Taking on the Network: Making Space for the Identity Play of Networked Publics

Total Page:16

File Type:pdf, Size:1020Kb

Taking on the Network: Making Space for the Identity Play of Networked Publics Taking on the network: making space for the identity play of networked publics Ben Dalton Royal College of Art Winter 2018 A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy Author’s Declaration This thesis represents partial submission for the degree of Doctor of Philosophy at the Royal College of Art. I confirm that the work presented here is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. During the period of registered study in which this thesis was prepared the author has not been registered for any other academic award or qualification. The material included in this thesis has not been submitted wholly or in part for any academic award or qualification other than that for which it is now submitted. Signature: Date: 2 Author’s Declaration Abstract This thesis is positioned in the field of communication design research and seeks to critically examine the practice and potential of identity play by digitally networked publics. It defines identity play as entailing a form of identity design practiced by participating publics themselves. The research contributes an understanding of the role of the designer in the entangled networks of digital public space by treating identity design agencies as co-produced with audiences and materials. The thesis locates identity play as part of a productive tradition of anonymous pseudonymity practices. It challenges design assumptions of anonymity as a contemporary privacy problem and of identity as detached and preexisting. The thesis elucidates an intra-active interpretation of identity design as on-going processes of collectively re-making network apparatuses and identity phenomena, moving beyond the limits of centralising and commercial models. It constructs the designer-researcher's role in making space for identity play through taking on the network. The Creative Exchange (CX) – a UK Arts & Humanities Research Council Knowledge Exchange Hub – provided the space to collaborate and research with diverse consortia of designer-researcher participants and their networked audiences to explore the possibilities of digital public space. The methodology employed by the thesis is grounded theory research through design underpinned by a "diffractive" research stance, with theory and practice read iteratively through each other. I have collected and critically analysed data using "design conversations" with materials, participants and audiences, through multiple projects and prototypes, bounded by the CX Hub and its activities over five years. The thesis constructs three prototype design patterns to make space for the identity play of networked publics from my practice as a designer-researcher: Sticking together, Fashioning our own belongings and Taking on the network. Each pattern produces an intersection of practices of identity design, networked public participation and design research. The design pattern of Sticking together offers ways of using assemblage to create anonymity and reputation. It calls for and requires the solidarity of collective assembly and ways to make identity play commonplace. Fashioning our own belongings investigates possessions as embodied networked apparatuses of identity, and audience relations as belonging. This design pattern grasps network function and fosters pseudonymity (dis)ownership. Taking on the network is formulated as a performance of inversion by publics through the resistance of the carnivalesque and the responsibility of infrastructural inversions. Taking on the network provides the overarching framework for the design patterns to take on the functions and models of cloud infrastructures. These findings demonstrate how identity design by publics requires active forms of network literacy that comprehend the network intra-actively, and that it is possible to take on the network by contesting cloud identity apparatuses and models. The design patterns make space for the identity play that, importantly, enables critical and creative anonymity practices to take place. The research offers identity play as a public critical infrastructure with benefits for the resilience and creativity of networked publics. It lends support to designers to reconfigure their part in identity design. The original contributions to knowledge are: (1) prototype design patterns for making space for the identity play of networked publics; (2) an articulation of the design space for identity play; (3) a diffractive form of design pattern that entails multiple intersecting practices; and (4) an intra-active interpretation of the discipline of identity design. Abstract 3 Table of Contents List of Illustrations 6 Acknowledgements 10 Dedication 11 Chapter 1 – Introduction 13 The Creative Exchange Hub 15 Research inquiry 17 Identity within digital public space 18 Thesis outline 21 Chapter 2 – Literature review 22 Identity design 24 Identity 27 Anonymous pseudonymity 36 Anonymity 51 Networked publics 61 Designer-researcher practice 70 A material-discursive understanding 75 Chapter 3 – Methodology 78 Project conversations 78 Scope of the study and theoretical sampling 79 Research through design 81 The diffractive practitioner 83 Grounded theory approach 85 Grounded theory research through design 90 Constant comparative design methods 94 Critical reflective research practice 96 Intra-active contestational prototyping 99 Introducing the data analysis: a note & an appendix of the data set 102 Chapter 4 – The overarching design pattern 106 Prototype design patterns 109 Identity design 112 Networked public participation 112 Designer-researcher practice 113 Infrastructural inversion and carnivalesque inversion 113 The design space: Designing for identity play 114 Anonymous pseudonymity apparatuses 119 Cryptographic identity apparatuses 121 4 Table of Contents Chapter 5 – Sticking together 124 Identity design 125 Anonymity patterns: Creative constraints and context collapse 125 Assemblage: Designing identities through sticking together 133 Resisting and inverting: Reputations and stereotypes 139 Constituting audiences and authenticity through knowing fabrication 143 Networked public participation 148 Making identity play commonplace 150 Designing identity collectively 162 Social data chaff 164 Designer-researcher practice 169 Chapter 6 – Fashioning our own belongings 174 Identity design 176 Network cabinets 182 Possessions 187 Getting to grips with: Embodying identity design agencies 196 Belongs to: Contesting (dis)ownership 206 Common goods 213 Networked Public Participation 217 A common place: Public spaces 218 Make good: Ongoing repair of identity apparatuses 223 Bothering 228 Designer-researcher practice 233 Chapter 7 – Taking on the network 238 Identity design 240 Networked public participation 246 Designer-researcher practice 260 Contesting clouds: Re-distributing agencies 261 Intersecting aspects of taking on the network 263 Identity play: Inversions and literacies 267 Iterations of identity play 267 Identity play in carnivalesque spaces 269 Identity play and playing mas 272 Ethical considerations. Facing one's own assumptions and privilege 273 Inversions: Taking on the network 273 Chapter 8 – Conclusions 276 Theoretical and methodological contributions of the thesis 276 Using these contributions 278 Research limitations 280 Important learning and challenging assumptions 281 Cutting identity design apart-together 282 Where next? What design research might follow? 283 Shifting contexts from project inception to completion 285 Appendix A – Project appendix 288 Appendix B – Example of coding and memo-making 322 References 325 Table of Contents 5 List of Illustrations Fig.1 Comparative analysis through some of my studio mapping and sorting practices...............................95 Fig.2 A timeline of activity of the larger projects and proposals during my CX research process....................104 Fig.3 Floor of paper cut apart together.......................................................................................124 Fig.4 Printing an ascii-key experiment.....................................................................................126 Fig.5 Experiments in mask making using memorable typographic forms.............................................126 Fig.6 A placard written within the creative constraints of a stamp kit..................................................127 Fig.7 Charles Fréger exhibition in Liverpool................................................................................127 Fig.8 Barrow Woodwose experiments over the week-long residency. Photos: Benedict Phillips.....................128 Fig.9 Drawing tablet and scanner Tor Toys prototypes...................................................................128 Fig.10 A Chattr participant dictates a text art . Photo: Hwa Young Jung..............................................129 Fig.11 Notes from our early Walk in the Park design discussions........................................................130 Fig.12 A Desk Snap selfie......................................................................................................130 Fig.13 The larger sections of a print typecase show the relative frequency distribution of common letters..........131 Fig.14 Part of my sketch mapping the identity design histories of the LulzSec.........................................133 Fig.15 A philosopher and gender theorist, the fairytale image diffraction patterns....................................134 Fig.16
Recommended publications
  • PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Revista De Sociologia E Política, Vol
    Revista de Sociologia e Política ISSN: 0104-4478 [email protected] Universidade Federal do Paraná Brasil Silveira, Sergio Amadeu da NOVAS DIMENSÕES DA POLÍTICA: PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Revista de Sociologia e Política, vol. 17, núm. 34, octubre, 2009, pp. 103-113 Universidade Federal do Paraná Curitiba, Brasil Disponível em: http://www.redalyc.org/articulo.oa?id=23816088008 Como citar este artigo Número completo Sistema de Informação Científica Mais artigos Rede de Revistas Científicas da América Latina, Caribe , Espanha e Portugal Home da revista no Redalyc Projeto acadêmico sem fins lucrativos desenvolvido no âmbito da iniciativa Acesso Aberto REVISTA DE SOCIOLOGIA E POLÍTICA V. 17, Nº 34 : 103-113 OUT. 2009 NOVAS DIMENSÕES DA POLÍTICA: PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Sergio Amadeu da Silveira RESUMO O texto propõe a existência de uma divisão básica na relação entre política e Internet: a política “da” Internet e a política “na” Internet. Em seguida, agrega os temas das políticas da internet em três campos de disputas fundamentais: sobre a infra-estrutura da rede; sobre os formatos, padrões e aplicações; e sobre os conteúdos. Analisa os temas políticos atuais mais relevantes de cada campo conflituoso, articulando dois aspectos: o tecno-social e o jurídico-legislativo. Este artigo trabalha com o conceito de arquitetura de poder, uma extensão da definição de Alexander Galloway sobre o gerenciamento protocolar, e com a perspectiva de Yochai Benkler sobre a existência de uma esfera pública interconectada. Sua conclusão indica que a liberdade nas redes cibernéticas depende da existência da navegação não-identificada, ou seja, do anonimato.
    [Show full text]
  • Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, and Social Networking Sites Influence Crime Victimization Ashley Bettencourt
    Bridgewater State University Virtual Commons - Bridgewater State University Master’s Theses and Projects College of Graduate Studies 12-2014 Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, And Social Networking Sites Influence Crime Victimization Ashley Bettencourt Follow this and additional works at: http://vc.bridgew.edu/theses Part of the Criminology and Criminal Justice Commons Recommended Citation Bettencourt, Ashley. (2014). Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, And Social Networking Sites Influence Crime Victimization. In BSU Master’s Theses and Projects. Item 10. Available at http://vc.bridgew.edu/theses/10 Copyright © 2014 Ashley Bettencourt This item is available as part of Virtual Commons, the open-access institutional repository of Bridgewater State University, Bridgewater, Massachusetts. Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, and Social Networking Sites Influence Crime Victimization By: Ashley Bettencourt Thesis Submitted in fulfillment of the requirements for the degree of Master of Science in Criminal Justice in the Graduate College of Bridgewater State University, 2014 Bridgewater, Massachusetts Thesis Chair: Dr. Kyung-Shick Choi 2 Empirical Assessment of Risk Factors: How Online and Offline Lifestyle, Social Learning, and Social Networking Sites Influence Crime Victimization Thesis By Ashley Bettencourt Approved as to style and content by: ______________________________ Kyung-shick
    [Show full text]
  • Hacker Culture & Politics
    HACKER CULTURE & POLITICS COMS 541 (CRN 15368) 1435-1725 Department of Art History and Communication Studies McGill University Professor Gabriella Coleman Fall 2012 Arts W-220/ 14:35-17:25 Professor: Dr. Gabriella Coleman Office: Arts W-110 Office hours: Sign up sheet Tuesday 2:30-3:30 PM Phone: xxx E-mail: [email protected] OVERVIEW This course examines computer hackers to interrogate not only the ethics and technical practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the prankish games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and we will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, privacy, security, surveillance, and intellectual property. We finish with an in-depth look at two sites of hacker and activist action: Wikileaks and Anonymous. LEARNER OBJECTIVES This will allow us to 1) demonstrate familiarity with variants of hacking 2) critically examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral 1 codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking.
    [Show full text]
  • Vogue Living Debuts New Furniture Collections ​
    VOGUE LIVING DEBUTS NEW FURNITURE COLLECTIONS ​ Condé Nast and Dorya to debut two new collections at High Point Market NEW YORK – April 10, 2018 – The Vogue Living collection, consisting of 65 pieces divided into two separate collections, Mayfair and Wiltshire, will be shown at High Point Market on April 14-18, 2018. The Wiltshire Collection, through warm tones of cherry and chestnut with pale velvets and florals, evokes a bucolic sensibility with pieces ideally suited for the country home that values comfort as highly as aesthetics. The Mayfair Collection is designed for the modern elegance of a city home, featuring strong statement pieces that draw inspiration from classic designs reinvented for today. ”We are pleased to partner with Dorya on the premier Vogue Living brand. Each piece is handmade and conveys the quality and luxury that Vogue stands for,” said Cathy Glosser, SVP of Licensing, Condé Nast. “The Vogue Living collections tap into a vast array of unique designs, supreme finishes, and stunning details to deliver unmatched craftsmanship,” says F. Doruk Yorgancioglu, president and chief executive officer, Dorya. “We wanted to achieve timelessness while staying relevant for today’s consumer.” The line is currently available through the trade and at vogueliving.dorya.com. Pictures from the ​ ​ line are available here. ​ ​ About Condé Nast: Condé Nast is a premier media company renowned for producing the highest quality content for the world's most influential audiences. Attracting more than 120 million consumers across its industry-leading print, digital and video brands, the company’s portfolio includes some of the most iconic titles in media: Vogue, Vanity Fair, Glamour, Brides, GQ, GQ Style, The New Yorker, Condé Nast Traveler, Allure, Architectural Digest, Bon Appétit, Epicurious, Wired, W, Golf Digest, Golf World, Teen Vogue, Ars Technica, The Scene, them, Pitchfork and Backchannel.
    [Show full text]
  • Volume 2 Presented at the Annual Convention of the Association for Educational Communications and Technology
    thannual Proceedings Selected Papers on the Practice of Educational Communications and Technology - Volume 2 Presented at The Annual Convention of the Association for Educational Communications and Technology Sponsored by the Research and Theory Division And 38 The Division of Instructional Design Indianapolis, IN Editor: Michael Simonson Nova Southeastern University Fischler College of Education North Miami Beach, Florida 2015 Annual Proceedings - Indianapolis: Volumes 1 & 2 Volume 1: Selected Research and Development Papers And Volume 2: Selected Papers On the Practice of Educational Communications and Technology Presented at The Annual Convention of the Association for Educational Communications and Technology Sponsored by the Research and Theory Division And The Division of Instructional Design Indianapolis, IN 2015 Editor Michael Simonson, Ph.D. Instructional Design and Technology Department Fischler College of Education Nova Southeastern University North Miami Beach, FL Preface For the thirty-seventh time, the Research and Theory Division of the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented at the annual AECT Convention in Indianapolis, IN. A limited quantity of these Proceedings were printed and sold in both hardcopy and electronic versions. Volumes 1 and 2 are available through the Educational Resources Clearinghouse (ERIC) System. Proceedings volumes are available to members at AECT.ORG. Proceedings copies are also available at: http://www.tresystems.com/proceedings/ The Proceedings of AECT’s Convention are published in two volumes. Volume #1 contains papers dealing primarily with research and development topics. Papers dealing with the practice of instructional technology including instruction and training issues are contained in Volume #2.
    [Show full text]
  • JULIAN ASSANGE: When Google Met Wikileaks
    JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton...
    [Show full text]
  • Selected Filmography of Digital Culture and New Media Art
    Dejan Grba SELECTED FILMOGRAPHY OF DIGITAL CULTURE AND NEW MEDIA ART This filmography comprises feature films, documentaries, TV shows, series and reports about digital culture and new media art. The selected feature films reflect the informatization of society, economy and politics in various ways, primarily on the conceptual and narrative plan. Feature films that directly thematize the digital paradigm can be found in the Film Lists section. Each entry is referenced with basic filmographic data: director’s name, title and production year, and production details are available online at IMDB, FilmWeb, FindAnyFilm, Metacritic etc. The coloured titles are links. Feature films Fritz Lang, Metropolis, 1926. Fritz Lang, M, 1931. William Cameron Menzies, Things to Come, 1936. Fritz Lang, The Thousand Eyes of Dr. Mabuse, 1960. Sidney Lumet, Fail-Safe, 1964. James B. Harris, The Bedford Incident, 1965. Jean-Luc Godard, Alphaville, 1965. Joseph Sargent, Colossus: The Forbin Project, 1970. Henri Verneuil, Le serpent, 1973. Alan J. Pakula, The Parallax View, 1974. Francis Ford Coppola, The Conversation, 1974. Sidney Pollack, The Three Days of Condor, 1975. George P. Cosmatos, The Cassandra Crossing, 1976. Sidney Lumet, Network, 1976. Robert Aldrich, Twilight's Last Gleaming, 1977. Michael Crichton, Coma, 1978. Brian De Palma, Blow Out, 1981. Steven Lisberger, Tron, 1982. Godfrey Reggio, Koyaanisqatsi, 1983. John Badham, WarGames, 1983. Roger Donaldson, No Way Out, 1987. F. Gary Gray, The Negotiator, 1988. John McTiernan, Die Hard, 1988. Phil Alden Robinson, Sneakers, 1992. Andrew Davis, The Fugitive, 1993. David Fincher, The Game, 1997. David Cronenberg, eXistenZ, 1999. Frank Oz, The Score, 2001. Tony Scott, Spy Game, 2001.
    [Show full text]
  • Underglobalization Beijing’S Media Urbanism and the Chimera of Legitimacy
    Underglobalization Beijing’s Media Urbanism and the Chimera of Legitimacy Joshua Neves Underglobalization Beijing’s Media Urbanism and the Chimera of Legitimacy Joshua Neves duke university press | durham and london | 2020 © 2020 Duke University Press All rights reserved Printed in the United States of Amer i ca on acid- free paper ∞ Designed by Drew Sisk Typeset in Portrait Text, SimSun, and Univers by Westchester Publishing Services Library of Congress Cataloging- in- Publication Data Names: Neves, Joshua, [date] author. Title: Underglobalization : Beijing’s media urbanism and the chimera of legitimacy / Joshua Neves. Description: Durham : Duke University Press, 2020. | Includes bibliographical references and index. Identifiers: lccn 2019032496 (print) | lccn 2019032497 (ebook) isbn 9781478007630 (hardcover) isbn 9781478008057 (paperback) isbn 9781478009023 (ebook) Subjects: lcsh: Product counterfeiting— Law and legislation— China. | Piracy (Copyright)— China. | Legitimacy of governments—China. | Globalization—China. Classification: lcc knq1160.3.n48 2020 (print) | lcc knq1160.3 (ebook) | ddc 302.230951— dc23 lc record available at https:// lccn . loc. gov / 2019032496 lc ebook record available at https:// lccn . loc. gov / 2019032497 Cover art: Xing Danwen, detail from Urban Fictions, 2004. Courtesy of the artist and Danwen Studio. Chapter 5 was originally published in “Videation: Technological Intimacy and the Politics of Global Connection,” in Asian Video Cultures: In the Penumbra of the Global, edited by Joshua Neves and Bhaskar
    [Show full text]
  • Restoration Objectives and Strategies for Terrestrial Habitats and Species of the Willamette Sub-Basin
    Protection, Restoration, and Management of Terrestrial Habitats and Species of the Willamette Sub-Basin Technical Appendix 1 Contents 1. Introduction 1 1.1 Purpose and Objectives 1 1.2 Scope and Scale of the Report 2 1.3 Principal Sources of Data 5 1.4 Analytical Approaches 7 1.5 Building Upon Previous Efforts 11 1.6 How to Apply this Report and Databases to Decision-making 14 2. Focal Habitats and Associated Focal Species 31 2.1 Introduction 31 2.2 Focal Habitat: Oak Woodlands 37 2.2.1 Definition 37 2.2.2 Recognition of Importance 37 2.2.3 Status and Distribution 37 2.2.4 Past Impacts, Limiting Factors, and Future Threats 38 2.2.5 Protection, Restoration, and Management 39 2.2.6 Compatibility of Oak Woodland Management and Stream Habitat Management. 40 2.2.7 Contribution of Oak Woodlands to Regional Biodiversity 40 2.2.8 Selected Focal Species 40 2.2.9 Synthesis: Indicators of Oak Woodland Ecological Condition and Sustainability 53 2.3 Focal Habitat: Upland Prairie, Savanna, and Rock Outcrops 55 2.3.1 Description 55 2.3.2 Recognition of Importance 55 2.3.3 Status and Distribution 56 2.3.4 Past Impacts, Limiting Factors, and Future Threats 57 2.3.5 Protection, Restoration, and Management 58 2.3.6 Compatibility of Upland Prairie-Savanna Management and Stream Management 58 2.3.7 Contribution of Upland Prairie-Savanna to Regional Biodiversity 59 2.3.8 Selected Focal Species 59 2.3.9 Synthesis: Indicators of Ecological Condition and Sustainability for Upland Prairie- Savanna 77 2.4 Focal Habitat: Wetland Prairie and Seasonal Marsh 81 2.4.1
    [Show full text]
  • 2017 SURE Program Abstract Book
    Abstract Book Summer Undergraduate Research in Engineering Program Summer 2017 College of Engineering, University of Michigan Table of Contents Aerospace Engineering……………………………………………………6-15 Climate and Space Sciences and Engineering………………………16-18 Biomedical Engineering………………………………………………….19-23 Civil and Environmental Engineering………………………………….24-31 Chemical Engineering…………………………………………………….32-37 Electrical Engineering and Computer Science………………………38-57 Engineering Education Research………………………….……………….58 Industrial and Operations Engineering……………………….…….…59-65 Macromolecular Science and Engineering……………………….………66 Mechanical Engineering………………………………………………….67-77 Materials Science and Engineering………………………………….…78-80 Nuclear Engineering and Radiological Sciences…………...……….81-85 Robotics…………………………………………………………………………86 Overview The Summer Undergraduate Research in Engineering Program (SURE) offers summer research internships to outstanding undergraduate students who have completed their sophomore or junior year by the start of the summer. Participants conduct 10-12 weeks of full-time summer research with some of the country’s leading faculty in a wide range of engineering disciplines. The program provides opportunities for students to assess their interests and potential in pursuing research at the master's or Ph.D. level in graduate school. SURE students receive guidance by a faculty advisor in a College of Engineering research facility and have produced an abstract booklet which highlights their summer research project and/or experience. Validation
    [Show full text]
  • DANGEROUS WORK the Mental Health Risks of Journalism Contents
    MAGAZINE OF THE NATIONAL UNION OF JOURNALISTS WWW.NUJ.ORG.UK | APRIL-MAY 2021 DANGEROUS WORK The mental health risks of journalism Contents Main feature 14 Strains of stress Mental health and journalism News afety has been on all our minds over the 03 BBC moves jobs out of London past year amid the pandemic. But while the coronavirus threat is Specialist teams to be relocated thankfully receding at the moment, 04 From Brixton to BLM there are many other risks that A persepective on combatting racism Sjournalists face on a daily basis. The demands of a exacting, deadline-driven 05 Reach closes newsrooms job which can involve dealing with traumatic news events take Radical move to homeworking their toll on mental health as our cover feature by Samir Jeraj 07 Members stressed by the pandemic explores. Survey finds isolation and anxiety And increasingly journalists are facing physical and verbal intimidation for just doing their jobs as Neil Merrick reports “in his feature. We also have a report from the TUC’s women’s Features conference on an NUJ motion about the spiralling abuse of 10 Spotlight on Liverpool women journalists. How journalism is faring in the city Help is hopefully at hand to tackle intimidation after the creation of a government-launched national plan for the safety 12 Pandemic of abuse of journalists. The NUJ contributed to the drafting of the plan How we can make journalism safer and will help monitor how journalists are protected in the 16 Weathering a storm future. Looking back to 1921 In the wake of Piers Morgan’s resignation, Raymond Snoddy looks at other high-profile departures and the reasons behind them.
    [Show full text]
  • Download Preprint
    PREPRINT - MARCH 2021 DO NOT QUOTE WITHOUT PERMISSION Video Meeting Signals A randomised controlled trial of a technique to improve the experience of video conferencing Paul D. Hills, Mackenzie V. Q. Clavin, Miles R. A. Tufft & Daniel C. Richardson* Department of Experimental Psychology, University College London Abstract We found evidence from A rAndomised controlled triAl thAt A simple set of techniques cAn improve the experience of online meetings. Video conferencing technology has practical benefits, but psychological costs. It has allowed industry, education and social interactions to continue in some form during the covid-19 lockdowns. But it hAs left mAny users feeling fAtigued And socially isolated, perhaps because the limitations of video conferencing disrupt users’ ability to coordinate interactions and foster social affiliation. Video Meeting Signals (VMS™) is a simple technique thAt uses gestures to overcome some of these limitAtions. We cArried out A rAndomised controlled trial with over 100 students, in which hAlf underwent A short trAining session in VMS. All pArticipAnts rAted their subjective experience of two weekly seminars, and transcripts were objectively coded for the valence of language used. Compared to controls, seminAr groups with VMS trAining rAted their personAl experience, their feelings toward their group, and their perceived learning outcomes as significantly higher. Also, they were more likely to use positive lAnguAge And less likely to use negative languAge. While future, pre-registered experiments will explore which aspects of the technique are responsible for these benefits, the current results establish thAt VMS hAs greAt potentiAl to overcome the psychologicAl problems of group video meetings. * corresponding author [email protected] Open Science FoundAtion Project pAge https://osf.io/x28ef/ 1 People struggle with communicAtion technologies when they clAsh with sociAl norms.
    [Show full text]