1 [email protected] / +31655881413

Total Page:16

File Type:pdf, Size:1020Kb

1 Patsydixon@Gmail.Com / +31655881413 The Affective Turn of Mobile Phones A study of affect in mobile-mediated communication University of Amsterdam MA Media & Culture (New Media track) Date: 15 August 2011 Name: Natalie Dixon Student Number: 6248551 Contact: [email protected] / +31655881413 Thesis Supervisor: Geert Lovink Second Reader: Jan Simons 1 Abstract The line between man and computer is no longer drawn at the ability to think but the capacity to feel. With the focus on emotion in human-computer interaction, research has extended past the cognitive to understand new aspects of human experience. This thesis studies the affective turn of mobile phones using interviews with couples and an online survey. The focus is not limited to the mobile’s role in mediating emotion or as an object of affection due to its contents, but points to it as a stand-alone affective actor. This thesis argues that mobiles are not simply inert objects that only respond to our whims and wants – they too have a presence. They move us in the same way that people can “move” each other – they are energetic participants in our assembly of human and non humans. As a result, users rarely view mobiles as mere technological devices but rather as natural beings, ones that have expressions – derived from the presence they create. This thesis argues that mobiles transfer affect, emit or radiate an aura that generates anxiety, pleasure or calm in people or places. Our relationships with them, often characterised by paradoxes and ambivalence, is shifting away from the realm of mobile culture to become part of human nature. 2 Acknowledgements This thesis was made possible by the generous contributions of the people I interviewed and surveyed. They shared their time, private messages and thoughts about mobile communication with me. For this, I am extremely grateful. I’d also like to thank: Geert Lovink, my supervisor, for introducing me to the fascinating world of affect. Jane Vincent, Amparo Lasén, Gerard Goggin, Jan Simons and Melissa Gregg for their kind responses to my requests for information and comments. Arno Morland and Elloise Bennett for their invaluable insights. Koert van Mensvoort and Hendrik-Jan Grievink for introducing me to the concept of next nature. John Relihan (Media 24), for financial support during my studies in Amsterdam. Roger Dixon, for graciously proof reading this thesis. The countless strangers I have randomly photographed and interrogated about their mobile practices. Anthony, for turning his Blackberry to silent. 3 Table of Contents Chapter 1: Introduction..................................................................................................5 Chapter 2: Literature review .........................................................................................8 2.1 Tethering and Relentless Connectivity ..............................................................................9 2.2 Subjectification and Surveillance....................................................................................... 11 2.3 New Codes of Social Interaction......................................................................................... 15 2.4 Face-to-Face Communication.............................................................................................. 18 2.5 Mediated Communication..................................................................................................... 19 2.6 Computer-Mediated-Communication Theories .......................................................... 21 2.7 Social Cohesion.......................................................................................................................... 23 2.8 Space and Time.......................................................................................................................... 25 2.9 Body Object ................................................................................................................................. 26 Chapter 3: The Affective Turn of Mobile phones ................................................. 29 3.1 Affect .............................................................................................................................................. 30 3.2 Emotion and Reason ............................................................................................................... 32 3.3 Emotion and Behaviour......................................................................................................... 35 3.4 Affective Computing................................................................................................................ 36 3.5 Recognizing Emotions............................................................................................................ 39 3.6 Mobile Phones as Affective Technologies...................................................................... 41 Chapter 4: Research....................................................................................................... 44 4.1 Introduction................................................................................................................................ 44 4.2 Reliability..................................................................................................................................... 45 4.3 Interviews.................................................................................................................................... 46 Chapter 5: Conclusion ................................................................................................... 67 Bibliography..................................................................................................................... 72 Appendix 1: Highlights of the ‘Me & My Mobile’ Survey .................................... 80 Appendix 2: Field Notes: Images ............................................................................... 89 4 Chapter 1: Introduction A rare few are unmoved by the charms of mobile phones. At the very least they are lauded for their abundant technical affordances1. At the very worst they are seen as facilitators for the darkest parts of our social behaviour. This thesis navigates the creases of mobile communication. It wiggles in between the incremental exchanges of couples living in the Netherlands and England, examining the conversations that make up the “wallpaper”2 of their everyday experiences and their deeper, more intimate expressions of love and affection. These interviews aim to test the label of mobile phones as affective technologies and to better understand the depth of our affective relationships with them. This approach of qualitative research was chosen to provide a thorough, thoughtful account of the lived and personal mobile experiences of couples – in their own words. The results were compared and contrasted with an online questionnaire of 118 respondents. The human behaviour that mobiles inspire is nothing short of fascinating. It has led me directly to this examination of the affective turn of mobile technology3. My everyday observations, general and formal inquiry revealed that mobile phones are perceived and treated less as technological tools but more as natural beings, even friends or colleagues. Simply the way people clutch phones, especially in foreign places, reveals at least anecdotally, how we4 have come to feel connected to others through these devices, showing the emotional significance we attach to them. Mobiles have 1 In 1988, Donald Norman appropriated the term “affordances” in the context of human–machine interaction to refer to just those action possibilities that are readily perceivable by an actor. (Donald A. Norman, The Design of Everyday Things (New York: Basic Book, 1988) Preface xii.) 2 “Wallpaper” is a term used by Amparo Lasén to describe the more mundane types of mobile communication between people like meetings arrangements and information requests and small talk (Amparo Lasén “Affective Technologies – Emotions and Mobile Phones” Vodafone Receiver (Newbury: Vodafone, 2004) 5.) 3 “Mobile technology” refers to the device, its operating system, the software users download onto the device (including applications) and the services provided by the network provider. This term is used interchangeably with “wireless technology” in this thesis. 4 Mobile phones enjoy massive global ubiquity. Nearly 80% of the world’s population are mobile subscribers, 97 economies have over 100% mobile penetration. Arguably, only the infirm, poor, aged and infants do not have access to one. This is emphasised throughout this thesis by the purposeful, inclusive use of “we” and “our” when referring to mobile phones. (International Telecommunications Union, ‘Statshot’ Aug 2011, 11 Aug 2011 <http://www.itu.int/net/pressoffice/stats/2011/03/index.aspx>.) 5 become witnesses to our emotional lives – as the primary communication channel for mediating emotion.5 They are the accountants of our emotional transactions – storing our precious contacts, picture memories and ephemeral love letters.6 7 They also aid and abet our emotional processing, ultimately becoming the “architects of our intimacy.”8 Their capacity to affect and be affected remains a nascent field deserving further research. This study is informed by the small and select group of mobile researchers working in the field. Predominantly it relies on the inspiring research work of mobile scholars Amparo Lasén, Leopoldina Fortunati and Jane Vincent. Their work acknowledges mobiles as players generating and mediating emotion, as agents in and of
Recommended publications
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • Speaking in Lolcats
    Transcribed text of an address to the Educational Computing Organization of Ontario, Richmond Hill, Ontario, November 12, 2009. Audio and slides available at http://www.downes.ca/presentation/232 Thanks everyone, and people online you should be hearing me OK, if not just say something in the chat area. Your chat area is being viewed by an audience here in Richmond Hill, which I had never really heard of before I came here, so I’m kind of… that’s good Christina, excellent. Now some of the people in the room may be joining you and anything you say in the chat area can be viewed by people in the room. We’re recording the Elluminate session – I’m not going to press my luck and try for video. Elluminate does support video and it supports it rather well, but I have to be standing right here the entire time because it would use the iSight monitor (I don’t have a video camera hooked up) and I don’t want to do the entire presentation like this, so I won’t. This is the second of two presentations today, and as I said in the first presentation, when you do two presentations in a day, there’s a good one and a bad one – this is the good one. It’s a fairly sweeping and ambitious presentation. It’s probably not the sort of presentation you’ll see in any of the other sessions. I’m trying to go someplace a bit different. 2 Stephen Downes It’s the first time I’ve tried this material, though I’ve tried bits and pieces of it, and it’s something I’ve been thinking about for a long time.
    [Show full text]
  • An Instance of Hybrid Cryptography
    EsoCipher: An Instance of Hybrid Cryptography Neel Adwani University of Petroleum and Energy Studies Dehradun, Uttarakhand [email protected] ABSTRACT esoteric language is Brainfuck [5], which became notable for its This paper proposes a whole new concept in the field of Cryptog- minimalistic expressions. The whole language constitutes 8 simple raphy, i.e., EsoCiphers. Short for Esoteric Cipher, EsoCipher is an commands and an instruction pointer. LOLCODE [8] is yet another algorithm, which can be understood by a few, who have the knowl- esoteric language, which is based on the lolcat meme. So, its files edge about its backend architecture. The idea behind this concept are generated of the extensions .lol and .lols. Since its inspiration is derived from esoteric programming languages, but EsoCiphers comes from memes over the internet, the syntax contains keywords will be having a practical use in the future, as more research is done like HAI, BTW, GTFO, KTHXBYE. on the topic. Although the algorithm is quite simple to understand, While there’s no intended practical use of esoteric languages, Es- the complexity of the output will indeed prove to be difficult to oCipher may be considered obfuscated but it can be proven useful in bruteforce if a secret is embedded to it. It uses a hybrid cryptog- some fields. Since a lot of exploration hasn’t been done around this raphy based technique, which combines ASCII, Binary, Octal and topic, it is hard to determine the usability of the given algorithms in ROT 13 ciphers. The implementation and similarity index has been this paper, but intentionally EsoCiphers can be useful in preventing provided to show that it can be implemented practically.
    [Show full text]
  • Gamespeak for N00bs a Linguistic and Pragmatic Analysis of Gamers‟ Language
    Gamespeak for n00bs A linguistic and pragmatic analysis of gamers‟ language Diplomarbeit zur Erlangung des akademischen Grades einer Magistra der Philosophie an der Karl-Franzens-Universität Graz vorgelegt von Jasmin FUCHS am Institut für Anglistik und Amerikanistik Begutachterin: Ao.Univ.-Prof. Mag. Dr. Phil. Hermine Penz Graz, 2013 Table of Contents 1. Introduction ........................................................................................................................ 5 2. The multiplayer game Counter-Strike: Source .................................................................. 7 2.1. Gameplay ................................................................................................................... 7 3. Language and the Internet .................................................................................................. 8 3.1. Computer-mediated communication .......................................................................... 9 3.2. Types of computer-mediated communication .......................................................... 10 3.3. Synchronous communication ................................................................................... 11 3.4. Asynchronous communication ................................................................................. 12 3.5. Computer-mediated communication tools used in games ........................................ 12 3.5.1. TeamSpeak ......................................................................................................... 13 3.5.2.
    [Show full text]
  • From Symbolic Values to Symbolic Innovations
    Paper to be presented at DRUID15, Rome, June 15-17, 2015 (Coorganized with LUISS) FROM SYMBOLIC VALUES TO SYMBOLIC INNOVATIONS EVIDENCE BASED ON INTERNET-MEMES Mickael Benaim University of Manchester/MBS Manchester Institute of Innovation Research [email protected] Abstract Technological assets capture the attention of many scholars in innovation studies, while leaving other sources and forms of innovation less tackled. Among this neglected corpus, this article stresses the important role played by symbolic value in the production and consumption processes of innovative goods and services. We focus more especially on Internet-memes - such as lolcats - that represent iconic productions of the Internet ?lead culture? i.e. embed significant symbolic values. Therefore, this article refers to the economic sociology and strategic management literature to emphasis the force of the symbolic values? creation by new culture-lead communities, through their not so trivial productions: the Internet-memes. We especially aim to contribute to innovation studies and to refine the concept of symbolic innovation, by applying it to both physical and digital goods and services. We argue that Internet-memes are symbolic innovations per-se, but we also emphasise that they represent an almost boundless source of innovative goods and services in various sectors from cultural industries to less expected ones like finance. Jelcodes:O31,O33 ** Please do not cite without permission ** FROM SYMBOLIC VALUES TO SYMBOLIC INNOVATIONS EVIDENCE BASED ON INTERNET-MEMES Abstract: Many innovation scholars focused on technological assets, while leaving other sources and forms of innovation less tackled. Among this neglected corpus, this article stresses the important role plays by symbolic value in the production and consumption processes of innovative goods and services.
    [Show full text]
  • From Symbolic Values to Symbolic Innovation: Internet-Memes and Innovation
    Research Policy xxx (xxxx) xxx–xxx Contents lists available at ScienceDirect Research Policy journal homepage: www.elsevier.com/locate/respol From symbolic values to symbolic innovation: Internet-memes and innovation Mickael Benaim Manchester Institute of Innovation Research (MIOIR) AMBS, University of Manchester, Denmark Road, Manchester M13 9NG, United Kingdom ARTICLE INFO ABSTRACT JEL classifications: Innovation studies has largely focused on technological assets, while leaving other sources and forms of in- O33 novation less tackled. Among this neglected corpus, this article stresses the important role played by symbolic Z13 value in the consumption and production processes of innovative goods and services. I explore especially O39 Internet-memes that represent iconic productions of the Internet ‘lead culture’, which embed significant sym- M3 bolic values. This article therefore, refers to the economic sociology and innovation management literature to Keywords: emphasise the force of these creations of symbolic value by culture-lead communities, through their production Internet-meme of Internet-memes. I argue that Internet-memes represent a widespread source of innovation in various sectors Symbolic value (from cultural industries to less expect ones like finance). While exploratory, the present study extends the Symbolic innovation debate on the nature of innovation, its symbolic and cultural aspects and its diffusion processes. It ultimately suggests potential new paths for innovation policies to tackle these new forms of innovations. 1. Introduction creativity” (Solon, 2013). The diffusion’s power of memes is facilitated by specific platforms: such as dedicated blogs (e.g. 4chan, Reddit or In 1966 the Beatles were said to be more popular than Jesus. Half a Ihascheezburger); video platforms (e.g.
    [Show full text]
  • 3.5 Years of Augmented 4Chan Posts from the Politically Incorrect Board
    Proceedings of the Fourteenth International AAAI Conference on Web and Social Media (ICWSM 2020) Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board Antonis Papasavva,*,§ Savvas Zannettou,†,§ Emiliano De Cristofaro,*,§ Gianluca Stringhini,‡,§ Jeremy Blackburn#,§ *University College London, †Max-Planck-Institut fur¨ Informatik, ‡Boston University, #Binghamton University, §iDRAMA Lab {antonis.papasavva.19, e.decristofaro}@ucl.ac.uk, [email protected], [email protected], [email protected] Abstract tion of users who committed mass shootings (Austin 2019; Ali Breland 2019; Evans 2018). This paper presents a dataset with over 3.3M threads and 4chan is an imageboard where users (aka Original Posters, 134.5M posts from the Politically Incorrect board (/pol/) of or OPs) can create a thread by posting an image and a mes- the imageboard forum 4chan, posted over a period of al- most 3.5 years (June 2016-November 2019). To the best of sage to a board; others can post in the OP’s thread, with a our knowledge, this represents the largest publicly available message and/or an image. Among 4chan’s key features are 4chan dataset, providing the community with an archive of anonymity and ephemerality; users do not need to register to posts that have been permanently deleted from 4chan and are post content, and in fact the overwhelming majority of posts otherwise inaccessible. We augment the data with a set of ad- are anonymous. At most, threads are archived after they be- ditional labels, including toxicity scores and the named enti- come inactive and deleted within 7 days.
    [Show full text]
  • Verge 7 Iz in Ur Meme / Aminalizin Teh Langwich: a Linguistic Study Of
    Verge 7 Iz in ur meme / aminalizin teh langwich: A linguistic study of LOLcats Aliza Rosen Verge 7 Rosen 2 As far as Internet culture goes, the pairing of cat pictures with grammatically erroneous captions has become one of the most pervasive trends of the past few years. LOLcats, as they are termed – a combination of LOL, Internet slang for “Laugh Out Loud,” and cat, the domesticated feline found in perhaps too many American households – have evolved from an Internet fad to a culture all their own. That is not to say, though, that just any pair of a caption and a picture of a cat is a LOLcat; while websites like icanhascheezburger.com and lolcats.com accept submissions from all users, there is inarguably an art to creating a quality LOLcat. The trend inevitably evolves and new styles emerge, but the classic LOLcat embodies a certain few traits, specifically with regard to the captions created. This paper aims to examine LOLcat captions in terms of the language employed, which is notably distinct from correct English and yet is still intelligible to most English speakers. While it is understood that the language, called LOLspeak, inevitably encounters some variance among its users, the spelling changes and altered grammatical structure suggest a number of overlying patterns. Many have referred to LOLcat language as “kitty pidgin,” a kind of mangled English adopted by cats in order to communicate with their owners. However, the alterations that occur from English to LOLspeak do not completely match the usual characteristics of a pidgin language. In fact, they more accurately represent a mix of “baby talk,” the variation many adults use when talking to infants and toddlers, and Leetspeak, the Internet lingo developed mainly by those playing online video games like Counterstrike.
    [Show full text]
  • ARE YOU with ME? HOW ONLINE CONVERSANTS MAKE L33T CONNECTIONS C. Anne Engert
    ARE YOU WITH ME? HOW ONLINE CONVERSANTS MAKE L33T CONNECTIONS C. Anne Engert R yuo a l33t h4x0r? Can j00 pwn n00bs? sites, l33t has been used to help identify its “1|=\| 0u |{4N r34|) t|-|15t|-|3N\| 0u i5 t3|-| user communities in an environment with |_337” (Blashki 81). If the preceding puzzles unique linguistic needs. Remarkable the reader, I can understand. My first especially for its streamlined nature, online encounter with l33t—a shortened form of conversation strips communication of all its elite, alternately written 1337, leet, or leet physical properties—gesture, inflection, and speak—left me feeling much the same way facial expression—so that text must stand about this online linguistic phenomenon. I alone. Of course, communication by the old- wanted to know more. As a student of fashioned written letter also uses only text, English literature and a lover of language, but that form of exchange does not operate what I found sent shivers up my spine: an with the immediacy of online communication alternate alphabet with as many as a dozen where real time, turn-based conversations options for each standard letter; a wildly between two or more persons, some half a shifting substitution-cipher approach to world apart, take place regularly. spelling that mixes letters, numbers, and other Furthermore, where letter writing allows for keyboard characters; a new morphology more expansive expression, online (patterns of word formation) with its own conversation favors quick, concise response. unique word endings; a dizzying array of Internet communication channels such as acronyms for conversational use. I had the Twitter actually limit users to messages of impression that a whole new language was one hundred forty characters or fewer.
    [Show full text]
  • Why “Hacktivism” Can and Should Influence Cybersecurity Reform
    INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY “HACKTIVISM” CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM Brian B. Kelly INTRODUCTION ........................................................................................ 1664 I. CYBERCRIME, HACKTIVISM, AND THE LAW ......................... 1671 A. The Current State of Cybercrime ............................................... 1671 B. Defining Hacktivism and Anonymous’s Place Within the Movement .................................................................................. 1676 1. Hacking and Hacktivism ..................................................... 1676 2. Anonymous ......................................................................... 1678 C. Current Cybersecurity Law ....................................................... 1683 1. Federal Statutes ................................................................... 1683 2. National Defense Systems ................................................... 1684 3. State Monitoring Systems .................................................... 1685 4. International Coalitions ....................................................... 1686 II. CURRENT REFORM PROPOSALS ............................................... 1687 A. Obama Proposal ........................................................................ 1687 B. Republican Task Force Proposal .............................................. 1689 III. THE CYBERSECURITY REFORM SOLUTION ........................... 1692 A. Similarities in the Reform Models ............................................
    [Show full text]
  • 9781589019546 GURT 2013.Pdf
    Discourse 2.0 Georgetown University Round Table on Languages and Linguistics Series Selected Titles Crosslinguistic Research in Syntax and Semantics: Negation Tense and Clausal Architecture RAFFAELLA ZANUTTINI, HÉCTOR CAMPOS, ELENA HERBURGER, PAUL H. PORTNER, EDITORS Discourse and Technology: Multimodal Discourse Analysis PHILIP LEVINE AND RON SCOLLON, EDITORS Educating for Advanced Foreign Language Capacities: Constructs, Curriculum, Instruction, Assessment HEIDI BYRNES, HEATHER D. WEGER-GUNTHARP, AND KATHERINE A. SPRANG, EDITORS Implicit and Explicit Language Learning: Conditions, Processes, and Knowledge in SLA and Bilingualism CRISTINA SANZ AND RONALD P. LEOW, EDITORS Language in Use: Cognitive and Discourse Perspectives on Language and Language Learning ANDREA E. TYLER, MARI TAKADA, YIYOUNG KIM, AND DIANA MARINOVA, EDITORS Little Words: Their History, Phonology, Syntax, Semantics, Pragmatics, and Acquisition RONALD P. LEOW, HÉCTOR CAMPOS, AND DONNA LARDIERE, EDITORS Sustaining Linguistic Diversity: Endangered and Minority Languages and Language Varieties KENDALL A. KING, NATALIE SCHILLING-ESTES, LYN WRIGHT FOGLE, JIA JACKIE LOU, AND BARBARA SOUKUP, EDITORS Telling Stories: Language, Narrative, and Social Life DEBORAH SCHIFFRIN, ANNA DE FINA, AND ANASTASIA NYLUND, EDITORS DISCOURSE 2.0 Language and New Media Deborah Tannen and Anna Marie Trester, Editors GEORGETOWN UNIVERSITY PRESS Washington, DC © 2013 Georgetown University Press. All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage and retrieval system, without permission in writing from the publisher. Library of Congress Cataloging-in-Publication Data Discourse 2.0 : language and new media / Deborah Tannen and Anna Marie Trester, editors. p. cm.
    [Show full text]
  • Pop Culture Cats Part Two - Top Cats in Cyberspace by Ramona D
    Pop Culture Cats Part Two - Top Cats in Cyberspace by Ramona D. Marek, MS Ed The idea of captioning cat images dates back long before the Internet and examples include post cards created in 1870 by British photographer, Harry Pointer, in which he posed cats for a picture and later added a humorous caption. Parody of the 1970’s motivational poster with a cat dan- gling from a branch with “Hang in There” text serves as inspiration for today’s pop culture. Photographs with captions by Harry Pointer Cats on the Internet started in the early days of the millennium with “Caturdays” on the 4chan.org message board featuring captioned cat pictures called “lolcat” in 2005, with the domain name, LOLcats. com registered June 14, 2006. “Lolcat” is a compound word using the acronym for “laugh out loud” (LOL) and the word “cat”. The lolcat combines a cat image with an intended humorous caption, sometimes written in broken English. Some of the more humorous ones use correct English. The lolcat prowled around cyberspace until 2007, when its popularity surged thanks to “I CAN HAZ CHEEZBURGER?” posting its first image January 11, 2007. An Internet meme is an idea, style or usage that spreads quickly across the Internet often creating copycats. There are over 500,000 Internet cat memes according to the website Know Your Meme, which researches Internet memes and viral phenomena Above: the original “ICanHasCheese- burger” meme with its first rebuttal (left) A popular lolcat is Chemistry Cat meme, aka, Science Cat, which com- bines a professorial looking white cat attired in round black glasses and a red bowtie behind chemistry flasks and beakers with a series of chemistry jokes and puns primarily using the Periodic Table.
    [Show full text]