<<

Centre for the Study of Communication and Culture Volume 24 (2005) No. 4

IN THIS ISSUE Social Teaching in Educational Technology Programs

Sebastian Mahfood Ralph Olliges, Ph.D. Kenrick-Glennon Seminary Webster University Angela Astuto Betsy Suits Whitfield School International School Bangkok

AQUARTERLY REVIEW OF COMMUNICATION RESEARCH

ISSN: 0144-4646 Communication Research Trends Table of Contents Volume 24 (2005) Number 4 http://cscc.scu.edu Cyberethics: Social Ethics Teaching in Educational Technology Programs Published four times a year by the Centre for the Study of Communication and Culture (CSCC), sponsored by the 1. Introduction ...... 3 California Province of the Society of Jesus. Copyright 2005. ISSN 0144-4646 2. The Main Issues in Technology, Education, and Society ...... 4 Editor: William E. Biernatzki, S.J. A. Intellectual in ...... 4 Managing Editor: Paul A. Soukup, S.J. B. ...... 5 Editorial assistant: Yocupitzia Oseguera C. in Cyberspace ...... 6 D. ...... 8 Subscription: 3. Cyberethics in Education ...... 9 Annual subscription (Vol. 24) US$45 A. Cyberethics in Schools of Education ...... 10 B. Definitions and Dimensions of Cyberethics . . 11 Payment by check, MasterCard, Visa or US$ preferred. C. Resources ...... 13 For payments by MasterCard or Visa, send full account number, expiration date, name on account, and signature. 4. Cyberethics: The Canon of Literature ...... 14 Checks and/or International Money Orders (drawn on 5. Conclusion ...... 16 USA banks; for non-USA banks, add $10 for handling) should be made payable to Communication Research Editor’s Afterword ...... 17 Trends and sent to the managing editor Paul A. Soukup, S.J. References ...... 18 Communication Department Additional Resources ...... 20 Santa Clara University 500 El Camino Real Book Reviews ...... 22 Santa Clara, CA 95053 USA

Report from Spain ...... 36 For wire transfer, please contact the managing editor for A. Gender Studies in Communication Journals . 37 information. B. The Decline of the Radio in Communication Journals ...... 37 Address all correspondence to the managing editor at the address shown above. Report from Germany ...... 39 Tel: +1-408-554-5498 A. History of an Initiative ...... 39 Fax: +1-408-554-4913 B. Recent Books or Essay Collections ...... 39 email: [email protected] C. Zeitschrift für Kommunikationsökologie und Medienethik ...... 41 The Centre for the Study of Communication and Culture D. Association for the promotion of journalistic (CSCC) is an international service of the Society of Jesus self-regulation ...... 43 established in 1977 and currently managed by the E. The Network on the Internet . . 43 California Province of the Society of Jesus, P.O. Box 519, F. Yearly Meeting 2006 ...... 43 Los Gatos, CA 95031-0519.

2— VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS Cyberethics Social Ethics Teaching in Educational Technology Programs

Sebastian Mahfood Ralph Olliges, Ph.D. Kenrick-Glennon Seminary School of Education Saint Louis, Missouri 63119 Webster University [email protected] Saint Louis, Missouri 63119 [email protected] Angela Astuto Betsy Suits Whitfield School International School Bangkok Saint Louis, Missouri 63141 Bangkok, Thailand [email protected] [email protected]

1. Introduction

Technology is bringing postmodernism down to , which states that all persons should pursue earth itself; the story of technology refuses mod- the greatest —which is that which is good for the ernist resolutions and requires an openness to greatest number. This was juxtaposed in 1859 against a multiple viewpoints. Multiple viewpoints call further argument by that “the of forth a new moral discourse. The culture of sim- the individual, in things wherein the individual is alone ulation may help us achieve a vision of a multi- concerned, implies a corresponding liberty in any num- ple but integrated identity whose flexibility, ber of individuals to regulate by mutual agreement such resilience, and capacity for joy comes from hav- ing access to our many selves. But if we have things as regard them jointly, and regard no persons but lost reality in the process, we shall have struck a themselves.” These ideas were proffered to reinforce a poor bargain. (Turkle, 1996) sense of social responsibility that respects the and property of all—a social responsibility that seems Human societies have wrestled with ethics at least dichotomous in its recognition of both individual rights since ’s and ’s writings on the nature of and social obligations. This dichotomy, however, creates social responsibility and the role of the individual in a both/and rather than an either/or situation in its attempt society. This ethical system was joined by another to reconcile social responsibility with individual rights, within half a millennium with the advent of the Judeo- and it is for that reason that it is quite useful to us today Christian presence in the West. Both ethical systems in our response to the social realities of cyberspace (a formed the foundation of Western social development term coined by William Gibson in his 1984 novel over the following centuries though changing social Neuromancer). realities have necessitated a re-envisioning of what they mean for each new era. In “Teaching and Learning in the New In response to these changing social realities, Millennium: Transformative Technologies in a including a greater emphasis in the West on the creation Transformable World” (CRT, Vol. 22, No. 2, 2003), we of rights, personal property acquisi- focused on “the transformative nature of distance tion, and individualism, and the fact that ethics “must learning as it affects the teaching and learning environ- also consider the conditions under which what ought to ment created by the teacher and developed by the stu- happen frequently does not,” the Enlightenment philoso- dent.” There we traced trends in the development of pher (1785) introduced the idea of the distributive learning initiatives, in the education of the categorical imperative: “Act only [in such a way that various stakeholders, and in the management of cours- your actions] may be capable of becoming a universal es and materials. This was only part of the story, how- law for all rational beings.” In the next half century John ever, as a new trend has been emerging as a result of Stuart Mill and articulated the theory of the development of the virtual communities these tech-

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 3 nologies have made possible. When people come importance in this new medium, and educational envi- together online, their interaction with one another is ronments that are developed entirely within cyberspace called virtual because there is no face-to-face contact have a great obligation to ensure the authenticity of between them. The community that results often exists communal interaction. As leaders in teaching and exclusively in cyberspace—that is, a communicative research in an educational technology program, our space in which there is no physical contiguity between interest in ethical behavior in cyberspace relates to how communicants. People interact with one another it is modeled in the classroom and how respect for such through discussion boards or email (asynchronous behavior is instilled in future educators. This review forms of engagement) or through chat rooms or virtual focuses on the developing trends in education and in worlds (synchronous forms). The viability of the com- the literature to restore the study of ethics to main- munity rests on the integrity of its members. Social stream society brought about by the Internet as a com- responsibility, then, has become an issue of great municative environment.

2. The Main Issues in Technology, Ethics, and Society

Social responsibility involves respecting the to be privacy, accuracy, property and accessibility) lim- rights and property of others, but in a forum driven by its our pursuit of ethical social engagement. mediated communication the ease with which data can Ultimately, any relationship or interaction between two be accessed and manipulated often justifies ignoring or more individuals creates ethical space; hopefully, certain social standards people would not dare violate our exploration of these few issues will assist in the in face-to-face environments. The literature that focus- development of tools with which to engage others. es on cyberethics, therefore, includes exploration of A. Intellectual Property in Cyberspace the emerging practices in cyber law dealing with intel- lectual property rights in cyberspace. (Ethics is not to One of the most prominent issues in cyberethics be confused with law, but in cases where laws have and education stems from the ease with which emerg- been put in place to regulate social responsibility, we ing technologies allow educators to use, copy, and dis- cannot avoid discussion of the law.) Cyberethics also tribute material. Protecting intellectual property in includes the rights of the person to engage in free and cyberspace has become so challenging that the legal unrestricted commerce with others throughout the systems of nations around the world struggle to keep medium as long as the nature of that commerce is not up. As currently defined, intellectual property refers to harmful to oneself or others. This establishes a com- literature, artwork, music, , designs, and other municant’s right to anonymity, for instance, even inventions that result from an individual’s creative though anonymity is not a protected constitutional intellectual efforts. In identifying current issues regard- right like privacy. ing intellectual property, the World Intellectual In spite of the many ethical concerns arising as a Property Organization (WIPO) cites Internet resources result of new communicative technologies, the follow- as an area of specific concern and encourages “signifi- ing review of current issues will focus only on the four cant new research and study” (WIPO, n.d.). ethical issues most likely to warrant a teacher’s atten- These concerns prompted the WIPO treaties of tion in cyberspace: intellectual property, privacy, 1996, which call for the global protection of intellectual anonymity, and the digital divide. The digital divide, property. These include four treaties outlining the appro- which deals with the idea of access, is, in fact, likely priate treatment of industrial property and two outlining the most pressing problem of the 21st century since all the appropriate treatment of copyright and related mate- other concerns are relative to that one. In our focusing rial. The results of these treaties have since been inter- on just this handful, moreover, we do not mean that our preted by such groups as the World Trade Organization’s readers should conclude that there are only these few TRIPS (Trade-Related aspects of Intellectual Property issues, and like Fairweather (2004) have rights) Council, the European Union in its EU Copyright admonished that focusing on incomplete codes of Directive of 2001, and the U.S. government in its Digital ethics found in the big four issues (which he considers Millennium Copyright Act of 1998, which includes one

4— VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS section devoted entirely to online copyright infringe- tinue to play a significant role in the future of online ment, and the Technology, Education, and Copyright mediated communication and data transfer. Harmonization Act of 2002, which granted almost the At the present time, almost every organization to same rights to distance learning environments as which Internet users provide their contact information enjoyed by face-to-face learning environments. The explicitly posts some form of privacy statement. The American Library Association has a comprehensive broadband DSL connection from SBC Global, used by report on this at http://www.ala.org/washoff/teach.html, the authors, assures in its privacy statement: and the University Continuing Education Association We understand the of keeping your per- provides a quick breakdown of it at http://www.ucea sonal information private, and we have designed .edu/salomon.htm. this software to collect only the amount of infor- These latest interpretations of the WIPO treaties of mation you disclose, and to use that information 1996 seem to indicate that the trend of the 21st century only for the purpose of supporting your Internet will be in the direction of developing media forms to connection. This program does not monitor your extend the ability of people to filter and interact with activity on your computer and does not track information that is already available to them. Laws like your use of the Internet or any Web sites. Your the Digital Millennium Copyright Act of 1998 and the provider asks that you register SmartConnect, Technology, Education, and Copyright Harmonization and provide your e-mail address and telephone Act of 2002 serve as a new foundation for media as it number so that we may verify you as a registered shifts from analog to digital transmission. As far as user to provide customized benefits and servic- teaching and learning is concerned, we may see the trend es. The identification information you provide is securely stored and will not be disclosed to third moving in the direction of greater reliance on the multi- parties without your . media forms of three-dimensional imaging merging with audio and video. Students may see their online instruc- This statement is designed to elicit trust from the con- tors as conversational holographic images in their own sumer though in one instance while researching infor- homes—the individualization of instruction moving mation on the ethics of cybersex, a warning flashed from warehousing students in classrooms to enabling across the screen that the sites being visited were students to work with a multiplicity of experts in the tracked. After all, it is because the monitoring activity implementation of their individual education plans. is working that companies like Verizon have records B. Privacy for the RIAA to subpoena in the first place. Likewise, providers of spam offer the option to unsubscribe to the How far might a just society go in the preserva- spamming list though there is a cyberlegend that if one tion of privacy rights? “Each person,” wrote John does so, it only confirms for the spamming company a Rawls, “possesses an inviolability founded on live email address that can be sold on a . That that even the welfare of society as a whole cannot over- is, in fact, how many spammers harvest email address- ride” (1999, p. 3). With ever-increasing pressures from es—from the of all those companies to which corporations to enforce copyright legislation, the trend consumers provide their contact information and their is moving in the direction of encroaching on privacy preferences and fail to deselect the box that promises to rights. This right is all but abrogated in a climate where keep them alert to the deals of their affiliates. Other a corporate entity like the Recording Industry spammers employ web crawlers, or spiders, to search Association of America (RIAA) can subpoena Internet through websites and harvest anything that looks like service providers (ISPs) to turn over records that indi- an email address. cate where their subscribers have visited and what it was they did while there (McCullagh, 2003). Using the Publishing anything online exposes us to advertis- Digital Millennium Copyright Act of 1998 as the vehi- ing in the same way that our driving down a highway cle to argue its case, the RIAA opened the door to the might, but instead of its being a mere distraction along distributed monitoring of everyone’s online activity the way, spam produces the rather harmful effects of before it was closed again by the U. S. Court of exhausting mailbox capacity and costing time in sifting Appeals on December 19, 2003 (RIAA v. Verizon through hourly mail. Sometimes spam arrives because Internet Services, 2003). The important thing to note is tracking devices on other people’s websites monitor the that this is a swinging door—privacy issues based on Internet Protocol (IP) addresses of all of their visitors, the prosecution of intellectual property theft will con- decode the hosting company and the name of the client,

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 5 and then carpet bomb all e-mail aliases that might be viduals, no matter the consequences. These rights attributed to the name signed onto the account. This include , confidentiality, informed consent, explains why people receive e-mails from parent com- etc. The protection is emphasized as an absolute value panies and their affiliates that resemble in content the that cannot be overridden by possible benefits gained at sites they have recently visited. In short, while online the cost of compromising these rights. However, U.S. privacy is an interesting theory, a journey through law regarding data privacy appears to clearly favor cyberspace is probably the most public thing we do; if economic interests, including those of corporations only for that reason, we should base all of our cyberac- over individual rights. This contrast between European tions on the idea of social responsibility, on the idea that and U.S. approaches can be seen in the NESH guide- we are accountable to others for everything that we do. lines. Europeans endorse human rights, even if these In light of these threats to the right of privacy in endorsements may lead to greater restrictions on one’s person, house, papers, and effects, some watchdog research. For example, the U.S.-based research guide- organizations seek to fight any attempts to infringe upon line that focuses on the protection solely of the indi- a person’s ability to use the Internet in socially responsi- vidual who participates in a research project contrasts ble ways. They include the Electronic Privacy with the NESH guidelines that “require researchers to Information Center (www.epic.org), “a respect not only the individual, but also his or her pri- research center in Washington, DC . . . established in vate life and close relations.” 1994 to focus public attention on emerging civil The differences in implementation through “either issues and to protect privacy, the First Amendment, and [current U.S.-style] liberal, market based governance or constitutional values,” and its sister site in England called [current E.U.-style] socially-protective, rights-based Privacy International, which “is the first successful governance” affects cyberethic laws. Both U.S. and attempt to establish a structured world focus on this cru- European laws are rooted in a shared conception of fun- cial area of human rights. Privacy International is an damental human rights. These are based on the 1950 independent, non-government organization with the pri- European Convention for the Protection of Human mary role of advocacy and support.” Both the Electronic Rights and the U.S. itself. There is still a Privacy Information Center and Privacy International debate regarding the comparison between online com- support a composite site called Privacy.org (www.priva- municative venues and “public spaces” (Ess, 2001). cy.org), which “is the site for daily news, information, While there are some safeguards already in place and initiatives on privacy.” The Privacy Rights to protect our privacy, we must take advantage of them Clearinghouse (www.privacyrights.org), provides vital and work to ensure that our Internet service providers information for readers to learn about their rights under maintain the confidentiality of our search queries lest the law. In addition to the materials provided by Harvard the information we broadcast be used in any number of Law School’s Berkman Center for Internet and Society, a ways against us. Because the trends in the U.S. have host of materials concerning privacy in cyberspace can been in the direction of corporate use of copyright law be found at http://cyber.law.harvard.edu/privacy/. Of to violate personal privacy, we should expect that our course, not all such sites are geared for adult users, as access logs may one day become public property. attested by one called Kidz Privacy, maintained by the C. Anonymity in Cyberspace U.S. Federal Trade Commission (www.ftc.gov/bcp/con- Unlike privacy, anonymity does not receive gov- lin/edcams/kidzprivacy) to provide guidelines in text and ernment protection, even where the disclosure of iden- audio that aim to prevent kids from giving out too much tities might have a debilitating effect on involvement personal information on the Internet and to prevent web- with online communities as, for instance, in the case of sites geared toward children from requesting it. This persons involved in religious websites that seek to requirement is mandatory for all children under the age of evangelize individuals living under oppressive 13 due to the Children’s Online Privacy Protection Act regimes. The lack of protection might also compromise (COPPA), which took effect in April of 2000 whistle-blowers as they go online to anonymously pro- (http://www.privacyrights.org/fs/fs21-children.htm). vide a tip to agencies like the Environmental Protection American and European laws differ. The Agency or the Food and Drug Administration that European Union Data Privacy Protection laws and eth- oversee their company’s actions. Many cyberethicists, ical codes for research (primarily, the NESH guide- such as Wolf (2003), have explored the need for free lines) more fully endorse protecting the rights of indi- speech on the Internet in these kinds of terms.

6— VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS If intellectual property rights raise questions about ly subvert. When each player can create many the problematic nature of the Web as an information characters in many games, the self is not only transmission tool, then a discussion of anonymity raises decentered but multiplied without limit. questions about the Web as a community transaction tool. Of course, there is a problem in turning a MUD into a Apart from any consideration of anonymity, teachers teaching and learning environment. When students should recognize that chat rooms for students are proba- enter these virtual worlds with their teachers, naturally, bly going to be textually-based, favoring those with faster they lose their anonymity; they will know that at least typing skills and quicker cognitive processing skills, not one person knows them in a real-life context. This loss necessarily benefitting others in this medium as it is of anonymity can compromise the freedom with which understood under play theory. For that reason, we see a they explore their own identities, reconstruct their own trend towards a shift of academia into two- and three- worlds, and engage others in virtual communion. What dimensional graphics-based virtual communities (multi- they lose in play, though, they will make up in authen- user dimensions or MUDs) within which people can ticity, in the establishing of social relationships based on roam and re-embody themselves as they engage in dis- their relatively truer personalities. In class, they might cussion with others. The Palace (www.thepalace.com), a maintain something of the structure of their learning two-dimensional graphics-based chat world is one place environment, but who is to say they will not experiment in which to engage others. Cryopolis [now, Kyela] with these virtual worlds outside of class under pseudo- (www.cryopolis .com), a site managed in France, is a 3D nyms their classmates will not recognize and in that graphics-based world that, like Worlds (www way realize the value of anonymity in their coming to .worlds.com) and ActiveWorlds (www.activeworlds know themselves in relation to others better. This kind .com) gives the user a virtual tour through a number of of open communication on the Internet is useful for venues. ActiveWorlds not only allows one to explore a community building as long as it provides opportunities three-dimensional world on one’s own, but it also pro- for meaningful, and never harmful, interaction. vides some world-building tools, like the two-dimension- In spite of the long-term benefits of anonymous al The Palace, that enable the user to create his or her own play, we might consider that the more immediate use of virtual spaces. The site promises “a community of hun- anonymity is to ensure an individual’s protection in the dreds of thousands of users that chat and build 3D virtu- face of prosecution or to enable an individual to seek al reality environments in millions of square kilometers when the disclosure of his or her identity would of virtual territory” and is especially inviting to educators prevent that. Kling, Lee, Teich, and Frankel (2000) who want to meet with their students there and use the examine “the social character of anonymous communi- three-dimensional space as a teaching and learning envi- cation and the ways that anonymous communication ronment. Turkle (1996) explains the draw of virtual com- has played important roles for professionals such as munity interaction: journalists and police.” Furthermore, they demonstrate MUDs imply difference, multiplicity, hetero- how “the openness, decentralization, and transnational geneity, and fragmentation. Such an experience character of the Internet challenge the efficacy of tradi- of identity contradicts the Latin root of the word, tional control mechanisms and have raised issues relat- idem, meaning “the same.” But this contradiction ed to , law enforcement, security and pri- increasingly defines the conditions of our lives vacy, governmental empowerment, and e-commerce.” beyond the virtual world. MUDs thus become Moreover, anonymity fosters a kind of narrative rea- objects-to-think-with for thinking about post- soning where different solutions to the same problems modern selves. Indeed, the unfolding of all MUD can be tested over time. To facilitate this, the American action takes place in a resolutely postmodern Association for the Advancement of Science has devel- context. There are parallel narratives in the dif- oped a series of case scenarios (www.aaas.org/spp ferent rooms of a MUD. The cultures of Tolkien, Gibson, and Madonna coexist and interact. Since /anon/cases) to provide an opportunity for exploration MUDs are authored by their players, thousands and discussion of issues like crime solvers’ websites of people in all, often hundreds at a time, are all and online chatting about addictions. Testing solutions logged on from different places; the solitary in a safe, role-playing environment—in effect creating author is displaced and distributed. Traditional a simulation that uses open-ended and negotiable real- ideas about identity have been tied to a notion of ities akin to Boalian Forum Theatre (Boal, 1979), authenticity that such virtual experiences active- which articulates a theory of forum theatre to break

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 7 down the barriers separating the audience space from eracy transformed us from creatures of acoustic per- that of the actors—opens all participants to the idea of ception into creatures of visual perception. Ong argues an infinite web of possibilities for understanding their that we would reach this secondary orality after a tran- own character and for understanding their interactions sition into literacy. While we can see secondary orality with others in developing a sense of social responsibil- developing in society as a result of the saturation of the ity and community purpose. audio/visual materials we enjoy from new technolo- D. Digital Divide gies, we will find that the transformation into a sec- ondary orality does not require the initial transition into The digital divide is not simply an economic issue literacy for which Ong argued. While Ong was correct that can be resolved by providing computer hardware and in his understanding of the differences between oral software to homes too poor to afford them. Carvin (2000), and literate cultures, his literate consciousness enabled writing for the Benton Foundation, argues that the digital him to see only the linear (or sequential) progression in divide is actually about content, literacy, pedagogy, and development from orality through literacy and into community. Moreover, it has nothing to do with an indi- hyperliteracy, and this caused him to claim that one vidual’s race or gender, though there are conflicting argu- cannot achieve secondary orality without first becom- ments on this (Fujimoto, 2003; Hubbard, 2000; Gaiter, ing literate. Because he did not possess a hyperliterate 1997). It is foremost an educational issue that involves consciousness, he did not know that the polyvalency of teaching people how to engage these technologies as pro- secondary orality creates a merger of the visual and ducers rather than just consumers of content and commu- acoustic consciousnesses that belies linear thinking. nity. It is also an issue of accessibility for persons with dis- This phenomenon could be salvific in communities that abilities (Seminerio, 1999; TRACE, n.d.), of improved have low levels of literacy due to the lack of relevance educational services for children of migrant workers that literacy-based cultures have had for them. The (Carr, 2003), and of intercultural engagement between all merger of orality and literacy in a world that is increas- interconnected communities. When people focus on the ingly based on acoustic imaging calls educators not digital divide, however, they often see only the economic only to train themselves in the ethics of cyberspace but issues because they look at the deficits of the have-nots to learn to recognize the patterns of cyberspace’s effect rather than at the surpluses of the haves. While many on culture so that they can teach the have-nots through schools have no developed computer labs, no computers their own cultural lenses rather than through the prac- or projection equipment in the classrooms, no education- tice of deficit-filling. al technologist on staff, no teachers trained in cyber-ped- As public access becomes more available through agogy, and no students who have computers or Internet libraries, community centers, and churches, the social connections at home, there exist those schools that have relevance of cyberspace as a tool to teach intercultural- all of those things in such an abundance that the members ism will become stronger. Already, there are a number of their teaching and learning communities actually have of places users might try to transform by their presence, a different kind of consciousness about the way in which including one that focuses on underdevelopment called to interact with their environment. This consciousness “Virtual Worlds: Large Scale Learning Resources” should be used to create a world in which those who have (www.bized.ac.uk/virtual/home.htm). This site is text- nothing will be able to thrive as much as those who have based with still images and maps (which means that it everything—in short, it is the responsibility of the haves will load easily on slower modem connections), and it to ensure continuous access and learning opportunities for contains three useful projects for the exploration of the have-nots. generative development, including the virtual develop- Ong (1982) argues that technology transforms ing country, the virtual factory, and the virtual econo- consciousness, noting that a qualitative difference my. The player does not have to respond to the scenar- exists between the literate and oral minds. He implies a ios by applying deficit theories and trying to figure out qualitative difference between the hyperliterate and lit- what to add to make these environments more like erate minds. He predicates this secondary orality upon those in developed countries; in fact, the player might the dual consciousnesses of primary orality and litera- find solutions that respect the cultural identity of the cy that is sweeping across our society in the form of people living under conditions that are unfamiliar to audio/visual methods of communication that will, in those of us in the West, and these realizations might be the spirit of McLuhan, transform us into creatures of useful in players developing an understanding of how multisensory perception in the same way the rise of lit-

8— VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS to find solutions for impoverished areas within Western evance than currently exists. What will stand in the countries. Interculturalism within and between devel- way of this are the state and federal standards that oped and developing countries is not a new fad; in fact, measure black or Hispanic, lower-class, inner-city it has been a trend in progress ever since audio/visual norms and white, lower-class, rural norms (or some technologies opened the world to globalization. The mixture of any of these variables) against white, mid- reason we need to recognize the directions in which dle-class, suburban norms and dictate the deficits that trends like these are naturally taking us is so that we must be filled (See Neill, 2003; Rethinking Schools can better prepare for a future that we cannot presently Online, http://www.rethinkingschools.org/special_ understand, and that future is a truly global and inter- reports/bushplan/; NCLB, http://www.ed.gov/nclb connected community. /landing.jhtml). Those learning communities that can- The federal government in the United States is not meet average scores on standardized assessments trying to increase the cohesiveness of that global com- will be penalized in ways that do nothing to foster the munity through fostering greater technological access kind of social relevance that would, if nurtured, pro- (see the U. S. Department of Education’s Office of duce results quite different if measured under another Educational Technology, http://www.ed.gov/about set of standards (Saltpeter, 2003). /offices/list/os/technology/), and improving upon cur- To qualify this, of course, it is important to note rent pedagogical methods with its No Child Left that very little research that meets the definition for Behind (NCLB) law (http://www.ed.gov/nclb/land- scientifically based standards as defined by NCLB has ing.jhtml), which seeks “increased accountability for been conducted on the effectiveness of educational States, school districts, and schools; greater choice for technology. There needs to be further investment in parents and students, particularly those attending low- research and evaluation studies to demonstrate to pol- performing schools; more flexibility for States and icy-makers the impact that educational technology has local educational agencies (LEAs) in the use of Federal on learning. The U.S. Department of Education is education dollars; and a stronger emphasis on reading, investing more than $56 million to study the “condi- especially for our youngest children” (see also Brown, tions and practices under which technology is used to 2003). The expectation in these guidelines is that stu- document its impact on student performance” (Bailey dents will achieve technological literacy by the eighth & Mageau, 2004). While federal funding is necessary grade. While there have been innumerable difficulties to support this requirement, Ishizuka (2004) points out in the practical implementation of this plan from the that Congress is not entirely behind the idea of pro- standpoint of perceived social irrelevance in inner city viding the means as a House appropriations bill threat- and rural communities, the idea of providing greater ened to slash funding for school technology initiatives flexibility for “local educational agencies in the use of by $91 million for the fiscal year 2005. Perhaps what Federal education dollars” might help foster individual NCLB might do in pursuit of this end is reconfigure education plans for each of the communities along the the measurement tools to be culturally inclusive lines of cultural imperatives like respect for home because they are based on an exclusively visual con- dialects, bilingual education, and curriculum adapta- sciousness that is growing outdated in a world of sec- tion in the basics of reading, written and oral composi- ondary orality that relies on both an acoustic and visu- tion, and arithmetic to engender a greater sense of rel- al consciousness.

3. Cyberethics in Education

Having explored four of the major issues in Technology Standards as its mandate. Most states in cyberethics, we now turn to how these play out in edu- the United States have adopted ISTE/NETS into their cational environments that are becoming increasingly governing policies for both elementary and secondary technologized. Since it is important for teaching prac- learning institutions and institutions of higher learning, titioners to pass of social responsibility on to and this has special meaning for those studying in uni- their students, the International Society for Technology versities to become classroom teachers. Of the many in Education has established the National Educational disciplines in higher education, those that have devel-

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 9 oped a reliance on computer technologies have created dent population. As student demographics change, teaching and learning environments that deal with the learning disabilities increase, and competencies expand ethics of computers as a separate category of profes- in range, the technologies that assist in broadening the sional ethics. In the past 15 years, a dozen or so cours- methods teachers can use to engage their students, to es in have also appeared in various reach different learning styles, and to attract the inter- universities as part of computer science programs or ests of students motivated by different things will departments of . While there are a healthy become more prevalent. For example, students present- number of courses concerning the idea of technology, ly build web pages and have email addresses—they are ethics, and society finding their way into teacher for- engaged, as a result, in communities larger than them- mation programs at universities around the world, this selves—and when they do research online, they have to important element of technology and education is over- learn how to separate viable information from useless looked in many programs. information and not be swayed from their studies by A. Cyberethics in Schools of Education the myriad of distractions that exist online. The instant community that the Internet provides requires ethics as With all this insistence on maintaining ethical stan- a complementary field of study. In short, cyberspace dards and on teaching ethical behavior, it is only natural should popularize ethics, bringing it into the structure that ethics should make its appearance in departments of and content of teaching. education and in new academic disciplines that involve Webster University’s Educational Technology teaching and learning. Some departments of education, Program course “Technology, Ethics, and Society,” however, offer no courses in ethics in their graduate edu- indicates that it cation program. Some schools place the word “ethics” in a course description, but it is buried amid a plethora of will engage social ethics in response to its many other worthwhile topics to teach. Thus, this leads impact on the developing technologies of global many to question how much, if any, ethics is really being societies. We will explore the idea that tradition- taught. Some schools, like Webster University, offer no al concepts of ethics insist that people in social relationships be treated as ends, in and of them- ethics course in the school of education, but do offer one selves, and never as means to the ends of others. in the Master of Arts in Teaching’s educational technol- Since all technologies evolve from our social ogy emphasis within the school of education. In practice, relationships, no technology is value-free. this means that future educators out of Webster Because of the value-laden nature of technolog- University who do not elect to cross-register into the ical developments, new technologies are charac- educational technology emphasis will complete their teristically defined as both socially-determina- degrees with no systematic course in the study of ethics. tive and socially derived. (Mahfood & Sujdak, More broadly, it indicates a considerable need for edu- 2003) cational technology programs to complement what is The course focuses not only on an exploration of issues done in schools of education rather than to compartmen- surrounding intellectual property rights, privacy, and talize themselves or be compartmentalized away from anonymity, but it also engages students in interpreting the mainstream of their parent school. Within a decade the transformative nature of the technologies we use as this ethics gap should disappear as the core program of extensions of ourselves in the world. In this way, stu- mainstream education integrates educational technology dents engage their core project, which is the analysis of because people will no longer be able to teach courses their most pressing question in the use of these tech- like curriculum development or instructional design nologies within the social construct of a teaching and without using the tools teachers will have available to learning environment and in the context of their issue’s them in the classroom. Until then, we face another gen- having a role within the greater society. Such courses eration of teachers entering their classrooms over the herald the future of educational technology programs next 10 years with no direct instruction in handling the because they deal with the very thing that makes edu- new social context created by their technologized teach- cational technology possible—the idea of social ing and learning environments. responsibility in a distributed learning framework. Not just another new program, educational tech- Even if a trend towards courses in cyberethics nology strikes at the core of teaching, of using new within educational technology programs is not readily tools to engage an incredibly dynamic and increasing- apparent, the trend toward the adoption of educational ly diverse kindergarten through graduate school stu-

10 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS technology programs themselves by schools of educa- established by that community, and these can vary tion is fairly pervasive. Because these programs teach depending upon the nature of the community and the teachers how to functionally integrate various tech- level of commitment of its members. In some online nologies into their daily curriculum, they will also have communities (e.g., The Palace or ActiveWorlds), the to teach teachers how to assess the impact on student way a person re-embodies him- or herself through the involvement and understand the effect these technolo- choice of a graphical image called an avatar is immate- gies have on the social realities of the classroom. rial; the narrative development of the character a per- Moreover, teachers using these technologies in their son chooses to portray seems most important to build- classrooms will have to teach their students to engage ing connections within that environment. Turkle (1996) them appropriately, even if the first things that come to explains: their minds are to warn the students against plagiariz- People can get lost in virtual worlds. Some are ing from online resource materials and to advise them tempted to think of life in cyberspace as insignif- against burning music CDs through the school’s high- icant, as escape or meaningless diversion. It is speed network. The more the students work with these not. Our experiences there are serious play. We technologies in the context of their classroom, the more belittle them at our risk. We must understand the rules the teacher is going to find him- or herself inter- dynamics of virtual experience both to foresee preting for them—it is wrong to read another person’s who might be in danger and to put these experi- email using a stolen password; it is wrong to sign one’s ences to best use. Without a deep understanding classmates up for free porn; it is wrong to data stream of the many selves that we express in the virtu- private conversations into public multi-user dimen- al, we cannot use our experiences there to enrich sions. Teachers will need tools to help them deal with the real. If we cultivate our awareness of what these situations, and once the idea of the average stands behind our screen personae, we are more teacher’s being the educational technologist for his or likely to succeed in using virtual experience for personal transformation. her room becomes commonplace, as a prelude to the emergence of these programs into mainstream educa- In educational online communities, re-embodiment is tion requirements, every educational technology not a strong issue, primarily because the main online department in every university should add an ethics course templates (Blackboard, WebCT, and the like) component, and, perhaps, these courses will become are entirely text-based and usually asynchronous; what capstone requirements for every educational technolo- is sought, moreover, is an academic rather than social gy program, as is proposed at Webster University. authenticity in communicating with others in the learn- B. Definitions and Dimensions of Cyberethics ing environment. In both cases, however, and in the range of options in between, respect for others and for When universities require these courses, we oneself is the most highly valued quality in maintain- expect a variety of curricula and a canon of literature ing the viability of the social engagement. on cyberethics. In order to situate the present review, Authentic mediated communication strategies in we propose this definitional formula: If ethics implies virtual spaces are attainable provided the structure of the rules of social engagement and responsibility, then environment fosters trust between members. In synchro- cyberethics implies the rules of social engagement and nous engagements, people participate in real time con- responsibility in cyberspace, the commons on which all versation with one another and develop a sense of trust who connect to the global information infrastructure over time. Their ability to be comfortable with the dis- (the Internet) find virtual spaces in which to meet and cursive environment they inhabit enables them to mean- share information. Cyberspace is different from geo- ingfully engage strangers to their community. Their habi- graphic space because it is everywhere and nowhere at tus creates a zone that lends itself to welcoming others once; that is, there is no physical engagement or face- provided those others behave according to the established to-face interaction in contiguous geographical space. norms of the community, provided they play fairly and People find each other in cyberspace as they follow appropriately within the world they have a share in creat- their varying interests and stumble (or are invited) into ing. Of course, there are plenty of opportunities for peo- chatrooms or webspaces that allow for textual, graphi- ple not to play by the rules of a discursive environment; cal, or audio-visual engagement with others within sometimes people act socially irresponsible and know- those spheres. Once within an interactive space, every- ingly violate the established etiquette of a given space. one within the community has to operate by the norms

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 11 Dibbell (1998), for instance, describes one such violation Play, according to Rieber “is an important mediator for in a multi-user dimension. (These are also called multi- learning and socialization throughout life” (1996, p. user dungeons based on the Dungeons and Dragons 43), and play theory is concerned with our use of play games from which they derived. Multi-user dimensions, to construct meaningful teaching and learning envi- object-oriented are called MOOs, and are like MUDs in ronments. Play increases communication and social all regards except that the user also gets to “interact” with interaction, and when it uses cyberspace as a medium, or manipulate inanimate objects created by other users.) it opens itself to explorations far beyond what con- Dibbell writes of a rape in cyberspace, an instance where tiguous time and space have heretofore provided it. a group of New York University students aggregated Rieber ([email protected]), who teaches a doctoral themselves into a single character in one of the most pop- seminar about play theory is interested, moreover, in ular object-oriented multi-user dimensions (Lambda- how play theory affects instructional technology; and MOO) and forced a couple of characters to violate them- by extension, in how play theory can be used in both selves sexually. Rape, because of its violence against an synchronous and asynchronous mediated communica- unwilling member of the social body, because it violates tion environments. In MUDs and MOOs, users not the integrity of another’s space, is always wrong, so a vir- only create their own environments through which tual rape, an act of violence against an unwilling member they can interact with others, but establish these envi- of the social body, because it violates the integrity of ronments as safe places for play due to the nature of another’s cyberspace, is equally always wrong. the social interaction that occurs within them. Turkle Violations like this do the opposite of engendering trust (1996) believes that within the community—they inspire fear and anger—and the anonymity of MUDs gives people the chance in the case of LambdaMOO, they inspired the communi- to express multiple and often unexplored aspects ty to seek justice by banning the perpetrator forever from of the self, to play with their identity and to try the community space. The community had no laws, no out new ones. MUDs make possible the creation precedents, for what to do in that instance, and after an of an identity so fluid and multiple that it strains extended debate, in which a consensus of the governing the limits of the notion. Identity, after all, refers council could not be achieved to oust the violator, a lone to the sameness between two qualities, in this wizard (or judge) assigned the death penalty and case between a person and his or her persona. destroyed the rapist forever—or, at least, until the rapist But in MUDs, one can be many. resurrected himself under a different login name. The While synchronous text-based chat rooms lend them- important thing is that the community came together in a selves to the exploration of character and social inter- democratic dialogue and examined all of its options. It action, graphics-based chat rooms lend themselves to took a certain kind of intimacy for those within the com- the exploration of physical identity. In ThePalace.com, munity to open themselves in that kind of dialogue, a cer- for instance, visitors can login, like in a text-based tain amount of trust and respect for the community as an MOO, under any pseudonym, and they can engage in autonomous entity with its own kind of integrity. After a text-chat under whatever conditions of textuality all, had the members of that community not cared about they choose to explore; however, because sustaining it, they would simply have never logged back ThePalace.com is, in addition, a graphics-based chat, in. Instead, they chose the harder path, that of dialogue visitors can also modify their appearance through the with one another in an attempt to make their community manipulation of their avatar, their re-embodied pres- stronger. This kind of authenticity does not fade away but ence in cyberspace, in any way they choose. Visitors is maintained through the social bonds engendered with- can become transgendered, transracial, and, in count- in all viable communities. Society’s reason for persever- less other ways, transfigured beyond their actual ance is contained in the belief that social interaction is our appearance; as a result, they end up affecting social most important human quality, and to sacrifice the good space in different ways than were they to enter dressed of the whole because of the occasional inappropriateness as themselves. Now, one would think that the lack of of others would be to lose something fundamental with- authenticity in appearance and in the way the re- in our collective humanity. embodied self has to interact with others based on that In a sense, all of our social interactions can be appearance would cause a lack of authenticity within seen through the lens of something called ludology, the social relationships that exist at, say, a place like the science of games, or, more simply, play theory. ThePalace.com. After all, there are literally (and figu-

12 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS ratively) hundreds of personae onscreen at any given communication methods (http://www.westga.edu/~dis- time in the labyrinth of rooms that comprise tance/ojdla/spring41/gearhart41.html). ThePalace.com. Oddly, such a thing does not happen; C. Resources moreover, the regular members succeed in their encul- turation of the newcomers and in their carte blanche To support education both at the level of the use acceptance of every person in whatever guise that per- of technology and at the level of social responsibility, a son assumes. The only explanation for this acceptance host of online materials aims specifically at helping is play theory, and in the world of online educational teachers teach their primary and secondary school stu- platforms, it is play theory at work that brings togeth- dents about the use. For elemen- er into a functional teaching and learning community tary school students, there is Cyberethics for Kids 15 people who had no relationship with one another (http://www.cybercrime.gov/rules/kidinternet.htm), the prior to their meeting in that course. kid-friendly version of the more adult Computer Crime While play theory can take us far in our under- and Intellectual Property Section (CCIPS) of the standing of social interactions online, it obviously has its Criminal Division of the U. S. Department of Justice limits when people abuse their social responsibilities. If (http://www.cybercrime.gov; see also http://www cyberethics is really about social responsibility in cyber- .usdoj.gov/criminal/cybercrime/cyberethics.htm), space, then some rules have to apply to the game. These which focuses on why hacking is wrong and presents a rules are couched in the definitions and implications of number of case scenarios that walk students through the field of ethics, and there are a host of available web- the consequences of what might happen were they to sites that apply this field to cyberspace—Google listed engage in online unethical behavior, such as using 7,850 of them on the search word “cyberethics” in another person’s password to send hate email to all of December of 2003 and 22,500 of them on the search her friends. There is also the Business Software word “cyberethics” in May of 2005, an increase of Alliance’s PlayItCyberSafe site for kids, parents, and almost 300% in only 18 months. Dr. Edward F. teachers (http://www.playitcybersafe.com) that Gehringer, of the Department of Computer Science at includes games like PiracyDeepFreeze prompting kids North Carolina State University, has constructed a site to “stop the pirates from freezing the city! Throw your that has a visual map in the shape of a continental coast- ball into the pirates and their stolen software before line with eight “countries” on it, each named after a par- they hit the ground.” ticular cyberethical issue: commerce, social justice, For middle school students, there are the computer abuse, speech, privacy, intellectual property, Adventures of Cyberbee (http://www.cyberbee.com), basics, and risks (http://legacy.eos.ncsu.edu/eos an interactive site that engages students in treasure /info/computer_ethics). Through each of the map’s hunts, in interactive projects with other middle school hotspots, the user can reach an anthology of links on top- students around the world, in an exploration of research ics as esoteric as immigration rights for foreign comput- tools, and, most importantly, in an understanding of ing professionals or on topics as common as fair use copyright issues and plagiarism. McGraw-Hill and the guidelines in the inclusion of educational technologies in Cyber Smart School Program even offer a free K-8 the classroom. Dr. Nick Burbules, who teaches the cyberethics curriculum (http://www.cybersmartcur- Ethical and Policy Issues in Educational Technology riculum.org), which is designed to “empower students course at the University of Illinois at Urbana- to use the Internet safely, responsibly, and effectively.” Champaign, posted a student project online that provides For high school students, Karen Bradley’s course in a model for educational standards that might be adopted technology, ethics, and society at the Head-Royce col- by programs that use educational technologies to inter- lege preparatory school in Oakland, California act with their students in the classroom (http://lrs.ed (http://ns.headroyce.org/~kbradley/ethics/index.html) .uiuc.edu/students/tsullivl/304Su01/ethics/handel.htm). provides an interesting model for the introduction of Deb Gearhart, Director of Distance Education at Dakota cyberethics courses into other high school programs. State University, provides a mission statement for edu- Opportunities exist on all educational levels, then, for cational standards that might be adopted by programs students to be enculturated into cyberethics where the that have developed distance education courses in which wisdom of their parents and teachers in the realm of students engage one another entirely through mediated social responsibility will be of real use to a generation whose technical abilities exceed their experience.

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 13 Sites that could serve as resources for teachers Center for Internet and Society hosts a lecture series include the Media Awareness Network (http://www entitled “Intellectual Property in Cyberspace” .media-awareness.ca/english/index.cfm), which pro- (http://cyber.law.harvard.edu/property00) on which can vides information on media use; The Center for the be found a goldmine of freely accessible archived International Study of Cyberethics and Human Rights materials. Likewise, IP Watchdog’s site (http://www (http://www.cischr.org), which is “dedicated to pro- .ipwatchdog.com/cyberspace_ip.html) maintains a moting the international study of cyberethics, through database of current laws and practices concerning quality research, teaching, publication and advocacy”; things like hyperlinking and cybersquatting. This sam- Technology and Society Magazine (http://www.njcc ple of sites indicates that there is no dearth of websites .com/~techsoc), which offers an ongoing critique of the dedicated to the exploration of technology’s impact on social implications of technology; The Ethical Oasis society as any Google search will corroborate. (http://www.ethicaloasis.com), which explores possi- Furthermore, a great many publications on this ble resolutions to cyber dilemmas; and The Ethics issue are readily available online. Articles for teachers Resource Center (http://www.ethics.org), whose “goals to read that will provide them with teaching insights are to inspire individuals, both children and adults, to include Starr (2003) on tools for teaching cyberethics, treat one another in an ethical manner, to inspire insti- Benson and Wright (1999) on pedagogy and policy, tutions to act ethically, recognizing their role as trans- Shaw (2003), on teaching copyright concepts to young mitters of values, and to inspire individuals and institu- children, the University of Washington (2003) on fair tions to join together in fostering ethical communities.” use guidelines, and Long (2002) on plagiarism. Online Computer Professionals for Social Responsibility books on cyberethics include Sutcliffe (2002-2003), (http://www.cpsr.org), provides “the public and policy- with a comprehensive exploration of the history and makers with realistic assessments of the power, prom- impact of technology on society. Vance (n.d.) offers a ise, and problems of information technology.” The rather comprehensive bibliography of cyberethics cur- Markkula Center for at Santa Clara rent through 1996. Tavani (2001) carries this list University has a technology ethics section that contains through 2001; the article is available through the a healthy selection of resource materials (http:// Association for Computing Machinery (ACM) www.scu.edu/ethics). The University of Ottawa’s (http://portal.acm.org). Kremer (1998) at the Human Rights Research and Education Centre houses University of Calgary has developed a compendium of a virtual library, “Information Technology, Ethics, and ethical instructions, which includes the ACM Code of Human Rights, (http://www.cdp-hrc.uottawa.ca/links Ethics and the IEEE (Institute of Electrical and /infotechint_e.html). Harvard Law School’s Berkman Electronics Engineers) Code of Ethics (www.ieee.org).

4. Cyberethics: The Canon of Literature

As indicated by the bibliographies mentioned in (1994), which provides case studies, and scenarios for the previous section, there is a growing body of litera- studying computer ethics. Johnson and Nissenbaum ture on cyberethics. Fetch, Vincent, and Kemnitz (1995) followed with a 656-page anthology on the eth- (1983), among the earliest titles, appeared just after the ical issues connected with the introduction of comput- emergence of Compuserve and the sudden public ers in society. access to networked home computers. Johnson (1984) The case study approach continues with Spinello provides a similar ethical guide. (1996), while Willard (1996) offers another reader, and A second wind for computer ethics books arising Lynch (1996), a textbook. Edgar and Suny (1997) pro- from the popularization and public accessibility of the vide a good introduction to ethics along with an analy- Internet in the early 90s brought Barbour’s (1992) sis of the social impact of computers. Rosenberg book on computer ethics. This was followed by a read- (1997) also examines the social impact and includes a er edited by Winston, Karsnitz, and Goldberg (1993) discussion of “computers and the imagination, criti- and by the second edition of Forester and Morrison cism and history, the business world, medicine and

14 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS computers, education, computers and the law, freedom ical questions raised by the interconnections of society of information, employment and unemployment, the brought about by the proliferation of computers linked information society, and ethics.” Rosenoer (1997) turns to the Internet. The issues these essays address in their to cyberlaw and covers, aside from a study of landmark discussion of ethics include speech, property, privacy, court cases, “copyright and trademark issues, defama- and security. Spinello (2001) deals with the same issues tion, privacy, liability, electronic contracts, tax issues, as his anthology but includes case studies, exercises, and ethics.” Hart (1997) deals with community devel- and overviews of seminal legal cases affecting the opment in an age of increasing technology use. development of cyberspace, with such topics as spam, Houston (1998), starting with , web site linking, open code, cookies, anonymity, discusses the idea of whether technology is morally e-mail privacy, cyberporn, and . The book is neutral or value-laden. Another edited collection, supported by a companion website (http://www.jbpub Pourciau and Mendina (1999), deals with the idea of .com/cyberethics/), which offers an online concordance digital information as a commons in which social that annotates the websites relevant to each of the chap- responsibility needs to be exercised. A legal case-study ter headings, provides a chat room for those interested approach, Clifford (1999) “has sections on contracts, in exploring the issues the book addresses, and demon- torts, evidence, , First strates with practice syllabi how the book might be used Amendment, jurisdiction, privacy, inaccurate informa- to structure a course. Hamelink (2001) argues that dis- tion, and criminal and proprietary rights.” cussions of human rights, not the profit-motive, should Baird, Ramsower, and Rosenbaum (2000) is an determine how democratic societies will organize anthology of 26 essays that span 356 pages in its explo- cyberspace. Kizza (2001), approaching ethics from the ration of a variety of major issues, including anonymi- other direction, explores the mind of the computer ty, privacy, property ownership, and issues of democra- hacker. Chadwick (2001) is an encyclopedia-like cy and communities. Johnson (2000) deals with the anthology of 37 articles spanning 404 pages, dealing ethical implications of the pervasive use of technology with theories of ethics and the ethical concepts sur- in society from philosophical, legal, and technological rounding , scientific ethics, environmen- perspectives. Hester and Ford (2000) has a multi- tal ethics, and . Ferrera, Reder, August, national scope, which, according to the back cover, Schiano, and Lichtenstein (2001) begins with law and addresses issues such as “the global impact of comput- introduces the legal system as it concerns e-commerce ers, on-line communities, and virtual reality” and ana- through a discussion of “copyright and trademark pro- lyzes “topics ranging from privacy, copyright and pro- tections on the Internet and general business concerns fessionalism to computer crime.” Bowyer (2000) is a such as online contracts, securities offerings, tax second edition of a text first published in 1995, and obligations, and data security.” deals with things ranging from viruses, hackers, intel- Like the other books he has authored, Spinello lectual property issues, whistle-blowers, to computer (2002) deals with law and public policy concerning fair control of missile defense systems. Langford (2000) competition and open access, free expression, intellec- deals with, according to the publisher’s comments, tual property, privacy rights, and security. Ermann, “censorship, data protection, and the law.” Lessig Shauf and Williams (2002), a 256-page anthology, (2000) argues that the people should involve them- deals with, according to the publisher’s synopsis, “top- selves in the discussion of how the Internet is to be reg- ics such as the work-related ramifications of automa- ulated lest they lose the opportunity as governments tion, the ethical obligations of computer specialists, and corporations encroach upon this consumer right. and the threats to privacy that come with increased Schwartau (2001) offers a text that focuses exclu- computerization.” A publication of International sively on how kids should be enculturated into social Society for Technology in Education, Willard (2002) responsibility within the cyber age. Halbert and Ingulli deals not only with social responsibility but also with (2001), an undergraduate textbook dealing with the social relationships in cyberspace, arguing that the best effect of cyberspace on culture, addresses intellectual thing cybercitizens can do is stay current with emer- property, privacy, freedom of expression and hate gent laws, policies, and practices within cyberspace. speech, e-commerce, education, and business and Focused on e-mail and ethics, Rooksby (2002) . Spinello and Tavani (2001) has 42 essays explores the textual nature of personal identity in com- spanning 618 pages that explore the new moral and eth- puter mediated relationships. Winston, Wainwright,

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 15 Edelbach, and Hawes (2002) is a 352-page anthology a guide for parents, teachers, and librarians, explores that “presents a variety of historical, social, and philo- privacy, property, and appropriate use of online materi- sophical perspectives on and its als with a selection of scenarios and discussion ques- social consequences, stressing the manner in which tions for use in the classroom. In the second edition of technological innovation creates new ethical problems a book on cyberlaw, Ferrera, Lichtenstein, Reder, Bird, for human civilization.” and Schiano (2003) covers “relevant legal issues, The United States Federal Government has pub- applicable court decisions, federal and state statutes, lished a CD-ROM that includes 8,841 pages titled 21st administrative rulings, legal literature, and ethical con- Century Guide to Cybercrime: the Computer Crime siderations relating to Internet law.” Keulartz, Section of the Justice Department and the National Korthals, Schermer, and Swierstra (2003) provides a Infrastructure Protection Center, which deals with strong emphasis on the interaction between technology hacking, intellectual property crimes, policy, cases, and values in its covering of “the interaction of tech- guidance, laws, documents, economic espionage, pri- nology and ethics, the status of pragmatism, the con- vacy issues, Internet and web crimes, cyberethics, cept of practice, and and deliberative threat assessments, and intrusion targets. democracy.” George (2003) includes 37 articles span- An introductory text with readings, Bynum and ning 496 pages, covering “views of computing, the Rogerson (2003), deals with, according to the publish- information society, computers and organizations, er’s comments, “the history of computer ethics; the computer-based monitoring, security and reliability, social context of computing; methods of ethical analy- and privacy, ethics, and the Internet.” sis; professional responsibility and codes of ethics; Tavani (2004), building on previous surveys of computer security, risks, and liabilities; computer cyberethics, includes material on “privacy and security crime, viruses, and hacking; data protection and priva- in cyberspace, cybercrime and cyberrelated crimes, cy; intellectual property and the “open source” move- intellectual property disputes in cyberspace, and social ment; global ethics and the Internet.” issues.” Updated editions of works on cyberethics Fodor (2003) addresses, according to its book include Spinello (2004), a collection of readings, and description, “the history of computer technology, the Halbert and Ingulli (2005), which “provides a frame- impact of advances in hardware and software on ethics work for discussing ethical dilemmas related to today’s issues, as well as privacy, security, piracy, technology computer technology and the Internet,” starting each for persons with disabilities and other important philo- section with case studies that serve as keynotes for the sophical issues.” Woodbury (2003) deals with the roots articles that follow. of ethics in relation to the new media. Johnson (2003),

5. Conclusion

The trends in educational technologies promise programs; by the time students reach that course after to restore the study of ethics if only because the move a year or so of study they will have already been toward greater interconnectedness will create a need familiarized with the principles that course will teach for explorations of social responsibility. As education- them (which is not a bad thing at all because the al technology programs begin to attract more practi- course will be able to do so much more with them in tioners returning for their masters of arts in teaching, that case). we will see a shift away from the emphasis in teach- Having provided a general survey of the relevant ing software and hardware programs towards an target areas in the future trends of educational technol- emphasis on the pedagogical methods requisite for ogy, we offer this partial list of predictions: engaging communities of learners. These methods • The fact that education institutions will design will build upon a foundation of ethics across the cur- learning environments in cyberspace will necessi- riculum rather than upon the compartmentalization of tate the consideration of how to ensure integrity ethics into a single course. Courses in cyberethics will among members. provide a solid capstone to educational technology

16 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS • Cyberspace will allow students to access the knowl- instruction and assessment that consider visual acu- edge of multiple experts in ways catered to their ity along with verbal acuity. individual learning needs. Consequently, legislators • The ethics gap will begin to diminish in schools of will need to consider how to resolve individual education as educational technology is integrated property rights with the needs of online instructors into the core program of mainstream education. to share materials with their students. • The social relevance of cyberspace as a tool to teach • If we take privacy rights literally into cyberspace, (and create) interculturalism will become stronger then the federal government could pass no laws as public access becomes more available. forcing disclosure of identity online; however, cor- If we are serious in our move to ethics across the porate use of copyright laws may continue to vio- curriculum, then we will not only focus on ethics with- late personal privacy. in all the courses in the schools of education within our • Virtual role-playing environments will allow stu- universities, but we will also raise a new generation of dents to interact in more authentic ways than teachers who will inculcate those values into all pri- social pressures might permit in a traditional mary and secondary school grades. The new society in classroom. which we live, defined by a secondary orality and • Educators must consider the needs of those students hyperliteracy that connects all of us within a new level who technology has allowed to develop hyperliter- of consciousness, is also a new age of ethics. Perhaps acy more acutely than traditional forms of literacy. that future will prove the greatest era of social con- As a result, educators will choose methods of sciousness that we have yet experienced.

Editor’s Afterword

Cyberspace seems, at first sight, to lack the sub- communicating may not seem as real to us as they stance of “real” space—the only kind of space in which would in a face-to-face conversation. A new “world” is human interactions, including communication, could seemingly created in which the expectations and rules take place in the past. People talking with each other of the real world no longer apply. have had to be physically nearby, sharing a space with- This loss of structure in human relationships in in which their words could be heard and understood. We cyberspace can give rise to many problems and misun- may be tempted to think that only modern inventions derstandings. A common example is “flaming,” in have eliminated the need for a common physical space which the sense of the reality of an online communica- in order to communicate, but in fact this requirement has tion is so compromised for one or other of the parties been breaking down for a long time. Even before the that normal rules of polite dialogue are abandoned and invention of writing various systems of symbols were hostile or abusive language takes the place of the more employed to carry on primitive kinds of remote commu- rational, temperate words that would ordinarily be nication. Writing made this a lot easier, and the level of used. The authors have pointed out the importance of remote communication rapidly became more sophisti- social responsibility in making online communities cated as writing and print technologies developed. Many viable. Unfortunately, the sense of unreality, added to technologies for remote communication have become so the anonymity of communicators functioning, in some familiar that we hardly think of them as in any way sense, almost in “a different world,” can breed tempta- unusual or “new,” and certainly not “unreal.” tions far more intense than would be the case in more But cybercommunication strikes us as somehow traditional communications. Sometimes the “games” different. Machines now “talk” with other machines played in cyberspace are based precisely on the char- without human intervention but nonetheless with con- acteristics of the Internet, such as its anonymity, its siderable impact on human beings. Even when people possibilities for creating virtual universes, etc., that are are clearly manipulating the machines to communicate most subject to abuses with other people a sense of remoteness and unreality In many ways, as the authors point out, the world can easily take over. The people with whom we are of cyberspace has put new demands on our ethical and

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 17 moral sensitivity. It has made many new things possi- November 6, 2005 from http://www.thejournal.com ble, but they have brought with them new moral dilem- /magazine/vault/A2372.cfm. mas, as well. To accept the technologies without direct- Boal, A. (1979). Theatre of the oppressed (C. A. McBride & ing serious attention to those new moral questions is M-O. Leal McBride, trans.). New York: Theatre clearly irresponsible, but the danger of doing so is Communications Group. heightened by the very newness of the questions, Bowyer, K. W. (Ed.). (2000). Ethics and computing. (2nd ed). New York: IEEE Computer Society Press. which makes them easy for set in custom- Brown, J. (2003). Technology helps rural Alaskan schools ary patterns to ignore. Privacy and the use of intellec- meet the NCLB challenge. Converge Magazine. tual property are among the more frequently cited Retrieved October 25, 2005 from http://www.center- rights that might easily be violated by misuse of the digitaled.com/converge/?pg=magstory&id=64960. Internet, but like other rights they need to be correctly Bynum, T. W. & Rogerson, S. (Eds.). (2003). Computer defined and correctly applied to differing social situa- ethics and professional responsibility: Introductory tions in order to be understood correctly. text and readings. London: Blackwell Publishing. On the other hand, the newness of the cyberworld Carr, M. C. (2003). The need for a national migrant student may create the impression that the old rules are no tracking database. Converge Magazine. Retrieved longer valid. Rather than doing the hard work of adapt- October 25, 2005 from http://www.centerdigitaled ing old rules to new situations, some are tempted to .com/converge/?pg=magstory&id=65467 simply throw them out entirely. But the core values and Carvin, A. (2000). Mind the gap: The digital divide as the civil rights issue of the millennium. Retrieved October principles do not change, even though the ways they 25, 2005 from http://www.infotoday.com/mmschools apply to new situations may have to be adjusted from /jan00/carvin.htm time to time. Chadwick, R. (Ed.). (2001). The concise encyclopedia of the The rise of cyberethics, while intended to meet ethics of new technologies. London: Academic Press. the challenges from a particular area of modern tech- Clifford, R. D. (1999). Computer and cyber law: Cases and nological development, may also stimulate renewed materials. Durham, NC: Carolina Academic Press. interest in probing broader ethical and moral questions. Dibbell, J. (1998). A rape in cyberspace. Scribble, scribble, Public discussion of many such questions seems, in scribble. Retrieved October 20, 2005 from recent years, to have degenerated into arguments based http://www.juliandibbell.com/texts/bungle.html. on expediency, or on legalisms that swat at gnats while Edgar, S. L. & Suny, G. (1997). and machines: avoiding the more fundamental principles at issue. Perspectives on computer ethics (Jones and Bartlett Honesty and principled integrity are all too rare in Series in Philosophy). Sudburry, MA: Jones and Bartlett Publishers. political discussions of ethical and moral questions Ermann, M. D., Shauf, M. S., & Williams, M. B. (Eds.). today. Their revivification and reinsertion into all polit- (2002). Computers, ethics, and society. London: ical and social dialogue is a prerequisite for an effective Oxford University Press. cyberethics as for the resolution of other questions in Ess, C. (2001, December). Internet research ethics. Paper social ethics. presented at Computer Ethics: Philosophical Enquiries —W. E. Biernatzki, S.J. Conference, Lancaster, UK. General Editor Fairweather, N. B. (2004). No, PAPA: Why incomplete codes of ethics are worse than none at all. In G. Collste (Ed.), Ethics and information technology (pp. 259- References 277). Delhi: New Academic Publishers. Bailey, J. & Magueau, T. (2004). Making the case: Research Ferrera, G. R., Lichtenstein, S., D., Reder, M. E. K., Bird, R. efforts on educational technology. T. H. E. Journal, C. & Schiano, W. T. (2003). Cyberlaw: Text and cases, 31(10). Retrieved November 2, 2005 from Second edition. St. Paul, MN: South-Western College. http://www.thejournal.com/magazine/vault/A4828.cfm. Ferrera, G. R., Reder, M. E. K., August, R., Schiano, W. T., Baird, R. M., Ramsower, R. M., & Rosenbaum, S. E. (Eds.). & Lichtenstein, S. D. (2001). Cyberlaw: Your rights in (2000). Cyberethics: Social & moral issues in the com- cyberspace. Cincinnati, OH: Thomas Learning. puter age. New York: Prometheus Books. Fetch, P., Vincent, P., & Kemnitz, T. M. (1983). Computer Barbour, I. G. (1992). Ethics in an age of technology. San ethics. New York: Trillium Press. Francisco, CA: Harper. Fodor, J. (2003). Understanding computer ethics. Upper Benson, A. & Wright, E. (1999). Pedagogy and policy in the Saddle River, NJ: Pearson Education. age of the wired professor. T. H. E. Journal. Retrieved

18 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS Forester, T. & Morrison, P. (1994). Computer ethics: 28, s003 from http://www.indiana.edu/~tisj/readers Cautionary tales and ethical dilemmas in computing /full-text/15-2%20kling.pdf. (Second edition). Cambridge, MA: MIT Press. Kremer, R. (1998). Social, ethical, and professional issues. Fujimoto, E. T. (2003). Bridging the divide, one child at a Retrieved November 6, 2005 from http://pages.cpsc time. Converge Magazine. Retrieved November 3, .ucalgary.ca/~kremer/courses/451/Ethics.html. 2005 from http://www.centerdigitaled.com/con- Langford, D. (Ed.). (2000). Internet ethics. London: verge/?pg=magstory&id=43505. Macmilan Press. Gaiter, L. (1997) Is the Web too cool for Blacks? Salon. Lessig, L. (2000). Code and other laws of cyberspace. New Retrieved November 3, 2005 from http://archive York: Basic Books. .salon.com/june97/21st/cool970605.html Long, P. (2002). Plagiarism: IT-enabled tools for deceit? George, J. F. (Ed.). (2003). Computers in society: Privacy, Syllabus. Retrieved November 6, 2005 from ethics, & the Internet. Upper Saddle River, NJ: http://www.syllabus.com/article.asp?id=5916. Prentice Hall. Lynch, J. J. (1996). Cyberethics: Managing the morality of Gibson, W. (1984) Neuromancer. New York: Ace Books. multimedia. Bedfordshire: Rushmere Wynne. Halbert, T. & Ingulli, E. (2001). CyberEthics. Cincinnati, Mahfood, S. & Sujdak, E. J. (2003). Course descriptions. OH: South-Western Educational Publishing. Retrieved November 8, 2005 from Webster Halbert, T. & Ingulli, E. (2005). CyberEthics. Cincinnati, University: http://www.webster.edu/~rolliges/EDTC. OH: South-Western Educational Publishing. McCullagh, D. (2003). RIAA wins battle to ID Kazaa user. Hamelink, C. J. (2001). The ethics of cyberspace. London: Retrieved November 4, 2005 from http://news.com Sage Publications. .com/2100-1023-981449.html. Hart, J. (1997). Ethics and technology: Innovation and Mill, J. S. (1859). On liberty. Retrieved November 3, 2005 transformation in community contexts. Cleveland OH: from http://www.utilitarianism.com/ol/one.html. Pilgrim Press. Neil, M. (2003). Don’t mourn, organize! Rethinking Schools Hester, D. M. & Ford, P. J. (2000). Computers and ethics in Online, 18(1). Retrieved October 25, 2005 from http: the cyberage. Boston, MA: Prentice Hall. //www.rethinkingschools.org/archive/18_01/nclb181. Houston, G. R. (1998). Virtual morality: Christian ethics in Olliges, R. (2005). Courses. Retrieved November 9, 2005 the computer age. Leicester: Apollos. from http:www.webster.edu/~rolliges/. Hubbard, L. (2000). Is the digital divide a Black thing? Salon. Ong, W. J. (1982). Orality and literacy: The technologizing Retrieved November 3, 2005 from http://dir of the word. New York: Methuen. .salon.com/news/feature/2000/03/02/digital/index.html. Pourciau, L. J. & Mendina, G. T. (Eds.). (1999). Ethics and Johnson, D. (2003). Learning right from wrong in the digital electronic information in the 21st century. West age: An ethics guide for parents, teachers, librarians, Lafayette, IN: Purdue University Press. and others who care about computer-using young peo- Rawls, J. (1999). A theory of justice. Cambridge, MA: ple. Worthington, OH: Linworth Publishing. Harvard University Press. Johnson, D. G. (2000). Computer ethics (3rd Edition). NJ: Recording Industry Association of American, Inc. [RIAA] v. Prentice Hall. Verizon Internet Services, Inc. (2003). U.S. Court of Johnson, D. G. & Nissenbaum, H. (1995). Computers, ethics, Appeals for the District of Columbia Circuit, No. 03- and social values. Englewood Cliffs, NJ: Prentice 7015. Retrieved November 2, 2005 from http://www Hall. .epic.org/privacy/copyright/verizon/dc-cir-op.pdf Johnson, D. W. (1984). Computer ethics: A guide for a new Rieber, L. P. (1996). Seriously considering play: Designing age. Elgin, IL: Bretheren Press. interactive learning environments based on the blend- Kant, I. (1785). Fundamental principles of the metaphysic of ing of microworlds, simulations, and games. morals. Retrieved November 5, 2005 from Educational Technology Research & Development, http://eserver.org/philosophy/kant/metaphys-of- 44(2), 43-58. morals.txt. Rooksby, E. (2002). E-mail and ethics: Style and ethical Keulartz, J., Korthals, M., Schermer, M., & Swierstra, T. relations in computer-mediated communications (Eds.). (2003). Pragmatist ethics for a technological (Routledge Studies in Contemporary Philosophy). culture. Dordrecht, NL: Kluwer Academic Publishers. London: Routledge. Kizza, J. M. (2001). Computer network security and cyber Rosenberg, R. (1997). Social impact of computers. London: ethics. Jefferson, NC: McFarland. Academic Press. Kling, R., Ya-Ching, L., Teich, A., & Frankel, M. (2000). Rosenoer, J. (1997). Cyberlaw: The law of the Internet. New Assessing anonymous communications on the York: Springer-Verlag. Internet: Policy deliberations. Cyberethics: Social and Saltpeter, J. (2003). 21st-century skills: Will our students be moral issues in the computer age. Retrieved December prepared? Technology & Learning. Retrieved October

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 19 25, 2005 from http://www.techlearning.com/story Willard, N. E. (2002). Computer ethics, etiquette, and safety /showArticle.jhtml?articleID=15202090 for the 21st-century student. Eugene, OR: Internation- Schwartau, W. (2001). Internet & computer ethics for kids: al Society for Technology in Education. (and parents & teachers who haven’t got a clue) Winston, M. E., Karsnitz, J. R., & Goldberg, C. H. (Eds.). (2001), illustrated by D. L. Busch. Seminole, FL: (1993). Society, ethics and technology: Selected read- Interpact Press. ings. Dubuque, IA: Kendall Hunt Publishing Co. Seminerio, M. (1999). New federal regulations: A brief his- Winston, M. E., Wainwright, S., Edelbach, R., & Hawes, W. tory. ZDNet. Retrieved October 25, 2005 from http: (Eds.). (2002). Society, ethics, and technology. //zdnet.com.com/2100-11-514374.html?legacy=zdnn. Belmont, CA: Wadswoth. Shaw, R. (2003). Kindergarten copyright. Tech Learning. WIPO [World Intellectual Property Organization]. (n.d.). Retrieved November 4, 2005 from http://www.tech- Emerging issues in intellectual property. Retrieved learning.com/story/showArticle.jhtml?articleID=1310 October 8, 2005, from http://www.wipo.int/about- 0799. ip/en/studies. Spinello, R. (1996). Case studies in information and com- Wolf, M. (2003). Virtual morality, morals, ethics, and new puter ethics. Upper Saddle River, NJ: Prentice Hall. media. New York: Peter Lang Publishing, Inc. Spinello, R. (2001). CyberEthics: Morality and law in cyber- Woodbury, M. (2003). Computer and . space. Boston, MA: Jones and Bartlett Publishers. Champaign, IL: Stipes Publishing. Spinello, R. (2002). Regulating cyberspace: The policies and technologies of control. Westport, CT: Quorum Additional Resources Books. Spinello, R. & Tavani, H. T. (Eds.). (2001). Readings in About intellectual property. (2004). Retrieved November 8, cyberethics. Sudbury, MA: Jones and Barlett 2005 from http://www.wipo.org/about-ip/en/. Publishers. Anonymous communications on the internet. (2003). Spinello, R., Tavani, H. T. (Eds.). (2004). Readings in cyber- Retrieved November 8, 2005 from American ethics. Sudburry, MA: Jones & Bartlett Publishers. Association for the Advancement of Science: Starr, L. (2003). Tools for teaching cyberethics. Education www.aaas.org/spp/anon/cases. World. Retrieved November 6, 2005 from http: Barger, R. (2003). Computer applications program syllabus. //www.educationworld.com/a_tech/tech055.shtml. Retrieved December 24, 2003 from Sutcliffe, R. J. (2002-2003). The fourth civilization— http://www.nd.edu/~rbarger/capp471syl.html. Technology, society, and ethics (4th edition). Arjay Bequette, G., Kitzmiller, M., Loschen, D., & McCue, J. Books. Retrieved November 6, 2005 from (2001). Computer ethics for educators. Retrieved http://www.arjay.ca/EthTech/Text. December 26, 2003 from http://lrs.ed.uiuc.edu/stu- Tavani, H. T. (2001). Cyberethics bibliography 2001: A dents/tsullivl/304Su01/ethics/handel.htm. select list of recent works. ACM SIGCAS Computers Demac, D. (1999). Summary of copyright office report on and Society, 31(2), 30-36. distance education. Retrieved November 8, 2005 from Tavani, H. T. (2004). Ethics and technology: Ethical issues http://www.aaup.org/Issues/DistanceEd/Copyright in an age of information and communication technol- /Corptsum.htm. ogy. New York: Wiley Text Books. Distance education and the TEACH act. (2005). The Trace Research and Development Center. (n.d.). Designing American Library Association. Retrieved November more usable web sites. Madison: University of 8, 2005 from http://www.ala.org/washoff/teach.html. Wisconsin. Retrieved November 7, 2005 from Electronic Frontier Foundation. (2005). Let the sun set on http://trace.wisc.edu/world/web. patriot. Retrieved June 1, 2005, from http://www.eff Turkle, S. (1996). Who am we? Wired, 4.01. Retrieved .org/patriot/sunset/202.php. September 20, 2005 from http://www.wired.com Fair use guidelines for educational multimedia. (2003). /wired/archive/4.01/turkle.html. Retrieved November 8, 2005 from http://www.wash- University of Washington. (2003). Fair use guidelines for ington.edu/classroom/emc/fairuse.html. educational multimedia. Retrieved November 6, 2005 Foundations of technology in teaching and learning. (2005). from http://www.washington.edu/classroom/emc University of Maryland. Retrieved October 20, 2005 /fairuse.html. from http://www.umuc.edu/grad/omed.shtml. Vance. D. (Ed.). (n.d.). Information systems ethics. Retrieved Gearhart, D. (2001). Ethics in distance education: November 6, 2005 from http://cyberethics.cbi Developing ethical policies. Retrieved December 26, .msstate.edu. 2003 from http://www.westga.edu/~distance/ojdla Willard, N. E. (1996). The cyberethics reader. Ontario: /spring41/gearhart41.html. McGraw-Hill.

20 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS Harper, G. (2002). The TEACH act finally becomes law. Retrieved December 24, 2003 from http://www- Retrieved November 8, 2005 from http://www.utsys- swiss.ai.mit.edu/6095/. tem.edu/ogc/intellectualproperty/teachact.htm. Association for computing machinery. (2005). Retrieved Instructional design & adult learning. (2005). Retrieved November 8, 2005 from www.acm.org. November 8, 2005 from http://thunder1.cudenver Bauer, C. (1997). Computers in society syllabus. Retrieved .edu/ilt/id_and_adult_learning/index.htm. December 24, 2003, from ttp://www.iit.edu/~cs485/. Kasunic, R. (2005). Copyright act of 1909 as amended. Burbules, N. (2002). Ethical & policy issues in information Retrieved November 8, 2005 from http://www.kasunic technologies syllabus. Retrieved November 8, 2005 .com/1909_act.htm. from http://cter.ed.uiuc.edu/about_CTER/descrip- Kidz privacy. (2003). Retrieved November 8, 2005 from tions/eps313.htm. www.ftc.gov/bcp/conline/edcams/kidzprivacy. Cornell course descriptions. (2003). Retrieved November 8, Little, J. (2001). History of copyright: A chronology. 2005 from http://www.education.cornell.edu/academ- Retrieved November 8, 2005 from http://www ics/courses.cfm. .musicjournal.org/01copyright.html. DeAmicis, K. (2004). Technology in education. Retrieved Lyman, P. & Samuelson, P. (1997). Copyright and communi- November 9, 2005 from http://isites.harvard.edu/icb ty: The future of the information society syllabus. /icb.do?keyword=k240. Retrieved December 24, 2003, from http://www Dickinson, J. (1996). Contemporary issues in computer sci- .sims.berkeley.edu/courses/is296a-2/f97/. ence syllabus. Retrieved December 24, 2003, from Office of educational technology. (2005). Retrieved http://www.cs.uidaho.edu/~johnd/cs401/assign.html. November 9, 2005 from http://www.ed.gov/about Duniho, F. (1996). Computer ethics syllabus. Retrieved /offices/list/os/technology/. December 24, 2003, from http://www.ling.rochester Perdue, M. (2003). Recent developments in copyright law. .edu/~duniho/phl117/index.html. Retrieved November 9, 2005 from http://www Gehringer, E. F. (n.d.) Ethics in computing site map. .utexas.edu/law/journals/tiplj/volumes/vol7iss1/per- Retrieved December 26, 2003, from http://legacy due.html. .eos.ncsu.edu/eos/info/computer_ethics/. Roche, A. (1998). Children’s privacy and safety on the inter- Gehringer, E. F. (1999). Ethics in computing syllabus. net: A resource guide for parents. Retrieved November Retrieved December 24, 2003 from http://courses 9, 2005 from http://www.privacyrights.org/fs/fs21- .ncsu.edu:8020/CSC379/. children.htm. Hall, J. B. (1996). Social aspects of information systems syl- Soukup, P. (1997). Ethics @ e-mail. Issues in Ethics, 8(2). labus. Retrieved December 24, 2003 from Retrieved November 9, 2005 from http://www.scu.edu http://www.cis.drexel.edu/faculty/hall/info215.html /ethics/publications/iie/v8n2/email.html. Kling, R. (1999). School of library and information science. The digital millenium copyright act. (2001). Retrieved Retrieved December 24, 2003, from http://www November 9, 2005 from UCLA Online Institute for .slis.indiana.edu/faculty/kling/Teach/L564_99.html. Cyberspace Law and Policy: http://www.gseis.ucla Lesley university course descriptions. (2005). Retrieved .edu/iclp/dmca1.htm, November 8, 2005 from Lesley University: http: The Internet: Know before you go into cyberspace! //www.lesley.edu/soe/tech_in_ed/course_desc.html. Retrieved November 9, 2005 from http://www.cyber- Litman, J. (1998). Seminar: The law in cyberspace. crime.gov/rules/kidinternet.htm. Retrieved December 24, 2003, from http://www.law The no child left behind act. (2002). Retrieved November 9, .wayne.edu /litman/classes/cyber/. 2005 from U.S. Department of Education: http://www McClurg, L. (1994). Computer science department syllabus. .ed.gov/nclb/landing.jhtml. Retrieved December 24, 2003 from http://www U. S. copyright office summary of the digital millenium copy- .cs.byu.edu/courses/cs404/syllabus.html. right act of 1998. (1998). Retrieved November 9, 2005 McCrickard, S. & Wheaton, R. (2003). Professionalism in from http://fairuse.stanford.edu/primary_materials computing syllabus. Retrieved December 24, 2003, /legislation/dmca.html. from http://courses.cs.vt.edu/~cs3604/. Wheaton v. Peters. (2003). The Founders Constitution, 3(15). Nissenbaum, H. (1996). Computers, ethics, and social responsi- Retrieved November 9, 2005 from http://press- bility syllabus. Retrieved December 24, 2003, from pubs.uchicago.edu/founders/documents/a1_8_8s15.html. http://www.cs.princeton.edu/courses/archive/spr96/cs291/. Poster, M. (2004). Theories of technology & culture syl- Course sites and syllabi labus. Retrieved December 24, 2003 from http: //www.hnet.uci.edu/mposter/syllabi/techsyl.html. Abelson, H., Pato, J., Weitzner, D., & Fischer, M. (2003). Robertson, W. (2002). Ethics and the Internet syllabus. Ethics and law on the electronic frontier syllabus. Retrieved December 24, 2003 from http://www.duke .edu/~wgrobin/ethics/.

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 21 School of education. (2005). Retrieved November 9, 2005 In addition, online pastoral care can meaningfully sup- from http://www.marquette.edu /online/html/masters plement what the local parish churches offer; however, /courses.htm. that face-to-face contact is important, for example, if it Spring course descriptions (Webster University School of is required for therapeutic reasons or in order to more Educational Technology). (2005). Retrieved October deeply root the faith socially. In these situations, a spir- 20, 2005 from http://www.webster.edu/~rolliges itual director should continue the discussion locally /EDTC/CRSE_DESC_SPRING.pdf. (even in writing).The promise of the subtitle, a manual Technology: Course descriptions (Lesley University School of Education). (2005). Retrieved October 20, 2005 from for practice, the author fulfills rather casually; he http://www.lesley.edu/soe/tech_in_ed/course_desc.html. strives too much to take on all possible discourses Weisband, S. (2004). Social, legal, and ethical issues of the inter- (computer, cultural, pastoral theology), including refer- net syllabus. Retrieved December 24, 2003 from ences to the literature. http://uainfo.arizona.edu/~weisband/411_511/index.html. The chapter headings of the 23 chapters (of dif- Whitbeck, C. (1995). Real world ethics syllabus. Retrieved ferent lengths) do not do justice to the scope of materi- December 24, 2003 from http://web.mit.edu/course/2 al covered. The first five chapters treat the Internet /2.95j/index.html. users, their needs, and the routines of their online prac- Woodward, K. (2005). Master of education. Retrieved tices as well as the consequences of the Internet for the November 8, 2005 from UMUC: http://www.umuc operational readiness of the church in this new market .edu/grad/omed.shtml. place. For example, online inquirers should be discov- Zalta, E. N. (1988). Computers and ethics syllabus. erable in non-church portals, as well as through church Retrieved December 24, 2003, from http ://mally.stan- ford.edu/syllabi/computers-ethics.html. sites. Here “customer orientation” for Belzer means not only a speedy answering of inquiries, but also an indi- The authors would like to thank Scott Hastings, a sec- vidual dealing with each e-mail. One must accept that ond year theology student at Kenrick-Glennon the inquirer may want to remain anonymous; some- Seminary, for his proofing of the final text. times only one-time inquiries or personal opinions come in. However intensive consulting discussions can develop, as in a written spiritual direction exchange; Book Reviews here the advice seekers can learn to understand their Belzer, Michael. Internetseelsorge: Der Leitfaden für life situations better, can receive comfort or accompa- die Praxis [Online pastoral care: A manual for prac- niment in the experience, and can find a solution of tice]. Stuttgart: Verlag Katholisches Bibelwerk 2004. their life situations. Chapters 9-16 offer convincing Pp. 208. ISDN 3-460-33056-2 (pb.) €19.90. examples of this time-intensive form of pastoral The author is a theological adviser of the Catholic advice, which should not be confused with therapy. faith information center in Frankfurt, an interdiocesan Contact with the “customers” can be supported by group, which, over the past 40 years, has answered ques- electronic reports to which people can subscribe tions about the Christian faith, usually with published (newsletters, perhaps—an example is in the appendix). responses to individual letters. For 15 years this pastoral Secondly, questionnaires (again shown in an appendix) service has been offered increasingly over the Internet. allow for a greater understanding of the questioner’s What new possibilities does an interactive medi- faith and church connection. Estimates provided indi- um like the Internet offer? How can faith and the cate a result that a quarter of the clientele of the service church remain present even in this informal context so come from those who have withdrawn from the church, that the interested questioner will feel s/he has received but who retain a lasting religious interest. an appropriate and quality response? This book is part- At the end of the book one feels well informed ly an effort to take stock of past experiences (also of the about the facets of online pastoral care and can only diocesan teams and offices), and partly an attempt to agree with the author in his call for better interdiocesan formulate recommendations on how the church practices in this special form of pastoral care. Internet users can adjust themselves even more to the —Rüdiger Funiok, S.J. context of the new medium. And—arranged from the Hochschule für Philosophie und Medien, perspective of a pastoral theologian and spiritual direc- Münich tor—arguments are presented for authenticating church Internet work as missionary outreach and pastoral care.

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 22 Castells, Manuel. (Ed). The Network Society: A Cross- three chapters analyzing productivity, labor, and the Cultural Perspective. Northhampton, MA: Edward intersection of time, space, and technology in networks; Elgar Publishers, 2005. Pp. 488. ISBN 1-84376-505-5. (3) sociability and social structure in the age of the (hb.) $135. Internet, featuring three chapters analyzing how the In this wide-reaching book, Castells has gathered Internet can be used to establish or nurture interpersonal leading network theorists from around the world to relationships and how it is changing social structures; (4) present a cross-cultural perspective of the network soci- the Internet in the public interest, featuring three case ety. Castells, author of The Information Age trilogy, studies on how the Internet has been used to help address offers a carefully organized series of essays analyzing various social problems (e-learning for adults, e-health the technological, cultural, and institutional transforma- networks and their impact on individual health, and the tion of societies around the globe to network societies. digital divide); (5) networked social movements and Castells summarizes the theory of the network informational , featuring two chapters on how the society proposed in his trilogy in the dense 48-page Internet has been used to create and sustain global social opening chapter. He defines the network society as “a movements and how it is changing the political process; society whose social structure is made of networks and (6) the culture of the network society, featuring three powered by microelectronics-based information and chapters about identity creation and meaning-making in communication technologies,” (p. 3). The networked the network society, and about the work ethic that society is not just one in which the Internet or other defines the network society. communication technologies are used, but one that is The contributing authors come from a variety of organized in networks rather than the hierarchies that traditions, from anthropology to sociology, political were traditional during the industrial age. The nature of science to communications, business to history; and new technologies, in which communication can be different methodologies, from analysis of survey data one-to-many, many-to-many, or many-to-one, and to ethnographic research. Each provides analysis where technologies quickly become obsolete, calls for about different but complementary aspects of the net- a social structure that offers flexibility, scalability, and work society. survivability (p. 5). Networks offer just such benefits, Many of the chapters are summaries or subtopics in that “networks can reconfigure according to chang- representing the authors’ larger projects, and in such a ing environments, keeping their goals while changing way serve to introduce the reader to the topic. This their components[,] . . . expanding or shrinking in size book serves as both an introduction to the concepts of with little disruption . . . [and] because they have no the network society, and as an up-to-date survey of center, and can operate in a wide range of configura- research being conducted in different fields and in or tions, networks can resist attacks on their nodes and about different populations. Indeed, it is hard to imag- codes because the codes of the network are contained ine an aspect of life that has not been covered in this in multiple nodes that can reproduce the instructions ambitious work. The book is not a complete cross-cul- and find new ways to perform” (p. 6). The network tural representation of networks across the world, leav- society is thus characterized by its organizational ing out, for example, the entire continents of Africa and forms. Castells argues that three independent process- South America, and limiting discussion of Asia to es, coincidentally occurring in the 1970s, contributed chapters on China and India; but, while these gaps are to the rise of the network society: (1) the crisis and significant, the book nevertheless succeeds in provid- restructuring of industrialism, (2) the freedom-oriented ing evidence for the widespread existence of the net- cultural and social movements, and (3) the revolution work society. Moreover, the book succeeds in present- in information and communication technologies. ing evidence for the different shapes that the network The remainder of the book is made up of chapters society takes depending upon the cultural and institu- meant to illustrate the depth and breadth of the network tional context in which it develops. society around the world, organized around six general Castells’ greatest contribution in editing this new themes: (1) the cultural and institutional diversity of the volume has been to unite a diverse group of research network society, featuring four chapters with country- and researchers, providing support for his own theories level analyses of the adoption of the Internet and net- while simultaneously demonstrating the pervasive working (Silicon Valley/Finland comparison, Russia, nature of the network society. The wide-ranging topics China, Britain); (2) the network economy, featuring help to illustrate the nature of the network society, for

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 23 the authors themselves make up a network within the author and subject indices. It will make a good refer- network society, and are each connected to slightly dif- ence book for the beginning student or even serve as a ferent networks of researchers. kind of lab manual. Each chapter contains its own bibliography, and a —Paul A. Soukup, S.J. comprehensive index is located at the end of the book. Santa Clara University —A. Susana Ramirez Ph.D. program Desser, David and Garth S. Jowett (Eds.). Hollywood Annenberg School of Communication Goes Shopping. Minneapolis: University of Minnesota Press, 2000. Pp. xvi, 363. ISBN 0-8166-3512-9 (hb.) Decker, T. Newell and Thomas D. Carrell. $49.95; 0-8166-3513-7 (pb.) $19.95. Instrumentation: An Introduction for Students in the It may not take much imagination or insight to Speech and Hearing Sciences (3rd ed.). Mahwah, NJ: realize that the film industry deals in commodities and Lawrence Erlbaum Associates, 2004. Pp. xxiv, 184. consumption—certainly the industry produces ISBN 0-8058-4681-6 (pb.) $29.95. themselves to be consumed. But the industry also pro- This text seeks to introduce the undergraduate motes a wider consumerism, featuring products, build- student to the instruments used in audiology and ing markets, and modeling lifestyles based on follow- speech pathology. This third edition includes revisions ing new fashions. The motion picture, the editors that address the changing technological environment of argue, shaped 20th century American society and cul- these laboratories as well as “recent developments in ture, and consumerism is part of that. But there is more. digital and consumer electronics” (p. xviii). The book “A focus on consumerism and the cinema also allows, accomplishes its goals, particularly for students with- perhaps even mandates, an understanding of how out much of a background in science or electronics; issues not only of gender but also of race and class have students who have a good working knowledge of elec- been structured into, worked through, and, often, tronic communication equipment may find parts of the remain problematic in contemporary culture” (p. xiii). text too elementary. The essays in this volume explore three related Chapter 1 introduces the basic electrical con- aspects of cinema and consumption: how films create cepts of fields, current, voltage, resistance, induc- consumers (either of films themselves or of products), tance, and capacitance, before discussing circuits and how consumers use films and their stars as guides for potential problems with circuits. Chapter 2 brings their own consumer behaviors, and how Hollywood related concepts into play as it discusses combining itself has become a commodity. The essays in Part I equipment: impedance, grounding, and so on. In addi- tend towards historical studies while those in the other tion, it adds practical details with instruction on test- two parts focus more analytically on film. Individual ing circuits and making connectors, with basic illus- contributors use different methodologies, so the vol- trations about soldering. ume as a whole not only addresses the general topic of Chapters 3 through 9 introduce the student to par- consumption but also illustrates various contemporary ticular kinds of equipment: transducers (primarily approaches to film studies, ranging from audience microphones and speakers in Chapter 3); digital and studies to cultural studies, to gender and class studies. signal processors and control equipment (Chapter 4); At their best, these essays open up a more complex way amplifiers, attenuators, mixers, and filters (Chapter 6); of viewing films; at their worst, some run the risk of various displays—CRTs, oscilloscopes, plotters, and stumbling over somewhat parochial concerns within recorders (Chapter 7); analogue and digital tape film studies. Overall, the essays are interesting, both recorders (Chapter 8); and sound level meters (Chapter for their historical material and for their sometimes sur- 9). Chapter 5 both describes the spectrograph and spec- prising revelations about the workings of the films trogram and provides a theoretical introduction to spec- within the cultural context of the United States. trum analysis. Finally, the last chapter provides instruc- With the exception of one essay, Part I (Creating tion on connecting laboratory equipment with con- Consumers) examines the cinema of the 1920s and sumer electronics. 1930s: the rise of “body shaping” and the focus on Each chapter includes a set of laboratory exercis- images available through the consumption of es, key terms, and suggested readings. The book itself dieting and exercise programs (Heather Addison); the features a very helpful glossary, a bibliography, and rise of a loyal audience through the of stars

24 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS or images (Barbara Wilinsky, Sara Ross); the develop- The book features a good number of illustrations ment of a youth culture (Cynthia Felando); and the and an index; each essay has its own end notes but no growing impact of the cosmetic industry, both in the separate reference list. new color films and in daily life (Sarah Berry). The one —Paul A. Soukup, S.J. exception to the period examines how post-war films Santa Clara University cultivated the need for appliances (Rick Worland and David Slayden). Ellingson, Laura. L. Communicating in the Clinic: Part II (Consuming Creators) directs attention to Negotiating Frontstage and Backstage Teamwork. stars and fashion. Gaylyn Studlar begins by examining Cresskill, NJ: Hampton Press, 2005. Pp. 204. ISBN 1- the relationship between Audrey Hepburn and 57273-599-6 (hb.) $47.50; 1-57273-600-3 (pb.) Givenchy and how Hepburn created a lasting iconic $21.95. image while introducing millions to high couture. Laura Ellingson’s Communicating in the Clinic is Rebecca Epstein steps back to examine the line of not only an excellent example of an ethnographic study development from the looks of the starts of the 1930s of patient-care provider communication and the back- and 1940s through to the more recent looks of Annie stage interaction and teamwork of the care providers in Hall or Sharon Stone. Aida Hozi focuses on the transi- a medical clinic but also an exemplar of the multiple tional role(s) of Elizabeth Taylor—from narrative to manifestations of ethnographic writing with a utilitari- spectacle, from star to package created by agents and an value for both undergraduate and graduate classes in marketers. Finally Angela Curran uses the analysis of qualitative research methods. The reader of this text two films (Ruby in Paradise and Clueless) to shed light experiences the emotions and the physicality of the on the creation of audiences and on the possibility of ravages of cancer in the communicative contexts of the cultural critique from within the culture industries. geriatric cancer clinic (where she performs her ethno- Finally, Part III calls attention to Hollywood not so graphic research) and of the author’s tale of her lived much as a place but as an idea. Of course the idea always experience as a cancer patient and cancer survivor. connects to the place, so Jeffrey Charles and Jill Watts Ellingson illuminates the everyday communica- offer a history of the marketing of Hollywood in 1910s tive practices of the oncology clinic in the construction and 1920s Los Angeles—a marketing built on the homes of teamwork as she discusses the mundane, day-to-day of the stars and the sale of land. The same thing occurs interactions among team members, patients, and her- in present-day Los Angeles, but in a more controlled and self, the researcher, in this multi-method mixed genre protected way, as Josh Stenger shows in his analysis of research approach. She describes this multiple method, Universal Studio’s “City Walk” shopping mall and pseu- mixed genre approach as a postmodern form of trian- do-urban environment. Thomas Wartenberg moves in gulation of methods, or rather “crystallization.” She and out of the exclusive shopping district of Rodeo cites Richardson’s (2000) definition of crystallization Drive by examining how Pretty Woman manages to as a multidimensional mixing of genres in which “crys- dodge the social criticism that it should provoke. tallization provides us with a deepened, complex, thor- Shopping is both class separator and great leveler. oughly partial, understanding of the topic” (qtd., p. 14). Finally, Larry Riggs and Paula Willoquet-Maricondi dis- Ellingson argues that the mixing of genres and inclu- sect the marketing of nature and “the natural” in Nell. sion of multiple accounts “enables readers not only to While the historical studies of the films of the experience teamwork from varied angles, but also to 1920s, 1930s, and even the 1950s offer interesting and consider the relationship between the style and content timeless looks at an earlier America and make plausible of writing” (p. 14). The multiple methods and genres claims about the shaping of its culture, those studies that employed in this research include narrative ethnogra- provide a detailed look at more recent films seem oddly phy, grounded theory analysis, and autoethnography. dated. Perhaps this results from a trick of perspective, but Ellingson’s autoethnography takes the reader into it does make the analysis of the films of the 1990s seem the realm of flashbacks of her own cancer treatment, as less generalizable than that of earlier periods. This may well as her recovery from a final surgery during the be the fate of any book on the products of contemporary writing of the book. Embodied writing acknowledges culture, but it demands more attention of the reader. the author and her/his role in the research process, the Those who might want to use this book in a course will analysis, and the writing. In reading Communicating in need to add the missing perspective. the Clinic, one gets to know the patients, the care-

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 25 provider team members, and not just Laura L. vividly describes her lived and re-lived experiences, Ellingson, health communication scholar, but also along with those of the patients with whom she interacts, Laura, the person—the cancer patient and survivor, as that the reader feels the pain, revulsion, empathy, and well as the naïve and inexperienced researcher who sadness that pull the reader into the text and then con- gains confidence through the ethnographic process as tract the muscles of the embodied written text and vomit. she grows into an experienced, embodied ethnographer. Yes, her raw, vivid, and visceral writing of her own body Communicating in the Clinic analyzes the com- and those of her research participants constructs a plex, interconnected power and gender roles among the metaphor of vomiting throughout the text. geriatric ontology medical team consisting of doctor, Ellingson’s embodied writing is real, direct, and nurse practitioner, pharmacist, dietician, etc., as well as powerful. She makes a strong argument for embodied the communicative practices among the care providers writing, for including the author’s bodily experiences and the patients. Ellingson uses Goffman’s (1959) dra- in the context of the research, the analysis, and the maturgical concepts of frontstage and backstage—the writing processes. The body of the researcher is present visible interaction between care- providers and patients in her tales of cancer, which is quite the contrary in versus the behind-the-scenes communication practices most ethnographic texts. Usually, the researcher among care-providers. She discusses the social con- becomes invisible as we are given the perspective of struction of teamwork within both frontstage and back- some omniscient narrator. This is not the case with stage contexts and then proposes a model of embedded Ellingson’s ethnography, which is a powerful contribu- teamwork, in which the boundaries between frontstage tion of Communicating in the Clinic to the field of and backstage are blurred. She argues that “theorizing communication and health communication especially. frontstage and backstage as separate spheres obscures Most health communication research employs the pos- the vital connections between them” (p. 144). Team itivist, social scientific perspective of the detached, all- members interact in the literal doorways that make knowing researcher, rather than enacting the research thresholds elusive as they enter and exit patient exam- process as a learning and growing process—one of ining rooms negotiating not only the boundaries recovery rather than discovery. between frontstage and backstage but also the complex- Another important contribution of this book is to ities of teamwork and the collaboration of patient care. qualitative research methods—specifically ethnogra- Furthermore, Ellingson deeply analyzes her own phy. Ellingson’s writing style makes the reader squirm socially constructed and complex identity as and elicits feelings of discomfort and even queasiness. researcher, quasi-team member, cancer patient, and These visceral effects on the reader illustrate the power survivor. She writes honestly and vividly about her dis- of her writing. The fact that I tasted the bile in my comfort and re-lived trauma of researching a cancer mouth as I read her autoethnographic memories is a clinic where she interacts with sick and dying patients positive endorsement of this kind of embodied while recovering from and re-living her own cancer research. I plan to use her text in my qualitative treatments. The reader also feels the author’s discom- research methods and senior thesis classes to illustrate fort, her pain, nausea, sorrow, and as the read- the multiple and powerful ways ethnographic research er interacts with the embodied text. can be written, lived, and experienced. This book is raw and genuine. The reader is given The book has an author index, a subject index, the sense of being right there in the clinic and also in the and a reference list of works cited. author’s own hospital room and on the sofa with her as —Paige P. Edley she recovers from surgery. You taste the bile as Ellingson Loyola Marymount University. reflects on her own chemotherapy treatments and her re- living of those treatments as she interacts with cancer Fisch, Shalom M. Children’s Learning from patients. You feel the heat and flush of her embarrass- Educational Television. Mahwah, NJ: Lawrence ment as she emotes and rushes out of the clinic on her Erlbaum Associates, 2004. Pp. vii, 267. ISBN 0-8058- first day at the research site. You feel the tightening in 3936-4 (pb.). $59.95. your stomach as she relives the retching and vomiting of Television is a prevalent medium in the lives of her chemotherapy treatments while listening to the inter- young children, and concerns over the influence of this action between extremely thin, ill, and smelly patients medium are often voiced by parents, caregivers, and and their care-providers. Ellingson so eloquently and teachers. Nevertheless, as many researchers now

26 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS acknowledge, it is not the medium that matters but Readiness,” on other “Preschool Series and School rather the content of the message. Shalom Fisch syn- Readiness,” along with empirical evidence in the realm thesizes over 30 years of research on the impact of one of “Literacy,” “Mathematics and Problem Solving,” form of television content: educational content. Fisch “Science and Technology,” “Civics and Social Studies,” writes that “at its best, educational television can pro- “Prosocial Programming,” and “Adult Mediation: vide children with enormous opportunities. Parents, Teachers, Childcare Providers.” The data in this Educational television can serve as a window to new section are rich and fulfilling to anyone interested in the experiences, enrich academic knowledge, enhance atti- educational impact of television on children. At the con- tudes and motivation, and nurture social skills” (p. 1). clusion of each chapter, Fisch presents issues raised and Given the ubiquity of television in the lives of lessons learned in terms of the implications for the future young children, Fisch notes that the attention that people production of educational television. have given towards understanding the effects of televi- In Part II, “Theoretical Approaches,” a model of sion on young viewers makes sense. Nonetheless, he “Comprehension of Educational Content: The Capacity notes that many discussions center on the negative effects Model” is presented. This model uses “children’s of television including reduced attention, disinterest in working memory allocation resources to explain how school, passivity during viewing, and problem behaviors. children extract and comprehend educational content The author (in agreement with Ellen Wartella) points out embedded in a television program” (p. 11). Following that many of the claims are not supported by empirical this discussion, a chapter on the “Transfer of Learning data, and while he does acknowledge that television can from Educational Television: When and Why Does it have negative effects (e.g., violent content and aggressive Occur” presents information on how children apply behavior, persuasive effects of , gender stereo- knowledge and skills learned from television beyond typing), he believes that the negative effects do not pres- those contexts shown on-screen and discusses what ent the entire picture. Specifically, he explains that “far factors influence such transfer. This section concludes less attention has been devoted to the positive effects that with a discussion of the “Social Nature of Children’s carefully crafted, developmentally appropriate television Learning from Educational Television,” which programs can hold. If we believe that children can learn attempts to “bridge the gap between academic and negative lessons from television, then it stands to reason social influences of television by showing how social that they can learn positive lessons, too” (p. 3). Fisch aspects of educational television influence learning of notes that there are nearly 30 years of empirical research academic content” (p. 11). on the educational effects of television, but comments Finally, in Part III, “The Future,” “Convergence that such literature runs the gamut of issues and academ- and Educational Television” looks at the future of new ic subjects, is scattered across numerous sources, and technologies and what role educational television will often has not been published but rather appeared in con- play. In particular, the chapter looks at the idea of ferences, technical reports, or reports to producers and enhanced television and how past lessons of education- funders. As such, he notes educational effects of televi- al television can inform development in the realm of sion have received little attention. new technologies. This book is a first attempt to bring attention to The book’s extensive reference section (pp. 209- the educational impact of television by providing an 238) along with the author and subject index will be extraordinary synthesis of all available literature (pre- welcomed by many children and media researchers viously published and unpublished) on the impact of seeking to use this book when developing their litera- educational television on young viewers. Beyond this ture reviews and when seeking to learn what is known, synthesis, Fisch works to fulfill another important and more importantly, what is yet to be investigated. gap—an explanation of how or why children learn This book is recommended to anyone interested in the from educational television. He offers theoretical mod- empirical evidence supporting children’s learning from els in the book to “explore aspects of mental process- educational television or the possible theoretical mod- ing that underlies children’s learning from educational els which explain how young viewers learn from such television” (p. 4). television. The book’s 13 chapters are distributed among its —Jessica L. Taylor three parts, as follows. Part I, “Empirical Data” presents Ph.D. program empirical findings on “Sesame Street and School Annenberg School of Communication

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 27 Gunter, Barrie, Caroline Oates, and Mark Blades. Jacobson, Maria. Young People and Gendered Media on TV. Mahwah, NJ: Lawrence Messages. Göteborg: NORDICOM, 2005. Pp. 66. Erlbaum Associates, 2005. Pp. ix, 209. ISBN 0-8058- ISBN 91-89471-29-6 (pb.) €12. 4488-0 (hb.) $45.00; 0-8058-5830-X (pb.) $24.50. Attempting to give a picture of “what is going on According to the authors, the purpose of their book in the field of gender and media in a broad sense” (p. is to “establish the status of our knowledge about how 5) around the world, as this research report does, is an children respond to advertising on television, how much ambitious undertaking. Author Maria Jacobson, a free- the research evidence can be taken at face value, and the lance journalist and chairperson of a nonprofit organi- degree to which research can usefully inform regulation zation that monitors the media, covers a good deal of of advertising aimed at young viewers” (p. xx). ground in a few pages. Yet this report is limited by its Chapter 2 discusses the nature of advertising to brevity and lack of a unifying central argument, theo- children, including descriptions of the products most retical framework, or organizing . frequently advertised and the techniques used to mis- The report contains six main chapters. The first lead children about products. It also includes a discus- chapter, on sexuality and consumer culture, begins by sion of common stereotypical portrayals in advertising. drawing the clear and familiar connection between how Both Chapters 3 and 4 focus on children’s under- commercial media portray commodities and sexualized standing of television advertising within the context of youth similarly as objects of desire and images for con- the ability of children to differentiate between pro- sumption. This part also touches on how the media gramming and commercials and distinguish the persua- industries segment audiences by gender as a marketing sive intent of the ad. The authors also discuss the rela- strategy for delivering desired audiences to advertisers. tive strengths and weaknesses of typical methodologies Chapter 2 examines visibility in news and children’s for measuring these concepts. entertainment, reporting findings from several interna- In Chapter 5, the authors point out a major weakness tional studies of news, children’s television, Japanese in much children and advertising research—the lack of any manga, and computer games, all indicating that chil- theoretical framework. What follows is a discussion of the dren are dramatically under-represented compared to theories most often cited by authors: Piaget’s theory of cog- adults, and females compared to males. nitive development, the information processing approach, The next two chapters examine the construction and children’s understanding of others’ minds. Advertising’s of gender roles in media messages. Chapter 3 focuses impact on children’s knowledge, attitudes, and values is the on images of femininity, including stereotypes of topic of Chapter 6. Several theories of advertising effects are women as passive, powerless, domestic, and sexual- summarized, and the levels of advertising influence are dis- ized. Jacobson also discusses studies that consider how cussed on three levels: level learning, product level “the young female body is, in many cases and coun- learning, and consumer socialization. tries, an arena for a symbolic battle between Chapter 7 considers the extent that advertising Westernization, modernity and traditional values” (p. affects children’s choice and consumption, the subject 19). She goes on to report on several studies of how most central to advisers’ concerns, it is argued. The dif- global media set beauty standards. Chapter 4 examines ferent experimental and survey studies on this topic are representations of masculinity, how they emphasize summarized. Next, Chapter 8 concentrates on the unin- power and mastery, but also how media increasingly tended effects of advertising, including the role of promote obsession with males’ appearance. advertising in children’s nutrition, onset of smoking, The last two chapters depart from media mes- underage drinking, social-stereotyping, and self-image. sages to consider the research on gendered uses and Regulation and the contribution research has effects of media, and how youth negotiate gender played in regulation are discussed in chapter 9. The roles with media. The chapter on uses discusses a authors limit this discussion to the position in European handful of studies that point to gender (as well as countries, specifically the United Kingdom. race) as an influence on media preferences. It also The authors conclude by suggesting future areas reports the results of another recent literature review of research. A complete list of references is provided. of the effects on girls and boys of gender role por- —Leslie R. Williams trayals on television, impacts of media on body satis- Ph.D. program faction and eating disorders, and whether media rep- Annenberg School of Communication resentations of sexuality shape youth attitudes and

28 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS behaviors. A final chapter notes that youth also use probably as great as the research effort Nimmo and media to play with and negotiate gender roles in com- Sanders captured in their review of research 60 years plex ways that can be both empowering and disem- prior to their volume (back to Walter Lippman’s ground- powering, offering a nod to cultural studies of media breaking work on polling in the 1920s). Kaid’s book truly and gender. Jacobson also appends to the report two follows the handbook genre. It provides historical infor- documents aimed at journalists and media monitors: mation on the roots and trajectory of the field, includes the International Federation of Journalists’ guidelines essays on key theories such as agenda setting, spiral of for reporting on children’s issues and UNESCO’s silence, political debates, etc., and synthesizes the future guide to gender-sensitive reporting. of the discipline. Five major sections frame the issues: (1) Young People and Gendered Media Messages is Theories and Approaches to Political Communication; valuable as a source of citations to international stud- (2) Political Messages; (3) News Coverage of Politics, ies, especially those outside the Anglo-American liter- Political Issues, and Political Institutions; (4) Political ature. The report could benefit scholars and students Communication and Public Opinion; and (5) who are conducting literature searches on recent work International Perspectives on Political Communication. on gender and media content, uses, and effects. A final essay points scholars toward the Internet, with all The report is less well-suited to serve as an intro- of its opportunities and limitations, as the primary chan- duction to the field of gender and media. It would ben- nel of the future of political communication. In that chap- efit from a more clearly stated argument or theoretical ter Tedesco argues that the Internet is as revolutionary to framework for organizing the field. At the outset, the study of politics, communication, and media as per- Jacobson writes that gendered media messages are haps television was 50-60 years ago (p. 507). characterized by two main themes: “consumerism and Everett Rogers’ opening essay sets the tone for sexuality often turned into sexism and sexualization or Kaid’s Handbook. Rogers traces the origins of the dis- hyper-sexuality” (p. 11). Yet much of the report departs cipline from the civic-minded journalism of Walter from these themes without explanation, so that it is not Lippman through contemporary uses of agenda setting clear exactly what guides the inclusion of some areas and the early stages of the Internet (p. 3). Rogers argues of the field and studies rather than others. In addition, that diffusion of political information occurs at a pub- competing theoretical approaches, such as media lic and interpersonal level. Newman and Perloff (p. 17) effects and cultural studies of active reception, are pre- identify key aspects of marketing research as a parallel sented side-by-side without much explanation or to communication research. In effect, they argue that inferred to be compatible with one another. A more use- contemporary political communication is essentially ful introductory text would explain and highlight the same as marketing, the latter usually associated (rather than obscure) the different assumptions of with corporate communication. Newman and Perloff major research traditions and help students to recog- refer to Newman’s (1994) earlier work in political mar- nize them. keting to identify these commonalities. Despite differ- This report contains notes and references but no ences in desired outcomes of politics and business, index. both rely upon the use of standard marketing —Chad Raphael tools and strategies, such as marketing research, Santa Clara University marketing segmentation, targeting and position- ing, and strategy development and implementa- Kaid, Lynda Lee (Ed.). Handbook of Political tion. . . . Second, the voter can be analyzed as a Communication Research. Mahwah, NJ: Lawrence consumer in the political marketplace. . . . [And] Erlbaum Associates, 2004. Pp. xvii, 541. ISBN 0-8058- third, both are dealing with competitive market- 3774-4 (hb.) $149.95. places and, as such, they need to rely on similar The first Handbook of Political Communication approaches to winning. (p. 19) appeared in 1981. The volume essentially sent the tone Graber (p. 45) identifies major genres of method- for a field of study that transcends the boundaries of sev- ological approaches to political communication eral disciplines. The current Handbook of Political research. She contends that politics has changed little, Communication Research edited by Lynda Lee Kaid, is yet methodologies have developed considerably. The the first complete update of that first edition. The depth genres are survey (still the dominant methodology in and breadth of change in the field in the past 23 years is political communication research), content analysis,

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 29 network analysis, and experimental research. Haynes and Thomas Petersen precede discussion of the theory (p. 109) discusses the terminology of the political com- with a review of the sociological theory (symbolic munication field. The development of a complete the- interactionism) that undergirds spiral of silence. saurus of political communication terms identifies the Neumann and Petersen review Mead, Goffman, and field as a mature body of work. The consistent termi- others to identify human beings as symbol-users capa- nology of concepts, relationships, etc. streamlines ble of projecting their political opinions on an imag- research practices and interpretation. ined other as they decide whether to make political The three essays in Part 2 deal with the enactment feelings public. As is often the case, people expect of rhetoric in political endeavors. Gronbeck (p. 135) unsupportive consequences to their publicizing of these traces the perspectives of rhetoric in politics from Plato opinions, thus these opinions spiral away silently. The to 21st century rhetoricians, but he addresses rhetoric section also includes chapters by Sotirovic and as essentially political as well. Kaid’s (p. 155) review McLeod (“Political Learning”), and Delli Carpini of political advertisements is a follow-up to the piece (“Citizens’ Involvement in Political and Civic Life”). she wrote 24 years earlier in the first edition of the One notable article is Bystrom’s (p. 435) on the Handbook. That period constitutes about one-half of increasing role of women as both sources and receivers the time that political television ads have been airing. of political information. She discusses the legal environment, content, and Two essays occupy Part 4, International Trends. valence of political advertisements. Though the chapter The political climate in both Europe and Asia has addresses all manner of political advertisements, this changed dramatically in the past 50 years, and the fact and the ubiquity of the Internet, reflect the relative effects of those changes on media production and newness of political advertising. media consumption is an important research question. McKinney and Carlin (p. 203) review literature of Holtz-Bacha (p. 463) traces the lines of political com- televised political debates. The nature of televised munication research in Europe and points out that the debates is evolving rapidly. In fact, television is still a fall of communism and the proliferation of privately- relatively new medium for covering politics. The owned television stations have changed the focus of authors provide a thorough review of studies generated political communication research. Though political from theory areas such as democratic theory, agenda communication research has grown significantly in setting, uses and gratifications, and argumentation and Europe, language barriers and the absence of an debate theory. alliance of communication scholars have restricted Part 3 presents articles on . For research to what Holtz-Bacha calls a “national endeav- Weaver, McCombs, and Shaw (p. 257), the news media or” (p. 471), unique to individual European countries. have long been responsible for setting the agenda, or Similarly, Willnat and Aw (p. 479) suggest that media what people ought to think about. Weaver, McCombs, research in Asia in the past 10 years has focused more and Shaw review literature beyond functions of agenda on public opinion and media effects as a result of setting theory to include studies from Britain, Tiananmen Square and the British return of Honk Kong Germany, Israel, Italy, Spain, Japan, and Taiwan. They to China. They argue that this period presents the “most also introduce the newest derivative of agenda-set- recent and academically important communication ting—agenda melding, the desire of citizens to “affili- studies conducted in Asia” (p. 481). The authors then ate with others . . . through other people and various move through Asian countries that have supplied sig- media” (p. 274). Among other chapters in this section, nificant English-language articles to summarize Gulati, Just, and Crigler (p. 237) address media cover- research from the past 10 years. age of political campaigns; Bennett (p. 283) questions The Handbook of Political Communication whether the journalists as gatekeepers have allowed the Research draws researchers from political science, gate to become more porous for soft news; and McKay communication studies, rhetoric, marketing, journal- and Paletz (p. 315) study media coverage of the presi- ism, and . Its ambitious and complete dency itself. summary of lines of research from these disciplines The study of politics and communication has a makes it an essential reference for scholars in all relat- long relationship with public opinion, the subject of the ed areas. The volume has a limited subject index. essays in Part IV. Chapter 13 presents Noelle- —-Pete Bicak Neumann’s (p. 339) spiral of silence theory, but she Rockhurst University

30 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS References “Internet Sources for Electoral Legislation, Regulation, Lippman, W. (1922). Public opinion. New York: Harcourt and Court Decisions,” and provides a list of relevant Brace. websites by country profiled. The second profiles the Newman, B. I. (1994). The marketing of the president; European Institute for the Media’s Media and Political marketing as a campaign strategy. Thousand Democracy Programme, and the third list media-moni- Oaks, CA: Sage. toring missions conducted by the Media and Nimmo, D. and Sanders, K. R. (Eds.) (1981). Handbook of Democracy Programme since 1992. political communication. Beverly Hills, CA: Sage. The Media and Elections: A Handbook and Comparative Study would be highly appropriate to Lange, Bernd-Peter and David Ward (Eds). Media accompany a comparative media course, as many of the and Elections: A Handbook and Comparative Study. factors of advertising and news apply not only to elec- Mahwah, NJ: Lawrence Erlbaum Associates, 2004. Pp. tions in many of these examples. Lange and Ward’s work xvi, 264. ISBN 0-8058-4780-4 (hb.) $59.95. would also be suitable for a comparative politics course “Spanning the political globe” comes to mind that studied elections and campaigns in particular. when looking at Lange and Ward’s book of compara- —-Joan Conners tive systems of and elections. Bernd-Peter Speech Communication Lange is the former Director-General of the European Randolph-Macon College Institute for the Media, and is with the University of Osnabrück, while David Ward has served in a number McChesney, Robert W. The Problem of the Media: of roles at the European Institute for the Media. U.S. Communication Politics in the Twenty-First Ward’s introduction sets the stage for the ration- Century. New York: Monthly Review Press, 2004. Pp. ale of the comparative approach taken in the book, 367. ISBN 1-58367-105-6 (pb.) $16.95. stating “contributions in this book demonstrate the Robert McChesney is that rare combination of variety of national systems of democracy and the activist and scholar. More than this, he writes in a direct range of differences in how nations organize both their style equally rare in communication scholarship. In his media systems and the rules that require elections to first sentence he comes right to the point: “The purpose be covered” (p. xv). of this book is to shed light on how the media system Seven chapters are dedicated to providing works in the United States and to provide a basis for cit- overviews of elections, media, and regulations for the izens to play a more active role in shaping the policies following countries: Italy, United States, Germany, upon which the system is built” (p. 7). McChesney is South Africa, France, Russia, and the United Kingdom. identified by many as a leftist spokesperson and dis- Each chapter outlines the political system of the coun- missed as only promoting a one-sided argument against try, media operations, and regulations related to politi- capitalism. Readers who take the time to read this book cal campaigns, as well as contemporary issues or con- will find, yes, a strong point of view, but the arguments troversies. It is quite interesting to note that the coun- promoted are bolstered by a wide array of evidence, both tries profiled indicate many common concerns regard- historical and social scientific, and the author makes a ing objectivity and fairness, voter involvement, as well point of trying to examine the evidence for counter-argu- as access to the media (paid or free). ments to his positions as well. One of his basic premis- Ward and Lange’s book also includes a profile of es is that regulation and policy are important historical elections in the European Union, as well as a brief con- platforms on which the U.S. media have been built and cluding chapter by Ward. Tying it all together is remain so today even in a deregulatory epoch. The struc- Lange’s final chapter on “Some reflections and recom- ture of this combined law and regulation goes back to mendations,” which offers guidelines, suggestions, as the mid-19th century with the beginning of the telegraph well as some warnings regarding media and elections, and, has, in the context of American political economy, access to media, and journalists’ responsibility in elec- favored private enterprise in media development. Even tion coverage. Although he makes more than 50 con- though in recent decades the dominance of the bottom clusions or recommendations in just 25 pages, Lange’s line and the largely private media industry seem to have work provides a valuable synthesis of issues that these triumphed over government regulation, nevertheless various countries share. McChesney is still optimistic that the American public Three appendices accompany the text, in addition can and will assert itself to limit such media power. to an author index and a subject index. One contains

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 31 The book is divided into seven chapters that pur- In Chapter 5 McChesney takes on the proposition sue the purpose of its first sentence in the Preface. He that is almost dogma that the market is the best mech- begins with a list of “myths” that underlie popular anism for “giving people what they want.” He applies belief about media in this country. The first is really not his analysis to entertainment media primarily because a myth widely held, but certainly underlies the argu- these have become the primary focus of the few, large ment for corporate expansion: The media do not matter media conglomerates that have dominated American much. This is not hard to dispel. McChesney goes on and global cultures. McChesney makes the already with seven other false beliefs concerning media. And familiar argument that a handful of media corporations these form the basis for the seven chapters that follow. have become the powerful arbiters of American culture In Chapter 1, he explores the history of the develop- and even politics. He adds an analysis of the economic ment of media and argues that there was a change in the structure of these monoliths to show that they are not 19th century from media (newspapers and journals) examples of true capitalist competition. Next, he asks that were privately owned but politically partisan to whether the market mechanism is the best way to reg- ones that substituted profitability and entertainment for ulate the system. Not surprisingly, he finds that it is not. the ideals of informing citizens about matters of gover- He asks, by way of summary, whether the media can nance. In this and the following two chapters, give people/audiences what they want, and he details McChesney demonstrates his expertise in history and 10 arguments why they cannot. in journalism research by chronicling the rise of mod- In the final two chapters, the author returns from ern news organizations which, in his view, have sacri- the media to regulation and policy and the role of citi- ficed professionalism for corporate control. zens in reforming the media. In Chapter 6 McChesney In Chapter 3 he turns to the political attack on reviews the consequences of the Telecommunications journalism in recent decades under four propositions Act of 1996 and argues for the need for better regula- promoted by the political right: that the decisive power tion of media, including the Internet. He concludes over the news lies with journalists; that journalists are with a call for stronger support for public broadcasting dominantly political liberals; that they abuse their and even for public subsidy for Internet development. power and break their professional code in advancing Lest the reader think this is just utopian rhetoric, their liberal agenda; and that “objective” journalists McChesney adds Chapter 7 where he gives a blow by would see the world more conservatively. This is a blow account of the Republican-controlled FCC efforts topic that the author is not only concerned about but to further relax media ownership rules in 2002-2003. has followed quite closely as a journalism scholar. He The story is one where citizens, ultimately of both left spends the first half of the chapter citing and refuting and right, spoke out against the growth of media giants the arguments against the liberal of the press. He and how the proposed changes to relax ownership rules also tries to explain why, in his mind, this attack has were rebuffed by a Republican-controlled Congress. been so successful (sheer repetition, better political What the author did not know at the time of publication organizing, lack of response by Democrats). was that the Bush administration would give up its In Chapter 4 McChesney argues that we live now quest for further relaxation in 2005. Whether that event in a hyper-commercialized culture and that this further means, as McChesney hopes, that media concentration undermines the democracy promoted by a free and will be stopped and citizens will begin to assert their independent press. The thrust of the chapter is to pro- influence toward the media reform that is advocated in vide a historical context for the rise of advertising in our this book remains to be seen. society and to provide evidence of the growth of adver- This is an important book both for its scholarly tising, the hyper-commercialization of media, and the approach and its advocacy for reform. At times it may consequences for the public. He also details briefly the blunt its appeal with a rhetoric that may put off some role of policies in both protecting and promoting the readers, but it is a powerful argument that is both time- selling of everything in our culture. This chapter is more ly and well articulated. derivative in tone than the previous ones as it depends There are extensive notes for each chapter with on much research by other scholars already devoted to references, as well as an index. a critique of our commercial culture. It is not unrelated —Emile McAnany to the general argument about media structure and Santa Clara University threats to democracy, but it seems less convincing.

32 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS Rogers, Richard. Information Politics on the Web. through 5 each introduce a distinct method and instru- Cambridge, MA: MIT Press, 2004. Pp. ix, 216. ISBN ment for studying web-based political communication. 0-262-18242-4 (hb). $35.00. Chapter 2 presents an entertaining study of how Viagra What are the in how information is select- is presented differently on the web by authoritative ed and presented to us on the World Wide Web? What voices (doctors, drug companies and manufacturers) new methods are available to study political communi- and non-authoritative sources (Viagra users and re-sell- cation online? Scholars interested in either question ers). This study uses a method that aims to take advan- can profit from this book by Richard Rogers, Assistant tage both of human surfing of sites using a variety of Professor in Media Studies at the University of search tools, as well as collaborative filtering of their Amsterdam. results. The results are expressed in a web site that por- Rogers is among those who are concerned with trays the struggle between expert views on Viagra (as a the shrinking scope and diversity of content we are drug for elderly men with erectile dysfunction) and non- exposed to on the web. He is especially interested in expert views (as a party drug for youth or for whimsical the major means of adjudicating the content we see experiments such as pepping up wilting flowers). online, such as how search engines rank and index Succeeding chapters focus on more traditional top- web pages, and how dynamic preference-matching ics of political communication. Chapter 3 looks at an (such as that provided by Amazon.com) recommends attempt by the Dutch government to organize a national content or products to a visitor based on her past pref- political debate over the safety of genetically modified erences and those of others with similar likes. Whose organisms in foods. The study uses Netlocator, Rogers’ voices and what opportunities are included and web crawling program that finds all sites linked to given excluded by these means? starting points, to identify “issue networks” of sites cre- This is a matter both of what Rogers calls “front-end ated by inter-linking non-governmental organizations politics” and “back-end politics” (p. 2). The politics of the (NGOs). In addition, Rogers discusses his Issuecrawler front-end of web sites concerns the inclusiveness of the software, which is used here to measure the temperature kind of visible content that communication scholars are of debate (according to how frequently sites modify their used to studying, such as news reports and political pages), level of territorialization of debate (by examin- debates. Back-end politics, which are unique to the web as ing where organizations taking part in the debate are a medium, have to do with how search tools, filters, and located), and intensity (via the number of organizations so on privilege or discriminate against content that is dis- taking positions on the issue). Linking patterns between played to users. Rogers argues that front-end content con- sites indicate that civil society groups engaged in the tinues to frame political debate in exclusive ways accord- food safety debate through international organizations, ing to traditionally powerful sources. Similarly, the back- and that the only national “debate” on the web was cre- end logics of search tools increasingly privilege official ated by a Dutch television program’s site, which linked sites, reducing the diversity of views that web users actu- widely to the views of NGOs, government and business. ally see. For example, a search for “terrorism” on Google Chapter 4 presents the Web Issue Index, a software tool after the September 11, 2001 attacks on New York City for tracking mentions of social issues on the web over yields initial pages of hits to the same authoritative time. Rogers uses it to compare mentions of globaliza- sources that dominate mainstream news coverage on and tion issues on sites created by Dutch and international off the web: the U.S. government, American journalists, NGOs and online Dutch newspapers during the 2001 G- think tanks, and academics at major institutions. 8 economic summit in Genoa, Italy. He finds that NGO However, the book is less an argument about views are not well represented in the press, where offi- where the web is going than a series of conceptual tools cial views dominate. Chapter 5 presents the Election and methods for researching web-based political com- Issue Tracker, which follows issues raised in party plat- munication. What makes this work unique is that it forms, by NGOs, and in press coverage, allowing for includes accounts of how Rogers and his colleagues comparison between them. This software allows Rogers created and used several online research instruments, to track which parties’ issues are resonating most in the with examples of how they can be applied in specific press, and the extent that NGOs are able to inject their studies. The introductory chapter offers a detailed con- issues into coverage. In his conclusion, Rogers asks ceptualization of how we can think about ways that whether the web might help free NGOs from their information politics works on the web. Chapters 2 reliance on mainstream media coverage to spread their

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 33 views and influence policy, suggesting that this may be Schirato, Tony and Jen Webb. Understanding the case when attention to NGOs and their issues are Globalization. London, Thousand Oaks, New Delhi: high within their issue networks on the web. Sage, 2003. Pp. v, 232. ISBN 0-7619-4794-9 (pb.) This is an important book that will stimulate think- $29.95. ing about how to conceive of information control on the Globalization challenges almost every student of web and how to study it. Rogers’ work is valuable for its communication, whether or not s/he focuses on inter- many conceptual distinctions that help us think about, national media. In fact, even a casual reading of the and critique, the way we are guided to privileged sources news confronts us with the idea of globalization and of information on the apparently free landscape of the with passionate arguments for and against it. But what web. It is also a fount of ideas for methods of research- exactly does the term signify? And how does it have an ing online communication. The discussion of how dif- impact on communication studies. Tony Schirato and ferent search tools’ logics work, and what kind of results Jen Webb tackle these issues, not always in a way that they are most apt to deliver, will be of interest to schol- will please everyone, but in a way that does lay out ars. The software tools he has developed, although in some of the contested territory. their early stages, should be useful additions to the At their most helpful, they argue “that globaliza- online researcher’s toolkit (see govcom.org for further tion can be understood as a grid of discourses, prac- discussion and program downloads). tices, relations, and values that passes over and trans- The book also leaves a few questions unanswered. forms virtually every aspect of contemporary life” (p. First, what Rogers calls “information politics” is often 187). The focus on discourses is particularly helpful, driven by economic factors as well, such as various “pay because globalization is a way of talking about the for placement” systems used by some search tools. One world, a kind of shorthand within largely academic may wonder whether his object of inquiry would not be attempts to grasp what has occurred and continues to more accurately called a political economy of informa- occur due to increased communication, business, eco- tion. Second, the research instruments he describes here nomic, and political links around the world. Much of are best thought of as prototypes, and should be careful- our current experience of globalization does have ly supplemented with other forms of inquiry, such as tex- strong connections with the communication infrastruc- tual analysis. Perhaps the most important example is the ture built out in the last 25 years; much of it has con- Netlocator. Although Rogers acknowledges that organi- nections with the communication industry and its prod- zations may link to each other for reasons other than ucts, both of which depend on the infrastructure. The sharing a set of common issues, we need to think more fact that the same infrastructure supports economic and about whether inter-linking is enough to establish real political (and religious and educational, etc.) influences connections between organizations, rather than merely a only makes it more important and more baffling. connection between their web sites. For example, the At their least helpful, Schirato and Webb present ubiquity of links to download Adobe Acrobat Reader a kind of one-sided argument against the power rela- software (so surfers can read some documents) does not tions and economic distortions introduced by global- mean that Adobe is part of anyone’s issue network. A ization. While this is not necessarily a bad thing, for conceptual issue is raised by the Election Issue Tracker these uneven relations and accompanying distortions as well. As applied in the book, the tool cannot measure deserve critique, the neo-Marxist language and eco- issues initiated by the press, only by parties and NGOs, nomics that frame the critique makes it less accessible so either the program or the use of it here (it is not clear) and more resistible than it should be. Their chapter on assumes that the press can only selectively amplify global capitalism (Chapter 4), for example, follows a issues raised by others, and cannot introduce issues into Marxist framework (which they straightforwardly campaigns. That is unlikely. admit) whose adequacy many in the business world Because of its complexity and dense academic would question. That this framework is itself part of the style, Information Politics on the Web is a book for “grid of discourses” that flows from globalization is scholars and for graduate courses in research methods, not so apparent. In general, they follow Marxist authors political communication, and new media or cybercul- like Immanuel Wallerstein, Michael Hardt, and ture. It is fully indexed and referenced. Antonio Negri, and neo-Marxist ones like Armand —Chad Raphael Mattelart, Manuel Castells, Jean Baudrillard, Paul Santa Clara University Virilio, and Arjun Appadurai (p. 8).

34 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS The book’s eight chapters attempt to lay out a interests of the state or of the corporation as, for exam- broad introduction to globalization, interspersing the ple, in the case of the migration of peoples. theoretical material with examples from contemporary The book has a glossary of key terms, a bibliog- communication artifacts ranging from films to music to raphy, and a general index. commercials. As well as introducing the general idea of —Paul A. Soukup, S.J. globalization, the book also takes the reader through a Santa Clara University number of key postmodern concepts that flow through communication studies—information, hegemony, the Ukadike, Nwachukwu Frank. Questioning African subject, interpellation, the public sphere, the digital Cinema: Conversations with Filmmakers. Minnea- divide, the end of the state. polis: University of Minnesota Press, 2002. Pp. xxi, Chapter 1 introduces the “idea of globalization,” 319. ISBN 0-8166-4004-1 (hb.) $54.95; 0-8166-4005- providing more description than definition. Here they X (pb.) $19.95. follow Mattelart. They also bring the reader face to face Largely due to distribution problems (or, in the case with problems like the relationship of the global and the of DVDs, distribution restrictions), viewers in the West local. Chapter 2 widens the discussion by examining the have little experience of African cinema. More surpris- history and of globalization. The emphasis on ingly, distribution problems of a different sort, as well as ideology is important, providing several different paths exhibitor policies, keep African cinema out of African through the material (Marxist, cultural theory, globalist movie theaters. And yet there exists a rich heritage of perspectives). Chapter 3 examines the technological African cinema, born largely after the colonial period underpinnings of globalization, introducing questions of (that is, in the 1960s). In a previous book, Black African information and “informationalism,” and the contempo- Cinema (1994) and in this one Ukadike attempts to intro- rary disruptions of space and time. duce the African film experience to the world. Thanks to Chapter 5 broadens the scope from Chapter 4’s festival venues, changed distribution deals, and govern- presentation on capitalism to ask about the role (or the ment support, “African cinema is at last infiltrating the survival) of the state and ideas of sovereignty, particu- world market with major works of indigenous cultures larly in the face of a growing corporate power. Only the that explore and adapt their oral and literary traditions to largest states seem able to survive. Chapter 6 moves the the articulation of a new film language” (p. xvii). reader from these larger issues to personal ones: the idea Rather than a textbook or work of cinema history, of the subject and how a global culture constitutes the Questioning African Cinema consists of interviews subject. This is a particularly helpful discussion for with leading African directors. Through the interviews, communication studies, as is Chapter 7, which moves conducted over a 10-year period at festivals, screen- from the personal to the community by asking about the ings, or universities, Ukadike tells the history of film in possibilities of a public sphere. Schirato and Webb Africa and introduces the key issues and challenges— rightly note that “the relationship between the public all in the words of the directors themselves. His broad- sphere, on the one hand, and capitalism and the (global) er purpose is to give some sense of the political, eco- media, on the other, is central to debates about the pol- nomic, social, and state practices that govern African itics of globalization” (p. 161). In many ways, this topic cinema, as well as its historical location in the experi- deserves a book in and of itself; the material here pro- ences of colonialism and the continued (cultural and vides an introduction to the issues, though understand- economic) influence of the former colonial powers. In ably it cannot give a fully developed political theory. many cases, for example, post-production work on Finally, Chapter 8 sums up the argument of the films financed by France must take place in France, book by looking at the discourses themselves, under thus limiting the establishment or viability of post-pro- the rubric of “globalization, counter-memory, and prac- duction facilities in francophone Africa. In other cases, tice.” Here we again encounter the media, the subject, theater owners prefer to program Hollywood and and the ways people make sense of their worlds. The Bollywood blockbusters in order to guarantee signifi- book leaves open the question of whether (or how cant revenues, even when African films may do as well much) people can opt out of these discourses, though at the box office. the authors remind us several times that globalization Ukadike, a professor at Tulane University, wishes does have its limits, especially when these favor the to go farther than just an examination of the infrastruc- tures of the African film industry, however. Where appro-

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 35 priate, he also invites his interview subjects to discuss Oumar Sissoko of Mali. These directors had the opportu- “acting, distribution and exhibition, history, theory and nity to build on some existing structures; they easily place criticism, video-based television production, and televi- their work in the context of those introduced in Part 1. sion’s relationship to independent film” (p. xvii). Finally, Part 3: Boundaries and Trajectories picks Because the book presents the interviews as sepa- up some of the themes of Parts 1 and 2, but attends rate chapters, it does not lend itself to any easy summa- more to the evolution of in the African cine- ry. Themes do emerge, but weave their way in and out of ma, and the effects of politics and socioeconomic the reflections of individual directors. For example, we issues. These directors often work in the shadow of hear about the beginnings of cinema in the different wars and development issues that limit their ability to regions of Africa, but especially in those French-speak- work freely. But they persist. The directors in this sec- ing areas and we learn of its support both by various tion are King Ampaw of Ghana, Jean-Pierre Bekolo of French ministries and by festivals, such as the long-run- Cameroon, Salem Mekuria of Ethiopia, Haile Gerima ning Pan-African Festival of Film and Television, held of Ethiopia, Ramadan Suleman of South Africa, and each year in Ouagadougou [FESPACO]. We also read of Jean-Marie Teno of Cameroon. the conflicts built into FESPACO, with its preference for In describing his process, Ukadike comments, films French. We read about the relationship of directors I posed certain questions to all as a way of ascer- to their respective governments, of support for docu- taining commonalities and differences among mentary work and struggles to create features. We read them concerning their opinions on specific about the development of an authentic African film style issues. As the interviews reveal, although all of and the role of film critics. (Not surprisingly, serious the filmmakers share a common goal—that of African directors have similar attitudes towards critics as promoting the use of African cinema as a mobi- most other serious directors.) We read about the creative lizing force and as a tool for enlightenment— process and the prosaic process of securing financing. they have widely varying beliefs regarding the We read, too, of the years of exile (political or econom- nature of African cinema, film aesthetics, and ic) spent in Europe or the United States by many of the methods of representation. (p. xxi) directors. For many of them, these also became the years One drawback of the interview form is that each that they studied or learned the craft of film making. interview reads as a combination of a traditional press Ukadike structures each chapter similarly. After a interview—almost a exercise—and an short introduction of the director, which includes a academic exploration of cinema. That is a small price to brief biography and a filmography, he outlines some pay, though, for an introduction to so many film makers. issues more particular to the situation of his interlocu- The sadness is that so few of these are known outside of tor. Then he proceeds with the interview in question Africa, or even outside of their home countries. This vol- and answer form. Of particular value is his invitation to ume should go a long way to remedying that lack. the directors to discuss their films and to talk about the The book has no index, but each chapter con- development of ideas and themes in the films. cludes with a full filmography of the director. The book We meet the directors in three groups, correspon- includes a list of distributors of African films in the ding to the three major sections of the book. Part 1: The United States. Tradition: Pioneering, Invention, and Intervention —Paul A. Soukup, S.J. introduces Kwaw Ansah of Ghana, Souleymane Cissé Santa Clara University of Mali, Safi Faye of Senegal, Gadalla Gubara of the Sudan, Med Hondo of Mauritania, Lionel Ngakane of South Africa, and Chief Eddie Ugbomah of Nigeria. As Report from Spain implied in the section subtitle, each of these can claim Professor Daniel E. Jones of the Facultat de a founding role for an African cinema in his country. Ciénces de la Comunicació Blanquernia, Universitat Part 2: Vision and Trends introduces what we might Ramon Llull in Barcelona ([email protected]) call a “new wave” of African film makers. These include writes with reports on gender studies and radio studies Flora Gomes of Guinea-Bissau, Gaston Kaboré of from the perspective of communication research in Burkina Faso, Djibril Diop Membety of Senegal, Barcelona. These first appeared in the Telos newsletters Ngangura Mweze of the Congo, Idrissa Ouedraogo of and are translated and reprinted with his permission. Burkina Faso, Brendan Shehu of Nigeria, and Cheick (Translation by Yocupitzia Oseguera.)

36 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS Gender Studies in Communication Journals In the North American world, studies about gender [Los estudios sobre género en las revistas de comuni- are common in specific journals which are specialized in cación]. From Telos 57 the field of social communication, such as the North What today are known as “gender studies” in the American Cinema Journal, The Communication Review, academic field of social communication are relatively Critical Studies in Media Communication, Journal of recent, since they have evolved in the last 25 years, Broadcasting and Electronic Media, Journal of although there are precedents overall in the United Communication Inquiry, Journal of Popular Culture, States and in Europe dating back a few decades. Media Studies Journal, Public Opinion Quarterly, and Basically, they have been promoted mostly by female New Media, as well as the British journals, Discourse & investigators, who from a sociological, psychological, Society, European Journal of Communication, and semiotic, and pedagogic perspective were first interest- Media Development. Likewise, studies on gender can ed in analyzing the representation of women in the also be found in German journals such as media. More precisely, they focused on what image Communications: The European Journal of Communica- was attributed to women, what stereotypes were the tion Research, in the Australian journal Australian most recurrent, and what the threshold for their public Journal of Communication, and in the Asian journals presence was. Asian Journal of Communication (Singapore) and The This interest on the part of the critical investigation Journal of Development Communication (Malaysia). has been consolidated with greater strength in the United In the Iberian American area, several references States, Canada, central and northern Europe, although on gender studies can be found in Latin American jour- with less force in other cultural areas such as Latin nals such as Anuário Ininco, Anuário Intercom, America and parts of Europe. This has been attributed in Aportes de la Comunicación y la Cultura, Comuni- part to the academic traditions of the different countries cación: Estudios Venezolanos de Comunicación, Diá- as well as to the level of consciousness of women regard- logos de la Comunicación, Comunicação & Sociedade, ing their marginality in politics, society, and the media. Estudios sobre las Culturas Contemporáneas, To quantitative content analysis (measuring the Etcétera, Interacción, Oficios Terrestres, Revista presence of women over against men in the press or in FAMECOS, and in the Spanish publication CIC: televised programming), other qualitative characters Cuadernos de Información y Comunicación. have been added which have been responsible for —Daniel E. Jones establishing the different stereotypes utilized to qualify The Decline of the Radio in Communication Journals women through the medium of semiotic analysis or [El ocaso de la radio en las revistas de comunicación] complex interviews. Therefore, the first historical stud- Telos 60 ies about the “feminine press” (specifically, the press The historic process of the introduction of radio directed towards women and concentrated on domestic as a medium of social communication was relatively and family matters) head to head with the “typical short in that it only took a span of 20 years from the press” (essentially masculine and meant to reflect pub- technical invention (Marconi TSH, in 1899) to reach lic issues deemed relevant) has also passed on to con- the first regular transmissions (beginning in 1920). The template the role of female and male professionals. In motives behind this rapid peak were overall the com- sum, the context has managed to evolve from the mercial interests of the powerful companies that fabri- analysis of texts, to study not only the number of cated the radio receiver components (for example, women who work in communication businesses, but RCA and Westinghouse in the United States, and also what positions they hold and what role they play Telefunken and Phillips in Europe) and the progress of in the selection and treatment of different issues. World War I. Mainly, female investigators have concentrated There were three models of implantation of media on print media but also on television (especially on the in the world. The United States has always situated different types of content, from advertisements to itself at the head of the commercial model, with a sys- informational or fictional programming), but there has tem of private entitlement for the broadcasters, which been little analysis about radio (in spite of the huge now holds hegemony in the entire West. A grand evo- influence on its female audience of various social lution of this medium was produced and in the 1920s standings) or about other cultural industries such as the first national broadcasting channels were created: cinema, music, and video. NBC, ABC, and CBS.

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 37 The progress of radio in Europe was slower, communication because of its excellence in those years although it had started early and the British Broadcasting since it only competed in a few aspects with the press Corporation (BBC) had represented the model singular- and cinema, until the television began gaining ground in ly. In 1926 this public (not governmental) corporation the United States during the ’50s and consequently in emerged which monopolized radio broadcasting and its Europe and Latin America during the ’60s. financing through the laws on the possession of In those decades radio broadcasting was (along receivers. This dealt with the model of public (not com- with the cinema) the medium of social communication mercial) radio broadcasting, with a certain parliamentary most studied, not only in books but also largely in jour- control and without advertising, which would be mostly nals that were professional as well as technical and aca- followed by liberal countries following World War II demic. In spite of this, between the ’50s and ’60s there with the exceptions of Spain and Portugal. were changes that irreversibly channeled scientific The radio came to maturity after 30 years, being interest towards television. Without a doubt there are a popular medium of entertainment (along with cine- differences between countries which are due to the ma), a significant medium of information (along with overall level of development. Nevertheless, most show the press), and a grand medium of . Its a greater interest in television and a generalized indif- social influence was extraordinary due to its credibili- ference to radio, even in regions of Latin America, ty, its acceptance as an informative source, and its pop- where radio continues to be an important medium, ularity with the masses. Popular culture was introduced especially in the vast rural areas without electricity to the radio and series, interactive programs, and con- where practically no other form of mass communica- tests were born. During the Spanish Civil War and after tion can reach. World War II, external radio programming gained Here are some titles of international academic importance as a medium of propaganda and influence journals which are published periodically and that are on public opinion. Hence, the radio was especially use- concerned with the radio as a medium of communica- ful in the propaganda during the Cold War (Radio Free tion, analyzing different technical aspects, political, Europe and Radio Liberty against Radio Moscow). managerial, professional, public, of social content and The 1950s saw a crisis for the radio because of the implantation of media, which permits the reader the lack of renovation of the genres, the bad habits derived access to concrete perspectives of analysis. This is the from a radio dedicated to propaganda, and the competi- case in North American publications such as Canadian tion of television which assumed the functions that had Journal of Communication, Communication Research been unique to the popular culture found in radio. This Trends, Journal of Broadcasting & Electronic Media, forced the radio to search for new functions. Journal of Communication and Political Communica- Consequently, the appearance of transistors and the drop tion; in the Latin American journals Comunicación, in prices made the radio accessible to the lower classes, Comunicação & Política, Eptic On Line, Etcétera, adolescents, and those parts of the Third World lacking Idade Mídia, Razón y Palabra, Revista Brasileira de electricity. Also the lightness and mobility of the new Ciências da Comunicação, Revista Mexicana de apparatus substantially changed the habits of the audi- Comunicación, Sala de Prensa, and Signo y ence: it ceased to be listened to as a family activity and Pensamiento. Also the European journals Cahiers became a medium enjoyed individually. Since then there d’Histoire de la Radiodiffusion, Communications & have been significant changes in the radio: the radio now Strategies, Dossiers de l’Audiovisuel, European specializes largely in music (the first formulaic broad- Journal of Communication, Historical Journal of Film, casting emerged), informational magazines were born, Radio and Television, Inter Media, Journalism, Media the “omnibus” programs, the weekend specials, the Culture & Society, Problemi dell’Informazione, and “radio compañia” during the night, etc. Telecommunications Policy, and Spanish journals such Precisely due to the spectacular peak that the radio as Ámbitos, Comunicar, Estudios de Comunicación, has had since its beginnings, numerous investigators Telos, Treballs de Comunicació, and Zer. Recently, in have occupied themselves with studying it, not only 2003 the journal Altavoz: revista de temas radiofónicos from the technical and political point of view of the appeared and is in CD form, edited by the science fac- 1920s and 1930s but also with the analysis of the effects ulty of information of the Complutense University. the messages of the radio has had on its audience after —Daniel E. Jones the 1940s. Without a doubt, it was the best medium of

38 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS Report from Germany The report of the yearly meeting in 2002 appears in the anthology edited by Debatin & Funiok (2003) whose Rev. Dr. Rüdiger Funiok, S.J., of the Institut für publication details and contents appear below. The publi- Komunikation und Medien in Münich, writes about an cation of the reports of the yearly meetings in 2003, 2004 ongoing work on media ethics—the 10 years of the and 2005 were taken over by the journal, Zeitschrift für Media Ethics Network (1995-2005). Kommunikationsökologie und Medienethik (ZfKM). A. History of an Initiative B. Recent Books or Essay Collections The Media Ethics Network—a discussion forum Karmasin, Matthias (Ed.) (2002). Medien und Ethik for researchers and practitioners to explore ethical ques- [Media and ethics]. Stuttgart: Philipp Reclam. tions in the media—has officially existed since 1997. This low-priced, pocket-sized book is appropriate Moderated by Rüdiger Funiok, S.J., in Munich, the annu- for student reading. In 11 essays members of the net- al two-day meetings take place at the Jesuit university for work write about media ethics, media education, media philosophy in Munich. In addition, the association of effects, the ethics of the Internet, the theological impli- German communication and media researchers cations of media ethics, journalism, and the quality of (Deutsche Gesellschaft für Publizistik- und the media. The volume gives an overview of the con- Kommunikationswissenschaft, [DGPuK]) has addres- stellations of media ethics problems and questions. sed media ethics. At the DGPuK annual convention in 2001 in Vienna, a specialized “communication and media Matthias Karmasin & Carsten Winter: Medienethik vor der ethics” group was created. Since that time this smaller, Herausforderung der globalen Kommerzialisierung von comprehensive group has met each February in Munich Medienkultur: Probleme und Perspektiven [Media ethics with the media ethics network. in the face of the challenge of a global commercialization of media culture: Problems and perspectives]. The broad goals of the groups coincide since they Rüdiger Funiok: Medienethik: Trotz Stolpersteinen ist der open the academic discourse toward practical possibil- Wertediskurs über Medien unverzichtbar [Media ities. An intensified scientific with commu- ethics: Despite stumbling blocks values discourse over nication and media ethics is also advantageous for the media is indispensable]. network. Matthias Rath: Medienqualität zwischen Empirie und Ethik: Under the guidance of Michael Traber, the World Zur Notwendigkeit des normativen und empirischen Association for Christian Communication had organized Projekts “Media Assessment” [Media quality between a conference in Munich in 1995. That led to the publica- experience and ethics: On the necessity of the norma- tion of a volume of basic questions for communication tive and empirical project, “Media Assessment”]. ethics, edited by Rüdiger Funiok (Konstanz: UVK Wolfgang Wunden: Medienwirkungen am Beispiel von Medien/Ölschläger 1996). It contains seven essays, Gewaltdarstellungen im Fernsehen [Media effects in which present possible openings to media ethics along the example of representations of force on television]. Michael Jaeckel: Kindheit, Jugend und die Bedeutung der the spectrum between systems theory and critical theory. Medien [Childhood, youth, and the meaning of the In 1998 there was an independent meeting of the media]. media ethics network and a conference, as well as the Barbara Thomass: Berufliche Sozialisation und die Ethik der Inquiry Commission of the German Bundestag on “The Medienmacher im internationalen Vergleich [Voca- future of the media in economics and society—the tional socialization and the ethics of the media pro- Germany path into the information society.” Udo F. ducers: An international comparison]. Schmaelzle and Christoph H. Werth edited and published Larissa Krainer: Medienethik als angewandte Ethik. Zur the contributions of both conferences in Medienethik—die Organisation ethischer Entscheidungsprozesse [Media Frage der Verantwortung [Media ethics: The question of ethics as applied ethics: The organization of ethical the responsibility] (1999). Supported by the federal center decision-making processes]. for political education in Bonn, this anthology can be Stephan Russ-Mohl & Susanne Fengler: Scheinheilige ordered for only the postage charge of one euro. The book Aufklärer? Wie Journalismus und Medien über sich selbst berichten [Hypocritical reconnaissance aircraft? publishes 15 contributions that treat the following topics: Journalism and media self-reports]. (1) Challenges for media ethics today, (2) Systematic Thomas A. Bauer: Die Kompetenz ethischen und ästhetischen openings to media ethics, (3) Media ethics and politics, Handelns. Medien-ethik aus medienpädagogischer (4) The ethics of media enterprises, and (5) Journalistic Perspektive [The authority of ethical and aesthetic act- ethics in the information society. ing: Media ethics from a media education perspective].

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 39 Bernhard Debatin: “Digital Divide” und “Digital Content.” [Conventions and deliberations: Discourse ethics and Grundlagen der Inter-netethik” [The “Digital Divide” the mass media public]. and “digital content”: Bases of Internet ethics]. Tanjev Schultz: Authentizität im Zeitalter ihrer medialen Helmuth Rolfes: Christlicher Glaube und Medienethik. Der Inszenierbarkeit. Überlegungen zur Ambivalenz des Beitrag von Theologie und Kirche zum medienethis- Ansatzes von Jürgen Habermas [Authenticity in the chen Gespräch der Gesellschaf [Christian faith and age of media money: Considerations for ambivalence media ethics. The contribution of theology and church at the root of Jürgen Habermas]. to society’s media-ethics discussions]. Friederike Herrmann: Ein neuer Begriff des Privaten - Scham als medienethische Kategorie [A new idea of Debatin, Bernhard & Funiok, Rüdiger (Eds.). (2003). privacy: Shame as a media ethics category]. Kommunikations- und Medienethik [Communication Part 3: Applications and media ethics]. Konstanz: UVK Verlagsgesellschaft Barbara Thomass: Fünf ethische Prinzipien journalistischer mbH. Praxis [Five ethical principles of journalistic practice]. This volume contains the contributions from the Wolfgang Wunden: Die “Publizistischen Grundsätze” des media ethics network conference in 2002 about “rea- Deutschen Presserats aus medienethischer Sicht [The “ principles” of German press advice from a sons and argumentations of media ethics.” While previ- media ethics perspective]. ously the media ethics discussion was limited mainly to Christian Schicha: Medienethik und politische Talk-Shows. theoretical or abstract papers, the authors at the confer- Zur Diskrepanz zwischen Diskurspostulaten und ence established foundations and applications of media medialen Handlungspraktiken [Media ethics and polit- ethics. They attempt to transfer media ethics maxims ical talk shows: The discrepancy between discourse and value orientations from theory into practice. postulates and media action practices]. Introduction: Michael Jäckel & Jan D. Reinhardt: Provokante Werbung Bernhard Debatin and Ruediger Funiok, Begründungen und unter dem Gesichtspunkt einer Ethik der Massenkom- Argumentationen der Medienethik [Reasons and argu- munikation [Provocative advertising under the criteri- mentations of media ethics]. on of an ethics of mass communication]. Part 1: Foundations Petra Grimm: Semiotik als empirischer Werte-Seismograf Hans Julius Schneider: Der systematische Ort der für die Medienethik [Semiotics as empirical value: A Medienethik - eine sprach-philosophische Perspektive seismograph for media ethics]. [The systematic place of media ethics: A language- Part 4 contains a 20 page bibliography. philosophical perspective]. Eike Bohlken: Medienethik als Verantwortungsethik. Institut zur Förderung publizistischen Nachwuchses / Zwischen Macher-verantwortung und Nutzerkom- Deutscher Presserat (Ed.). (2005). Ethik im petenz [Media ethics as responsibility ethics: Between Redaktionsalltag [Ethics in editing a daily]. Konstanz: the responsibility of message creators and the authori- UVK Verlagsgesellschaft mbH. ty of users]. The German press council—the voluntary self- Rainer Leschke: Vom Nutzen und Nachteil der Medienethik. policing organ of the print media—publishes this Plädoyer für die meta-ethische Analyse [Of the use workbook together with the Institute for the Promotion and disadvantage of media ethics: A plea for meta ethics analysis]. of a New Generation of Journalists (ifp), which attach- Anika Pohla: Eine verbindliche normative Medienethik - ein es a high value to media ethics in the continuing edu- unmögliches Unter-fangen? [An obligatory normative cation of journalists. The book contains cases studies media ethics: An impossible venture?] arranged with the intention of making young journal- Part 2: Special Topics ists (possibly inexperienced with ethical questions) Alexander Filipovic: Niklas Luhmann ernst nehmen? (Un-) familiar with ethics and ethical standards in journalism Möglichkeiten einer ironischen Ethik öffentlicher by an orientation and guidance on the basis of typical Kommunikation [Niklas Luhmann taken seriously? (Im-) problems in editing everyday life issues. In the first Possibilities of an ironic ethics of public communication]. part respected German journalists address ethical ques- Karsten Weber: Medienethik und politische Ethik - der tions, consider their own offenses, and suggest how Versuch einer Grundlegung [Media ethics and political they could have been avoided. The second part con- ethics: An attempt at a foundation]. tains an extensive collection of contested material from Andreas Hütig: Konventionen und Deliberationen. Die newspapers and magazines, in which readers weighed Diskursethik und die massenmediale Öffentlichkeit in with the German press council. Each chapter pres-

40 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS ents case examples, statements of the editors, the den [Ethics in the training of journalists and commu- appropriate numbers and guidelines of the Press Code, nication students in the Netherlands]. as well as suggestions for discussion. Each chapter Wolfgang Wunden: Beraten, vortragen und lehren. Notizen ends with a solution: the decisions of the press council aus der Praxis der Medienethik-Vermittlung [Advise, for the respective cases. The case examples from con- speak, and teach: Notes from the practice of media crete practice are supplemental by “references from the ethics mediation]. Barbara Thomass: Didaktische Methoden der Vermittlung real world editing” and “notes from the law office.” journalistischer Ethik [Didactic methods of mediation C. Zeitschrift für Kommunikationsökologie und in journalistic ethics]. Medienethik (ZfKM) [Journal for communication Horst Pöttker: Konzept der Lehrveranstaltung “Berufsethik ecology and media ethics] für Journalisten” [The concept of training meetings in “ for journalists”]. This journal is edited by the Institut für Steffen W. Hillebrecht: Medienethik als Gegenstand der Informations- und Kommunikationsökologie [Institute Ausbildung von Verlags-management. Modellbildung for information and communication ecology] e.V. und Praxiserfahrungen mit einem Traineeprogramm Duisburg. http://www.ikoe.de. Until 2004, the journal für katholische Verlagshäuser [Media ethics as the sub- was called Zeitschrift für Kommunikationsökologie ZfK. ject of training in publishing house management: The It appears two to four times per year in an edition of 500 concept and practical experiences with a trainee pro- copies. Among other things the magazine publishes the gram for Catholic publishing houses]. Christian Schicha: Unterhaltsame Formate als Bausteine der articles of the annual conventions of the media ethics medienethischen Ausbildung. Spielfilme und network and the DGPuK specialist group “media and Benetton-Werbung als populäre Beispiele communication ethics” since 2003. Individual essays by [Entertainment formats as components of the media Thomas Langkau, M.A., Dr. Christian Schicha ethics training: Feature films and Benetton advertise- (V.i.S.d.P.) und Dipl.-Journ. Carsten Brosda published in ments as popular examples]. the journal are available as electronic files on request. Thomas Knieper: Der Journalisten- und Medienfilm. Contact the editor by e-mail: [email protected]. Filmographie und Bibliographie zur Einführung [The Issue: 1/2003: Emphasis on media ethics, with docu- journalistic and media films: Introductory filmography mentation of the 2003 annual convention of the media and bibliography]. ethics network, with the theme, “media ethics in the Sebastian Köhler: Ansehnlich? Kriegs-Geschichten 2003. Zu basic and advanced training of media workers.” einigen Aspekten der Krisen-Kommunikation Bernhard Debatin & Rüdiger Funiok: Empfehlungen für das [Substantially? War stories 2003. Some aspects of cri- Lehren von Medienethik in Aus- und Fortbildung von sis communication]. Medienberufen [Recommendations for the theory of Christian Schicha: “Kämpfen, Jürgen, kämpfen. . .” Die Ins- media ethics in basic and advanced training media zenierungsstrategien des Jürgen W. Möllemann zwis- workers]. chen Popularität, Provokation und Populismus [“Fight, Rainer Leschke: Und die Moral von der Geschicht’? Über- Jürgen, fight”: The production strategies of Jürgen W. legungen zur Medienethik als Analyseinstrument [And Moellemann between popularity, provocation, and the moral of the story? Considerations of media ethics populism]. as an instrument of analysis]. Christian Schicha: Vergessene Themen [Forgotten topics]. Rüdiger Funiok: Wertklärende Gespräche und sozialpäda- Issue 1/2004: Emphasis on media and global conflicts, gogische Berufsethik. Überlegungen zur Medienethik with documentation of the 2004 common annual con- als Analyseinstrument [Value-clarifying discussions vention of the media ethics network and the DGPuK and social-educational professional ethics. specialist group on media and communication ethics. Considerations of media ethics as an instrument of The theme is “media and global conflicts. How are analysis]. global conflicts in the media treated?” Bernhard Debatin: Können moralische Werte gelehrt wer- Horst Pöttker: Distanzierte Beobachtung: Professionelle den? Erfahrungen mit Medien-ethik in der US- Qualität oder Ideologie? Berufsethische und historische amerikanischen Jounalistenausbildung [Can moral Thesen zum Kriegsjournalismus [Dissociated observa- values be taught? Experiences with media ethics in the tion: Professional quality or ideology? Professional U.S.-American journalism training]. ethics and historical theses for war journalism]. Huub Evers: Ethik in der Ausbildung von Journalisten und Andrea Höhne & Stephan Russ-Mohl: Zur Ökonomie und Kommunikations-wissenschaftlern in den Niederlan- Ethik von Kriegsbericht-erstattung. (Fakten, Interpre- tation mit Hilfe der Ökonomik, Folgerungen und

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 41 Verbesserungsmöglichkeiten) [To the economics and reflection and thematizing discussions of the reporting ethics of war reporting: (Facts, interpretation with the of the 2003 Iraq war in the supra-regional press]. help of economics, consequences, and possibilities for Barbara Thomass: Fallanalyse Selbstmordattentate. Wie improvement)]. kann Berichterstattung der Komplexität des Christian Schicha: Ethische Postulate an den Friedensjour- Gegenstandes gerecht werden? [Analysis of suicide nalismus. Aufgaben und Probleme bei der Kriegs- assassination attempts: How can the reporting of the berichterstattung am Beispiel des Irakkriegs [Ethical complexity of the event become fair?] postulates for peace journalism: Tasks and problems Alexander Filipovic: Persuasive Leidenskommunikation. during war reporting by reference to the example of Für eine humane Anschluss-fähigkeit menschlichen the Iraq war]. Leids [Persuasive communication of suffering: For an Michael Nagenborg: Kriegstrommeln bauen? Über die ability of a humane connection to human wrong]. Notwendigkeit, Medieninhalte im Kriegsfall zu kon- Peter Studer: Kriegsfoto. Geschichte, Wirkung, Ethik [War trollieren [War drums? On the necessity to control photography: History, effects, ethics]. media contents in case of war]. Stefan Leifert: Zeigen oder nicht zeigen? Schreckensbilder Burkhard Bläsi: Konstruktive Berichterstattung und und Medienethik [Show or don’t show? Fright pictures Medienrealität - ein unüberwindbarer Gegensatz? and media ethics]. [Constructive reporting and media reality: An insur- Simone Richter: Von einem, der auszog, um über sich im mountable contrast?] Krieg zu erzählen. Was, wenn die Berichterstatter plöt- Nadine Bilke: Krieger für den Frieden. Strategien konstruk- zlich im Mittelpunkt der Berichterstattung stehen? [Of tiver Konfliktberichterstattung am Beispiel intereth- one, which took off, in order to tell of itself in the war: nischer Konflikte in Ghana [Battle for peace: What if the correspondents are suddenly located in the Strategies of constructive conflict reporting by refer- center of reporting?] ence to the example of inter-ethnic conflicts in Ghana]. Sebastian Köhler: The Bad and Ugly. Ein Präsident zum Christian Kolmer: Krieg im Fernsehen 2001-2003. Eine Anfassen. Eine Kritik des Narrativismus in der TV- Inhaltsanalyse der deutschen, englischen, südafrikan- Kriegs- und Krisenberichterstattung [The Bad and ischen und US-Fernsehnachrichten [War on television Ugly: A president for touching. A criticism of the nar- 2001-2003: A content analysis of German, English, rative in TV war and crisis reporting]. South African and U.S. television messages]. Issue 1/2005: Emphasis on media practice and media Oliver Hahn: Neues arabisches und westliche Nachrichten- ethics, with documentation from the 2005 common annu- fernsehen zwischen Kulturbindung und Propagandadia- al convention of the media ethics network and the DGPuK log [New Arab and western televised messages between specialist group on media and communication ethics. The connecting cultures and propaganda dialogues]. topic addresses media ethics from the perspective of Michael Harnischmacher: Unbewusst gefangen im Krieg der media practitioners and theoreticians, with applications. Worte? Der zweite Irak-Krieg und das Verhältnis Achim Baum: Welchen Journalismus will die Deutschland - USA im Lichte von George Lakoffs Kommunikationswissenschaft? [Which journalism Metaphern-Theorie [Unconsciously imprisoned in the does communication studies want?] war of words? The second Iraq war and the relation- Huub Evers: Journalismus braucht Selbstreflexion. Medien ship of Germany and the U.S.A. in light of George in den Niederlanden auf dem Prüfstand [Journalism Lakoff’s metaphor theory]. needs self reflection: Media in the Netherlands under Stefan Krempl: Krieg und Internet. Ausweg aus der Propaganda? the microscope]. [War and the Internet: A way out of propaganda?] Ingrid Stapf: Zwischen Freiheit und Verantwortung. Über- Bernhard Debatin: US-Medien zwischen Unsicherheit und legungen zu einem Modell ethischer Medien- Patriotismus. Zur Selbstreflexion des Journalismus seit Selbstkontrolle im Spannungsverhältnis von Ideal und dem 11.09.2001 und den Folgekriegen [U.S. media Praxis [Between liberty and responsibility: between uncertainty and patriotism: On the self reflec- Considerations of an ethical model of media self-con- tion of journalism since 9/11 and the subsequent wars]. trol tested in the ratio of ideal and practice]. Christoph Neuberger, Birgit Eiglmeier, & Julia Peter Studer: Fairness. Vages Appellwort oder medi- Sommerhäuser: Warblogs. Berichte aus erster Hand enethisch brauchbarer Begriff? [Fairness: Vague oder Propagandatricks? [War blogs: First-hand reports appeal word or a useful media ethics term?] or propaganda tricks?] Michael Nagenborg & Karsten Weber: Der Wandel der Meike Vögele: Kritischer Medienjournalismus als Chance für Medienanbieter und die Notwendigkeit eines Paradig- eine bessere Kriegsberichterstattung? Zur Reflexion menwechsel in der Medienethik. Ein Workshopbericht und Thematisierung der Berichterstattung über den [Changing media producers and the necessity of para- Irakkrieg 2003 in der überregionalen Presse [Critical digm changes in media ethics. A Workshop report]. journalism as a chance for better war reporting? On the

42 — VOLUME 24 (2005) NO. 4 COMMUNICATION RESEARCH TRENDS Alexander Missal: Ein Körnchen Wahrheit. Gerüchte und The contents include essays on German press ihre medienethische Einordnung in der wirtschaft- councils: FSK (Freiwillige Selbstkontrolle sjournalistischen Praxis [A germ of truth: Rumors and Filmwirtschaft); FSM (Freiwillige Selbstkontrolle their media ethics classification in the practice of eco- Multimedia); FSF (Freiwillige Selbstkontrolle nomic journalism] Fernsehen); LMA (Landesmedienanstalten); ZDF- Jeldrik Pannier & Stefanie Frie: Ein Bild ist immer ein WDR (Rundfunkrat); Werberat; PR-Rat; SK Kommentar. Analyse der fotografischen Berichter- (Unterhaltungssoftware-Selbstkontrolle); DT-Control stattung zum Irakkrieg 2003 von FAZ und Bild- Zeitung [A picture is always a comment: Analysis of (Freiwillige Selbstkontrolle im Pressevertrieb). These the photographic reporting of the 2003 Iraq war of deal with film, multimedia, television, broadcasting, FAZ and illustrated newspapers]. advertising, public relations, software, and press sales. Horst Pöttker: Publizistische Selbstkontrolle im Wandel. The volume covers instances of media self-regula- Über zivilgesellschaftliche Notwendigkeit und medi- tion in Germany. It is supplemented by texts of special- engesellschaftliche Irrwege [Changing journalistic ists, who critically reflect on the function and effective- self-control: Regarding civilian social necessity and ness of this self-regularion. The volume is suitable for media society errors]. research and theory over the range of communication Stefan Hartwig: Public Relations und Medien. media and media ethics and can be used in the training Spannungsverhältnis oder spannendes Verhältnis? of journalists and as a reference book for practical work Erfahrungen aus der Praxis [Public relations and in editorial and training centers. In addition, it can help media: A strained or an exciting relationship? people who feel mistreated by the media and ask, for Experiences from practice]. Sebastian Köhler: Gnadenlose Selbstverteidigung. Zur example, “What can I do, if I were wrongly represented widersprüchlichen Rolle eingebetteter TV-Journalisten by the media or feel that excessive brutality were shown [Merciless self-defense: Regarding the contradictory on tv or in the news?” The book gives information about role of embedded TV journalists]. to whom they can turn, if they are targeted by journalists Christian Schicha: Bürgergesellschaft und Medien- or their privacy invaded by voyeuristic reporting. demokratie. Herausforderungen für die politische E. The Media Ethics Network on the Internet Bildung [Civil society and media democracy: Challenges for political education]. For the website of the media ethics network, go to Christian Schicha: Aktuelle Medienthemen hektisch auf- http://www.netzwerk medienethik.de. Here one finds a a bereitet? Wissenschaftsvermittlung im Spannungsfeld virtual library (where texts can be downloaded) and a zwischen Theorie und Praxis [Current media topics digital library (with links to texts on other Internet sites): hectically prepared? Science reporting in the area of http://netzwerk medienethik.de/bib/bibindex.htm. conflict between theory and practice]. Sebastian Köhler: Zehn Uhr mittags: VISA-TV. BIG F. Yearly Meeting 2006 BROTHER Goes Politics [Ten o’clock at noon:VISA- The topic for the next common annual convention TV. BIG BROTHER Goes Politics]. of the media ethics network and the DGPuK specialist D. Association for the Promotion of Journalistic group on communication and media ethics and visual Self-regulation communication is “photo and image ethics.” The con- ference date is the February 23-24, 2006, at the In order to lend their co-operation to promote and Hochschule für Philosophie in Munich. If you wish to bring to wider public attention the work of the different be added to the distribution list of the media ethics net- medium-specific self-governance committees, repre- work, please write to [email protected]. sentatives of the DGPuK specialist group on communi- The 10-year history of the media ethics network is cation and media ethics, the media ethics network, and described in Wolfgang Wunden: Netzwerk Medienethik— other personalities created an association for the pro- ein Experiment. In Christian Drägert & Nikolaus motion of journalistic self-regulation (http://www.pub- Schneider (Eds.), (Bearbeitet von Hans-Wilhelm Fricke- lizistische selbstkontrolle.net). They have a new publi- Hein und Michael Schibilsky), Medienethik. Freiheit und cation: Baum, Achim, Langenbucher, Wolfgang, Verantwortung. Festschrift zum 65. Geburtstag von Pöttker, Horst, & Schicha, Christian (Eds.). (2005). Manfred Kock [Media ethics: Liberty and responsibility. In Handbuch Medienselbstkontrolle [Handbook of media honor of the 65th birthday of Manfred Kock], pp. 319-333. self-regulation]. Wiesbaden: VS Verlag für Stuttgart: Kreuz Verlag, 2001. Sozialwissenschaften

COMMUNICATION RESEARCH TRENDS VOLUME 24 (2005) NO. 4 — 43