scholarly journals Transformative Readings: Harry Potter Fan Fiction, Trans/Queer Reader Response, and J. K. Rowling

Author(s):  
Jennifer Duggan

AbstractThe politics of children’s literature and the actors surrounding it have never been more visible than they are now, in the digital age. As one of the first children’s series to gain widespread popularity concurrently with the spread of the internet, the Harry Potter septet arrived on the global stage at the perfect moment to develop an avid, connected fandom. But the fandom has laid bare the many conflicting ideologies of the fans themselves and of the actors surrounding the texts. This article examines the contentious issue of gender nonnormativity and its relation to the Harry Potter texts, the queer/trans reading practices and political resistance common to the fandom, and the ongoing disagreements over gender, made visible on social media, between Rowling and the fans of her series. The article discusses the Harry Potter novels’ varied and conflicting ideologies; queer/trans readings of the Potter septet, including both invitations and resistances to queer/trans reading by Rowling herself; how gender is queered and queried in and through fan fiction; and finally, the recent hostilities between Rowling and her fans. It concludes by discussing the worsening relationship between Rowling and her fans and highlighting how fans are using their collective power to undermine Rowling’s gender politics through fan fiction. By doing so, the article traces the complex politics of the reception of books for young people in the digital age, demonstrating that authors’ powerful voices continue to shape readers’ responses to texts long after their publication but showing, too, that readers often resist authors’ attempts to influence not only their textual interpretations but their politics.

2016 ◽  
Vol 20 (3) ◽  
pp. 253-269 ◽  
Author(s):  
Natalia Samutina

This article focuses on fan fiction as a literary experience and especially on fan fiction readers’ receptive strategies. Methodologically, its approach is at the intersection of literary theory, theory of popular culture, and qualitative research into practices of communication within online communities. It characterizes fan fiction as a type of contemporary reading and writing. Taking as an example the Russian Harry Potter fan fiction community, the article poses a set of questions about the meanings and contexts of immersive reading and affective reading. The emotional reading of fan fiction communities is put into historical and theoretical context, with reference to researchers who analysed and criticized the dichotomy of rational and affective reading, or ‘enchantment’, in literary culture as one of the symptoms of modernity. The metaphor of ‘emotional landscapes of reading’ is used to theorize the reading strategies of fan fiction readers, and discussed through parallels with phenomenological theories of landscape. Among the ‘assemblage points of reading’ of fan fiction, specific elements are described, such as ‘selective reading’, ‘kink reading’, ‘first encounter with fan fiction texts’ and ‘unpredictability’.


2020 ◽  
Vol 12 (1) ◽  
pp. 40
Author(s):  
Tri Lestari ◽  
Imam Riadi ◽  
Rusydi Umar

AbstractThe digital age is a sign of the progress of the internet that has made everything easy and fast. Tix Id is one of the many e-commerce applications that have developed in the digital age. This application requires that consumers are satisfied with promotions and services. Even though the Tix Id application already provides the best service, there are still some customers who feel unsatisfied using the application, a problem that often occurs is that there is often a one-sided ticket booking cancellation by Tix Id, the transaction process has been successfully carried out, besides that the consumer is also harmed by Tix's complaints My ID-consumer refunds remain reduced, and there are also often errors that contain seats not available. One way to optimize this application in the transaction process, namely by improving the information infrastructure, before improving the technology infrastructure, security analysis will be done first by using the intrusion detection system (IDS) [1], and this IDS is the process of finding active solutions suspicious on a system or network so that it can be identified the cause that occurs in the Tix Id application transaction process. The results obtained from this study are errors that often occur in Tix Id applications can not be identified whether it is an attack or not, but this research has resulted in the design of the need to optimize network security in Tix Id applications.Keywords: Security, Transactions, Tix Id, Intrusion Detection System (IDS), SnortAbstrakEra digital merupakan tanda kemajuan internet yang menyebabkan semua menjadi mudah dan cepat. Tix Id adalah salah satu dari sekian banyak aplikasi e-commerce yang berkembang di era digital. Aplikasi ini berusaha agar konsumen merasa puas dengan promosi dan pelayanan. Meskipun aplikasi Tix Id sudah berusaha memberikan pelayanan terbaik namun masih ada beberapa konsumen yang merasa kurang puas menggunakan aplikasi tersebut, masalah yang sering terjadi adalah sering terjadi pembatalan pemesanan tiket sepihak oleh Tix Id padahal proses transaksi sudah berhasil dilakukan, selain itu konsumen juga merasa dirugikan ketika pihak Tix Id me-refund konsumen namun saldo konsumen tetap berkurang, dan juga sering terjadi error yang berisi pesan kursi tidak tersedia. Salah satu cara untuk mengoptimasi aplikasi tersebut kususnya dalam proses transaksi, yaitu dengan memperbaiki infrastruktur teknologi informasi, sebelum diperbaiki infrastruktur teknologinya, akan dilakukan terlebih dahulu analisis keamanan dengan menggunakan metode intrusion detection system (IDS) [1], dimana IDS ini merupakan proses untuk mendeteksi aktivias mencurigakan pada sebuah sistem atau jaringan sehingga dapat diketahui penyebab kesalahan yang terjadi pada proses transaksi aplikasi Tix Id. Hasil yang diperoleh dari penelitian ini adalah kesalahan yang sering terjadi pada aplikasi Tix Id belum dapat teridentifikasi apakah merupakan serangan atau bukan, namun penelitian ini telah menghasilkan rancangan kebutuhan untuk mengoptimalisasi keamanan jaringan pada aplikasi Tix Id.Kata Kunci: Keamanan, Transaksi, Tix Id, Intrusion Detection System (IDS), Snort


2019 ◽  
Vol 3 (1) ◽  
pp. 83
Author(s):  
Prita Haryani

The e-safety parenting socialization activity aims to provide knowledge about patterns of childcare in the digital era in using smartphones, especially the use of the Internet. The socialization activities were attended by 38 participants fromTrayeman village, Plered, Bantul. The method used is lecture and question and answer. Socialization material is distributed in the form of material handouts. The implementation of e-safety parenting is getting a good response. The participants were enthusiastic in listening to lectures from the speakers. This can be seen from the many questions raised related to childcare patterns in the digital age in using smartphones, especially Internet usage. After participating in this socialization, the participants of the socialization have understood the potential or risks of children using the Internet, tips on using the Internet wisely and knowing the procedures and techniques for the prevention of negative content on the Internet. Socialization participants can also practice the steps of using the Secure Parental Control App on their smartphone. It is hoped that by taking part in the socialization of e-safety parenting, they will discuss the negative impacts of using gadgets and direct the use of these gadgets for positive activities.


Author(s):  
Tarek El-Ariss

Focusing on the Internet as a space of regression and harassment following the Arab uprisings, this chapter traces the violence perpetrated against Arab authors, activists, and intellectuals online to the emergence of fiction as hyperreality principle. Investigating the relation between reading practices and knowledge production, and continuing the examination of the function of the author as leaking subject in the digital age, it focuses on the act of fragmenting the work itself through online campaigns and perverse literary performances. Specifically, it examines a hashtag campaign—in fact, a hashtag ghazwa (tribal raid)—launched on Twitter against a Saudi author, Badriah Albeshr [al-Beshr] (b. 1967), who was accused of apostasy for passages in her novel Hend and the Soldiers (2010).


2014 ◽  
Vol 17 ◽  
Author(s):  
Vera Cuntz-Leng

Among the large group of Harry Potter fans who write their own stories about the boy wizard, his friends, and his foes, and publish them on the Internet, some are interested in the exploration of the erotic and romantic bond between identical twins. Because the Harry Potter saga features two sets of identical twin pairs of different gender—the Weasley brothers and the Patil sisters—the series not only provides a unique playground for the recipients in terms of the possibilities for twincest stories; more importantly, it offers ample opportunity for researchers to examine how fans actually use such pairings. In this essay, the examination of twin relationships as portrayed within Rowling's works, the movies, and in twincest fan fiction are confronted with each other to outline how Rowling's different concepts of the sibling pairs and the author's general ongoing interest in doubling motifs is consistently expanded by fan fiction writers to discuss the complex relationship between source and fan text.


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


2016 ◽  
Vol 7 (2) ◽  
pp. 111-124
Author(s):  
Alexander Pschera

"Neben der Industrie hat die Digitalisierung auch die Natur ergriffen. Die Tatsache, dass Tausende von Tieren mit GPS-Sendern aus- gerüstet und überwacht werden, erlaubt, analog zur Industrie 4.0 auch von einer Natur 4.0 zu sprechen. Dieses Internet der Tiere verändert den Begriff, den der Mensch von der Natur hat. Er transformiert die Wahrnehmung vor allem der Natur als etwas fundamental An- deren. Neben den vielen kulturellen Problematisierungen, die das Internet der Tiere mit sich bringt, lassen sich aber auch die Umrisse einer neuen, ganz und gar nicht esoterischen planetarisch-post-digitalen Kultur aufzeigen, die die conditio humana verändert. In addition to industry, digitalization has also taken hold of nature. The fact that thousands of animals are provided and monitored with GPS transmitters allows to speak of nature 4.0 by way of analogy to industry 4.0. This internet of animals changes our idea of nature. Most of all, it transforms the perception of nature as something fundamentally other. Beside the many cultural problems that the internet of animals implies, it can also outline a new, not at all esoteric planetary post-digital culture that is about to change the human condition. "


2020 ◽  
Author(s):  
Kunal Srivastava ◽  
Ryan Tabrizi ◽  
Ayaan Rahim ◽  
Lauryn Nakamitsu

<div> <div> <div> <p>Abstract </p> <p>The ceaseless connectivity imposed by the internet has made many vulnerable to offensive comments, be it their physical appearance, political beliefs, or religion. Some define hate speech as any kind of personal attack on one’s identity or beliefs. Of the many sites that grant the ability to spread such offensive speech, Twitter has arguably become the primary medium for individuals and groups to spread these hurtful comments. Such comments typically fail to be detected by Twitter’s anti-hate system and can linger online for hours before finally being taken down. Through sentiment analysis, this algorithm is able to distinguish hate speech effectively through the classification of sentiment. </p> </div> </div> </div>


2021 ◽  
pp. 146144482110186
Author(s):  
Gianfranco Polizzi

This article proposes a theoretical framework for how critical digital literacy, conceptualized as incorporating Internet users’ utopian/dystopian imaginaries of society in the digital age, facilitates civic engagement. To do so, after reviewing media literacy research, it draws on utopian studies and political theory to frame utopian thinking as relying dialectically on utopianism and dystopianism. Conceptualizing critical digital literacy as incorporating utopianism/dystopianism prescribes that constructing and deploying an understanding of the Internet’s civic potentials and limitations is crucial to pursuing civic opportunities. The framework proposed, which has implications for media literacy research and practice, allows us to (1) disentangle users’ imaginaries of civic life from their imaginaries of the Internet, (2) resist the collapse of critical digital literacy into civic engagement that is understood as inherently progressive, and (3) problematize polarizing conclusions about users’ interpretations of the Internet as either crucial or detrimental to their online engagement.


Designs ◽  
2021 ◽  
Vol 5 (3) ◽  
pp. 42
Author(s):  
Eric Lazarski ◽  
Mahmood Al-Khassaweneh ◽  
Cynthia Howard

In recent years, disinformation and “fake news” have been spreading throughout the internet at rates never seen before. This has created the need for fact-checking organizations, groups that seek out claims and comment on their veracity, to spawn worldwide to stem the tide of misinformation. However, even with the many human-powered fact-checking organizations that are currently in operation, disinformation continues to run rampant throughout the Web, and the existing organizations are unable to keep up. This paper discusses in detail recent advances in computer science to use natural language processing to automate fact checking. It follows the entire process of automated fact checking using natural language processing, from detecting claims to fact checking to outputting results. In summary, automated fact checking works well in some cases, though generalized fact checking still needs improvement prior to widespread use.


Sign in / Sign up

Export Citation Format

Share Document