Digital Technologies of the Self edited by Yasmine Abbas and Fred Dervin.

Similar documents
Write a Persuasive Essay

Updating to remain the same: Habitual new media [Book Review]

Methodology. Ben Bogart July 28 th, 2011

Steps for Writing a History Paper

Write an Opinion Essay

New developments in the philosophy of AI. Vincent C. Müller. Anatolia College/ACT February 2015

Violent Intent Modeling System

AP WORLD HISTORY 2016 SCORING GUIDELINES

Privacy, Data Protection and Cybersecurity in Europe

Guidelines for Writers You must write for at least two different magazines on two different topics.

Publishing for Impact

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Book Review: Digital Forensic Evidence Examination

special roundtable Andrew D. Marble Kenneth Lieberthal Emily O. Goldman Robert Sutter Ezra F. Vogel Celeste A. Wallander

individuals take are often influenced by a larger source in life. A main cause for a change in

Power, Ideology, and Technological Determinism

Gauging the likelihood for acceptance of a paper submitted to the Journal of the Acoustical Society of America

Inconsistency In Studies: Violent Video Games. 'Do violent video games affect the consumers violent tendencies permanently?

Children s rights in the digital environment: Challenges, tensions and opportunities

examines the physics that Poe studied throughout his life and Foucault s interpretation of

Taylor & Francis journals Canadian researcher survey 2010

Should animals used research argumentative essay >>>CLICK HERE<<<

INDIVIDUAL LEARNING PACKET/TEACHING UNIT. Anthem R A N D A Y N PRESTWICK HOUSE REORDER NO. TU73

New perspectives on article-level metrics: developing ways to assess research uptake and impact online

THE ATLAS OF NEW LIBRARIANSHIP

The 10 Biggest Mistakes

Howard Hall Office Hours: T 11:00-12:15; W 11:30-1:00; TH 8:15-9:15; 11:00-12:15

Thesis and Intro. ENGL 146 Dr A. Mitchell

IAASB Main Agenda (March, 2015) Auditing Disclosures Issues and Task Force Recommendations

The responsibility of Editors and Publishers in Reporting of Research: Changing current practice how to ACT

How Transhumanism Can Transcend Socialism, Libertarianism, and All Other Conventional Ideologies

Beyond technology Rethinking learning in the age of digital culture

SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE

Reinterpreting Revolutionary Russia

paul nadasdy application of environmental knowledge the politics of constructing society/nature

Values in design and technology education: Past, present and future

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

Transportation Education in the New Millennium

CDTL Workshop. Introduction to Argumentative Essay Writing. Lee Gek Ling and Lee Ming Cherk CELC

RATIONALE. Using only the space provided in the box below, briefly state why this course should be approved as a first year seminar course.

Edinburgh Research Explorer

1984 essay individualism essay individualism.zip

LESS FOCUS ON COMICS THAN STATED. by Jani Ylönen

Artificial intelligence and judicial systems: The so-called predictive justice

Cognitive Systems Engineering

How gaming communities differ from offline communities

REQUIRED RETAKE INSTRUCTIONS ENG100: Classification and Division

45 INFORMATION TECHNOLOGY

Critical friends at work

THE LABORATORY ANIMAL BREEDERS ASSOCIATION OF GREAT BRITAIN

FICTION: Understanding the Text

ADRIFT IN THE URBAN MAZE. by Dan Hassler- Forest

Book review: Profit and gift in the digital economy

Academy of Social Sciences response to Plan S, and UKRI implementation

Given the amount of ink spilled on the subject, we are undoubtedly living through something of a crisis in scholarly communication.

A Good Society in our Contemporary World of Interconnected Technologies and Technological Systems

Topics of business letter writing >>>CLICK HERE<<<

The challenges raised by increasingly autonomous weapons

WIMPing Out: Looking More Deeply at Digital Game Interfaces

MPJO : FEATURE WRITING GEORGETOWN UNIVERSITY: MPS- JOURNALISM Tuesdays, 6 p.m. to 9:20 p.m. Summer 2014

B) Issues to be Prioritised within the Proposed Global Strategy and Plan of Action:

Lecture 1: Introduction and Preliminaries

Scandinavian versus UK research: The importance of institutional context

Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011

January 1 st, 2018 Sample Current Affairs

Kauffman Dissertation Executive Summary

Science and Ideology Abha Sur moderating

Design for Innovative Value Towards a Sustainable Society

LSUS Northwest Louisiana Archives Noel Memorial Library

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

IMPROVE YOUR ACADEMIC WRITING - AN EDITOR S ADVICE. WORKSHOPS SCHEDULE j.mp/ru_about

Narratives of Sorrow and Dignity: Japanese Women, Pregnancy Loss, and Modern Rituals of Grieving

The Response of Motorola Ltd. to the. Consultation on Spectrum Commons Classes for Licence Exemption

The Relevance Question: The Professionalization of Political Science and the Waxing and Waning of Security Studies

Mla format for argumentative essay. Mla format for argumentative essay.zip

GETTING TO KNOW GP:!! AN OVERVIEW! * * *!

INFORMATIONAL INTERVIEWING

Algorithms and Networking for Computer Games

Learning Progression for Narrative Writing

Knowledge Brokerage for Sustainable Development

SAMPLE INTERVIEW QUESTIONS

Academic identities re-formed? Contesting technological determinism in accounts of the digital age (0065)

Engineering Systems Doctoral Seminar. ESD.83 Fall 2011

Program Level Learning Outcomes for the Department of International Studies Page 1

Media Art Net introduction to the chinese edition

Researching Identity and Interculturality

California State University, Northridge Policy Statement on Inventions and Patents

Sat writing prompts for practice >>>CLICK HERE<<<

Howard Hall Office Hours: T 11:00-12:15; W 11:30-1:00; TH 8:15-9:15; 11:00-12:15

The Writing Process From Blank Page to Final Draft

St. Francis Xavier University Department of Sociology SELECTED TOPICS IN THE SOCIOLOGY OF TECHNOLOGY (SOCI 496)

Through the Looking-Glass

composition. argumentative essays composition of an argumentative essay essay argumentative argumentative essay essay

Anthropology. Teacher Edition. Written by Rebecca Stark Illustrated by Karen Birchak and Nelsy Fontalvo

Comments on Summers' Preadvies for the Vereniging voor Wijsbegeerte van het Recht

13 June Office of the Communications Authority 29/F Wu Chung House 213 Queen s Road East Wanchai, Hong Kong

Harvard Guide to Using Sources: How to Avoid Plagiarism

COMPARE AND CONTRAST ESSAY. Divergent and Hunger Games: FIGHT TO THE DEATH!

Narrative writing about a holiday >>>CLICK HERE<<<

Predicting Success, Preventing Failure: An Investigation of the California High School Exit Exam Technical Appendix

Transcription:

Digital Technologies of the Self edited by Yasmine Abbas and Fred Dervin. Newcastle: Cambridge Scholars, 2009. (ISBN: 9781443814195). 189 pp. David T. Macknet (University of Glasgow) Digital Technologies of the Self is a collection of 8 essays which, together, consider the impacts of current technologies upon identity, human interaction, and construction of the self. These works centre about concepts of self-construction as formulated in the works of Foucault. Several incorporate Castronova s research on massively multiplayer online role-play games (MMORPG), and Bourdieu s understanding of habitus. The works examine the affects of surveillance upon identity, political identity as affected by social media, external imposition of identity, and the ways in which current technologies directly shape the quality of social interactions. The contributors (including the editors) each provide an article which is essentially a summary of their doctoral thesis; as such, each piece engages on a very deep level with the subject at hand, drawing on several years of research and investigation to provide a very complete understanding of one narrow aspect of an issue within digital identity. 1

Each pair of articles subtly presents opposing views upon the desirability of a particular use of technology; only in examining the pair of articles together, however, does this come to the fore: read alone, or on separate occasions, the contrast between the pieces may be easily overlooked. This would be a great shame, as it appears to have been by design, considering how each pair so neatly works together. In future editions this opposition between the pieces should be made more explicit. The first section of the collection considers the affects of surveillance upon the individual, in terms of how that individual constructs identity and preference, and in terms of how groups socialize given the presence or absence of overt surveillance. The two issues considered are the impact of ambient intelligence upon behaviour, and the social interactions within a highly-restricted communications environment (that of craigslist missed connections ). Together, these pieces encourage examination of the effects of imposed order via surveillance willingly accepted by those utilising the technologies. Whether by accident or design, both pieces take a fairly neutral stance towards the human impacts of surveillance technologies, only hinting at or listing a few of the negative affects they may have upon individuals and society, rather than making any strong statement against misuse of such technologies. The second pair of articles consider the intentional use of social technologies as instruments of political change. They examine groups which bridge participation between the online and offline environments, and the efficacy of social technology within national 2

and international political discourse. The two pieces investigate two instances in which social technologies are used to engage participants in the construction of a political self which is participant in a highly structured, controlled, regulated series of interactions, each of which activity serves the end purpose of those at the apex of the power structure. Again, these pieces take a very neutral stance with regards to judging the systems under examination. It is only via the language of the pieces that it becomes clear that one of the authors might feel some disapprobation for the cynical way in which social media was deployed as a weapon in the mobilisation of troops. Only by contrasting the two pieces does it become clear that the second author strongly approves of the very same use of technology, albeit in a different social context. The third pair of essays examine the sometimes-paradoxical imposition of ideologies of the self by gaming systems and by videoblogging ( egocasting ) systems, providing a positive portrayal of various, violent, computer-gaming environments, contrasted with a consideration of some of the issues suffered by individuals as they transition in and out of different cultures. This pair of articles examines the fixity of self-identity, and the degree to which identity is imposed by technology as compared to a like imposition by individuals within society. Only by reading the pair of articles does it become clear that this is the intent in their presentation; however, each article is relatively staid, moving forward its own point about identity and identity construction, neither piece directly addressing issues of the imposition of identity directly. 3

The last two works examine extremes of interpersonal connection within the online world: the egotism of collecting friends as status indicators and a narcissistic practice; and that of providing a place to couch surf to complete strangers so that a true, deep connection may be established. The first practice is very much anti-social, the second intensely human. Both are facilitated by very similar technology; the two articles give a deep insight into the different ways in which technology may be used to either hinder or facilitate human communication, and directly assert that it is the construction of the technology which drives the behaviour within the technology: the system developer is a causal factor in the uses to which the technology is suited. The various pairs of essays each attempt to address a single topic in depth, providing a surfeit of bibliographic references should the reader wish to continue further. The works as condensed versions of theses rather than scholarly articles serve better as introductions to the various subject areas than as exposition in and of themselves; indeed, perhaps that is not their goal, yet the reader might be better served if the goal of the collection were made explicit. Stylistically, the collection lacks consistency, excessive citations serve to interrupt the flow of the articles, and little effort was made to render the pieces readable. Perhaps a future edition will remedy issues of style and readability. As a resource for teaching about the impact of technology upon humanity, at the university level, I would recommend this work. I sincerely hope that a future edition will emphasize the potential use of this work in an educational setting, as the subjects under consideration are of 4

importance to any user of technology. The pieces subtly play up the positive and negative affects of technology upon humanity, and would allow for a great deal of classroom debate. Because of the extensive amount of bibliographic information provided after each article this work would serve nicely as an instructional resource, providing a ready list of academic sources for consultation and further investigation. The Kelvingrove Review http://www.gla.ac.uk/departments/esharp/thekelvingrovereview/ 5