scholarly journals Under Her Eye: Digital Drag as Obfuscation and Countersurveillance

2019 ◽  
Vol 17 (5) ◽  
pp. 681-698
Author(s):  
Harris Kornstein

Among drag queens, it is common to post screenshots comically highlighting moments in which Facebook incorrectly tags their photos as one another, suggesting that drag makeup offers a unique method for confusing facial recognition algorithms. Drawing on queer, trans, and new media theories, this article considers the ways in which drag serves as a form of informational obfuscation, by adding “noise” in the form of over-the-top makeup and social media profiles that feature semi-fictional names, histories, and personal information. Further, by performing identities that are highly visible, are constantly changing, and engage complex forms of authenticity through modes of camp and realness, drag queens disrupt many common understandings about the users and uses of popular technologies, assumptions of the integrity of data, and even approaches to ensuring privacy. In this way, drag offers both a culturally specific framework for conceptualizing queer and trans responses to surveillance and a potential toolkit for avoiding, thwarting, or mitigating digital observation.

Koneksi ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. 493
Author(s):  
Dhiya Fauziani Hediana ◽  
Septia Winduwati

In current digital era, the development of technology in the world are getting more advanced and rapid. The existence of new media provides an open space for individuals to convey or receive information. One of them, a Queer who see new media as a space for expression, such as self disclosure. The limited space in the public that encourages individuals queer self disclosure through digital communication in new media, namely social media Instagram. This purpose of this study is to find out how the self disclosure of one of a Queer on social media Instagram. The analysis is based on the theory of interpersonal communication with reference which according to the concept of self disclosure and social media theory. The study conducted using a qualitative descriptive approach with case study method on the Instagram account @kaimatamusic. The findings result of this study are informant able to open up herself by sharing her work, sexual identity, ideas, activities and open attitudes to the others on an Instagram account. Even so, there are some personal information that she did not share such as romantic partners and families Di era digital saat ini, perkembangan teknologi di dunia semakin maju dan pesat. Kehadiran media baru memberikan ruang keterbukaan individu untuk menyampaikan ataupun menerima informasi. Salah satunya, individu queer yang melihat media baru sebagai ruang untuk berekspresi, seperti melakukan pembukaan diri (self disclosure). Adanya keterbatasan ruang di publik yang mendorong individu queer melakukan penyingkapan diri (self disclosure) melalui komunikasi digital di media baru yaitu media sosial Instagram. Tujuan dari penelitian ini adalah untuk mengetahui bagaimana pembukaan diri salah satu individu Queer di media sosial Instagram. Analisa dilandaskan pada teori komunikasi antarpribadi dengan referensi yang mengacu pada konsep pembukaan diri (self disclosure) dan teori media sosial. Penelitian dilakukan menggunakan pendekatan deskripsi kualitatif dengan metode studi kasus pada akun Instagram @kaimatamusic. Temuan yang dihasilkan dalam penelitian ini adalah informan dapat membuka diri dengan membagikan  hasil karya, identitas seksual, ide dan gagasan, aktivitas serta sikap yang terbuka dengan orang lain di akun Instagram. Meskipun demikian, ada beberapa informasi pribadi yang ia tidak bagikan seperti pasangan romantis dan juga keluarga.


2020 ◽  
Vol 26 (1) ◽  
pp. 151-156
Author(s):  
Andrei Șandor

AbstractSince the emergence of Internet and social media, new Intelligence branches have flourished, like CYBERINT (Cyber Intelligence), OSINT (Open Source Intelligence) or SOCMINT (Social Media Intelligence), with the aim to exploit different dimensions of the virtual world. These Intelligence-related disciplines may inquire personal information, statements and conversations posted voluntarily on websites or social platforms in order to profile people, identify social networks and organizational structures, and uncover vulnerabilities and threats/risks that can jeopardize the security of individuals or organizations. In this respect, the Internet - as environment - can provide valuable information from both technical and social side. This is why the World Wide Web is and will remain an important place to search for data and information that can be processed into Intelligence, and represents the reason why people working in sensitive domains (e.g. Intelligence) should be aware of their vulnerabilities and the risks and threats posed by this environment.DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence.


2020 ◽  
Vol 12 (17) ◽  
pp. 7081 ◽  
Author(s):  
Athapol Ruangkanjanases ◽  
Shu-Ling Hsu ◽  
Yenchun Jim Wu ◽  
Shih-Chih Chen ◽  
Jo-Yu Chang

With the growth of social media communities, people now use this new media to engage in many interrelated activities. As a result, social media communities have grown into popular and interactive platforms among users, consumers and enterprises. In the social media era of high competition, increasing continuance intention towards a specific social media platform could transfer extra benefits to such virtual groups. Based on the expectation-confirmation model (ECM), this research proposed a conceptual framework incorporating social influence and social identity as key determinants of social media continuous usage intention. The research findings of this study highlight that: (1) the social influence view of the group norms and image significantly affects social identity; (2) social identity significantly affects perceived usefulness and confirmation; (3) confirmation has a significant impact on perceived usefulness and satisfaction; (4) perceived usefulness and satisfaction have positive effects on usage continuance intention. The results of this study can serve as a guide to better understand the reasons for and implications of social media usage and adoption.


Religions ◽  
2021 ◽  
Vol 12 (6) ◽  
pp. 449
Author(s):  
Timur Badmatsyrenov ◽  
Elena Ostrovskaya ◽  
Fyodor Khandarov ◽  
Innokentii Aktamov

The paper presents the results of a study that implemented a mixed methods approach to explore the question of correlation between online and offline activities of Buddhist organizations and communities in Russia. The research was carried out in 2019–2020 and addressed the following key issues: How do Buddhist websites and social media communities actually interact with offline organizations and Russian-speaking Buddhist communities? How do the ideological specifics of Buddhist organizations and communities influence their negotiations with the Internet and strategies towards new media technologies? Within the methodological frame of the religious–social shaping of technology approach by Heidi Campbell, we used the typology of religious digital creatives to reveal the strategies created by the Russian-speaking Buddhist communities developing their own identity, authority, and boundaries by means of digital technologies. In the first stage, we used quantitative software non-reactive methods to collect data from social media with the application of mathematical modeling techniques to build a graph model of Buddhist online communities in the vk.com social network and identify and describe its clusters. The second stage of the research combined biographical narratives of Buddhist digital creatives and expert interviews.


2016 ◽  
Vol 10 (1) ◽  
pp. 87-98 ◽  
Author(s):  
Victoria Uren ◽  
Daniel Wright ◽  
James Scott ◽  
Yulan He ◽  
Hassan Saif

Purpose – This paper aims to address the following challenge: the push to widen participation in public consultation suggests social media as an additional mechanism through which to engage the public. Bioenergy companies need to build their capacity to communicate in these new media and to monitor the attitudes of the public and opposition organizations towards energy development projects. Design/methodology/approach – This short paper outlines the planning issues bioenergy developments face and the main methods of communication used in the public consultation process in the UK. The potential role of social media in communication with stakeholders is identified. The capacity of sentiment analysis to mine opinions from social media is summarised and illustrated using a sample of tweets containing the term “bioenergy”. Findings – Social media have the potential to improve information flows between stakeholders and developers. Sentiment analysis is a viable methodology, which bioenergy companies should be using to measure public opinion in the consultation process. Preliminary analysis shows promising results. Research limitations/implications – Analysis is preliminary and based on a small dataset. It is intended only to illustrate the potential of sentiment analysis and not to draw general conclusions about the bioenergy sector. Social implications – Social media have the potential to open access to the consultation process and help bioenergy companies to make use of waste for energy developments. Originality/value – Opinion mining, though established in marketing and political analysis, is not yet systematically applied as a planning consultation tool. This is a missed opportunity.


Author(s):  
Pete Bennett ◽  
Julian McDougall

This volume re-imagines the study of English and media in a way that decentralises the text (e.g. romantic poetry or film noir) or media formats/platforms (e.g. broadcast media/new media). Instead, the authors work across boundaries in meaningful thematic contexts that reflect the ways in which people engage with reading, watching, making, and listening in their textual lives. In so doing, the volume recasts both subjects as combined in a more reflexive, critical space for the study of our everyday social and cultural interactions. Across the chapters, the authors present applicable learning and teaching strategies that weave together art works, films, social practices, creativity, 'viral' media, theater, TV, social media, videogames, and literature. The culmination of this range of strategies is a reclaimed 'blue skies' approach to progressive textual education, free from constraining shackles of outdated ideas about textual categories and value that have hitherto alienated generations of students and both English and media from themselves.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


2012 ◽  
Vol 9 (4) ◽  
pp. 378-393 ◽  
Author(s):  
Alice Marwick

People create profiles on social network sites and Twitter accounts against the background of an audience. This paper argues that closely examining content created by others and looking at one’s own content through other people’s eyes, a common part of social media use, should be framed as social surveillance. While social surveillance is distinguished from traditional surveillance along three axes (power, hierarchy, and reciprocity), its effects and behavior modification is common to traditional surveillance. Drawing on ethnographic studies of United States populations, I look at social surveillance, how it is practiced, and its impact on people who engage in it. I use Foucault’s concept of capillaries of power to demonstrate that social surveillance assumes the power differentials evident in everyday interactions rather than the hierarchical power relationships assumed in much of the surveillance literature. Social media involves a collapse of social contexts and social roles, complicating boundary work but facilitating social surveillance. Individuals strategically reveal, disclose and conceal personal information to create connections with others and tend social boundaries. These processes are normal parts of day-to-day life in communities that are highly connected through social media.


2012 ◽  
Vol 5 (1) ◽  
pp. 37-50 ◽  
Author(s):  
Geraldine O’Mahony ◽  
Jo Ellen Fair

The process of post-conflict reconstruction in Liberia involves an array of actors vying for power. Many of the key political and civic figures involved are former warlords, whose reigns of terror affected many they now work with and serve. By reframing themselves through social media these warlords have created new centers of power, embracing their new roles as public servants and renouncing past acts of terrorism. This article focuses on two of Liberia’s most notorious former warlords, Prince Johnson and Joshua Blahyi. Johnson, now Senator Johnson, was best known for swilling beer while he conducted the video-taped torture of President Doe. Joshua Blahyi, formerly General Butt Naked, who infamously drank children’s blood before running naked into battle, is now a born-again preacher with his own faith-based NGO. We argue that their use of social media has enabled them to reconstruct and reframe their ‘past lives’, ensuring these cannot become political liabilities.


2015 ◽  
Vol 44 (1) ◽  
pp. 12-21 ◽  
Author(s):  
Andrea Copeland

Abstract This article explores the possibility that public libraries can be repositories for digital community archives. The overarching goal is to establish a case for public libraries’ developing digital community archives that are participatory and which emphasize born-digital items rather than digitized physical items. This discussion follows my own research and experience in this area to include personal information management, social media and the personal archive, and the accidental community archive, and demonstrates that public libraries can focus on communities’ current events and people rather than solely on those from the past.


Sign in / Sign up

Export Citation Format

Share Document