging uses. Tis term would equate to Rogers (2003, [1962]) terms of innovators and early adopters from his Difusions of Innovations theory, discussed in Chapter 4. According to this model, the difusion of an innovation occurs over a period of time whereby the (approximately) 16 per cent of innovators and early adopters infuence the 84 per cent of early majority, late majority and laggards/ contents. Within the moment, this infuence occurs between co-present parties involved in networks of communication. In these networks people learn from each other, and particularly from key informants and enthusiasts, what the new technologies are and how they ofer benefts. Opinion leadership and the fostering of technology aspirations is an activity that happens in the present, in terms of prompting awareness, raising interest, developing desire and resulting in action. Long before the majority move to broadband or investigate wireless connections, they have been infuenced by someone whose views and experience they respect. Key infuences upon the household can occur at the level of either a parent or a child, but within the family home the person infuenced has to argue the case for the adoption of the new technology or the new way of organising something. Networks of infuence infuence both the appropriation and the conversion phases of domestic technology acquisition. Refection: opinion leaders Are you an opinion leader in any feld? Why do people seek out your opinions in that area? Are you an opinion seeker for some activities or purchases? What makes you choose one person to approach for advice, rather than another? Lets consider this material in terms of our domestication model of appropria tion, in- corporation, objectifcation and conversion (Silverstone et al. 1992: 19). Te west ern household is well integrated within local and national information and tech nology fows, and a decision to appropriate technology involves seeking and evaluating information from others and from a range of sources such as the internet and i n t e r n e t i n f a m i l y l i f e 173 consumer stores. Decision-makers become more involved in researching a decision depending upon how expensive it is to carry through, and the perceived risks. High- involvement decisions require a signifcant investment of time and energy as well as money. Incorporation relates to the way the innovation is taken up in terms of the temporal patterns of the home. Moving from a single internet access point to allowing multiple computers to go online simultaneously, via a broadband router for example combined with a cabled LAN network, means that family members no longer have to negotiate who has access to the internet, when and for what purpose. Objectifcation sees the physical environment of the home altered to accept the new technology. For example, cables may be taken up and discarded as a family moves from a cable LAN access pattern to a wireless one. Finally, conversion sees the benefts of the new innovation translated into other forms: enhanced ICT access might result in better school results, or more fexible work hours with some tele com muting from the home, or the chance to send and receive family videos and speak online to family members far away, as well as a greater capacity to ofer opinions, advice and support to others leading to increased social standing. It may also constitute an important element of the socialisation of the next generation of online users, communicating the message that innovation is to be welcomed and that change is excitingly dynamic. Families, both within the same household and extended in geographical space, are consequently central to much innovation and technology adoption. REMITTANCES AND THE INTERNET We have examined the role of the internet as a catalyst for helping to reveal the prior ities and dynamics of people living in a shared space in family relationships. We have concentrated upon the wealthy West although we have also considered how the internet is used by the homeless; people who are essentially excluded from family life (Chapter 4). Here we attend to the diferent issue of generally poorer, majority- world people who have left their families behind in order to work overseas so that they can generate an income stream to support those they care for at a distance. Te payments sent home from one country to another by a family member working in a richer economy to support their loved ones in a poorer country are called remittances. It is estimated that ten per cent of the worlds population is subsidised in these ways, by absent family workers who live abroad (IFAD 2009a). Remittance fows have been called the human face of globalization (IFAD 2009b). Even though these migrant workers are generally among the poorest commun- ities in the countries in which they work, their contribution to some of the econ- omies of majority nations is astonishing. Although most migrant workers would 174 t h e i n t e r n e t have mobile-phone communications, rather than internet-based contact, with the families they have left behind, the remittances trafc by which they send money home has an internet dimension and may start its journey as an online transfer in the workers host country. It is to a discussion of these issues of informal but critical distance communication between dispersed family members that we now turn. According to World Bank data, the poorest nations in the world rely dis pro- portionately on remittance income. As a percentage of national Gross Domestic Product (GDP), Tajikistan received an estimated 45 per cent of their total GDP in remittances during 2008, Moldova 38 per cent and Tonga 35 per cent. In this ranking of dependence, it is not until the tenth country is reached, Jamaica at 19.8 per cent, that the proportion of estimated GDP falls below 20 per cent. On average, over a quarter of the national productivity of the top ten recipient countries was vol- untarily supplied by citizens living and working abroad. Te total amount of money estimated to have been transferred in remittances sent through formal channels in 2008 was US$283 billion according to the World Bank, which notes that Tese fows do not include informal channels, which would signifcantly enlarge the volume of remittances if they were recorded (WB Press Release 2008; Kumar 2008). Remittances are among the most resilient forms of income for recipient countries: While capital fows tend to rise during favourable economic cycles and decline in bad times, remittances tend to be counter-cyclical (World Bank 2008: 12). Which is to say that, as the world goes into a recession, migrant workers send more money home since they know their families are among the most adversely afected people globally. Te costs of remitting money to the developing world can be very high (AusAID 2007: ix), and new delivery mechanisms are constantly being investigated by both the senders and receivers of micro-fnance remittances. In many cases the options are limited by poor technological infrastructure and security issues in terms of accessing money from ATMs in urban locations. Te key features in desirable services are cost, security, convenience and speed, as these impact upon both senders and receivers (AusAID 2007: 24). Researchers note, however, that high rates of mobile phone owner ship in [. . .poorer] countries ofer the potential for improving access and reducing transfer costs through SMS-based transfer technologies (AusAID 2007: 21). Although it will be some time before remittances can be sent internationally by phone (ABC BB 2008), since all phone trafc of this kind has to happen within national borders, the combination of e-banking transfers plus mobile phone access ofers the potential to improve the lives and the incomes of the one-in-ten people involved in the global remittances economy. International Food and Development researcher Dilip Ratha enthused about seeing a prototype system in operation in Africa: i n t e r n e t i n f a m i l y l i f e 175 I have seen it operating in Kenya and I was so impressed. I saw people, including the taxi drivers and the hotel people who worked there, and men on the street and women on the street, actually use the cell phone transfers, and its very convenient and it is almost instantaneous, and they were using this at a fee of about 50-cents per transaction. (ABC BB 2008) Tese possible uses of mobile phones constitute an innovation unanticipated (Haddon 2005: 55) by those industry players who frst designed and developed the mobile phone. At the same time, it makes the mobile phone even more likely to be the pervasive inclusion-building technology in terms of its use among the worlds poor (Parreas 2005). Te internet may be the powerful connector of the worlds wealthy nations, but it may also be integral in supporting other technologies in delivering benefts to the worlds poor. In many ways, and increasingly, it is a tool for integrating and connecting individuals within the family, the family within the community, and the family within its global networks. Summary n This chapter examined the role of the internet in everyday family life since it is through the examination of the domestic that we discover peoples individual priorities and values. By looking at the internet in family life we learn about families, as well as about the internet. n Discussions about the domestication of the internet within the family home led to consideration of parents strategies for regulating internet use and the question of internet addiction. People continually upgrade their internet equipment and services, and the processes through which this takes place were examined. n Although the internet has predominantly been constructed in terms of the lives of the worlds richer citizens, in that it is available to a minority of the globes population, it plays an important role in the lives of the poorest by facilitating the operation of the remittances economy. n It is worth remembering that we are only at the end of the beginning when it comes to understanding what the internet means to human society, and what it may yet mean. Even in the most technologically advanced nations on earth, general access to the internet is less than a generation old: and what is accessed keeps developing and changing. This is an exciting time to be using, and studying, new media. The fnal chapter of the book sums up the issues we have explored, and brings the various threads together as we cement our understanding of the internet as an introduction to new media. 10 CoNCLUSIoN INTRODUCTION Only recently established as an academic discipline, the study of new media is an exciting area of research. Te term new media is applied to digitally based in- formation and communication technologies, which are increasingly mobile. It is constantly changing and evolving, has many facets, and applies to many technologies and practices. Within the total range of new media, the internet and online com- munication are a particular focus of investigation. Some people are paid to be experts in one aspect of new media or other, but many of the most passionate users of new media consume it and develop their skills in their spare time or at times when they should be engaged in other activities (like homework). Such people have been referred to in this book as prosumers (e.g. Hartley 2006), but they may also be referred to as prod-users (producer-users, Bruns 2003) or pro-ams (professional- amateurs; people who are amateurs, but who work to professional standards). As is clear, internet-user enthusiasts have stimulated the coining of new words to describe key user groups. New media prowess is also associated with being future-savvy: while we may not know what the future will look like we can be confdent it is digital. Researchers in this feld use approaches and research methodologies from a variety of disciplinary felds, often informed by the aspect of internet use they wish to study. Psychologists, marketers, sociologists, designers, anthropologists, educators, managers, information scientists, technologists, linguists, and practitioners from every other discipline have a legitimate interest in internet research and a valid toe- hold and contribution to make to new media studies. Tis diversity is demonstrated in the case studies included in this volume. In this concluding chapter we draw together the diferent strands of the book by examining issues from across a range of chapters and ask what we have learned about new media, and ourselves, as a result of studying the internet. At the same time, we will review the tools of the trade for critically examining our own new media use, seeing ourselves as the subjects of an immersive, longitudinal engagement with new media. 178 t h e i n t e r n e t Te internet is a medium that is constantly being reinvented as social and econ- omic space, with its roots in computer networks, defence strategies, freedom of information and frontier mythologies. Unsurprisingly, it also raises fundamental questions around gender, family, community, and old media in relation to the new. From a theoretical and conceptual perspective, this book has adopted a Social Constructionism framework which argues that our understandings of the world and the ways in which we relate to it are constructed through social and cultural forces. Such an approach positions the socio-cultural as the predominant deter miner of meaning. Within the Social Constructionism framework, the social shaping of tech- nology perspective acknowledges the power of user agency in fash ion ing technology, alongside those political and economic elites located in the armed serv ices, bureaucracies and the corporate world, who fnance and hothouse many develop- ments later taken up by innovative publics. Software and technology developments provide examples of distributed collaboration, while everyday innovations include the creativity inherent in social media practices (see mnemonic in Chapter 1). Technological advance is consequently positioned as an outcome of social dynamics and, at least theoretically, susceptible to scrutiny, regulation, accountability and democratic change. Ultimately, a Social Constructionism framework complements a user-driven development agenda and ofers an optimistic approach to technological change. Within the over-arching approach of the social shaping of technology perspect- ive, a range of specifc micros-theories inform the methodological frameworks evident in the case studies that are the backbone of this book. Te micro-theories of greatest relevance are the Teory of Consumption, the Domestication framework, the Social Construction of Technology (SCOT) perspective and Actor-Network Teory (ANT). Tis theoretical canon presupposes an inclusive defnition for the notion of tech- nology. Tat defnition includes not only the physical object of the technology but also the uses for which it is designed and to which it is put, and the knowledge, skills and practices through which it is used. Once we talk about the ways in which people learn to use something and are given access to a limited resource, such as tech nology, we are talking about the social and the political, and implicating the process within broader issues of education, economics, power and gender (Wajcman 1994: 6). Tis is another reason for using case studies to examine the internet. In tying together some themes raised in the book, and introducing a new one on the brain, which provides a specifc prompt for consideration and refection, this chapter suggests ways in which to create a series of integrated research-based ex- pecta tions concerning new media use. Te examples to be considered below are art- iculated around aspects of gender, family and community, and some psychological c o n c l u s i o n 179 implications of internet use. Such research-driven overviews might serve as a touch- stone for readers investigations, and promote further research and study including examination of individual practices using new media. Te book and the chapter conclude with an over-arching consideration of the internet. GENDER Tis book does not address gender and new media as a stand-alone topic, but it is difcult to discuss new media, and especially access to and uses of the newest media, without recognising that gender constitutes a specifcally social dimension of new media use. It is beyond the scope of this book to engage in debates about how much gender is constructed in social interactions compared with the extent to which it is biologically determined. Even so, it is clear that boys and girls, men and women, use the internet diferently when they have the opportunity to choose their online activities. Hasebrink et al. (2009: 51), discussing childrens internet use in research projects reported from across Europe, note that while both boys and girls enjoy a range of online opportunities, there is clear evidence of gender diferences in online activities and preferences. Girls prefer activities that involve communication, content creation and collaboration. Boys prefer competition, consumption and action. Comments about gender diferences will vary with the age of the people con- cerned and their cultural context, while in many instances such diferences may be smaller than indicated above. Even so, the diferences noted for children have their equivalents in older age groups with women, for example, having the major responsibility for kinkeeping, using both old and new media to maintain links with friends and family (Chapter 9). Noting gendered activities for groups of teenage boys (game-players) and groups of teenage girls (fan-fction writers and readers), as discussed in Chapter 8, does not preclude men from active careers as successful fan- fction authors, or prevent women from being exceptionally skilled in frst-person shooter games. Such against-the-grain activities are well outside the norm, however. Te case studies addressed in the book have often recognised a gendered dimen- sion in technology use, including an acknowledgement of the preponderance of men in accounts of the development of the internet (Chapter 2). In cultures around the world, prowess with high-technology is generally associated with young, wealthy, well-educated males (Kidder 1982), who are also seen as proactively preparing for and guiding the emergence of the future (Wajcman 1991: 144). In the early days of new media adoption within a national context (Chapter 4), this masculine privilege is expressed in diferential rates of take-up between males and females, with men having far greater access to technology and greater confdence in its use. 180 t h e i n t e r n e t In countries where pornography is legal it has been shown to be a major driver of internet service investment and uptake, particularly among young male con sumers, as well as prompting the development of innovative business models and inter net pric ing strategies (Chapter 6). In some other countries, pornography is entirely pro hib ited and heavily prosecuted, constituting a serious content risk. Given multiple jurisdictions and a range of diferent legal frameworks, what is illegal and prosecutable in one country might be legal and acceptable in another. Most liberal, free-market economies permit adults to access pornography while restricting its use by children and young people and strictly forbidding its creation except between freely consenting adults. Mens opportunities to use new media in early-adopter societies are associated with the fact that men are more likely to have higher education and gain employment in environments where internet use is expected and supported, and where they are appropriately trained as part of their work role. Tis removes many of the barriers to gaining skills and competence. In contrast, people outside the digital workforce, including many women, have to overcome barriers of access, training and support, as well as looking for opportunities to practice and develop their skills over time as new programs and technologies come online. Once internet use is more pervasive and found in most home, school and work environments, as is currently the case with the majority of western nations, the diference between the proportions of males and females accessing the internet tends to disappear (Hasebrink 2009: 20) and gender is instead expressed through the purposes for which individuals use the internet. Partly because of diferences in gendered use, the content, contact and conduct risk profles of boys and girls usually difer and change over time. One example of this is that girls are more likely to be harassed through solicitation, for example, and boys more likely to be the harassers, with the fgures from one study indicating that 75 per cent of victims were girls and 99 per cent of perpetrators were boys (Wolak et al. 2004, cited in SNS Safety 2008: 20). It is possible to fnd online act ivities where the gender balance is comparatively equal and some MMORPGs (massively multiplayer online role-playing games) would provide examples of this, but again there are gendered dimensions to the preferred virtual game world: fantasy as opposed to sci-f, for example. Within gendered environments online, MMORPG players often gender swap their game character, but give diferent reasons for doing so. In a recent online survey involving 119 participants (83 males, 32 females, 4 undeclared), over half the male respondents (54 per cent) had swapped gender in-world, while two-thirds of females had done so (68 per cent). A male respondent reported that playing a female character meant that male gamers treated him far better (Hussain and c o n c l u s i o n 181 Grifths 2008: 52), while a female commented that she played as a man to prevent unsolicited male approaches on her female characters (ibid.: 52). Hasebrink et al. (2009: 20) comment, regarding the multi-country EU Kids Online research network fndings, that in almost every country, boys are more likely than girls to spend greater amounts of time online, have more places to access the internet from, have their own computer and internet access and have access to a PC and internet in their bedrooms. Tis material also reinforces other research which demonstrates some (slight) diferences in family regulations about internet use afecting boys and girls, which changes with the age of the child and with cultural factors. Even where families agree that there are rules in place, however, research has repeatedly indicated that children and their parents disagree on what the rules are (Chapter 9). Te consideration of regulation moves the focus from one of gender to one of the family, and it is to a consideration of family to which we now turn. FAMILY Even with internet-connected computers available in schools and community-based resources such as libraries, or afordably accessible in cyber cafs, families remain a key infuence in terms of younger members developing computer skills and using their internet competencies. Tis may be clear for families with school-aged children living at home, but is also the case in other contexts where the family infuence may be more tenuous. Within the lives of the Scottish homeless, for example (Chapter 4), some younger homeless people used their irregular access to the internet as a fxed place for family contact. Similarly, the internet is one means of communicat ing with distant family members, keeping in touch with each others lives and perform- ing kinkeeping at a distance (Chapter 9), exchanging photos, videos, chat and email. Maintaining a deep sense of commitment and connectivity means that family members are more likely to make themselves available in times of crises, including travelling to be of physical help to distant family members (Baldassar 2007). Te Scottish homeless was one case study supporting our consideration of the digital divide, and highlighted the particular circumstances of a loss of internet access due to a change in circumstances such as retirement, redundancy, separation and divorce, or even in terms of young adult children moving away from home (Green 2002: 1067). Another family-related case study centred on the experiences of people who were (in the main) registered carers of seriously ill or disabled family members (Chapter 4). Younger carers, and male carers, were more likely to have had access to the internet, as were the adult care-givers of younger people, whose charges were more likely to be involved in education, leaving their carers with greater opportunities to develop new skills themselves. In this context, however, 182 t h e i n t e r n e t the household as a whole was generally poorer and more stretched fnancially, and signifcant poverty is a serious inhibitor of much new media access and use. Family was also implicated in discussion of the customisation of the internet to support languages other than English (Chapter 5). For example, according to Fleming and Debskis study (2007), much of the motivation for using Irish in internet-based communication is centred on maintaining contact with other family members, and using the same language online as would be used in face-to-face discussion. Elsewhere, as discussed in Chapter 6, the internet was constructed as a place to which people retreat as an escape from the drudgery of maintaining self and family, even an aphrodisiac for everyday life (Rival et al. 1998: 304). Te family home and the internet caf are the primary sites of volunteer online activity, and since the home is generally where people do what they choose with their leisure, rather than what they are required to do, it becomes a locale within which preferred internet activity takes place. Te activities of LAN clans and fan- fction communities are unlikely to be carried out at work or school. Indeed, many schools and employers ban game-play and other entertainment uses of the internet. A study of internet use in domestic spaces thus becomes, particularly, a study of how people negotiate the internet when they have a choice. It also becomes a study of the family since the internet is one of the catalysts which reveal the dynamics of family life in terms of Livingstones (1992: 113) who lets who use what (Chapter 9). Te family is connected into the wider society through social, emotional, econ- omic and political processes and is directly impacted by the moral panics that circulate in the mass media about such fears as internet addiction, and rising rates of obesity. For these and other reasons, parents feel obliged to regulate their childrens use of the internet, particularly emphasising ways that maximise the educational and skills-based opportunities provided by online interaction while minimising perceived content, contact and conduct risks. For younger children especially, these dynamics result in a series of family rules and regulations around internet use, although such rules become less enforceable once children get wireless or networked access in private domestic spaces, and with the growing accessibility of the internet via use of mobile media. Chapter 9 includes discussion of a case study where regulation failed and a young adult within the family circle was investigated for internet addiction. Where internet activity is seen as a positive within family life, and where families or individuals within them have sufcient fnancial resources, the purchase and upgrading of online equipment can become a major priority. With older children within their parents home, but especially young men who are not themselves responsible for the households daily expenses, the family becomes a site for sign- ifcant innovation and creativity. In turn, as new technologies and practices are adopted in one family so they are modelled to others within a community, spurring c o n c l u s i o n 183 demand for similar innovations in other households and establishing an opinion leader dynamic. Te capacity to innovate depends upon family wealth, education and cultural con texts. Some of the dynamics through which decisions are made about invest- ments in new media were addressed in the domestication framework of appro- priation, objectifcation, incorporation and conversion (Chapter 9). It is through the domestication of a technology that a family integrates their new media usage within the temporal and spatial confguration of their home, and harnesses the benefts of consumption for activities within the wider social realm. Although the domestication framework operates at the level of the household, and is thus broader than applying solely to families, many households are built around family groups. Te internet is also critical to families at the other end of the global wealth scale, where ICTs including the internet are critically implicated in the international remittance fows that are sent by family members working in distant, richer countries to relatives in their home communities. Although comparatively under-discussed, these remittance fows afect about 10 per cent of the worlds population, some 700 million people. Te recipients are generally among the three in four people globally who remain cut of from the internet due to a combination of poverty, and lack of education, opportunity and infrastructure. COMMUNITY Community is important to internet activity in a number of ways, two of which are considered here, the frst of which also involves the family, the second of which focuses on shared interests. Family is implicated within notions of the wider physical community, partly as a conduit through which individual members relate to com- munity, and also in terms of the conversion phase of technology domestication. Community-based narratives may reveal specifc aspects of internet use and some- times these are at odds with, or disruptive of, the generally accepted stories of how the internet works or why it has developed in the ways it has. A personal history of a new media technology can demonstrate a richness of engagement specifc to the individual and their community. Such a history may involve the social minutiae of the wider community of opinion leaders and supporters who infuenced the technologys purchase and helped set it up and get it working. It would include details of who was frst communicated with and why, integrating the technology and its use within the family, community and society. An example from the early days of consumption studies may indicate this. Igor Kopytof is an American academic who has carried out anthropological research in Africa. He suggested that things have a social biography relating to the ways in 184 t h e i n t e r n e t which they are integrated and consumed in peoples lives and gave this example to illustrate his argument: Te biography of a car in Africa would reveal a wealth of cultural data: the way it was acquired, how and from whom the money was assembled to pay for it, the relationship of the seller to the buyer, the uses to which the car is regularly put, the identity of its most frequent passengers and of those who borrow it, the frequency of borrowing, the garages to which it is taken and the owners relation to the mechanics, the movement of the car from hand to hand over the years, and in the end, when the car collapses, the fnal disposition of its remains. All of these details would reveal an entirely diferent biography from that of a middle- class American, or Navajo, or French peasant car. (Kopytof 1986: 67) In this vignette, Kopytof has taken the social history of a specifc car as a text that can be used to illustrate ways in which some people in Africa might live their lives diferently from people in other contexts, and in other parts of the world. Internet use and the acquisition of new media skills can similarly construct a relevant text for comparison with others and for analysis. Such a text would include the reasons given for the acquisition of the ICT concerned, the people consulted, the shops and sites through which the purchase was researched, the insurance taken out, the set up and installation arrangements, the funding sources, the frst people communicated with and how, the uses to which it is actually put rather than those anticipated. In all these ways the community contributes to the individual construction of a particular technology. Physical community is therefore an important part of the domestication and consumption of ICTs. Online community can also be critically important to these processes in terms of providing a context within which technology is acquired. It may be that the technology has been purchased in order to keep in touch with a distant other, such as when middle-aged children buy their elderly parents a computer. As well as helping elderly people keep in touch by using new media, such a purchase might be a strategy to fll empty hours created by family moving away or by other signifcant life events. Online communities can ofer a range of supports in diverse circumstances to supplement, replace and compensate for interaction, or lack of interaction, with people living locally. Tis may be particularly relevant at times when people nearby may be at work or asleep, or otherwise inaccessible, since an online community may have a round-the-clock availability. Communities can take shape ofine and then become active online, or can form online around shared passions and practices. As a consequence, the range of possible communities that can be considered as having an internet dimension is in- numerable. Te communities considered in Chapter 8 were primarily articulated c o n c l u s i o n 185 with gender and youth, and particularly harnessed online practices. LANing culture implicates teenage and young adult males, such as those who responded to the viral video memes of All your chocolate rain are belong to us (discussed in Chapter 7). In contrast to the LANers, and underlining the gendered nature of some online interaction, fan-fction communities generally involve teenage and young adult women who create and share stories within a particular fan realm, such as Harry Potter or Twilight. Some commentators, such as Tosenberger (2008), see the erotic aspects of many of these stories as expressing a gendered counterpoint to the visual pornography consumed by many young males (Chapter 6). Reciprocal commitment to community members is developed when enough people carry on those public discussions long enough, with sufcient human feeling, to form webs of personal relationships in cyberspace (Rheingold 2000: xx). Such comments can be taken as a reference to the development of social capital, which is central to the uses of social media as well as to the development of specifc online communities. A discussion of social capital (Chapter 5) helps explain the dynamics through which people construct the internet as a supportive environment, building linkages of mutual obligation using social structures beyond the family. BRAIN-CHANGING Tere have been some suggestions, for example in research studies cited by Steven Jones (2005), that new media is making us more intelligent. It is, in efect, good for the brain, and that might be sufcient reason for a middle-aged child to buy their elderly parent a computer. Neurologists believe they have demonstrated that even adult brains grow according to how they are used. Te brains of London taxi drivers, for example, change in response to the experience of navigating the inner city (Maguire et al. 2006). It now seems probable that everything we do, including using the internet, has subtle efects upon our brain. Te more we do something, the greater the impact it will have on our brains physiology. At the same time we rewrite our neuronal wiring, we help rewrite our consumer culture. Te choices we make online mean that some consumer products are developed in certain ways, practices evolve to suit our priorities, and companies providing services come into existence and thrive, or decline and are closed. As our usage patterns drive changes in the information and experiences available on the internet, so the activities of engaging with the internet and its various aspects are changing us. Well over a decade ago, when the internet was still a minority experience even in the wealthy West, David Porush, an MIT-trained cyber-theorist, suggested that cyberspace is brain changing. Writing in the late 1990s, Porush suggested that society 186 t h e i n t e r n e t was embarking upon a momentous journey. He sought an analogous moment in history when culture found itself in possession of an equally new and revolutionary cybernetic technology . . . for getting thoughts from one mind to another (1998: 46) and argued that the invention of the internet is of equivalent importance to the invention of language and writing. Given the impact upon human culture of these communications tools, it is unsurprising that there is a perception that we have fallen behind in our capacity to understand the impact of ICTs on society. Such a perspective, of the internet having an incredible social impact, gives credence to the attempts by minority language speakers and members of numerically smaller cultures to use online resources to support cultural maintenance. Tis might be done by creating culturally specifc web-based content (Chapter 5) to strengthen a culture that feels under threat from social and linguistic communities that have particular traction on the internet (Chapter 2). Some policy makers are concerned that the power of the cultures dominating the internet may distort minority cultural infuences, particularly through the impact of the English language. Also implicated are the large transnational corporate cultures, some of which are themselves ICT companies (Bryan 1994: 146), such as IBM, Microsoft and Google (Chapter 2). Indeed, commentators have suggested that technology operates a little like a genetic code, transferring the DNA of the originator community into the cultural heritage of the societies that adopt the technology (Bissio 1990, in Chapter 4). By following certain choices and web-pathways that refect their perceptions of the internet, users create patterns of access and consumption that efectively construct their online experience as a model of their own preferences and priorities, rather like synaptic pathways are laid down in the brain (Maguire et al. 2006). Internet access and use is a choice that both expresses and moulds individual and community identity and this prompts a critical examination of what an individuals internet usage says about them as social and cultural actors; and what would constitute the major highways, routes and byways of each persons internet use. Alongside these varied analogies, the model of the brain has another relevance to the development of the internet. It was not self-evident that a computer network would be developed along the lines of a distributed grid (Chapter 2). On the contrary, both the telephone and the earlier telegraph system had used hubs, nodes and spokes (or trunks, branches and twigs) as their organising principles. Te hub, as with the centre of a wheel, provided services, support and control for all the spokes radiating from it. Some of those spokes ended in mini-hubs, or nodes, allowing a number of additional spokes to radiate from that point. However, given the importance of keeping communications open after a critical incident, such as an attack on a national communications system, engineers were looking for ways to develop self-mending frameworks. c o n c l u s i o n 187 Te structure of the brain was ofered as a possible model for the internet, partly because it is remarkably resilient in accommodating and compensating for partial damage. Te networks through which neurones are connected became the pattern for proposed computer inter-connectivity. If one link between computers was down, or congested, other links ofered a way forward. Such a model included built-in redundancy, the term used for when there is more capacity than can be reasonably needed. Tis model also meant that cheaper, less robust connections could be utilised since the chance of all of these being broken at the same time was reduced with the large number of possible connections available. Te use of the brain metaphor as a way of envisaging the internet, and the indication that the internet is itself brain changing, ties into Rheingolds statement (Chapter 6) about online community allowing a member to tap into this multibrained organism of collective expertise (Rheingold 2000: 109). OLD MEDIA AND NEW MEDIA Whereas the public sphere (Chapter 7) of old media, such as broadcasting and news papers, was characterised by professional access and rigorous gatekeeping that restricted the kinds and numbers of voices heard, the internet allows a space for multiple voices of varied credibility. In particular, blogging has been identifed as a collaborative activity which is particularly related to Web 2.0 (Bruns 2008a), examined here through the case study of the Iraqi citizen-journalist Salam Pax (Chapter 7). One perceived strength of new media as opposed to old media is that there are no space constraints, and generally no cost implications, in reading and writing multiple blogger-stories. With a limited resource such as newsprint, access to good information is ensured when everything accepted for printing is of a specifc quality. With an efectively unlimited resource such as the online environment, a single form of quality control is replaced by access to large amounts of information and the exercise of careful judgement on the part of the reader. Te example of cyber-stalking addressed in Chapter 6 focuses upon the deliberate use of the public sphere to harm a persons reputation and employment prospects. Whereas most print and broadcast media are published and consumed in specifc jurisdictions, and court action is comparatively straightforward, new media engages readers, writers and recipients across national and jurisdictional boundaries. Tis leads to potential clashes of national information cultures and illustrates the difculty of developing relevant regulations (Chapter 6). Even given a court order in one country which declared a range of statements to be defamatory lies, the victim in the study was unable to prevent continued cyber-harassment emanating from 188 t h e i n t e r n e t another country. Instead, his attempt to stop someone from saying something on the internet could be seen as an attempt to chill debate and thus constructed as a restriction upon free speech. Te difcult balancing act relating to the celebration of free speech, while allowing for the legitimate protection of peoples reputations, is a long way from being resolved. In the context of the expanded public sphere, Wikipedia is an example of a quality- controlled collaborative project that aims to establish self-correcting processes to support a continuously-updatable resource which functions as a fawed repository of human knowledge (Chapter 7). Te acknowledgement of faws recognises that the project cannot aford to aim for perfection. Peer-reviewed perfection was established to be problematic in the pre-wiki days and now Wikipedia aims to get better with each iteration, rather than achieving perfection. Tis approach difers from the vision which inspired YouTube, which was to create a showcase for short digital videos which attracted audiences on the basis of viewers quality recommendations and the numbers of times a video has been viewed. National policy makers (Chapter 3), infuential opinion leaders (Chapter 8) and individuals within their domestic contexts (Chapter 9) all have difering construc- tions of the internet, and diferent ways of relating to and using it. Tere is no single, stand-alone, agreed way of understanding new media. Instead, the internet can generally be constructed as the result of a series of choices, and a dialogue, between the user, the regulator, the technology manufacturer and supplier, the access portal, the search engine and the website designers often with a host of advertisers, as well. Tis is very diferent from the situation with the press and broadcasting where the readership or audience has limited capacity to engage with the medium itself and has little opportunity to use the media to share ideas except through newspapers letters pages and radio talk-back. It is notable that many of the moral panics about the internet (Cohen 1980) are circulated by the old media. Panics can start using a range of emotive triggers, such as paedophiles preying on young girls they befriend on social networking sites. Old media would almost never undermine a good panic-promoting story by citing Finkelhors (2008) work (Chapter 9) to the efect that there has been a 53 per cent reduction in sexual ofences against children between 1992 and 2006 (Schrock and boyd 2008: 10). Old media are far more likely to talk about the risks of internet use than they are about its opportunities and benefts (Chapter 6). Some people might argue that it is old media that is panicking at present since they have yet to fnd an economic model that makes newspaper publishing viable in the post-internet world, and advertising revenues are increasingly used to support internet sites, rather than newspapers. c o n c l u s i o n 189 LOOKING FORWARD It is impossible to confdently predict the future development of the internet. Whilst it is clear that, in internet terms, the frst decade of the twenty-frst millen nium marked the conjunction of Web 2.0 and social media, this would not have been predictable in the late 1990s. It will only be clear in retrospect what elements of the internet will spawn the defning path for new media in the coming decade (Chapter 3). Even so, some predictions centre around the development of a Semantic Web, and this has been discussed as one possibility among many others (Chapter 5). Constructed as an immensely versatile technological system, the internet has energised creativity, collaboration and commercialisation on a global scale in unexpected and unpredictable ways and impacted all areas of human life. Over the course of the previous chapters, as well as this one, Te Internet: An Introduction to New Media has analysed and explained research into peoples uses of the network of networks at the global, national, community, family and individual levels. In taking this big-picture perspective, the volume has raised and addressed issues of policy, regulation and legislation, and also considered the digital divide and the internets contribution to the public sphere. Trough these considerations we have developed a complex understanding of the internet, its development, and possible trajectories. Tere is intense social interest and concern focused upon the internet, as was also true of other information and communication technologies in the critical stages of early adoption and take-up. Such concern implicates politicians, lawyers, corporations, opinion leaders, educators, parents and consumers in a debate about issues of control, access, regulation, (dis)advantage, cultural imperialism and the economic implications of internet use. Whilst it is evident that the internet supports new ways of seeking information and relating to others socially, there is little evidence that this technology rewrites human society and sociability any more than did television, radio or the invention of printing. Instead, the internet ofers new ways through which diferent social entities (both nation-based and interest-based) can connect and express themselves. Building upon major and current research, such as that in the US and the EU examining the opportunities and risks presented by the internet to children and young people (SNS Safety 2008; Livingstone and Haddon 2009), this book has ofered an account of the internet as it currently stands whilst acknowledging that it represents the epitome of a fast-developing medium. In developing an awareness of the complex content, contact and conduct risks which characterise this technology, the volume has also sought to showcase the immense benefts ofered by a medium which engages its users creativity and allows access to communities untrammelled by issues of time and space, even though users in individual communities may be 190 t h e i n t e r n e t limited by access. During the time that this book was being written, however, global take-up of the internet rose from one in fve to one in four people (Internet World Statistics 2009), and this statistic demonstrates that while many people are still unable to access the internet, it has a growing relevance around the world. Researchers and students should feel confdent and conversant with the use of key technical and policy terms germane to debates about the internet as it was, as it is, and as it will be (Chapter 3). Such an ambition requires a more explicit engagement with technological policy than is usually addressed in social and cultural explorations of the internet. A glossary is supplied as an aid to help the reader understand both the physical and the policy infrastructures of the internet, better to engage with public debates about further ICT policy in local, regional and national contexts. Demystifying this language allows students and researchers to make informed choices as to the debates they engage with, and the terminologies they use. Citizens are an early focus of Chapter 4, which starts by considering the situation of some sections of the population that are not sufciently settled and prosperous to make good consumers. Citizens have rights, while consumers access products and services according to their capacity to pay. As the internet continues to develop in its scope and relevance, the right to access and use information has never been more important. Tis book has positioned the internet in relation to readers daily lives, so that researchers and students who use this volume will be better able to analyse the implications of new media for themselves, for their societies, and for the future. ANNOTATED GUIDE TO FURTHER READING Readers are encouraged to use the web to investigate these issues further. Although most recommendations are for old media printed books and journals many of these are available through the web and often link through to further resources. Chapter 1: Introduction A general introduction to the social shaping of technology is provided by MacKenzie and Wajcman (1999), which is foundational in this feld. Te domestication framework, which looks at ways in which technologies become integrated within peoples homes and lives, has been linked to the social-shaping approach in Silverstone and Haddon (1996). Haddon (2004) ofers a range of studies of ICT use in daily life. Wajmans books (1991, 2004) are a good starting point for discussions about technology as a masculine culture, while Gray (1992) provides a classic account of the gendering of the video recorder. Te nature and characteristics of the information society have been theorised over the past thirty years with Bells (1973) Te Coming of the Post-Industrial Society, a foundational text. Masuda (1981) ofers a futurist view of the information society, while Jones (1995) examines some implications for the future of work as seen in the early years of the WWW. Chapter 2: History Te book and the flm October Sky (Johnston 1999), based on a true story, give some indication of the Sputnik launch in the US from the perspective of a teenage boy, Homer Hickham Jnr, who was inspired to become an American rocket scientist as a result of seeing Sputnik 1 in orbit. Similarly, Tirteen Days (Donaldson 2000), recreates the drama of the Cuban Missile Crisis. 192 f u r t h e r r e a d i n g Maney (2003) and Gerstner (2002) between them cover much of the history of IBM, while Whol (2006) provides a brief and accessible overview of the im plica tions in computer and software development for those who used the tech nology. Paul Ceruzzis A History of Modern Computing (2003, 2nd edn) is an engaging chrono- logical narrative dealing with critical events from WWII to the dot.com crash. Some of the excitement of directing the future through involvement with the development of computers and the internet is communicated in the work of Hafner and Lyon (2003), who interviewed many of the key inventors and pioneers and also engaged in extensive archival research. Teir work contributes signifcantly to the chapter. Berners-Lee with Fiscetti (1999) and Battelle (2006) carry this exciting history forward. Raymond (2001) outlines the diferences between the processes of open-source software production and the large proprietary software houses, while Bruns (2008a) examines the implications of participatory culture for everyday internet practices such as blogging and wikis. Chapter 3: Policy Tere is a growing literature on innovation and creativity including Florida (2002), Kuhn (1996) and Howkins (2001). In terms of national responses to the challenge of fostering creativity throughout the innovation system, the UKs National Endow- ment for Science Technology and the Arts (NESTA n.d.) probably sets the agenda. Although this chapter relies upon a range of sources to compare and contrast the working of regulatory regimes in China and Australia, the purpose of this discussion is to indicate the value in being aware of equivalent debates in the context of these and other countries. It may be useful to choose a country other than China or Australia and use the internet to research the major agencies and regulatory bodies charged with overseeing the operation of regulation in the felds of broadcasting, telecommunications and the internet. Tis strategy will result in a range of relevant reports and recommendations. Some regions also have over-arching bodies, such as the EUs COST 298 action: Participation in the Broadband Society (COST 298 n.d.), and the part-UN funded Digital Review of Asia-Pacifc (DirAP n.d.). Such sources can provide useful starting points to individual countrys regimes and to the issues afecting a region. Green (2002) contains a detailed discussion on the active process of regulating, building on Palmer (1994). f u r t h e r r e a d i n g 193 Chapter 4: Te Digital Divide Bell (1973) is often considered as the frst person to systematically demonstrate that the economies of western countries had shifted inexorably from an agricultural and manufacturing base to the development and delivery of information goods and services. Beniger (1986) added value to this concept by tracing a detailed history of the shift. Van Dijk (2005) ofers a conceptual framework and policies to address the digital divide, while Rooksby and Weckert (2007) are editors of a volume that examines the implications of the digital divide for social justice issues. Te Pew Internet and American Life project has been documenting the impact of the internet upon segments of the US population, and upon aspects of American life since 2000 (Pew 2009). Te range of reports, from online dating to teleworking, is fascinating. Rogers (2003) Difusion of Innovations Teory is one way to explain the take-up of internet goods and services charted by the Pew Internet and American Life project. Chapter 5: Customising the Internet Herb Schillers seminal theory of cultural imperialism (1991) makes a useful starting point for discussions of the potential of new media for the strengthening of Irish Gaelic (Fleming and Debski 2007), and La Francophonie (Jeanneney 2006). Tapscott and Williamss (2006) popular volume on Wikinomics is a useful intro- duc tion to the implications of Web 2.0 collaborative engagement, while Hendler and Golbeck (2006) and Berners-Lee et al. (2001) ofer an accessible and brief intro- duction to visions of Web 3.0 and the workings of the Semantic Web. Crawfords (2009) account of the emerging practice of Twitter is a fun and readable study of the incorporation of a new digital application into everyday domestic life. Chapter 6: Regulation and Legislation: Pornography and Cyber Stalking Cullers (2001) introduction to discourse analysis is a classic of the feld, while Morgans Images of Organization (2006) demonstrate the additional power and vers- atility of metaphor. Some risks faced by children and teenagers in their internet activities have prompted much government research and many landmark reports including the EU Kids Online outputs (EU Kids Online n.d.); the US report Enhancing Child Safety and Online Technologies (SNS Safety 2008) and Media and Communications in Australian Families (ACMA 2007). As part of the EU Kids Online project, Staksrud et al. (2009: 1819) summarise perceived risks in their report on available data about childrens activities online. Specialist centres such as the US National Center 194 f u r t h e r r e a d i n g for Missing and Exploited Children (e.g. Finkelhor et al. 2000; Wolak et al. 2006) and the Pew Internet and American Life project also publish reports that address risk (e.g. Lenhart 2005; Lenhart et al. 2007). Perceived risk is often raised and handled in family contexts, thus Chapter 9 also comments on this theme. Chapter 7: Te Public Sphere Te radical diferences in conceptions of the public sphere put forward by Habermas (1989b) and McKee (2004) repay detailed consideration, especially when considered in the context of changes in ICTs and social organisation over the past few decades. Te Electronic Frontier Foundation (EFF 2009) has branches in many countries and campaigns actively for internet freedoms (but see Chapter 6). While caution is in order when using information found on the internet, Clegg (2006) ofers a how- to guide to using the web for study purposes. Bruns (2008a) addresses citizen-journalism, blogging and wikis in his wide- ranging book on prod-usage, while Tapscott and Williams (2006) examine the im- plica tions of voluntary collaborative organisation for business practices. Burgess and Greens (2009) analysis of YouTube is usefully positioned in the context of participatory culture. Chapter 8: Community Rheingolds Virtual Community (2000) remains one of the key discussions of online social connection, while Andersons Imagined Community (1991) examines the impact of mediated connections in building a sense of belonging to a community. Nichols et al. (2006) consider the potential value of gaming communities to brands and to business, while Jenkinss book Convergence Culture (2006) examines a range of case studies indicating the growing infuence of digital media upon individuals, society and politics. Hillss Fan Culture (2002) ofers an in-depth look at the working of fandom. Like Jenkins, Johnson (2005) sees signifcant value in many aspects of digital culture that are minimised or decried by the formal education establishment. In terms of participant-based research and writing, Green and Guinery (2004) address fan fction while Green and Guinery (2006) investigate a FPS LAN clan. A range of complex issues is raised when we think about the ethics and practicalities of online research. Hine (2005) provides an invaluable guide to this minefeld. Chapter 9: Internet in Family Life Morleys Family Television (1986) is a landmark study in accounts of the dom- estication of technology, even though it precedes the development of the classic f u r t h e r r e a d i n g 195 domestica tion framework (Silverstone et al. 1992, Silverstone and Haddon 1996). Bakardjievas (2005) examination of the internet in everyday life adds to these accounts. ACMA (2007) ofers a detailed, recent account of family-based uses of ICTs, including the internet, while the Pew Internet and American Life (Pew 2009) Project provides a wealth of specifc research fndings across gender and generational axes. Although some parents have strong fears that the internet is addictive, discussions still continue. Allison et al. (2006) indicate that the subject of their case study, Mr A, had a range of problems underlying his condition. Bocij (2006) includes a section on addiction; Johnson (2005) ofers an alternative viewpoint. Te International Fund for Agricultural Development (IFAD 2009a) and the World Bank (2008) provide information on families and remittances and this is often backed up by country-specifc reports, such as AusAID (2007). Chapter 10: Conclusion EU Kids Online (n.d.) reports investigate gender and family infuences upon child- rens internet usage. Moyals (1995) work on the gendered use of the telephone is relevant for older age groups when considering the ways in which womens uses of ICTs typically difer from those of men. Porushs (1998) article about the brain-changing nature of internet activity is an intriguing one, especially alongside the recent fndings of neurobiology (Maguire et al. 2006). McKee (2004) and Bruns (2008a) ofer detail that helps identify a range of difer ences between old and new media, while Castells book on Te Rise of the Network Society (2009), a revised and updated edition and the frst volume of the Information Age series, provides a philosophical perspective on the social, cultural and economical implications of these changes. Between them, the thirty-one chapters in Te Handbook of New Media, edited by Leah Lievrouw and Sonia Livingstone (2002), engage with many of the issues raised here and can ofer supplementary and contrasting perspectives. EXERCISES AND QUESTIoNS Chapter 1: Introduction Exercises 1. Is it possible to develop a truly inclusive digital technology, accessible to people all over the world? What issues and problems would need to be addressed? What would the benefts and costs of such a project be? 2. Using a global perspective, give examples of social, political and cultural factors that infuence whether any particular individual is more or less likely to have the opportunity to use the internet. 3. List some of the ways in which new media difer from old media. Is the internet an archetypal new medium? Why? Questions 1. In 1994, Teodore Roszak suggested that the information age involves a range of unacceptable risks: the price we pay for its benefts will never outweigh the costs. Te violation of privacy is the loss of freedom. Te degradation of electoral politics is the loss of democracy. Te creation of the computerized war machine is a direct threat to the survival of our species. (Roszak 1994: 233) Would you agree with Roszak? Please give your reasons. 2. Why has the digitisation of information triggered a huge explosion of goods, services and convergent technologies? What issues are raised by the speed with which technology changes? Chapter 2: History Exercises 1. What do you see as the key components of the technological system that we call the internet? How would the components of that technological system change if 198 e x e r c i s e s a n d q u e s t i o n s we took time lines of 1975, 1995 and 2010? What are the implications of adding human inputs in terms of the roles played by key infuencers? 2. Do you think of the internet as being a US-controlled entity? What evidence would you ofer in favour or against such a proposition? What would be the implications of a split internet that was fractured along nationalistic or political lines? (Might the internet refect an economic divide?) 3. What factors build the wealth and the infuence of successful internet start-up entrepreneurs? What aspects of the digital economy mean that their labour is rewarded so extravagantly? Questions 1. Compare the development process of a proprietary brand of software with that of an open source application. What are the implications for producers and for users? 2. Tousands of computer scientists had been staring for two decades at the same two things hypertext and computer networks. But only Tim conceived of how to put those two elements together (Dertouzos 1999: x). How would you explain the implications for the internet of the development of the World Wide Web? What else might explain the exponential growth in popular internet use since the mid-1990s? 3. In 2004 Judy Wajcman argued that women who wish to participate in felds that are traditionally masculine preserves, such as computer science and electronic engineering, are asked to exchange major aspects of their gender identity for a masculine version without prescribing a similar degendering process for men. Do you agree? Why do you think that women are under-represented in the history of the development of computing and the internet? Chapter 3: Policy Exercises 1. Do you believe we can identify features that lead to a society being especially creative? What social infuences would you see as helping to build innovation? 2. What kinds of debates about the internet are currently circulating in your society? How are they likely to afect policy development and your governments approach to regulating the internet? How might a person in your position, individually or as part of a group, make a contribution to a policy debate? 3. Is it possible to censor the internet? What would be the positives and the neg- atives of trying to do so? What kind of social, economic, political and personal price would be paid by those trying to enforce such censorship and those trying to resist it? e x e r c i s e s a n d q u e s t i o n s 199 Questions 1. Tink about Tomas Kuhns (1996 [1962]) notion of the paradigm shift. Do you consider that the notion of the internet as we understand it today has shifted sign ifcantly from that of its frst developers? If so, where do you think that para- digm shifts can be identifed? If not, explain how the internet today is implied in the internet as it took shape in the late 1960s and early 1970s. 2. What kinds of policy approaches characteristic of western democracies have fostered the rapid take-up and fast adoption of the internet? How did the policy environment drive consumer response? Chapter 4: Te Digital Divide Exercises 1. What are the implications of being in the 25 per cent of people without internet access in a rich, western-style country? What are the implications of being in a poor country, where few people have internet access, and being part of the 75 per cent of the worlds population without internet access? How do these two circumstances difer from the point of view of an individual unconnected citizen? 2. Statistics can go out of date very quickly. (Indeed, most are already out of date at the time that they are frst published.) Taking your country as your case study, research the statistics for broadband use, dial-up use, and for the proportion of people who have no internet connection at all. What factors explain relative advantage? How quickly is the situation changing? 3. Tis chapter uses a number of technical terms which might be seen by some people as jargon. Make a list of the terms that are unfamiliar to you and con- struct your own glossary of defnitions. (Tis is often done best with a group of people sharing the tasks, and comparing their results.) Questions 1. If you were a legislator responsible for communications policy and infrastruc- ture, what factors would you take into account when determining which groups of people most need your help to connect to the internet? Why? 2. Tere are more computers around, but the digital divide is getting wider because of broadband. Discuss the implications of this statement in terms of (i) those with no access to a computer, and (ii) those with access to a computer and a dial- up service. 200 e x e r c i s e s a n d q u e s t i o n s Chapter 5: Customising the Internet Exercises 1. How important is it that minority languages are supported in their home ter- ritories? In what ways are new media a help in preserving minority languages? In what ways a hindrance? 2. Do you agree that Google has a perceived Anglo-centric bias? Is this a problem? Why? What might be done to reassure someone who thinks it is a problem? Can you recommend steps that would address their concerns? 3. Compare the workings of a heterarchical folksonomy with those of a hier arch- ical taxonomy. Why is it so difcult to think in terms of a taxonomy of internet information? Questions 1. If the web is a library, why do we need a building full of books? Why do we need librarians? What would you say in response to this post from Blake, a blogger librarian? 2. Discuss the characteristics of social media. What is it about the way that some people use certain technologies that makes some media social? Chapter 6: Regulation and Legislation: Pornography and Cyber Stalking Exercises 1. Where do you see the intersections and cross-overs between your online and ofine life? Do other people make judgements about your online activities? What impacts do such judgements have on you? 2. Te decision to change an ISP contract, or to buy a new piece of software or technology, often centres around the need for more or better or faster service. In your experience, what kinds of reasons and rationales have been given for domestic technology upgrades? Did these upgrades deliver as expected? 3. Drawing upon your own experience, or using the Cullen case study, what advice would you give to someone who was being bullied online? Do you think that Cullen could or should have responded diferently? Questions 1. [T]here can be no single theory or metaphor that gives an all-purpose point of view. Tere can be no correct theory for structuring everything we do (Morgan 2006: 338). Relate this quotation to your experience of using the internet. What metaphor(s) do you fnd helpful, and why? e x e r c i s e s a n d q u e s t i o n s 201 2. Do you see a diference between real life and life online? Give reasons for your answer. How do you see the relationship between your online and your ofine life? Chapter 7: Te Public Sphere Exercises 1. McKee paints a chaotic image of the contemporary public sphere but seems to suggest that there is greater strength in its inclusivity and diversity than is the case with the unitary public sphere championed by Habermas. What are the advantages and disadvantages of these competing visions? 2. What are the key diferences between a professionally produced encyclopedia and Wikipedia? When would those diferences be advantageous, and when would they be drawbacks? 3. After buying YouTube, Google has become increasingly likely to ofer video segments in response to a search enquiry. What strategies would you use to integrate a database of images with a database of words? Questions 1. Refecting upon the statement that authenticity has since been validated by an American newsperson (Hamilton and Jenner 2003: 131), discuss the diferences that characterise professional journalists and citizen-journalists. How would you justify the contribution of citizen-journalists? 2. Is all information equal? What aspects of information need to be considered when judging its value? Chapter 8: Community Exercises 1. Ideologically based internet communities are a new force in politics, alongside big business and employers, and workers and trades unions. How might these online organisations impact upon the political system? 2. What rules would you put in place so that members of an online community would be accountable and take appropriate responsibility for their actions? 3. Is it acceptable to join an online community for the purpose of researching and writing about it? What ethical issues are raised? 4. How difcult would it be to hide your identity online over a protracted period, like Julie did? What would make it easy? What would make it hard? 202 e x e r c i s e s a n d q u e s t i o n s Questions 1. Do you agree with Jenkinss proposition that some people learn more from their voluntary internet activities than they do from school-based classwork? What might the implications be for the organisation of education? 2. In richer countries, internet participation is no longer gendered, both sexes participate equally. It seems, however, that certain activities are gendered: fan fction writing and FPS gaming are two such activities. What issues are raised by the identifcation of gender as an important aspect of some internet activity? Chapter 9: Internet in Family Life Exercises 1. Why might some children see their family as being without internet rules, while the parents in that family see themselves as having internet rules? Is it surprising that most parents seem to trust their children in terms of their internet use? 2. One consistent piece of advice for parents is to have the internet-accessible computer in a public space so that usage can be monitored. What are the implications of the growing prevalence of mobile phone-based internet access for this strategy? How can children be protected from risk if they have anytime, anywhere connectivity? 3. How would you see a familys media use, and its conversion into social currency, infuencing the relationship between the household and the outside world the boundary across which artefacts and meanings, texts and technologies pass as the household defnes and claims for itself and its members a status in neighbourhood, work and peer groups in the wider society? Give examples from one or more of the case studies in this book. Questions 1. Accepting that internet use follows phone use, comment on Moyals claim that intrinsic communication is both gendered work and gender work, in that it is work that women do to hold together the fabric of the community, build and maintain relationships, and accomplish both care-giving and receiving functions. What do these kinds of communication look like in an internet context? Is it gendered work? 2. Do you believe that people can get addicted to the internet? How would that be recognised? What treatment would you see as useful? e x e r c i s e s a n d q u e s t i o n s 203 Chapter 10: Conclusion Exercises 1. A generation ago, parents and care-givers might have worried that children spent too much time in front of the television. Now the concern is that they spend too much time on the computer. Is this essentially the same kind of concern or are there important diferences? 2. Some commentators have used the idea of the brain to explain the workings of the internet. What other ways can you think of to explain how the internet works? 3. Teres a popular saying attributed to the open source movement to the efect that Information just wants to be free. Do you agree with this sentiment? What are the implications of such freedom for old media? Are the implications for new media diferent? Questions 1. Our technology computerized weapons systems, medical scanners, the Internet sets the standard to which developing countries aspire (Schiller 2000: 149). Critique Schillers argument that we have moved into an era of soft colonialism where poorer countries are unnecessarily driven by the desire to adopt elements of richer culture, including the internet. 2. Is the internet particularly brain changing? Justify your answer. 3. Your legal concepts of property, expression, identity, movement, and context do not apply to us [in cyberspace]. Tey are all based on matter, and there is no matter here (Barlow 1996). Do you agree? ABBREVIATIoNS AND GLoSSARY Tis glossary should be read in conjunction with the index, where readers are pointed to uses of critical terms in the text. Further understanding will be gained from the web and by following concepts of interest through the indexes of other books, cross-referencing diferent authors usages. High profle brand name products such as Google, Facebook and Twitter are not included here, but are indexed. I have written two previous Abbreviations and Glossaries (Green and Guinery 1994, Green 2002), and this work draws on those earlier versions. 1G/2G/3G . . . XG used to refer to frst, second, third, etc., generation technology, often used as a way of referring to mobile phone advances 24/7 around the clock; twenty-four hours a day, seven days a week; all the time 3D 3-dimension a/synchronous synchronous activity (a phone call) occurs with two or more people interacting at the same time while asynchronous activity is interaction separated by lapsed time (for example, leaving a message and waiting for a reply) ACE Automatic Computing Engine (early UK computer) ACMA Australian Communications and Media Authority ADS asymmetrical digital subscriber line algorithm step-by-step logical sequence which embodies the rules for interpreting the information it contains. Diferent algorithms serve diferent purposes. When a communication is digitised, it is encoded algorithmically. Digital data travels in algorithmic form, and algorithmic rules dictate decoding back to the original form at the destination, for example, to computer data, sound waves, etc. analogue something analogous to, or representative of, the original; continuously changing, like hands on a watch face, or a sound wave. Digital representation is on/ of (or high/low), i.e. two states only 206 a b b r e v i a t i o n s a n d g l o s s a r y ANT Actor-Network Teory; a theoretical approach to understanding how people interact with each other and with networks AOL America Online ARPANET/DARPANET the computer network created by ARPA, the Advanced Research Projects Agency of the US Department of Defense, renamed DARPANET (Defense ARPA Network) in 1972. Designed to overcome the lack of interactivity between diferent types, kinds, and models of early computers ATM automatic teller machine Avatar a digital persona that can take a 3D form, as in a computer game; a 2D form, as an icon; or a 1D form as a nickname or pseudonym AVS adult verifcation system, identifes the age of an internet user for access to restricted websites, typically adults only BBC British Broadcasting Corporation BBN Bolt Beranek and Newman Inc.; consultancy which helped develop ARPANET BDP Big Dikk Pimpz, a LAN clan BitTorrent P2P fle-sharing network that makes it possible to source large multi- media fles by using a protocol to near-equalise the time taken by trafc in both directions, uploading and downloading, and also makes it increasingly necessary with use that the hard drive collections of members that are downloading content be accessible to other community members for uploading Broadband ISDN an example of an intelligent communications system. Te broadband prefx indicates that the system is designed to include many channels (bands). See ISDN BT British Telecom CASS Chinese Academy of Social Sciences CD compact disk; compact storage of digital information on a disk CDA Communications Decency Act (US) CEO chief executive ofcer CERN European particle physics research centre, near Geneva, Switzerland communications system/intelligent communications system an intelligent com mun ications system has artifcial intelligence built in, monitoring the fow and quality of the information communicated and making sure that it reaches the destination in the correct form. Broadband ISDN is an example of such a system. See ISDN communications technology technology used for communicating but also storing, retrieving and packaging (manipulating) information. Te com mun ica- tions revolution, the progressive separation of communication from transport is an integral part of the information revolution a b b r e v i a t i o n s a n d g l o s s a r y 207 construction of meaning a perspective which argues that meaning is a construct or product of social processes shared by individuals and groups. Tus the meaning of computer includes elements of the technological, unlike the meaning of pen (even though, during the decline of the quill, the pen would have been seen as technological) CPU central processor unit, the guts of a computer cross-subsidy the use of profts from one sector to subsidise an unproftable sector, usually to permit the possibility of universal service at an afordable price CSO community service obligation CTSS compatible time-sharing system customer service presumes that the consumer is rich enough to be a customer. Cit iz enship is not sufcient, and wealth is also required. See public interest for more cyber- (for example, cyberspace) something constructed from digital components thus cyberspace, a digital construction of space cyberspace term coined by William Gibson to refer to the cyberworld created by the convergence of IT/computers, digital media and telecommunications Cyclades early French computer network DDD direct distance dialling (US) determinism the notion that something is so powerful that it is beyond human control, for example, in technological determinism digital divide the gap between the haves and have-nots of the information society following the advent of ICTs and digitisation digitisation the rendering of information in digital form. For example, in analogue phone services the sound is modulated at the mouthpiece, retaining the pattern of sound waves as digital information until it is converted back into waves at the earpiece of the listener. Digital sound is encoded algorithmically, using on/of states, which compacts the signal and means that more data can travel at the same time, with consequent benefts in terms of carriage capacity and cost discourse given that understanding depends upon the construction of meaning, a discourse frames the parameters within which meaning is shared with other/s it involves the concept of communication. Feminism, for example, assumes that gender is a political as well as social construction and that to be feminine is to struggle with dominant masculine and patriarchal discourses DNA dioxyribonucleic acid (a nucleic acid) plus protein molecules make up chromosomes DoCoMo DO COmmunications over the MObile Network (Japan) DSL digital subscriber line DVD digital video disk EFF Electronic Frontier Foundation 208 a b b r e v i a t i o n s a n d g l o s s a r y efects research a branch of audience/readership research which attempts to de- scribe and quantify media efects, such as the efect of violent television images upon children, or of pornography upon sex-ofenders. Tere is a tendency to assume that there is an efect (see construction of meaning), although most efects described are subtle and highly conditional electronic and microelectronic applied to microchip technologies where the electrical circuits have been progressively miniaturised to allow quantum leaps in available processing capacity while minimising physical size; often used to indicate some element of in-built computer control as in robotics ENIAC the Electrical Numerical Integrator and Calculator (an early computer) (US) ethnography the study of patterns of living of a series of individuals, or of a group of people. Tends to provide large amounts of data, which are afected by the presence of the observer/researcher, and which refect their priorities. Often associated with postmodern discourses, and also the foundation for early structuralist analysis EU European Union EU Kids Online a multi-country EU research network led by Professor Sonia Livingstone and Dr Leslie Haddon at the LSE and co-sponsored by the LSE and the European Community Safer Internet Plus Programme F2F face to face F2S face to screen fan fction fction produced by fans for fans as a voluntary response to their im- mersion in a specifc fctional world. It commonly adds unexpected and potentially subversive themes to established story lines fanzine fan-produced magazine for consumption by other fans FF See fan fction fbre optic/optical fbre pulses of laser light travel along superfne glass strands to communicate information. Laser energy travels at the speed of light and its power is concentrated as a result of the photons all having the same wavelength. Digitisation allows optic fbres to carry immense amounts of information FPS frst person shooter, a digital game in which the gamers main aim is to shoot opponent avatars. See RTS frequency the frequency of, for example, a radio signal is related to its wavelength; the point on the broadcasting spectrum at which that signal is transmitted and can be received. Longer wavelengths travel at lower frequencies. Te frequency (the number of waves per second) is measured in hertz (Hz). A range of neighbouring frequencies make a spectrum, such as that of visible light (each colour has its own frequency) FTP fle transfer protocol a b b r e v i a t i o n s a n d g l o s s a r y 209 FTTH/FTTP/FTTN fbre to the home, fbre to the premises, fbre to the node gatekeeping the process through which experts, such as news editors, restrict access to the mass media newspapers, radio, television, etc. usually on grounds of ensuring professionalism, quality and relevance GDP gross domestic product, a measure of a countrys productivity gender a social construction with political implications, justifed by biological diference. Conceptualisations of biological diference are also social constructions (see discourse) global/isation the notion that a networked world is interconnected rather than divided by satellites, by fbre optics, by digital information and that the whole is greater than the sum of the parts. Usually associated with such terms as information fows and information power within the global context GNU free software platform with the acronym meaning Gnus Not Unix gTLD generic top-level domain heterarchy a fat organisational structure in which position does not determine relative status hierarchy a trunk, branch, twig, type of classifcation system with diferent levels of power HIV/AIDS human immunodefciency virus/auto-immune defciency syndrome host, network host a computer connected into the network as a network node (or internet node). Each host has a unique IP address while data is sent and received according to TCP parameters HP Harry Potter, J.K. Rowlings schoolboy wizard character HTML hypertext mark-up language http:// hypertext transfer protocol protocol that allows pages of text held on servers accessible via the WWW to be accessed by remote computers IBM International Business Machines ICANN Internet Corporation for Assigned Names and Numbers ICTs information and communication technologies, digital by nature, including computers and mobile phones IGF Internet Governance Forum IM internet messaging, such as MSN messenger IMP interface message processor (see Diagram 2.3). IMPs connected hosts into the early ARPANET network imperialism associated with the domination by one culture or country the colonial power of other countries or cultures, the colonies. Involves the enrichment of the imperial power by the impoverishment of the oppressed information a surprisingly ambiguous term in that, according to the semantic defnition, information is organised data with the capacity to inform people. Classic 210 a b b r e v i a t i o n s a n d g l o s s a r y information theory sees information as data; it needs to be measurable, but doesnt need to be understood to be processed, for example, by machines information revolution the process by which the material base of industrialised nations became based upon an information economy. Conceived broadly this can include libraries, education, law, administration, media. etc. Information societies were originally defned as over 50 per cent dependent upon information, and were sometimes referred to as post-industrial societies, because the industrial base was no longer judged to be the prime constituent information rich/poor as the knowledge explosion accelerates, those with access to the information produced the information rich become richer. At the same time the information gap widens between the information rich and poor (see global/isation, digital divide) information technologies especially computers, databases and telecommunications (see communications technologies) means that information societies are character- ised by a knowledge explosion, with the amount of information in the (developed) world estimated to be doubling every fve years intelligent communications system See broadband ISDN interactive the capacity of a communication medium to be altered by, or to have its products altered by, a user or audience interface the coupling of hardware and software which is negotiated by network/ computer users before they use the technology to communicate, store, retrieve or manipulate information internet an interconnecting, global-wide series of inter/national networks based on the frst ARPANET into which all computers can be connected at a cost. Stand- alone PCs can access the internet via modems (modulator-demodulators) or routers, and an appropriate software gateway/interface, to get information onto and of from the telecommunications channels. IMPs and TIPs used to serve the purposes now served by routers (see Diagram 2.3) IP internet protocol, the protocol that manages the transfer of information from one network to another via a gateway (see Diagram 2.4) IP intellectual property IPO Initial Public (stock) Ofering, a process and a document required to trans form, or foat, a privately owned company into one that is listed on the stock exchange IRC internet relay chat. Synchronous (= same time) chat over the internet using text and/or images and sound. Sometimes called simply chat IRI internationalised resource identifers, unique identifers for information which will help to structure the (anticipated) semantic web ISDN integrated switched digital network (an intelligent system). ISDN pathways utilise a variety of communications media for example, satellite and/or fbre optics a b b r e v i a t i o n s a n d g l o s s a r y 211 ISP internet service provider an organisation that sells access to the internet ISTTF Internet Safety Technical Task Force (US) IT information technology Kbps kilobits per second kinkeeping the process by which regular calls concerning everyday domestic activities and subjects bind together people who are distant from each other within reciprocal ties of caring and involvement LAN local area network (see network), but more usually applied to a clan of game- players who regularly get together and set up a LAN to play games and ex change fles LANfest a gathering of LAN clans for immersive engagement in a gaming tournament, typically over a weekend. Similarly, LAN party LANing engaged in the process of LAN playing liberalisation used to indicate the commercial marketplace will play a bigger part in regulating goods and services for example, in telecommunications Linux currently the leading open-source software platform MAD mutually assured destruction, a strategy promoted as a means for avoiding nuclear war MAKO movement against kindred ofenders, Australian organisation publicising the crimes and whereabouts of sex ofenders Mbps megabits per second meaning meanings formed by an individual or group are often revealed through analysing the myths and narratives which that group shares media diversity used both to mean a diversity of media, for example, internet, print, television, radio and diversity within a given medium, for example, a variety of diferent newspapers, and viewpoints, including minority opinions and ideas. Te internet showcases greater diversity of opinion than any other medium in history meme the smallest possible element of culture, analogous to the gene in biology microchip See electronic and microelectronic MIT Massachusetts Institute of Technology (US) MMORPGs massively multiplayer online role-playing games modem modulator-demodulators, used to transfer digital data between computers using analogue phone lines. See internet moral panic when a society or mainstream group reacts to a change in the environ- ment, as of it threatens life as we know it MS-DOS Microsoft disk operating system MSN Microsoft network MSP minimum service provision; a service so central to society that regulators work to make it universally available (sometimes USP, universal service provision), for example, telephone, television, mail 212 a b b r e v i a t i o n s a n d g l o s s a r y multimedia the use of interactive multiple media components which respond to inputs, for example, a computer program through which a user can trigger text, graphics, pictures and sound multiplexing interweaving of diferent digital elements during data transfer to achieve efciencies of communication mythology myths involve shared social understandings which help inform mem- bers of a cultural group as to the nature of that group, and to unite the group, for example, in the creation of a national identity. Sometimes associated with the suspen- sion of disbelief of something which would usefully be true, for example, equality between the sexes might be seen as mythic. Myths often work below the level of consciousness. Stories, fctions, narratives and legends frequently serve mythic ends narrative theory readers bring to an event or experience a sense of before and after required to understand the story. If an event is un-narratable. it is beyond the context of the rules and understandings which society uses to construct meaning NASA National Aeronautics and Space Administration agency (US) NASDAQ US (mainly) technology-based stock exchange NCP network control protocol, precursor of TCP/IP NES Nintendo Entertainment System (Japan) net the totality of networks, email, proprietary (for example, AOL), WWW. etc., a contraction of internet network networks come in a range of typologies and specifcations and the passage of data through diferent networks is controlled by the internet protocol (IP) newbie newcomer to the net, or to a chat room, or to a discussion area nouveau information poor people who lose access to ICTs as a result of sudden poverty or change in life circumstances; for example, unemployment, divorce NPL National Physical Laboratory (UK) NSFNET Te National Science Foundation Network (US) NTT Nippon Telegraph and Telephone (Japan) OECD Organisation for Economic Co-operation and Development ONI Open Net Initiative, an international index of freedom on the internet sponsored by Harvard, Toronto, Cambridge and Oxford Universities open source where the source code is available for any skilled person to work with a program to improve or adapt it P2P peer-to-peer paradigm a framework of understandings within which discourses are constructed and communicated. Analysing a paradigm can be the frst step to resisting or sub- verting the power of the elite whose interests that paradigm serves. A paradigm is analysable through its discourses PC IBM-compatible personal computer a b b r e v i a t i o n s a n d g l o s s a r y 213 PC bangs Korean internet caf post-industrial See information revolution POTS plain old telephone system (paired copper wires) privatisation the passing into private ownership, usually by share foat, of publicly (government) owned industries protocol a series of program commands by which sender and recipient hosts com- municate regarding the status and destination of a specifc data set to be transferred between the two machines PTT postal, telegraph and telephone service public interest when an aspect of a debate requires consideration of wider social costs and benefts than company proftability or government efciency. Citizen implies that people have certain civic rights regardless of their fnancial status and these are often honoured through public services. Customer service considers the needs of people rich enough to be customers. Te introduction of user-pays changes a public service into customer service RAND Corporation Research ANd Development Corporation, based in Santa Monica, California (US) reader one who reads, but also a term making visible the active power of the person constructing meaning and interpreting a text RFC Request for Comments, started in the development phase of ARPANET RFLAN Red Flag LAN, a specifc LANfest (Australia) RIM Research in Motion (Blackberry software, Canada) RL real life RTS Real Time Strategy, a more strategic game genre than some online gaming; for example, FPS tests fast refexes as much as strategy sci-f science fction: often used to explore social and moral issues related to technology SCOT Social Construction of Technology: a theoretical approach to the under- standing of technology and society semantic this refers to the communication of meaning. Te semantic web implies a belief that machine-understandable meaning can be built into the web and its components, such as web pages. See Web 3.0 slash erotic fan fction usually with homosexual themes SMS short message service SNS social networking sites, such as Facebook, MySpace and Bebo social determinism sees technology as expressing the priorities of the social elites which create or utilise the technology. See determinism SRI Stanford Research Institute (US) STD subscriber trunk dialling system (UK) 214 a b b r e v i a t i o n s a n d g l o s s a r y switched-packet system each message is broken into smaller packets of data with a standardised header containing information about destination and sequence for reassembly. Te header switches the packet along lines in a network which allocates bandwidth on the connecting communications cables according to the requirements of the message/data to be sent (known as dynamic allocation) TCP transmission control protocol, the protocol that manages the communica- tion of data at the sending host and the receiving host, standardising packet size, sequencing, and confrmation technological determinism constructs technology as outside social control, deter- mining future social development and direction. Media determinism is a specialist application of technological determinism to communication media telecommunications communications at a distance, usually implying cable, satellite, broadcasting spectrum, fbre optics, etc. text this need not be written, or be a media product; it can be any human/social construct, Alan Turings life say, or a car. To view such entities as texts, a reader would normally subscribe to a constructionist approach and use appropriate discursive practices to analyse meaning TIP terminal interface message processor. TIPs allowed dumb terminals to access a host built into the TIP and allowed multiple access to the ARPANET network (see Diagram 2.3) TV Television UCLA University of California, Los Angeles (US) UK United Kingdom UNESCO United Nations Educational, Scientifc and Cultural Organisation UNIVAC early, room-sized computer made by Remington Rand (US) UNIX multi-user, multi-tasking operating system used by many powerful com- puters and the basis for much open-source programming. Unix contains many sub- programs that perform network operations transparently between several machines URL uniform resource locator US United States USO universal service obligation USSR Union of Socialist Soviet Republics viral (video) viral communication is when groups of internet users are infected with an enthusiasm for some digital product to the extent that they cannot help but pass that infection on VL virtual life WAN wide area network. See network and LAN wavelength electromagnetic waves travel out in every direction from the point where they are generated. Te distance between the peaks of the waves (where the a b b r e v i a t i o n s a n d g l o s s a r y 215 electrical energy is strongest) determines the wavelength. Wavelength is related to frequency: the longer the wavelength the lower the frequency; the higher the frequency the shorter the wavelength Web 1.0 the name which has been retrospectively given to the early versions of the web Web 2.0 the development of the internet beyond the straightforward accessing of websites and fles to fostering interactivity through the use of collaborative and social media including wikis and blogs Web 3.0 more speculated than delivered, but seen as a combination of the soci- ality of Web 2.0 plus a layer of coded information carried in each element of the web which makes it meaningful to computers and other ICTs. A web which has embedding meaning accessible to computers is termed the semantic web WELL early online community: Whole Earth Lectronic Link WSIS World Summit on the Information Society WWII Second World War WWW World Wide Web; an accessible, connected, searchable, updatable web of information with elements of the whole widely dispersed among the networked computers XXX triple X-rated: Adults only REFERENCES Aaronovitch, D. (2003), Why We Love Wife Swap, Te Observer, 5 October, p. 23. ABC BB (2008), Remittances Flying Money, Background Briefng, ABC Radio National, 5 October, http://www.abc.net.au/rn/backgroundbriefng/stories/2008/2375175.htm (accessed 3 October 2009). Abraham, R. (2008), Mobile Phones and Economic Development: Evidence From the Fishing Industry in India, Information Technologies and International Development, 4(1): 517. ABS (2001), Use of the Internet by Householders, Australia. 8147.0 http://www8.abs.gov.au/ ausstats/[email protected]/PrimaryMainFeatures/8147.0?OpenDocument (accessed 3 October 2009). ABS (2008), Internet Access at Home, 4102.0 Australian Social Trends, Australian Bureau of Statistics, July, http://www.abs.gov.au/AUSSTATS/[email protected]/Lookup/ 4102.0Chapter10002008 (accessed 3 October 2009). ACMA (2007), Media and Communications in Australian Families: Report of the Media and Society Research Project, Australian Communications and Media Authority, Canberra: ACMA. http://www.acma.gov.au/webwr/_assets/main/lib101058/media_and_society_ report_2007.pdf (accessed 3 October 2009). ACMA (2008), Internet Codes Index, Australian Communications and Media Authority website, http://www.acma.gov.au/WEB/STANDARD/pc=IND_REG_CODES_INT (accessed 3 October 2009). Adler, P. S. and Kwon, S. W. (2002), Social Capital: Prospects for a New Concept, Academy of Management Review, 27(1): 1740. Aizu, I. (2003), .jp Japan, in Chin Saik Yoon (ed), Digital Review of Asia Pacifc 2003/2004, Penang: Southbound; Kuala Lumpur: Asia-Pacifc Development Information Programme, UN Development Programme; Ottawa: Pan Asia Networking Programme, International Development Research Centre; Montreal: Orbicom Network of UNESCO Chairs in Communications, pp. 1209. Albanese, A. (2009), Authors Guild Slams Amazon Over Its Google Settlement Stance: Other Groups Opt Out of Settlement, Publishers Weekly, 3 September, http://www. publishersweekly.com/article/CA6687448.html (accessed 3 October 2009). Albury, K. (2003), Te Ethics of Porn on the Net, in C. Lumby and E. Probyn (eds), Remote Control: New Media, New Ethics, Melbourne: Cambridge University Press, pp. 196211. 218 r e f e r e n c e s All your . . . (n.d.) All Your Chocolate Rain Are Belong To Us [music video], YouTube, http:// www.youtube.com/watch?v=dUyxurUWtSQ (accessed 3 October 2009). Allison, S., Wahlde, L. von, Shockly, T. and Gabbard, G. (2006), Te Development of the Self in the Era of the Internet and Role-Playing Fantasy Games, Clinical Case Conference, American Journal of Psychiatry, March, 163 (3): 3815. ALP (2007), A Computer for Every Student, Federal 07 Campaign, Australian Labor Party, http://www.alpvictoria.com.au/News-and-Media/Federal-07-Campaign/Archived-News/ A-Computer-For-Every-Student-.html (accessed 3 October 2009). Amnesty International (n.d.), Shi Tao Background, Amnesty International: Action for Human Rights. Hope for Humanity [website], http://www.amnestyusa.org/business-and-human- rights/internet-censorship/yahoo-action-background/page.do?id=1011510 (accessed 3October 2009). Anderson, B. (1991 [1983]), Imagined Communities, 2nd edn, London: Verso. Anderson, D. (2007), Max Newman: Topologist, Codebreaker and Pioneer of computing, IEEE History of the Annals of Computing, JulySept, 29 (3): 7681. Anderson, M. (1971) Sociology of the Family, Harmondsworth: Penguin. Ang, P. H. and Yeo, T. M. (1998), Mass Media Laws and Regulations in Singapore, Singapore: Asian Media Information and Communication Centre [AMICC]. Apted, M. (dir.) (2001), Enigma [Film], Miramax. Arensberg, C. M. and Kimball, S. T. (2001 [1940]), Family and Community in Ireland, 3rd edn, Clare: CLASP Press. AusAID (2007), Leveraging Remittances with Microfnance: Synthesis Report, Monash Asia Institute; Institute for regional development and University of Tasmania; Foundation for development cooperation, December, http://www.ausaid.gov.au/publications/pdf/ remittances.pdf (accessed 3 October 2009). Avaaz (2009), Avaaz: Te World in Action [website], http://www.avaaz.org/ (accessed 3October 2009). Bakardjieva, M. (2005), Internet Society: Te Internet in Everyday Life, London: Sage. Baldassar, L. (2007), Transnational Families and the Provision of Moral and Social Support: Te Relationship Between Truth and Distance, Identities: Global Studies in Culture and Power, 14: 385409. Barcan, Ruth (2002), In the Raw: Home-Made Porn and Reality Genres, Journal of Mundane Behavior, 3(1) February http://www.mundanebehavior.org/issues/v3n1/barcan. htm (accessed 3 October 2009). Barlow, J. P. (1996), A Declaration of the Independence of Cyberspace, Electronic Frontier Foundation, 8 February, http://homes.ef.org/~barlow/Declaration-Final.html (accessed 3October 2009). Barter, Peter (2002), Peter Barters open letter regarding Bill Whites Anti-Divine Word Uni campaign, VoyForums: Clown [website], http://www.asiapac.org.f/cafepacifc/resources/ aspac/clownindex2.html (accessed 3 October 2009). Battelle, J. (2006 [2005]), Te Search: How Google and its Rivals Rewrote the Rules of Business and Transformed our Culture, UK revised edn), London: Nicholas Brealey Publishing. r e f e r e n c e s 219 Baym, N. (1995), Te Emergence of Community in Computer-Mediated Communication, in S. Jones (ed.), CyberSociety: Computer-Mediated Communication and Community, Tousand Oaks: Sage, pp. 13863. BBC News (2000), Tech Stock Meltdown, Business Stories of the Year, 15 December, http:// news.bbc.co.uk/1/hi/in_depth/business/2000/review/1058175.stm (accessed 3 October 2009). BBC Newsnight (2008), Talk About Newsnight: Return of the Baghdad Blogger, Newsnight, 17 June, http://www.bbc.co.uk/blogs/newsnight/2008/06/return_of_the_baghdad_ blogger.html (accessed 3 October 2009). BBC Press Ofce (2008), Next Generation BBC iPlayer Launches, BBC Press Releases: New Media, 25 June, http://www.bbc.co.uk/pressofce/pressreleases/stories/2008/06_june/25/ iplayer.shtml (accessed 3 October 2009). BBN (2008), About BBN, BBN Technologies, Bolt Beranek and Newman Inc., [website] http://www.bbn.com/about/timeline/ (accessed 3 October 2009). Bearman, D. (2006), Jean-Nel Jeanneneys Critique of Google: Private Sector Book Digitization and Digital Library Policy (Opinion), D-Lib Magazine, 12 December (12), http://www.dlib.org/dlib/december06/bearman/12bearman.html (accessed 3 October 2009). Beavis, C. (2007), New Textual Worlds: Young People and Computer Games, in N. Dolby and F. Rizvi (eds), Youth moves, Identities and Education in Global Perspective, London: Routledge, pp. 5366. Bell, D. (1973), Te Coming of Post-Industrial Society: A Venture in Social Forecasting, New York, NY: Basic Books. Beniger, J. R. (1986), Te Control Revolution: Technological and Economic Origins of the Information Society, Cambridge, Mass: Harvard University Press. Berners-Lee, T. (with Fiscetti, M.) (1999), Weaving the Web: Te Original Design and Ultimate Destiny of the World Wide Web by its Inventor, San Francisco: Harper San Francisco. Berners-Lee, T; Hendler, J., and Lassila, O. (2001), Te Semantic Web: A New Form of Web Content that is Meaningful to Computers Will Unleash a Revolution of New Possibilities, Scientifc American, 5 (1): 2837. Bijker, W., Hughes, T. and Pinch, T. (eds) (1987), Te Social Construction of Technological Systems: New Directions in the Sociology and History of Technology. Cambridge, MA: MIT Press. Bill White exposed (n.d.), Bill White Info [website], http://bill_white1.tripod.com/ (accessed 3 October 2009). Bissio, R.R. (1990), Tird World Guide 1991/92: Te World as seen by the Tird World. Facts, Figures, Opinions, Montevideo, Uruguay: Institut del Tercer Mundo. Blackburn, C., Read, J. and Hughes, N. (2005), Carers and the Digital Divide. Factors Afecting Internet Use Among Carers in the UK, Health and Social Care in the Community, 13 (3): 20110. Blake (2004), Our Battle for Hearts and Minds, LISNews Blog/Blakes Blog, Librarian and Information Science News, 5 November, http://www.lisnews.org/node/24580 (accessed 3October 2009). 220 r e f e r e n c e s Bocij, P. (2006), Te Dark Side of the Internet: Protecting You and Your Family From Online Criminals, Santa Barbara, CA: Praeger Publishers. Bonniface, L., Green, L. and Swanson, M. (2006a), Communication on a Health-Related Website Ofering Terapeutic Support: Phase 1 of the HeartNET Intervention, Australian Journal of Communication, 33 (2,3), pp. 89108. Bonniface L., Omari A. and Swanson M. (2006b), Shufing Buddies How an Online Community Supports Healthier Lifestyle Choices: An Early Indication of Physical Activity and Exercise Outcomes from the HeartNET Intervention, in F. Sudweeks, F. H. Hrachovec and C. Ess (eds), Proceedings of the Fifth International Conference on Cultural Attitudes Towards Technology and Communication; Estonia, Tartu: School of Information Technology/ Murdoch University; pp. 90101. Bonniface, L., Green, L. and Swanson, M. (2005), Afect and an Efective Online Tera- peutic Community, M/C: A journal of Media and Culture, Afect, 8 (6), http://journal. media-culture.org.au/0512/05-bonnifacegreenswanson.php (accessed 3 October 2009). boyd, d. (2006), Friends, Friendsters, and Top 8: Writing Community into Being on Social Network Sites, First Monday, 11 (12), http://131.193.153.231/www/issues/issue11_12/ boyd/index.html (accessed 3 October 2009). Brain, M. (n.d.) How Analog and Digital Recording Works, How Stuf Works, http:// communication.howstufworks.com/analog-digital.htm/printable (accessed 3 October 2009). Branwyn, G. (1999), How the Porn Sites Do It, Te Industry Standard, 22 March, pp. 36 8, http://www.danni.com/press/industrystan_032299.html (accessed 3 October 2009). Brin, S. and Page, L. (n.d.), Te Anatomy of a Large-Scale Hypertextual Web Search Engine, Stanford: Stanford University, http://infolab.stanford.edu/~backrub/google.html (accessed 3 October 2009). Bringers (n.d.), Te Potter War Campaign, Te Bringers: Fighting For the Rights of Fans Online [website], http://web.ukonline.co.uk/bringers/temp/c-potter.html (accessed 3October 2009). Bruns, A. (2003), Gatewatching, Not Gatekeeping: Collaborative Online News, Media International Australia Incorporating Culture and Policy, May, 107: 3144. Bruns, Axel (2008a), Blogs, Wikipedia, Second Life and Beyond: From Production to Produsage, New York: Peter Lang. Bruns, Axel (2008b), News Blogs and Citizen Journalism: New Directions for e-Journalism, in K. Prasad (ed.), e-Journalism: New Directions in Electronic News Media., New Delhi: BR Publishing, http://snurb.info/fles/News%20Blogs%20and%20Citizen%20Journalism. pdf (accessed 3 October 2009). Bryan, D. (1994), Te Multilocals, Transnationals and Communications Technology, in L. Green and R. Guinery (eds), Framing Technology: Society, Choice and Change, Sydney: Allen and Unwin pp. 14560. BuddeComm (2009), Global - Key Telecoms Mobile and Broadband Statistics (6th ed), Paul Budde Communication Pty Ltd, http://www.budde.com.au/Research/Global-Key- Telecoms-Mobile-and-Broadband-Statistics.html(accessed 3 October 2009). r e f e r e n c e s 221 Bure, C. (2005), Digital Inclusion Without Social Inclusion: Te Consumption of Information and Communication Technologies (ICTs) within Homeless Subculture in Scotland, Te Journal of Community Informatics, 1 (2): 11633. Burgess, J. (2008), All Your Chocolate Rain Are Belong to Us? Viral Video, YouTube and the Dynamics of Participatory Culture, in G. Lovink and S. Niederer (eds), Te VideoVortex Reader: Responses to YouTube, Amsterdam: Institute of Network Cultures, pp. 10110 http://networkcultures.org/wpmu/portal/fles/2008/10/vv_reader_small.pdf (accessed 3 October 2009). Burgess, J. and Green, J. (2009) YouTube: Online Video and Participatory Culture, Cambridge: Polity Press. Burkeman, O. (2004), Plug Pulled on Live Website Seen by Millions, Te Guardian, 3January, http://www.guardian.co.uk/technology/2004/jan/03/usnews.internationalnews (accessed 3 October 2009). Burman, E. (2003), Shift! Te Unfolding Internet Hype, Hope and History. Chichester, UK: John Wiley and Sons. Buzan, T. and Buzan, B. (1996) Te Mind Map Book: How to Use Radiant Tinking to Maximise Your Brains Untapped Potential New York: Plume. Carey, J. (1988), Technology and Ideology: Te Case of the Telegraph. In Communication as culture, essays on media and society. London and Boston: Unwin Hyman, pp. 20130. Carr, D., Buckingham, D., Burn, A. and Schott, G. (2006), Computer Games: Text, Narrative and Play, Cambridge: Polity Press. Castells, M. (2010), Te Rise of the Network Society (rev. ed, new preface) Oxford: Wiley- Blackwell. Castells, M., Fernndez-Ardvol, M., Qui, J. L. and Sey, A. (2007), Mobile Communication and Society: A Global Perspective, Cambridge, MA: MIT Press. Cavoukian, A. (2009), Online Privacy: Make Youth Awareness and Education a Priority. Toronto: Information and Privacy Commissioner of Ontario. http://www.ipc.on.ca/ images/resources/youthonline.pdf (accessed 3 October 2009). CBC News (2009) NPD Candidate in BC Election Quits Over Racy Photos in Facebook, CBC News, 20 April, http://www.cbc.ca/canada/bcvotes2009/story/2009/04/20/bc- election-lam-facebook.html (accessed 3 October 2009). Center for Internet Addiction Recovery (2006), Cybersex/Cyberporn Addiction, Center for Internet Addiction Recovery [website], http://www.netaddiction.com/cybersexual_ addiction.htm (accessed 3 October 2009). Cerf, V. and Kahn, R. (1974), A Protocol for Packet Network Intercommunication, IEEE Transactions on Communications, May, Com22 (5): 63748. CERN (2008) How the Web Began, CERN: European Organization for Nuclear Research [website], http://public.web.cern.ch/public/en/About/WebStory-en.html (accessed 3October 2009). Ceruzzi, P. (2003), A History of Modern Computing, Cambridge MA: MIT Press. CFR (2009) About, Council on Foreign Relations [website], http://www.cfr.org/about/ (accessed 3 October 2009). 222 r e f e r e n c e s Cheal, D. J. (1988), Te Gift Economy. New York: Routledge. Chmielewski, D. (2007), Search Site Moves at the Speed of China, LA Times Business, 10 December, http://articles.latimes.com/2007/dec/10/business/f-baidu10 (accessed 3October 2009). Clegg, B. (2006), Studying Using the Web: Te Students Guide to Using the Ultimate Information Resource, Oxford: Routledge, Routledge Study Guides. Cohen, S. (1980 [1972]), Folk Devils and Moral Panics: Te Creation of the Mods and Rockers, 2nd edn, Oxford: Martin Robertson. Computer Economics (2007), Internet and Broadband Growth Accelerates Worldwide, Computer Economics: Metrics for Management, March, http://www.computereconomics. com/article.cfm?id=1206 (accessed 3 October 2009). Conroy, T. and Hanson, J. (2007), Constructing Americas War Culture: Iraq, Media and Images at Home, Lanham, Maryland: Lexington Books. Coopersmith, J. (2006), Does Your Mother Know What You Really Do? Te Changing Nature and Image of Computer Based Pornography, History and Technology, 22 (1): 125. COST 298 (n.d.), Participation in the Broadband Society [website], http://www.cost298.org/ (accessed 3 October 2009). Crawford, K. (2009), Tese Foolish Tings: on Intimacy and Insignifcance in G. Goggin and L, Hjorth, Mobile Media, Mobile Technologies: From Telecommunications to Media, Oxford: Routledge, pp. 25063. Culler, J. (2001 [1981]), Story and Discourse in the Analysis of Narrative, Te Pursuit of Signs: Semiotics, Literature, Deconstruction, London: Routledge, Routledge, Classics edn, pp. 188208. CyberAngels (2009), Homepage, CyberAngels: A Program of Guardian Angels, Keeping It Safe [website], http://www.cyberangels.org/ (accessed 4 October 2009). Dare, J. (2004), Online Defamation: A Case Study in Competing Rights, Cultural Studies Association of Australasia Annual Conference, Murdoch University, Murdoch, W.A. http:// wwwmcc.murdoch.edu.au/cfel/docs/Julie_Dare_FV.pdf (accessed 4 October 2009). Dare, J. (2005), Cyberharassment and Online Defamation: A Default Form of Regulation? Transformations, 11 (Nov), http://www.transformationsjournal.org/journal/issue_11/ article_04.shtml (accessed 4 October 2009). Dare, J. (2006), Connections in the Private Sphere: Womens Use of ICTs in Sustaining and Enriching Connections and Communion, Making and Keeping Connections: Life, Learning and Information Networks, Proceedings of the Transforming Information and Learning Conference, 30 September, Perth, Australia, pp. 6172, http://conferences.scis. ecu.edu.au/TILC2007/documents/2006/tilc2006_dare.pdf (accessed 4 October 2009). Dertouzos, M. (1999), Foreward, in T. Berners-Lee, Weaving the Web: the Original Design and Ultimate Destiny of the World Wide Web by its Inventor, New York: Harper SanFrancisco, pp. ixxi. DiMaggio, P. and Hargittai, E. (2001), From the Digital Divide to Digital Inequality: Studying Internet Use as Penetration Increases, Working Paper Series, 15, Princeton University: Center for Arts and Cultural Policy Studies, Princeton University, http://www. r e f e r e n c e s 223 princeton.edu/~artspol/workpap/WP15%20-%20DiMaggio%2BHargittai.pdf (accessed 4 October 2009). DirAP (n.d.), Digital Review of Asia-Pacifc [website], http://www.digital-review.org/ (accessed 4 October 2009). Donaldson, R. (dir.) (2000), Tirteen Days [Film], New Line Cinema. Durkin, K. and Barber, B. (2002), Not So Doomed: Computer Game Play and Positive Adolescent Development, Applied Developmental Psychology, 23: 37392. EDL Project (n.d.) About EDL project, European Digital Library Project, http://www. edlproject.eu/about.php (accessed 4 October 2009). EFF (2009), Electronic Frontier Foundation [website], http://www.ef.org/ (accessed 4 Oct- ober 2009). Endeshaw, A. (2004), Internet Regulation in China: Te Never-Ending Cat and Mouse Game, Information and Communication Technology Law, 13 (1) March: 4157. Enough Rope (2004), Salam Pax, Enough Rope with Andrew Denton, 42, ABC, 17 May http://www.abc.net.au/tv/enoughrope/transcripts/s1110359.htm (accessed 4 October 2009). Ephron, N. (dir.) (1998), Youve Got Mail [Film], Warner Bros. Ernkvist, M. and Strm, P. (2008), Enmeshed in Games with the Government: Govern- mental Policies and the Development of the Chinese Online Games Industry, Games and Culture, 3 (1): 98126. Estabrooks, M. (1995), Electronic Technology, Corporate Strategy and World Transformation, Westport, CT: Greenwood Publishing Group. EU Kids Online (n. d.), EU Kids Online [website], London: London School of Economics/ EC Safer Internet Plus Programme, http://www.eukidsonline.net/ (accessed 4 October 2009). Evangelista, B. (2003), Te Other Shared Files: Pornography. Adult Film Industry Profts from Services, SFGate/San Francisco Chronicle, 19 May http://www.sfgate.com/cgi-bin/ article.cgi?file=/chronicle/archive/2003/05/19/BU248597.DTLandtype=business (accessed 4 October 2009). Finkelhor, D. (2008), Childhood Victimization: Violence, Crime and Abuse in the Lives of Young People, New York, NY: Oxford University Press. Finkelhor, D., Mitchell, K.J., and Wolak, J. (2000), Online Victimization: A Report on the Nations Youth. Alexandria, VA: National Center for Missing and Exploited Children, http://www.unh.edu/ccrc/pdf/jvq/CV38.pdf (accessed 4 October 2009). Fisher, W. A. and Barak, A. (2001), Pornography, Erotica and Behaviour: More Questions than Answers, International Journal of Law and Psychiatry, 14: 6583. Fishkin, J., He, B., Luskin, R. and Siu, A. (2006), Deliberative Democracy in an Unlikely place: Deliberative Polling in China, Stanford University: Center for Deliberative Demo- cracy http://cdd.stanford.edu/research/papers/2006/china-unlikely.pdf (accessed 4 Oct- ober 2009). Fleming, A. and Debski, R. (2007), Te Use of Irish in Networked Communications, A Study of School Children in Diferent Language Settings, Journal of Multilingual and Multicultural Development, 28 (2): 85101. 224 r e f e r e n c e s Flickr (2009), Flickr tour, Flickr [website], http://www.fickr.com (accessed 4 October 2009). Florida, R. (2002), Te Rise of the Creative Class: And How Its Transforming Work, Leisure, Community and Everyday Life, New York: Basic Books. Fraunholz, B; Unnithan, C; and Jung, J. (2005), Tracking and Tracing Applications of 3G for SMEs, in M. Pagani (ed.), Mobile and Wireless Systems Beyond 3G, Hershey, PA: IRM Press, pp. 13054. Freeman, C. B. (2008), Internet Gaming Addiction, Te Journal for Nurse-Practitioners, 4 (1), January: 4247. Gerstner, L. (2002), Who Says Elephants Cant Dance? Inside IBMs Historic Turnaround, NY: HarperCollins. Get Up (2009), Get up! Action for Australia [website], http://www.getup.org.au/ (accessed 4October 2009). Gettys, J. (1999) Re: GNU/Linux [Blog], http://www.ussg.iu.edu/hypermail/linux/ kernel/9904.0/0497.html (accessed 4 October 2009). GNU (n.d.) Te GNU Manifesto [website], http://www.gnu.org/gnu/manifesto.html (accessed 4 October 2009). Goggin, G. (2006), Cell Phone Culture: Mobile Technology in Everyday Life, Oxford: Routledge. Google (2006), Google To Acquire YouTube for $1.65 Billion in Stock: Combination Will Create New Opportunities for Users and Content Owners Everywhere, Google Press Center, Google, 6 October, http://www.google.com/press/pressrel/google_youtube.html (accessed 4 October 2009). Google Books (n.d.) About Google Book Search, Google, http://books.google.com.au/intl/ en/googlebooks/about.html (accessed 4 October 2009). Gorman, M. (2004), Google and Gods Mind, Opinion, Los Angeles Times, B15, 17 December, http://articles.latimes.com/2004/dec/17/opinion/oe-nugorman17 (accessed 4October 2009). Gray, A. (1992), Video Playtime: Te Gendering of a Leisure Technology, London: Routledge. Green, L. (1999), Te End of the Virtual Community, M/C Journal: A Journal of Media and Culture, End, 2 (8), http://journal.media-culture.org.au/9912/virtual.php (accessed 4 October 2009). Green, L. (2001), Te Work of Consumption: Why Arent We Paid?, M/C: A Journal of Media and Culture, Work, 4 (5), http://journal.media-culture.org.au/0111/Green.php (accessed 4 October 2009). Green, L. (2002), Technoculture: From Alphabet to Cybersex, Sydney:Allen and Unwin (published concurrently as Communication, Technology and Society, London: Sage). Green, L. (2003), Attempting To Ground Ethnographic Teory and Practice, Australian Journal of Communication, 30 (2): 13345. Green, L. and Costello, L. (2009), Fractures Between an Online and Ofine Community (and the Ethical Responses), International Journal of Web-based Communities, 5 (3): 462 75. r e f e r e n c e s 225 Green, L. and Guinery, B. (2006), Play Up! Play Up! and Play the Game! Cultural Studies Association of Australasia, Canberra, 68 December, http://www.unaustralia.com/ electronicpdf/Ungreenandguinery.pdf (accessed 4 October 2009). Green, L. andGuinery, C.(2004), Harry Potter and the Fan Fiction Phenomenon, M/C: A Journal of Media and Culture, Fame, 7 (5), http://journal.media-culture.org.au/0411/14- green.php (accessed 4 October 2009). Green, L. and Holloway, D. (2004), Te Role of Everyday Life in Confounding Expectations in Communication Research, Australian Journal of Communication, 31 (2): 16784. Green, L. Holloway, D. and Quin, R. (2004), @ Home: Australian Family Life and the Internet, in G. Goggin (ed.), Virtual Nation: the Internet in Australia, Sydney: UNSW Press, pp. 88101. Green, N. (2001), Information Ownership and Control in Mobile Technologie, e-Usages Conference, June 1214, Paris. Green, N. (2009), Mobility, Memory and Identity, in G. Goggin and L.Hjorth (eds), Mobile Technologies: From Telecommunications to Media, Oxford: Routledge, Oxon, pp. 26681. Guardian (2008), China and the Internet: Te Great Firewall, Te Guardian, Monday 22 December, http://www.guardian.co.uk/commentisfree/2008/dec/22/china-internet- comment (accessed 4 October 2009). Gunther, M. (2006), Tech Execs Get Grilled Over China Business, Fortune, 16 February http://money.cnn.com/2006/02/15/news/international/pluggedin_fortune/index. htm?cnn=yes (accessed 6 October). Haas, T. (2005), From Public Journalism to the Publics Journalism? Rhetoric and Reality in the Discourse on Weblogs, Journalism Studies, 6 (3): 38796. Habermas, J. (1989a), Te Public Sphere: An Encyclopedia Article, in S. Bronner and D. Kellner (eds), Critical Teory and Society: A Reader, trans. S. Lennox and F. Lennox, New York: Routledge, pp. 13642, in M. G. Durham and D. Kellner (eds) (2005), Media and Cultural Studies: Keyworks, 2nd edn), Oxford: Wiley-Blackwell, pp. 739. Habermas, J. (1989b), Te Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society, trans. T. Burger, Cambridge, MA: MIT Press. Haddon, L. (1988), Te Home Computer: Te Making of a Consumer Electronic, Science as Culture, 2: 751, http://www.lse.ac.uk/collections/media@lse/whosWho/ LeslieHaddon/HomeComputer.pdf (accessed 6 October 2009). Haddon, L. (2000), Social Exclusion and Information and Communication Technologies: Lessons from Studies of Single Parents and the Young Elderly, New Media and Society, 2 (4): 387406. Haddon, L. (2004), Information and Communication Technologies in Everyday Life: A Concise Introduction and Research Guide, Oxford: Berg. Haddon, L. (2005), Te Innovatory Use of ICTs, in L. Haddon, E. Mante, B. Sapio, K-H Kommonen and L. Fortunati (eds), Everyday Innovators: Researching the Role of Users in Shaping ICTs, Netherlands: Springer, pp. 5466. 226 r e f e r e n c e s Haddon, L. and Stald, G. (2008), A Comparative Analysis of European Media Coverage of Children and the Internet, Association of Internet Researchers (AoIR) Annual Conference, Denmark: IT University, Copenhagen, 1619 October, http://www.lse.ac.uk/collections/ EUKidsOnline/EU%20Kids%20I/Presentations/EUKidsPressAnalysisAoIR.pdf (accessed 6 October 2009). Hafner, K. and Matthew L. (2003 [1998]), Where Wizards Stay Up Late: Te Origins of the Internet, London: Simon and Schuster. Hamilton, J. M. and Jenner, E. (2003), Te New Foreign Correspondence, Foreign Afairs, 8 (5): 131. Hartley, J. (2006), Journalism as a Human Right: Te Cultural Approach to Journalism, in M. Lofelholz and D. Weaver (Eds), Journalism Research in an Era of Globalization, London: Routledge, pp. 4050. Hasebrink, U., Livingstone, S., Haddon, L. and lafsson, K. (2009), Comparing Childrens Online Opportunities and Risks Across Europe: Cross-National Comparisons for EU Kids Online, Deliverable D3.2., 2nd edn, LSE, London: EU Kids Online, http://eprints.lse. ac.uk/24368/ (accessed 6 October 2009). Hearn, G., Mandeville, T., and Anthony, D. (1997), Te Communication Superhighway: Social and Economic Change in the Digital Age. Sydney: Allen and Unwin. Hellard, P. (2003), Cyber Victim Seeks Payout, Sunday Times, 27 July. Hendler, J. and Golbeck, J. (2008), Metcalfes Law, Web 2.0, and the Semantic Web, Web Semantics: Science, Services and Agents on the World Wide Web, 6 (1): 1420. Herz, J. C. (2002), Harnessing the Hive: How Online Games Drive Networked Innovation, Release 1.0, 18 October, 20 (9): 122. Hill, A. (2002), Big Brother, Te Real Audience, Television and New Media, August, 3 (3): 323340. Hills, M. (2002), Fan Cultures, Oxford, UK: Routledge. Hindley, R. (1990), Te Death of the Irish Language: A Qualifed Obituary, Oxford, UK: Routledge. Hine, C. (ed.) (2005) Virtual Methods: Issues in Social Research on the Internet, Oxford: Berg. Hodges, A. (1992 [1982]), Alan Turing: Te Enigma, rev. edn, London: Vintage. Holloway, D. and Green, L. (2008), Room to View: Family Television Use in the Australian Context, Television and New Media, 9 (1): 4761. Holloway, D. Green, L. and Quin, R. (2004), What Porn? Children and the Family Internet, M/C: A Journal of Media and Culture, Porn, 7(4), http://journal.media-culture. org.au/0410/02_children.php (accessed 6 October 2009). Holt, J. (2006), Code-Breaker: Te Life and Death of Alan Turing, Te New Yorker, 6 February, http://www.newyorker.com/archive/2006/02/06/060206crbo_books (accessed 3 October 2009). Horrigan, J. (2008a), Home Broadband 2008. Adoption Stalls for Low Income Americans Even as Many Broadband Users Opt for Premium Services Tat Give Tem More Speed, Pew Internet and American Life Project, July, http://www.pewinternet.org/Reports/2008/ Home-Broadband-2008.aspx (accessed 6 October 2009). r e f e r e n c e s 227 Horrigan, J. (2008b), Obamas Online Opportunities: What Our Research Suggests About Where President-Elect Obamas Technology Policy May Lead, Pew Internet and American Life Project, 4 December, http://www.pewinternet.org/Reports/2008/Obamas-Online- Opportunities.aspx (accessed 6 October). Howkins, J. (2001), Te Creative Economy: How People Make Money From Ideas. London: Penguin. Hussain, Z. and Grifths, M. (2008), Gender Swapping and Socialising in Cyberspace: An Exploratory Study, CyberPsychology and Behavior, February, 11 (1): 4753. doi:10.1089/ cpb.2007.0020. Hutchins, B. (2008), Signs of Meta-Change in Second Modernity, Te Growth of e-Sport and the World Cyber Games, New Media and Society, 10 (6): 85169. Hwang, J. S. and Park, S.-H. (2009), .kr Korea, Republic of , Digital Review of Asia-Pacifc 2009/2010, Shahid Akhtar (ed.), India: Sage; Ottawa: Pan Asia Networking Programme, International Development Research Centre; Montreal: Orbicom Network of UNESCO Chairs in Communications, pp. 23440. Hyman, S. (2003), Cyberspace. Last Frontier for Settling Scores? Los Angeles Times, 27 July. IFAD (2009a), Sending Money Home: Worldwide Remittance Flows to Developing Countries, International Fund for Agricultural Development, http://www.ifad.org/ remittances/maps/index.htm (accessed 6 October 2009). IFAD (2009b), Global Forum on Remittances 2009, International Fund for Agricultural Development, http://www.ifad.org/remittances/events/forum09.htm (accessed 6 October 2009). Indymedia (n.d.), Te Independent Media Center [website], http://www.indymedia.org/en/ index.shtml (accessed 6 October 2009). Internet World Statistics (2009), Internet World Stats [website], http://www.internetworldstats. com (accessed 3 October 2009). Ishii, K. (2004), Internet Use Via Mobile Phone in Japan, Telecommunications Policy, 28 (1): 4358. Jeanneney, J.-N. (2006), Google and the Myth of Universal Knowledge: A View From Europe, trans. T. L Fagan, Chicago: University of Chicago Press. Jenkins, H. (2004), Why Heather Can Write, Technology Review, 6 February http://www. technologyreview.com/business/13473/?a=f (accessed 3 October 2009). Jenkins, H. (2006), Convergence Culture: Where Old and New Media Collide, New York: New York University Press. Jennings, T. (2009), Global outlook for video games, [video] Insights and Analysis: Global Entertainment and Media Outlook 2009-2013, PriceWaterhouseCoopers, http://www.pwc. com/gx/en/global-entertainment-media-outlook/insights-and-analysis.jhtml (accessed 3October 2009). Jin, D. Y. and Chee, F. (2008), Age of New Media Empires: A Critical Interpretation of the Korean Online Game Industry, Games and Culture, January, 3 (1): 3858. Johnson, S. (2005), Everything Bad is Good For You, London: Penguin, Allen Lane. Johnston, J. (dir.) (1999), October Sky [Film], Universal Pictures. 228 r e f e r e n c e s Jones, B. (1995 [1981]), Sleepers, Wake! Technology and the Future of Work, 4th edn, Melbourne: Oxford University Press. Jordan, L. (2007), Te Google Book Search Project Litigation: Massive Copyright Infringe- ment or Fair Use?, Arts, Communications, Entertainment and Sports Law, Michigan Bar Journal, September: 324 http://www.michbar.org/journal/pdf/pdf4article1210.pdf (accessed 3 October 2009). Justia.com (n.d.), Featured Cases: Te Authors Guild et al. v Google, Inc, Justia.com News and Commentary, http://news.justia.com/cases/featured/new-york/nysdce/1:2005 cv08136/273913/#20081002 (accessed 3 October 2009). Kalathil, S. and Boas, T. (2003), Open Networks Closed Regimes, Te Impact of the Internet on Authoritarian Rule, Washington, DC: Carnegie Endowment for International Peace. Kasesniemi, E.-L. and Rautiainen, P. (2002), Mobile Culture of Children and Teenagers in Finland, in J. E Katz and M. A. Aakhus (eds), Perpetual Contact: Mobile Communication, Private Talk, Public Performance, New York: Cambridge University Press, pp. 17092. Kelly, K. and Rheingold, H. (1993), Te Dragon Ate My Homework, Wired, 1.03, July/ August, http://www.wired.com/wired/archive/1.03/muds.html (accessed 3 October 2009). Kennedy, T., Smith, A., Wells, A. and Wellman, B. (2008), Networked Families, October, Washington, DC: Pew Internet and American Life, http://www.pewinternet.org/ Reports/2008/Networked-Families.aspx (accessed 3 October 2009). Kenny, C. (2005) Sil Eile: Another Way of Seeing Minority Language Broadcasting, Language and Intercultural Communication, 5 (3/4): 26473. Kidder, T. (1982), Te Soul of a New Machine, London: Penguin, Harmondsworth. King, S. A. (1996),Is the Internet Addictive, or Are Addicts Using the Internet? Storm King [website], http://webpages.charter.net/stormking/iad.html (accessed 3 October 2009). Kopytof, I. (1986), Te Cultural Biography of Tings: Commoditization as a Process, in A. Appadurai (ed.), Te Social Life of Tings: Commodities in a Cultural Perspective, Cambridge: Cambridge University Press, pp. 6491. Kuhn, T. (1996 [1962]), Te Structure of Scientifc Revolutions, 3rd Edn, Chicago: University of Chicago Press. Kumar, A. (2008), Indians Abroad Send $27 bn Home to Make India Top Receiver, Taindian News, 20 March, http://www.thaindian.com/newsportal/uncategorized/ indians-abroad-send-27-bn-home-to-make-india-top-receiver_10029300.html# (accessed 3 October 2009). Kump, P. (1999), Breakthrough Rapid Reading, revised edn, New Jersey: Prentice Hall. Lampe, C., Ellison, N. and Steinfeld, C. (2006), A Face(book) in the Crowd: Social Searching vs. Social Browsing, Computer Supported Cooperative Work, Proceedings of the 2006 20th anniversary conference on Computer Supported Cooperative Work, Canada: Banf, pp. 16770. Latour, B. (1987), Science in Action: How to Follow Scientists and Engineers Trough Society, Milton Keynes: Open University Press. Layden, J. (2003), Content is King for 3G. But What Content? Te Register, 1 April, http:// www.theregister.co.uk/2003/04/01/content_is_king_for_3g/ (accessed 3 October 2009). r e f e r e n c e s 229 Lenhart, A. (2005), Protecting Teens Online, Pew Internet and American Life Project, 17 March, http://www.pewinternet.org/Reports/2005/Protecting-Teens-Online.aspx (accessed 3 October 2009). Lenhart, A., Madden, M., Macgill, A. R. and Smith, A. (2007), Teens and Social Media, Pew Internet and American Life Project, 19 December, http://www.pewinternet.org/ Reports/2007/Teens-and-Social-Media.aspx (accessed 3 October 2009). Leonard, M. (2008a), Inside Chinas New Intelligentsia, Prospect Magazine, 144 (28 March), http://www.prospect-magazine.co.uk/article_details.php?id=10078 (accessed 3October 2009). Leonard, M. (2008b), What Does China Tink? London: Fourth Estate. Lievrouw, L. and Livingstone, S. (eds) (2002), Te Handbook of New Media, London: Sage. Litwark, E. and Szelenyi, I. (1969), Primary Group Structures and Teir Functions: Kin, Neighbours and Friends, American Sociological Review, 34 (August): 46581. Livingstone, S. (1992), Te Meaning of Domestic Technologies: A Personal Construct Analysis of Familial Gender Relations, in R. Silverstone and E. Hirsh (eds), Consuming Technologies: Media and Information in Domestic Spaces, London: Routledge, pp. 11330. Livingstone, S. and Bober, M. (2005), UK Children Go Online, Economic and Social Research Council, April, http://www.citizensonline.org.uk/site/media/documents/1521_ UKCGO-fnal-report.pdf (accessed 3 October 2009). Livingstone, S. and Haddon, L. (2009), EU Kids Online: Final Report, LSE London: EU Kids Online (EC Safer Internet Plus Program Deliverable D6.5) http://eprints.lse. ac.uk/24372/ (accessed 3 October 2009. Lobe, B., Livingstone, S. and Haddon, L. (2007), Researching Childrens Experiences Online Across Countries. Issues and Problems in Methodology, LSE London: EU Kids Online (EC Safer Internet Plus Program Deliverable D4.1) http://eprints.lse.ac.uk/2856/ (accessed 3October 2009). MacKenzie, D. and Wajcman, J. (eds) (1999 [1985]), Te Social Shaping of Technology: How the Refrigerator Got Its Hum, 2nd edn, Milton Keynes: Open University Press. Madden, M. and Fox, S. (2006), Finding Answers Online in Sickness and in Health, Pew Internet and American Life Project Report, 2 May, http://www.pewinternet.org/ Reports/2006/Finding-Answers-Online-in-Sickness-and-in-Health.aspx (accessed 3 Oct- ober 2006). Maguire, E. A., Woollet, K. and Spiers, H. J. (2006), London Taxi Drivers and Bus Drivers: A Structural MRI and Neuropsychological Analysis, Hippocampus, 16: 10911101 http://193.62.66.20/Maguire/Maguire2006.pdf (accessed 3 October). Maney, K. (2003), Te Maverick and His Machine: Tomas Watson Sr. and the Making of IBM, New Jersey: John Wiley and Sons. Marcus, A. and Perez, A. (2007), M-YouTube Mobile UI: Video Selection Based on Social Infuence, in J. Jacko (ed.), Human Computer Interaction, HCI Intelligent Multimodal Interaction Environments, Berlin/Heidelberg: Springer, pp. 92632. Marshall, P. D. (1997), Technophobia: Video Games, Computer Hacks and Cybernetics, Media International Australia, 85 (November): 708. 230 r e f e r e n c e s Marvin, C. (1990), When Old Technologies Were New: Tinking About Electric Communication in the Late Nineteenth Century, New York: Oxford University Press. Masuda, Y. (1981), Te Information Society as Post-Industrial Society, (English Ed.), Bethesda, US: World Future Society. McCarthy, R. (2003), Salams Story, Te Guardian, Friday 30 May, http://www.guardian. co.uk/world/2003/may/30/iraq.digitalmedia (accessed 3 October 2009). McKee, A. (2004), Te Public Sphere: An Introduction, Melbourne: Cambridge University Press. McKee, A., Albury, K. and Lumby, C. (2008), Te Porn Report, Melbourne: Melbourne University Press. MCT (2004), Te Rise of Korean Games: Guide to Korean Game Industry and Culture, Ministry of Culture and Tourism, Seoul: Korea Game Development and Promotion Institute. Mercury (1992), Fibre Optic Technologies, Mercury Communications Ltd, August, accessed at Technology Watch http://www.gare.co.uk/technology_watch/fbre.htm (accessed 3October 2009). MIC (2007), Subscribers of High Speed Internet by Region, Seoul, Korea: Ministry of Information and Communication. Milian, M. (2008), Numa Numa Kid and Rihanna and T.I.s Hyper-Viral New Song, Los Angeles Times: Entertainment, 9 September, http://latimesblogs.latimes.com/webscout/ 2008/09/numa-numa-song.html (accessed 3 October 2009). Miller, C. C. (2008), How Obamas Internet Campaign Changed Politics, Technology BITS, New York Times, 7 November, http://bits.blogs.nytimes.com/2008/11/07/how- obamas-internet-campaign-changed-politics/ (accessed 3 October 2009). Miller, D. (1987), Towards a Teory of Consumption (chapter 10), Material Culture and Mass Consumption, Oxford: Basil Blackwell pp. 178217. Miller, D. (1994), Modernity, an Ethnographic Approach: Dualism and Mass Consumption in Trinidad, Oxford, UK: Berg. Miller, D. and Slater, D (2000), Te Internet: An Ethnographic Approach, Oxford, UK: Berg. Molyneux, G. J., McCarthy, G. M., McEnif, S., Cryan, M. and Conroy, R. M. (2008), Prevalence and Predictors of Carer Burden and Depression in Carers of Patients Referred to an Old Age Psychiatric Service, International Psychogeriatrics, 20: 11931202 doi:10.1017/S1041610208007515. Morgan, G. (2006 [1986]), Images of Organization (Rev. ed), Tousand Oaks, CA: Sage. Morley, D. (1986), Family Television: Cultural Power and Domestic Leisure, London: Routledge. Morley, D. (1995), Teories of Consumption in Media Studies, in D. Miller (ed.), Ack- nowledging Consumption: A Review of New Studies, London: Routledge, pp. 293324. Morris, S. (2004), Shoot First, Ask Questions Later: Ethnographic Research in an Online Computer Gaming Community, Media International Australia, 110 (February): 3141. Moses, A. (2008), Dont Be Evil or Dont Loose Value? Sydney Morning Herald, 15 April, http://www.smh.com.au/news/biztech/dont-be-evil/2008/04/15/1208025168177. html?page=fullpage#contentSwap1 (accessed 3 October 2009). r e f e r e n c e s 231 Move On (2008), Celebrating 10 Years of People Power, MoveOn.org Political Action [Slideshow], http://pol.moveon.org/10years/ (accessed 3 October 2009). Moyal, A. (1989), Te Feminine Culture of the Telephone: People, Patterns and Policy, Prometheus, 7 (1): 531. Moyal, A. (1995), Te Feminine Culture of the Telephone: People Patterns and Policy, in N. Heap, R. Tomas, G. Einon, R. Mason and H. Mackay, (eds), Information Technology and Society, London, UK: Sage Publications, in association with Te Open University, pp. 284310. Mullins, J. (2007), iMode: A Case Study, Te New Business Road Test: What Entrepreneurs and Executives Should Do Before Writing a Business Plan, 2nd edn, Harlow, UK: Pearson Education, pp. 2933. Murdock, G., Hartmann, P. and Gray, P. (1992), Contextualising Home Computing: Resources and Practices, in R. Silverstone and E. Hirsch (eds), Consuming Technologies: Media and Information in Domestic Spaces, London: Routledge, pp. 14660. NESTA (n.d.), National Endowment for Science, Technology and the Arts: Making Innovation Flourish [website], http://www.nesta.org.uk/about-us/ (accessed 3 October 2009). Nichols, D., Farrand, T., Rowley, T. and Avery, M. (2006), Brands and Gaming Te Computer Gaming Phenomenon and its Impact on Brands and Businesses, Basingstoke, UK: Palgrave Mcmillan. Nohe, R. (1995), A Diferent Time, a Diferent Place: Breaking up Telephone Companies in the United States and Japan, Federal Communications Law Journal, 48: 30737. Nordicom (2004), Playing with Fire: How Do Computer Games Infuence the Player?, Gothenburg University, Sweden: Nordicom, Te International Clearinghouse on Children, Youth and Media. November, A. (2008), Web Literacy for Educators, Tousand Oaks, CA: Corwin Press. ODonnell, M. (2003), Perth Academic Takes Cyberstalker to Court, 7.30 Report, ABC Television, 12 August, http://www.abc.net.au/7.30/content/2003/s922886.htm (accessed 3 October 2009). OLeary, C. (2003), Cyber-Stalker Traps Perth Lecturer in Web of Deceit, Te West Australian, (11 October): 13. ORourke, B. (2005), Expressing Identity Trough Lesser Used Languages, Examples from the Irish and Galician Contexts, Language and Intercultural Communication, 5 (3and4): 27483. OECD (2008), OECD Broadband Subscribers per 100 Inhabitants, by Technology, June 2008, Organisation for Economic Co-operation and Development, http://www.oecd.org/ dataoecd/21/35/39574709.xls (accessed 3 October 2009). Ohmori, S., Yamao, Y. and Nobuo N. (2000), Te Future Generations of Mobile Com- munications Based on Broadband Access Technologies, IEEE Communications Magazine, (December): 13442, http://www.comsoc.org/ci/public/preview/ohmori.html (accessed 3 October 2009). ONI Australia (n.d.), Australia and New Zealand, Open Net Initiative [website], http:// opennet.net/research/regions/au-nz (accessed 3 October 2009). 232 r e f e r e n c e s ONI China (n.d.), China (including Hong Kong), Open Net Initiative [website], http:// opennet.net/research/profles/china (accessed 3 October 2009). Palmer, L. (1994), Regulating Technology, in L. Green and R. Guinery (eds), Framing Technology: Society, Choice and Change, Sydney: Allen and Unwin, pp. 7790. Parreas, R. (2005), Long Distance Intimacy: Class, Gender and Intergenerational Relations Between Mothers and Children in Filipino Transnational Families, Global Networks, 5 (4): 31736. Parsons, T. (1943), Te Kinship System of the Contemporary United States, American Anthropologist (New Series), 45 (1) JanMarch: 2238. Passerini, K., Patten, K., Bartolacci, M. and Fjermestad, J. (2007), Refections and Trends in the Expansion of Cellular Wireless Services in the US and China: Charting the Evolution of Business Capabilities and Communication Technology and Standards, Communications of the ACM, 50 (10): 258. Pesce, M. (2006), Te Tags Within, Te Human Network: What Happens After Were All Connected? 7 Oct, http://blog.futurestreetconsulting.com/?p=18 (accessed 3 October 2009). Pew (2008), Teens, Video Games and Civics: Teens Gaming Experiences are Diverse and Include Signifcant Social Interaction and Civic Engagement, Pew Internet and American Life Project with the MacArthur Foundation, 16 September, http://www.pewinternet.org/ Reports/2008/Teens-Video-Games-and-Civics.aspx (accessed 3 October 2009). Pew (2009), Pew Internet and American Life Project [website], http://www.pewinternet.org (accessed 3 October 2009). Pinch, T. and Bijker, W. (1984), Te Social Construction of Facts and Artefacts: Or How the Sociology of Science and the Sociology of Technology Might Beneft Each Other, Social Studies of Science, (14) August: 399441. Pink, D. (2005), Te Book Stops Here, Wired, 13.03 (March), http://www.wired.com/ wired/archive/13.03/wiki.html?pg=1andtopic=wikiandtopic_set= (accessed 3 October 2009). Porush, D. (1998), Telepathy: Alphabetic Consciousness and the Age of Cyborg Illiteracy, in J. Dixon and E. Cassidy (eds), Virtual Futures: Cyberotics, Technology and Post-Human Pragmatism, London: Routledge, pp. 4564. Pouzin, L. (1973), Presentation and Major Design Aspects of the Cyclades Computer Network, Proceedings of the NATO Advanced Study Institute on Computer Communication Networks, Sussex, United Kingdom: Noordhof International Publishing, pp. 41534. Rakow, L. (1988), Women and the Telephone: Te Gendering of a Communications Technology, in C. Kramarae (ed), Technology and Womens Voices, New York: Routledge and Kegan Paul, pp. 20728. Rakow, L. (1992), Gender On Te Line: Women, the Telephone and Community Life, Illinois: University of Illinois Press. Raymond, E. S. (2001), Te Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary, revised edn, Sebastopol, CA: OReilly and Associates, also at http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/index. html#catbmain (accessed 3 October 2009). r e f e r e n c e s 233 Reimer, J. (2005), Total Share: 30 Years of Personal Computer Market Share Figures, Ars Technica, December 14, http://arstechnica.com/articles/culture/total-share.ars/10 (accessed 3 October 2009). RFLAN (2006), WA Red Flag LAN 16, Red Flag LAN [Unauthorised Documentary], YouTube, http://www.youtube.com/watch?v=qUMLsjGP5yY (accessed 3 October 2009). Rheingold, H. (2000 [1993]), Te Virtual Community: Homesteading on the Electronic Frontier, Cambridge, MA: MIT Press, also at http://www.rheingold.com/vc/. Rival, L., Slater, D. and Miller, D. (1998), Sex and Sociality: Comparative Ethnographies of Sexual Objectifcation, Teory, Culture and Society, 15 (34): 295321. Roberts, L. (1967), Multiple Computer Networks and Intercomputer Communication, http:// www.packet.cc/fles/multi-net-inter-comm.html (accessed 3 October 2009). Roberts, L. (1978), Te Evolution of Packet Switching, http://www.packet.cc/fles/ev-packet- sw.html (accessed 3 October 2009). Rogers, E. (2003 [1962]), Difusion of Innovations, 5th edn, New York: Simon Schuster. Rogers, E. and Larsen, J. (1984), Silicon Valley Fever: Growth of High-Technology Culture, New York: Basic Books. Rooksby, E., and Weckert, J. (Eds.), (2007), Information Technology and Social Justice. Hershey, PA.: Information Science Publishing. Rosenberg, M. (2009), Te Number of Countries in the World, About.com: Geography, http://geography.about.com/cs/countries/a/numbercountries.htm. Roszak, T. (1994), Te Cult of Information: A Neo-Luddite Treatise on High Tech, Artifcial Intelligence and the True Art of Tinking, California: University of California Press. Rotunda, R. (n.d.), Legal Analysis: On the Facts, Google Perspectives [website], http://www. google.com/googlebooks/legal.html (accessed 3 October 2009). Ryf, C. Schmutte, P. and Lee, Y (1996), How Children Turn Out: Implications for Parental Self-Evaluation, in C. Ryf and M. Saltzer (eds), Te Parental Experience in Midlife, Chicago: University of Chicago Press, pp. 383422. Schifman, L. Bednall, D. Watson, J. and Kanuk, L. (1997), Consumer Behaviour, Sydney: Prentice Hall. Schiller, H. (1991), Not Yet the Post-Imperialist Era, Critical Studies in Mass Communication, 8 (1) March: 1328. Schiller, H. (2000), Living in the Number One Country: Refections from a Critic of American Empire, New York, NY: Seven Stories Press. Schonfeld, E. (2009), Watch Out Google, Obamas Antitrust Chief is Looking to Make an Example out of You, TechCrunch, 11 May, http://www.techcrunch.com/2009/05/11/ watch-out-google-obamas-antitrust-chief-is-looking-to-make-a-big-case/ (accessed 3 October 2009). Schrock, A. and boyd, d. (2008), Online Treats to Youth: Solicitation, Harassment and Problematic Content, Appendix C: Research Advisory Board Literature Review, Enhancing Child Safety and Online Technologies, http://www.danah.org/papers/ISTTF- RABLitReview.pdf (accessed 3 October 2009). Silverstone, R. (1994), Television and Everyday Life, London: Routledge. 234 r e f e r e n c e s Silverstone, R. and Haddon, L. (1996), Design and the Domestication of Information and Communication Technologies: Technical Change and Everyday Life, in R. Silverstone and R. Mansell (eds), Communication by Design. Te Politics of Information and Communication Technologies, Oxford: Oxford University Press, pp. 4474. Silverstone, R., Hirsch, E. and Morley, D. (1992), Information and Communication Tech- nologies in the Moral Economy of the Household, in R. Silverstone and E. Hirsch (eds), Consuming Technologies: Media and Information in Domestic Spaces, London: Routledge, pp. 1531. Singel, R. (2009), Te Fight Over the Google of All Libraries: A Wired.com FAQ, Wired: Epicenter, 30 April, http://www.wired.com/epicenter/2009/04/the-fght-over-the-worlds- greatest-library-the-wiredcom-faq/ (accessed 3 October 2009). Skeldon, P. (2002), Sex and the City: It Is the US Adult Services Industry Currently Making the Most Money from Broadband, UK: Communications International, 1 October: 1825. SNS Safety (2008), Enhancing Child Safety and Online Technologies, Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of the State Attorneys General of the United States, Harvard: Internet Safety Technical Task Force, 14 January, http://cyber.law.harvard.edu/pubrelease/isttf/ (accessed 3 October 2009). Somerville, P. (1998), Explanations of Social Exclusion: Where Does Housing Fit In?, Housing Studies, 13 (6): 761780. Staksrud, E., Livingstone, S., Haddon, L. and lafsson, K. (2009), What Do We Know About Childrens Use of Online Technologies? 2nd edn, A Report on Data Availability for the EC Safer Internet Plus programme, EU Kids Online, London, UK. http://eprints.lse. ac.uk/24367/ (accessed 3 October 2009). Stone, A. R. (1991), Will the Real Body Please Stand Up? in M. Benedikt (ed.), Cyberspace: First Steps, Cambridge: MIT Press, pp. 81118, http://molodiez.org/net/real_body2.html (accessed 3 October 2009). Streeter, T. (2003), Te Romantic Self and the Politics of Internet Commercialization, Cultural Studies, 17(5): 64868. Stvilia, B., Twidale, M., Smith, L. and Gasser, L. (2008), Information Quality Work Org an isation in Wikipedia, Journal of the American Society for Information Science and Technology, 59 (6): 9831001. Sugar Quill (n.d.) Te Sugar Quill [website], http://www.sugarquill.net/index.php (accessed 3 October 2009). Sussman, M. B. (1965), Relationships of Adult Children With Teir Parents in the United States, in E. Shanas and G. Streib (eds), Social Structure and the Family: Generational Relations, Englewood Clifs, NJ: Prentice Hall, pp. 6292. Swisher, K. (2003), Tere Must be a Pony in Here Somewhere: Te AOL Time Warner Debacle and the Quest for the Digital Future, New York, New York: Tree Rivers Press. r e f e r e n c e s 235 Tancer, B. (2007), YouTube and Google: Quantifying the Synergy, Hitwise Intelligence, 29 January, http://weblogs.hitwise.com/bill-tancer/2007/01/youtube_and_google_ quantifying.html (accessed 3 October 2009). Tapscott, D. and Williams, A. (2006), Wikinomics: How Mass Collaboration Changes Every- thing, London: Atlantic Books. Techtree (2008), Facebook: Largest, Fastest Growing Social Network, Techtree News, 13 August, http://www.techtree.com/India/News/Facebook_Largest_Fastest_Growing_ Social_Network/551-92134-643.html (accessed 3 October 2009). Tey Work For You (2009), Are your MPs and Peers Working for You in the UKs Parliament? TeyWorkForYou, [website], http://www.theyworkforyou.com/ (accessed 3 October 2009). Tomas, A. (2006), Fan Fiction Online: Engagement, Critical Response and Afective Play Trough Writing, Australian Journal of Language and Literacy, 29 (3): 22639. Tompson, C. (2005), Te BitTorrent Efect, Wired, 13.01 (January) http://www.wired. com/wired/archive/13.01/bittorrent.html?pg=2andtopic=bittorrentandtopic_set= (accessed 3 October 2009). Tosenberger, C. (2008), Homosexuality at the Online Hogwarts: Harry Potter Slash Fanfction, Childrens Literature, 36: 185207. Turing, A. (1936), On Computable Numbers, With an Application to the Entscheid- ungsproblem, Proceedings of the London Mathematical Society, series 2, (42): 23065, http://plms.oxfordjournals.org/cgi/reprint/s2-42/1/230.pdf (accessed 3 October 2009). Twittervision (n.d.) Twittervision, [Website] http://www.twittervision.com/ (accessed 3October 2009). UN (2009), United Nations Member States, United Nations, http://www.un.org/members/ list.shtml (accessed 3 October 2009). UNESCO (2002), Universal Declaration on Cultural Diversity http://unesdoc.unesco.org/ images/0012/001271/127160m.pdf (accessed 3 October 2009). van Dijk, J. A. G. M. (2005), Te deepening divide: Inequality in the Information Society. Tousand Oaks, CA: Sage. Vise, D. A. (2006), Te Google Story: Inside the Hottest Business, Media and Technology Success of Our Time, London: Pan Books. Voss, G. (2007), Te Dynamics of Technological Change in a Socially Stigmatised Sector, DRUID (Danish Research Unit for Industrial Dynamics) Winter Conference, 257 January, http://www2.druid.dk/conferences/viewpaper.php?id=1072andcf=10 (accessed 3October 2009). Vossen, G. and Hagemann, S. (2007), Unleashing Web 2.0: From Concepts to Creativity, Burlington, MA: Morgan Kaufmann. Wajcman, J. (1991), Feminism Confronts Technology, Sydney: Allen and Unwin. Wajcman, J. (1994), Technological A/Genders: Technology, Culture and Class, in L. Green and R. Guinery (eds), Framing Technology: Society, Choice and Change, Sydney, Allen and Unwin, pp. 314. 236 r e f e r e n c e s Wajcman, J. (2004), Technofeminism, Cambridge: Polity Press. Walsh, J. (2001), Language, Citizenship and National Identity, Language and Citizenship, London: LSE Language Centre, London School of Economics, pp. 14, 24 October. Wang, T. Wu, L. and Lin, Z. (2005), Te Revival of Mozilla in the Browser War Against Internet Explorer, ACM International Conference Proceeding Series, vol. 113, Proceedings of the 7th international conference on Electronic commerce, China: Xian, pp. 15966. Warschauer, Mark (2003), Technology and Social Inclusion: Rethinking the Digital Divide, Cambridge MA: MIT Press. WB Press Release (2008), India Top Receiver of Migrant Remittances in 2007, Followed by China and Mexico, World Bank Press Ofce, 19 March. Weber, T. (2006), Now on YouTube: Googles Gamble, BBC News, 10 October, http:// news.bbc.co.uk/1/hi/business/6036023.stm (accessed 3 October 2009). Weise, Elizabeth (2001), Potter is Still the Muggles Domain, Cyberspeak, USA Today, 24 April, http://www.usatoday.com/tech/columnist/cceli000.htm (accessed 3 October 2009). Whitlock, G. (2007), Soft Weapons: Autobiography in Transit, Chicago: University of Chicago Press. Widyanto, L. and Grifths, M. (2007), Internet Addiction: Does It Really Exist? (Re- visited). in J. Gackenbach (ed), Psychology and the Internet: Intrapersonal, Interpersonal, and Transpersonal Implications 2nd edn, Amsterdam: Elsevier/Academic Press, pp. 12749. Wikipedia Salam Pax (n.d.), Salam Pax, Wikipedia, the Free Encyclopedia [website], http:// en.wikipedia.org/wiki/Salam_Pax (accessed 3 October 2009). Wilbur, S. (1997), An Archaeology of Cyberspaces: Virtuality, Community, Identity, in D. Porter (ed.), Internet Culture, New York: Routledge, pp. 522, http://project. cyberpunk.ru/idb/archeology_of_cyberspace.html (accessed 3 October 2009). Wired (2005), Feds Urge Delay for .XXX Domain, (Associated Press), Wired, 16 August, http://www.wired.com/techbiz/it/news/2005/08/68545 (accessed 3 October 2009). Wired Safety (n.d.) Wired Safety: Te Worlds Largest Internet Safety, Help and Education Resource [website], http://www.wiredsafety.org/index.html (accessed 3 October 2009). Wohl, A. (2006), How We Process Words: Te Marketing of WP Software, IEEE Annals of the History of Computing, OctoberDecember, 28 (4): 8891. Wolak, J. Finkelhor, D. and Mitchell, J. K. (2004), Internet-Initiated Sex Crimes Against Minors: Implications for Prevention Based on Findings from a National Study, Journal of Adolescent Health 35 (5): 424.e11424.e20. Wolak, J. Mitchell, J. K and Finkelhor, D. (2003), Escaping or Connecting? Characteristics of Youth Who Form Close Online Relationships, Journal of Adolescence, 26: 10519. Wolak, J. Mitchell, J. K and Finkelhor, D. (2006), Online Victimization of Youth: Five Years Later, Alexandria, VA: National Center for Missing and Exploited Children, #07-06-025, http://www.unh.edu/ccrc/pdf/CV138.pdf (accessed 3 October 2009). Wolf, G. (2004), Weapons of Mass Mobilization, Wired, 12.09, September, http://www. wired.com/wired/archive/12.09/moveon.html (accessed 3 October 2009). Wong, J. and Nah S. L. (2001), Chinas Emerging New Economy: Te Internet and e-Commerce, Singapore: Singapore University Press/World Scientifc. r e f e r e n c e s 237 World Bank (2008), Migration and Development Brief 8, 11 November, http:// siteresources.worldbank.org/INTPROSPECTS/Resources/334934-1110315015165/ MD_Brief8.pdf (accessed 3 October 2009). Ybarra, M. and Mitchell, J. K. (2004), Youth Engaging in Online Harassment: Associations with Caregiver-Child Relationships, Internet Use and Personal Characteristics, Journal of Adolescence, 27: 31936. Ybarra, M. and Mitchell, J. K. (2008), How Risky Are Social Networking Sites? A Comparison of Places Online Where Youth Sexual Solicitation and Harassment Occurs, Paediatrics, 121 (2): e350e357. Yin, R. K. (2003 [1984]), Case Study Research: Design and Methods (3rd ed.), Tousand Oaks, CA: Sage. Young, M. and Willmott, P. (1957), Family and Kinship in East London, London: Routledge and Kegan Paul. Zetter, K. (2010), Google to stop censoring search results in China after hack attack, Wired, 12 January, http://www.wired.com/threatlevel/2010/011google-censorship-china/#Replay (accessed 6 February 2010). Zonday, Tay (n.d.), Chocolate Rain [Music Video], YouTube, http://www.youtube.com/ watch?v=EwTZ2xpQwpA (accessed 3 October 2009). 3G technologies, 612, 94, 205 Academic writing, 122, 125 Access, 2, 5, 7, 14, 167, 19, 21, 22, 29, 339, 41, 43, 45, 47, 48, 50, 52, 55, 60, 6572, 76, 78, 85, 91, 94, 1047, 111, 119, 132, 1345, 145, 148, 166, 175, 1802, 18690 Access for carers, 77 Access rate predictors, 170 Access, see also Childrens access ACMA, see Australian Communications and Media Authority Actor-Network Teory, 2, 1012, 18, 178, 206 Administrator rights, 153 Adolescent sexuality, 152 Adopters, 10, 74 Adopters, see also Early adopters ADSL, see Asymmetrical Digital Subscriber Line Adult entertainment, 1045, 1079 Adult sites, 35, 36, 109, 215 Adult Verifcation System, 109, 149, 206 Advanced Research Projects Agency (United States), 9, 2021, 31, 46, 206 Advertising, 878, 104, 109, 143, 188 in new media, 188 in old media, 188 Algorithms, 37, 867, 205 All your chocolate rain are belong to us, 1356, 185 Amateur pornography, 108, 110 Amazon, 88, 89, 161 Amnesty International, 24, 37, 53 Analogue technologies, 5, 42, 567, 205, 207, 211 AOL (America Online), 3, 13, 106, 109, 206, 212 Appropriation of technology, 11, 108, 159, 172 Armed Forces, see Elites ARPANET, 202, 2832, 467, 206, 20910, 2134 see also DARPANET Asymmetrical Digital Subscriber Line, 58, 205 AT&T (American Telephone & Telegraph), 734, 206 AtanasofBerry Computer, 23, 45 ATMs, see Automatic teller machines Audience participation, 160 Australian Communications and Media Authority, 49, 1656, 205 Australian Research Council, 153, 206 Automatic Computing Engine, 457, 205 Automatic teller machines, 7, 58, 94, 174, 206 Autonomy, see National autonomy; Personal autonomy Baidu, 80 BBN, see Bolt, Beranek and Newman BDP, see Big Dikk Pimpz, Bebo, 94, 213 Berners-Lee, Tim, 17, 23, 325, 90, 92 Beta reading, 1489, 153 Big Brother (television program), 109, 121, 160, 226 Big Dikk Pimpz, 145, 206 Big Dikk Pimpz Represent!!1, 135137 BitTorrent, 58, 89, 93, 107, 206 Blackberry, 93, 213 Blogs and blogging, 3, 5, 72, 74, 801, 86, 8990, 945, 1214, 131, 133, 137, 139, 1456, 157, 162, 164, 215 Bolt, Beranek and Newman, 212, 29, 31, 206 Bondage, dominance and sadomasochism, 149, 206 Bourgeoisie, 1201 Brain analogy for internet, 102, 178, 1857 INDEX Tis index has avoided, where possible, terms beginning with internet, virtual, cyber and online. For example: Internet access is listed as Access; Online games and gaming as Games and gaming; Virtual community as Community; and Cyber stalking as Stalking. i n d e x 239 Brain-changing, 1856 Brin, Sergey, 36, 126 Broadband access, 57, 80, 170 Broadband IDSN, 206, 210 Broadband services, 578, 678 Korean, 142 Broadband take-up, 57, 67, 723 Broadcast culture, 45 BT (British Telecom), 59, 206 Bureaucracy, see Elites Business computing, 223, 34 Cable television, 5, 58, 62, 81, 171, 214 Capacity to pay, 105 Capitalism as control, 80 Card games, 143 Carers internet use, 15, 748, 181 Case study research, 3, 124, 178 CDA, see Communications Decency Act (United States) Censorship in China, 512, 80 of pornography, 105 CERN, 324, 206 Chat, 3, 48, 512, 80, 823, 102, 106, 110, 139, 1601, 1634, 1667, 170, 181, 210, 212 Child pornography, 48 Childrens access, 166, 16871 Childrens online experiences, 100, 163, 165 Chinas economy, 55 Chinese Academy of Social Sciences, 53, 206 Chocolate rain (Music video), 1356, 185 Citizen journalism, 945, 1214, 131 Civil liberties, 43, 105, 121, 129 Cold War, 18, 20, 41 Collaboration, 1, 10, 12, 29, 34, 40, 467, 72, 8990, 93, 100, 103, 131, 144, 147, 151, 158, 1789, 1879, 215 Collaborative learning, 151 Collaborative spaces, 1538 Collective expertise, 102, 187 Commercial imperialism, 802 Commercial risk, 101 Communications Decency Act (United States), 130, 206 Communications technologies, see Information and communication technologies Communities, 3, 8, 14, 16, 40, 60, 72, 1078, 110, 129, 135, 137, 13942, 153, 160, 169, 173, 1825, 189 Community, 10, 156, 55, 72, 967, 100, 1346, 13958, 160, 178, 1824, 187, 215 accessibility, 158 availability, 184 formation, 96, 148, 169, 185 research, 140, 153 service obligation, 60, 207 Compatible Time Sharing System, 30, 207 Computer gaming, see Games and gaming Computing, see Business computing; Domestic computing Conduct risks, 162, 167, 180, 182, 189 Connectivity, 212, 61, 72, 92, 148, 154, 175, 181, 187 Connectivity rates in Japan, 94 Connectivity, see also Wireless connectivity Construction of meaning, 2, 6, 38, 92, 99100, 1023, 137, 160, 188, 2078, 2115 Consumers, see Consumption Consumption, 2, 13, 183, 185, 190, 207 privacy, 104 theory, 1011, 96, 178 Consumption of technology, see Consumption Contact risk, see Harassment Content risk, 100, 117, 180, 182 Convergence of digital technologies, 3, 4, 15, 18, 56, 147, 207 Conversion of new technology, 11, 15960, 1723, 183 see also Domestication of technology framework Copyright law, 856 Corporate Power, see Elites CPU (Central processor unit), 144, 207 Credit cards, 7, 109, 149 Cross-selling, 109, 161 Cross-subsidisation, 60, 207 of telecommunications services, 60 Cuban missile crisis, 20, 24, 41 Cullen, Trevor, 1126, 118 Cultural diversity, 121 Cultural imperialism, 67, 80, 86, 189, 206, 209 see also Soft imperialism Cultural maintenance, 186 Cultural products, 121 Cultural self-defence, 81 Culturally specifc content, 186 Culture change, 121 Culture maintenance, 186 Customising the internet, 7998 Cyber harassment, see Harassment Cyber predators, see Predators Cyber stalking, see Stalking Cybercafs, 106 Cyberporn addiction, 111 240 i n d e x Cyberspace defnition, 207 Cyclades (France), 301, 207 Daily Prophet, 14951 Data transfer, 56, 212 Databases, 67, 40, 1267, 134, 210 Declaration of the Independence of Cyberspace, 15, 130 Defamation, 15, 97, 1127, 130, 187 Defense Advanced Research Projects Agency (United States), 31 Determinism, 8, 207, 2134 Dial up access, 20, 578, 67, 80, 170 Dial up users, 734 Difusion of Innovations Teory, 74, 172 Digital divide, 45, 62, 6578, 181, 207, 210 in India, 62 in the United Kingdom, 75 Digital freedom rating, 49 Digital freedom, see Freedom Digital inclusion, see Inclusion Digital inequality, see Inequality Digital information, see Information Digital literacy, 52, 101 Digital natives, 65 Digital Object Identifers, 923 Digital subscriber lines, 57, 207 see also Asymmetric digital subscriber lines Digital workforces, 52, 180 Digitisation, 207 Discourse analysis, 99103, 1178, 2079, 212 Distributed Collaborators, see Elites Distributed networks, 10, 21, 246, 135 DoCoMo (Japan), 94, 207 Domestic computing, 23, 37, 61, 170 Domestic games and gaming, 145, 182 Domestication of technology framework, 1011, 18, 159, 178, 183 Dot.com crash (2000), 38 Dumbing down of media content, 121 Dynamic allocation techniques, 21, 214 Early adopters, 61, 105, 169, 172 Early majority innovators, 74, 172 Education and internet use, 12, 159, 180 Educational status and internet use, 169 EFF (Electronic Frontier Foundation), 121, 12930, 137, 207 Efects research, 51, 96, 104, 167, 185, 208 Electronic technology, see Technology Elites, 912, 43, 178, 2123 Email, 3, 7, 29, 56, 701, 74, 80, 823, 8990, 945, 135, 139, 161, 164, 166, 181, 212 Emotional engagement in community, 141 English language primacy, 81, 834, 86, 186 ENIAC, 23, 208 Enjoyment, 90, 150, 168 Entertainment, 1001, 159, 1701, 182 Environments, 35 Erotica, 152 EU Kids Online, 100, 164, 181, 208 European Community Safer Internet Plus Programme, 100, 208 European Digital Library, 889 Everyday Innovators, see Elites Everyday life, see Real life Eyewitness accounts, 123, 128 Facebook, 3, 79, 81, 89, 945, 97, 99, 137, 164, 213 Falun Gong, 523 Families, 140, 178 as communities, 183 as creators, 182 as innovators, 168, 173, 182 Family life, 15976 Family regulation of internet use, see Regulation of childrens internet use Family relationship maintenance, see Kinkeeping Family research, 140 Fan communities, see Fandom Fan fction communities, 1479, 151, 153, 182, 185, 208 Fan fction moderators, 153 Fan fction writers, 141, 1512, 179 Fandom, 41, 136 Fanon dissent, 1512 Fanzines, 147, 208 Fibre optics, 31, 578, 20910, 214 Fibre to the home, 57, 209 Fibre to the node, 57, 209 Fibre to the premises, 57, 209 File sharing protocol, 89, 106, 134, 145, 206 File Transfer Protocol, 34, 208 Filters and fltering, 49, 52, 55, 94, 106, 111, 123, 145, 164 Firefox, 3, 40, 80 First person shooter (FPS) games and gaming, 143, 147, 158, 179, 2089, 213 Flickr, 72 Folksonomies, 912 Francophone resistance to English, 15 Francophonie, 856 Free market economies, 43, 55, 179 Freedom of choice, 49 Freedom of information, 178 i n d e x 241 Freedom of speech, 1156, 199, 121, 12930, 188 Friendster, 93, 96 Frontier mythologies, 129, 178 see also Electric Frontier Foundation (EFF) FTP, see File Transfer Protocol Gaelic League, 812 see also Irish Gaelic Gambling online, 50, 61 Games and gaming, 3, 1011, 23, 401, 51, 57, 61, 80, 99, 1012, 107, 137, 1407, 152, 158, 1658, 1701, 17980, 182, 206, 2113 addiction, 1678 clan members, 1467 communities, 1447, 164 Korean, 1425, 147 see also Domestic games and gaming Gatekeepers and gatekeeping, 123, 187, 209 Gates, Bill, 19, 267 Gender swapping in games and gaming, 180 Gendered diferences, 12, 16, 389, 67, 71, 73, 77, 103, 113, 121, 152, 15861, 166, 17881, 185, 209 Gift economies, 41, 157 Globalisation, 173, 20910 GNU, 40, 209 Google, 3, 9, 19, 27, 368, 523, 80, 84, 868, 115, 125, 128, 1334, 186 AdWords, 87 Books, 81, 856, 88, 97, 125, 128 in China, 53 company foat, 37 Maps, 38 PageRank algorithm, 37, 87, 126 Scholar, 1258 Gross domestic product, 209 Korea, 142 Moldova, 174 Tajikistan, 174 Hackers, 401, 146 Harassment, 1001, 1124, 1179, 130, 165, 180, 182, 187 Harassment of children, 165 Hardware, 1920, 22, 267, 35, 41, 71, 79, 108, 146, 210 Harry Potter, 136, 185, 209 fan community, 1478 fan fction, 149 see also Potter universe; Potter War Header, see Packet header HeartNet, 142, 152 administrative structure, 153 community, 154 competitor site, 156 confict, 1547, 159 moderation, 154 negative reciprocity, 157 terms and conditions, 153 Heavy regulation, 50, 68 Heterarchy, 40, 923, 209 Hierarchy, 51, 91, 93, 107, 166, 171, 209 HIV/AIDS, 113, 209 Homelessness, 15, 6971 in Scotland, 6971, 78, 181 Host computer, 289, 312, 1089, 115, 209, 2134 HTML (Hypertext Markup Language), 34, 209 HTTP (Hypertext Transfer Protocol), 33, 209 Hub and spoke systems, 245 Human rights, 43, 52, 130 Hybrid technologies, 45, 94 IBM, 19, 213, 27, 35, 133, 186, 209, 212 ICANN, see Internet Corporation for Assigned Names and Numbers ICTs, see Information and communication technologies Identity theft, 113 IGF, see Internet Governance Forum iMode (Japan), 89, 94 Imperialism, see Cultural imperialism; Soft imperialism Inclusion, see Social inclusion Incorporation, 11, 15960, 172, 183 Inequality, 69, 712, 77 Information, 57, 15, 31, 52, 567, 77, 87, 2067, 209 Information and communication technologies, 57, 56, 62, 6971, 78, 140, 159, 1612, 177, 1834, 186, 207, 20911 in Scotland, 70, 78 Information delivery, 57 Information diversity, 121 Information overload, 100 Information packets, 22, 24, 26, 31, 214 see also Packet switching Information poor, 69, 75, 78, 212 Information revolution, 206, 210 Information rich, 210 Information society, 207 see also World Summit on the Information Society Information sources, 56, 94, 126, 1289 242 i n d e x Information technologies, see Information and communication technologies Information validity, 1224 Informed consent in research, 101, 153 Innovation and innovators, 9, 19, 27, 37, 434, 46, 48, 74, 106, 108, 110, 162, 1689, 1723, 175, 180, 1823 Instant messaging, 3, 74, 95, 107, 110, 139, 166 Instrumental use of technology, 1601 Intellectual property, 108, 150, 152 Interface message processor, 28, 30, 209, 214 International Network Working Group, 31 Internationalised Resource Identifers, 92, 210 Internet, 3, 99, 177, 210, 212 access, see Access addiction, 16, 50, 111, 1623, 1678, 175, 182 adoption by families, 169 communities, see Communities community, see Community constantly reinvented, 1, 178 as educational environment, 101 as entertainment, 101 as escape, 182 as fast developing medium, 189 future of the, 4, 189 as heroic story, 19 history, 1942 as multi-brained organism, 187 as organism, 186 policy in Australia, 4950 in China, 501 in Singapore, 50 pornography, see Pornography as pornography delivery mechanism, 104 protocol, 324, 210, 212 regulation, see Regulation as repressive militaristic plan, 103 safety, see Safety as supportive environment, 185 take-up, 2, 66, 80, 101, 148, 168, 190 use by children, 16970 use by family members, 159, 181 use for education, 181 Internet cafes, 142 in Korea, see PC bangs Internet Corporation for Assigned Names and Numbers, 356, 209 Internet Explorer, 3, 27, 37, 80 Internet Governance Forum, 36, 209 Internet Industry Association (Australia), 49 Internet Relay Chat, see Chat Internet Safety Task Force, 211 Internet Safety Technical Task Force, 113, 164, 211 Internet Service Provider (ISP), 49, 52, 57, 80, 115, 117, 211 Internet World Statistics, 657 Interviews, 13 Intrinsic use of technology, 1601 iPhone, 94 Iraq War reporting, 1223 IRC, see Chat Irish bilingualism, 82 Irish Gaelic language, 81, 84 Irish language internet communication, 182 content, 84 ISDN (Integrated switched digital network), see Broadband ISDN Jeanneney, Jean-Nel, opinions, 878 JenniCam, 109 Julie (Online persona), 124, 154 Jurisdiction over new media, 187 over old media, 187 Kinkeeping, 1612, 179, 181, 211 Kinship networks, 140 Kopytof, Igor, 1834 Laggard innovators, 74, 172 LAN clans, 182 LAN culture, 142, 144 LANers, 144 Australia, 145 Malaysia, 144, 146 LANfests, 107, 146, 211 Language communities, 186 Languages, 812, 857, 89, 91, 140, 182 Languages threatened, 84, 186 LANing, 211 LANing communities, 107, 146, 160, 185, Korean, 141 LANs, 171, 211 Laptop use, 1701 Late majority innovators, 74, 172 Lawver, Heather, 1501 Lead users, 172 Legislation, 100 Light touch regulation, 489 Linux, 401, 211 Local area networks, see LANs Location services, 94 Long tail of internet participation, 65 i n d e x 243 Male gamers, 143 Marginalisation, 69, 151 Mash-ups, 136 Massively Multiplayer Online Role Playing Games, 1423, 180, 211 McGraw-Hill v. Google, 85 Media efects research, see Efects research Media literacy, 1623 Medical information sharing, 153 Memes, 1356, 185, 211 Metadata, 91 Metaphors for organisations, 102 Micro-fnance remittances, see Remittances Micro-moments, see Twitter Microelectronic technologies, 208 Microsoft, 19, 268, 35, 41, 53, 186, 211 Migrant workers, 173 Military origins of the internet, 201 Military strategies, 178 Mind mapping, 17 Minimum service provision, 211 Minority languages, see Languages threatened Mobile access, 61, 71, 935, 166, 174, 182 Mobile phone adoption in China, 62 in India, 62 Mobile phone banking, 1745 Mobile phones, 69 as indicators of social status, 701 Mobile technologies, 61 Mobile technologies for underdeveloped countries, 62 Mobility of access, 934 Modems, 57 Moderation, 153 see also Administrator rights Monitoring the internet, 48 Monopolies, 19 Moral panics, 2, 165, 182, 188, 210 Movement Against Kindred Ofenders (Australia), 112, 211 MoveOn.org, 13940 MSN, 27, 211 Mumbai attacks, Wikipedia coverage, 133 Mutually Assured Destruction (MAD), 20, 211 MySpace, 72, 79, 946, 134, 213 Napster, 106, 134 Narrative construction of the internet, 99 Narrative theory, 212 NASA (National Aeronautics and Space Administration) (United States), 20, 212 NASDAQ, 80, 212 National autonomy, 52, 130 National Center for Supercomputing Applications, 34 National Physical Laboratory (United Kingdom), 30, 456, 212 National policy and the internet, 188 National Science Foundation Network, 32, 212 Netscape demise, 88 Network Control Protocol, 29, 212 Network redundancy, 24 Network stability, 1112 Networked computers, 24 Networks, 1112, 178, 212 Networks of infuence, 172 Networks, see also Distributed networks Neutrality of technologies, 12 New media, 1, 1778, 1878 see also Old media Newbies, 146, 212 News media, 123 Nintendo Entertainment System (NES), 1434, 212 Nuclear families, see Families Obama presidential campaign, 139 Objectifcation of technology, 15960, 1723 Ofensive material, 52, 115, 149 Old media, 1879 Online communities, see Communities Online defamation, see Defamation Online games and gaming, see Games and gaming Online risks, 162, 164 Open Net Initiative, 50, 212 Open source code, 3, 401, 58, 80, 1312, 146, 212, 214 Opinion leaders, 89, 160, 169, 172, 1823, 1889 Opportunities, 100 Packet header, 24, 26, 28, 214 Packet switching, 26, 31, 46, 214 Page, Larry, 367, 126 PageRank algorithm, see Google PageRank algorithm Paradoxes, 92, 105 Parental regulation of childrens internet use, see Regulation of childrens internet use Participatory culture, 135 Pax, Salam (Pseudonym) literature search, 1228, 131 PC, 22, 267, 34, 94, 210, 212 PC bangs, 142, 1445, 147, 213 Peer groups, 160, 165, 169 244 i n d e x Peer-reviewed articles, 1256, 188 Peer-to-peer fle sharing, 58, 89, 1067, 134, 212 Personal autonomy, 70, 130, 145, 164, 168 Personal computing, 23 Pervasiveness of internet, 2 Pew Internet and American Life Project, 724, 77, 165 Physical community, 184 Pimping machines, 146 Ping rates, 146 Plain Old Telephone System, 568, 213 Policy, 4364 formation processes, 523 terms, 190 Political aspects of technology adoption, 178 Political dissent in China, 54 Political movements, 140 Political systems as metaphor, 102 Porn as driver for adoption of new technologies, 1056 Porn industry, 1078 business links, 107 intellectual property, 108 trade shows, 107 Pornography, 50, 99118, 120, 130, 180, 208 24/7 access, 104 accessed through work computers, 105 consumer attitudes, 104 consumers as desirable advertising demographic, 104 as content risk, 101, 117, 180 creation, 180 as degradation of women, 104 delivery mechanisms, 103, 106 as driver of internet service investment, 180 and internet uptake, 1056, 180 as killer app, 103 as private activity, 105 searches, 1067 stigma associated with, 105 without consent, 111 and YouTube, 137 see also Amateur pornography Potter universe, 148 Potter, Harry, see Harry Potter Potter War (potterwar.org.uk), 150 Power and powerlessness, 7, 12 in the family, 165, 167 Predators, 50 Print culture, 45 Privatisation, 213 Privilege, 12, 43, 67, 130 Pro-ams, 40, 177 Produsers, 132, 177 Prosumer videos, 136 Prosumers, 13, 41, 72, 131, 1334, 1513, 162, 177 Psychiatric evaluation of gamers, 1678 Public culture, 121 Public interest, 213 Public opinion, 11920 Public sphere, 11938, 159, 187 Public sphere fragmentation, 121 Punch card processors, 223 Queer communities, 121, 152 Queuing theory, 22, 24 RAND Corporation, 24, 213 Reactive policies, 44 Reader judgment of internet content, 187 Reading techniques, 167, 34 see also Beta reading Real life, 1, 13, 41, 104, 111, 141, 158, 162, 213 Real time strategy, 147, 213 Reasoning public, 119 Red Flag LAN, 146, 213 Regulation, 434, 4750, 601, 68, 100, 130, 178, 189 in Australia, 55 of childrens internet use, 162, 164, 1667, 1712, 1812 in China, 50, 68, 130 in the home, 51, 162, 171, 182 in Singapore, 51 in United States, 130 see also Heavy regulation; Light touch regulation Relationship contexting, 96 Relevant social groups, see Elites Reliable information, 122 Remittances, 16, 71, 162, 1735, 183 Reputations, 41, 101, 112, 1157, 125, 1878 Request for comments, 29, 47, 213 Rheingold, Howard, 102, 141, 154, 165, 185, 187 Right of reply, 115, 117 Risks for children, 163 of childrens use of the internet, 163 of internet use, 188 RL, see Real life Safety, 100, 113 Salam Pax, see Pax, Salam Same-sex relationships, 151 i n d e x 245 Satellite communications, 58 Sci-f games and gaming, 180 SCOT, see Social construction of technology Search engines, 36 Search software, 36 Searches for information, 67, 1229 Second Life, 3, 72 Sega, 143 Self-exploration, 96 Self-mending frameworks, 186 Self-regulation in free market economies, 48 Semantic Web, 15, 78, 89, 923, 97, 189, 210, 213 Sexual content, 101 Skills recognition, 168 Slash fction, 1512, 213 communities, 152 Smart phone games and gaming, 143 SMS, see Texting Social actors and internet use, 186 Social benefts of ICT use, 159 Social capital, 967, 142, 157, 185 Social construction of technologies, 2, 1011, 38, 178, 184, 213 Social constructionism, 9 Social constructionist framework, 178 Social determinism, 9, 213 Social elites, 11 Social history of objects, 1834 Social identity, 10 Social identity formation, 11, 39, 148, 186 Social impact of the internet, 186 Social inclusion, 701 Social interaction enhanced by mobile phone access, 94 Social justice, 140 Social media, 139 Social networking, 3, 80, 89, 93, 95, 97, 134 Social overlay, 90 Social shaping of technologies, 2, 7, 10 Socialisation of online users, 173 Socio-economic aspects of internet use, 169, 1823 Soft imperialism, 801, 209 Software, 22, 267 Solicitation, 165, 180 Speccing, 146 Spiders, 36 Sputnik launch, 20 Stalking, 99118, 187 Standing Committee of Attorneys-General Defamation Working Group, 117 Stanford Linear Accelerator Center, 34 Stanford Research Institute, 21, 213 Stranger danger, 163 Study techniques, 17 Subscriber trunk dialling, 56, 213 Sugar Quill, 1489, 151 Surveys, 13 Switched packet systems, 21, 214 Synchronous activity, 110, 205, 210 Tagging, 901 Taste cultures, 90, 121 Taxonomies, 91 Technical terminology, 190 Technological challenges faced by women, 39 Technological competence as a male construct, 39 Technological determinism, 8, 214 Technological infrastructure, 3 Technological innovations, 168 see also Innovations Technologies, 39 and disempowerment, 7 as drivers of social change, 7 and elites, 9 emerging, 38 inherently bad?, 8 and the speed of change, 7 as results of social processes, 9 Technology, 178, 208 aspirations, 172 as masculine culture, 3, 19, 389 skill development, 147 take-up, 43, 74, 171 use within communities, 183 use within families, 183 use within society, 183 Technonationalism in China, 512 Telecommunications, 56, 214 deregulation, 57, 59, 61 liberalisation, 5961 monopolies, 5961 policy, 45, 55 privatisation, 55, 5961 Telecommuting, 173 Television, 1, 2, 4, 56, 135, 171, 20810 see also Cable television Terminal Interface Message Processor, 2930, 214 Texting, 10, 82, 95, 213 Texting in Irish, 834 Time spent on the internet, 162, 167, 171 Time spent using media, 162 Transition as metaphor, 102 Transmission Control Protocol, 323, 214 Triangulation of research, 13 246 i n d e x Turing, Alan, 457, 63 Twilight, 185 Twitter, 72, 81, 95 UNESCO, 81, 214 Union of Soviet Socialist Republics (USSR), 20, 214 United States Department of Defence, 21 UNIVAC, 21, 214 Universal Declaration on Cultural Diversity, 81 Universal service obligation, 60, 214 University of California, Los Angeles (UCLA), 21, 29, 214 Upselling, 109 URL, 334, 923, 214 User agency, 178 User interface, 36 User-driven development agenda, 178 Validity of internet communication, 1234 Victim support, 114 Video games and gaming, see Games and gaming Videotape technologies, 171 Violent pornography, 50, 111, 147, 149, 208 Viral marketing, 89, 135, 214 Viral videos, 1356, 185, 214 Virtual domestic environments, 161 Voice data, 56 Wales, Jimmy, 1312 Warner Brothers, 1501 Web 1.0, 4, 90, 215 2.0, 45, 72, 79, 81, 8990, 924, 967, 131, 187, 189, 215 3.0, 4, 78, 89, 923, 213, 215 browsers, 27, 334, 37, 401, 80, 90, 172 content, 92, 131 domains, 150 libraries, 86 Web-based community, 97 Webcams, 109 WELL, 102, 129, 215 Western politics, Chinese views, 54 White, Bill, 1126 Wikipedia, 3, 15, 72, 89, 93, 121, 124,126, 1289, 1314, 137, 146, 188 Wikis, 5, 10, 80, 131, 133, 137 Windows, 27, 37, 40 Wireless access, 20, 61, 68, 171, 182 Wireless connectivity, 166 Wireless take-up, 143 Women, as consumers of pornography, 104 Word of mouth marketing, see Viral marketing World Cyber Games, 143 World of Warcraft, 3, 142, 167 World Summit on the Information Society, 36, 215 World Wide Web, 3, 323, 215 see also Web Worst-case scenarios, 158 XXX websites, see Adult websites Yahoo, 36, 38, 523, 80, 91 in China, 53 Young peoples use of the internet, 100 Youth culture, 121 YouTube, 15, 37, 40, 72, 8990, 96, 121, 1337, 146, 188
(Studies in Violence, Mimesis & Culture) Duane Armitage - Philosophy's Violent Sacred - Heidegger and Nietzsche Through Mimetic Theory-Michigan State University Press (2021)
(Routledge Focus - Disruptions - Studies in Digital Journalism) Steen Steensen, Oscar Westlund - What Is Digital Journalism Studies - Routledge - Taylor & Francis Group (2020)