Confusion, control and comfort: premediating identity management in film and television
A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Mo...
Saved in:
Published in | Information, communication & society Vol. 17; no. 8; pp. 986 - 1000 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Abingdon
Routledge
14.09.2014
Taylor & Francis Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Most work about IM assumes users to be rational actors making instrumental choices on the basis of perceived usefulness and efficiency; cultural narratives hardly ever come up in current research about acceptance of new identity management technologies (IMTs). Screen representations do not prescribe certain meanings around IM, but create and delineate horizons of imagination; repositories of meanings from which people can draw to make sense of innovations and their consequences. In this paper, we focus on a sample of films, television and web series to examine how IMTs are premediated. Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. We conclude that these dark horizons are anchored in myth and persistent fears about who we are, and thus that new means of IM face a difficult task in gaining users' trust. |
---|---|
AbstractList | A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Most work about IM assumes users to be rational actors making instrumental choices on the basis of perceived usefulness and efficiency; cultural narratives hardly ever come up in current research about acceptance of new identity management technologies (IMTs). Screen representations do not prescribe certain meanings around IM, but create and delineate horizons of imagination; repositories of meanings from which people can draw to make sense of innovations and their consequences. In this paper, we focus on a sample of films, television and web series to examine how IMTs are premediated. Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. We conclude that these dark horizons are anchored in myth and persistent fears about who we are, and thus that new means of IM face a difficult task in gaining users' trust. A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Most work about IM assumes users to be rational actors making instrumental choices on the basis of perceived usefulness and efficiency; cultural narratives hardly ever come up in current research about acceptance of new identity management technologies (IMTs). Screen representations do not prescribe certain meanings around IM, but create and delineate horizons of imagination; repositories of meanings from which people can draw to make sense of innovations and their consequences. In this paper, we focus on a sample of films, television and web series to examine how IMTs are premediated. Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. We conclude that these dark horizons are anchored in myth and persistent fears about who we are, and thus that new means of IM face a difficult task in gaining users' trust. Adapted from the source document. A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Most work about IM assumes users to be rational actors making instrumental choices on the basis of perceived usefulness and efficiency; cultural narratives hardly ever come up in current research about acceptance of new identity management technologies (IMTs). Screen representations do not prescribe certain meanings around IM, but create and delineate horizons of imagination; repositories of meanings from which people can draw to make sense of innovations and their consequences. In this paper, we focus on a sample of films, television and web series to examine how IMTs are premediated. Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. We conclude that these dark horizons are anchored in myth and persistent fears about who we are, and thus that new means of IM face a difficult task in gaining users' trust. Reprinted by permission of Routledge, Taylor and Francis Ltd. |
Author | van Zoonen, Liesbet Harvey, Jasmine Turner, Georgina |
Author_xml | – sequence: 1 givenname: Georgina surname: Turner fullname: Turner, Georgina email: g.turner@lboro.ac.uk organization: Department of Social Sciences, Loughborough University – sequence: 2 givenname: Liesbet surname: van Zoonen fullname: van Zoonen, Liesbet organization: Department of Social Sciences, Loughborough University – sequence: 3 givenname: Jasmine surname: Harvey fullname: Harvey, Jasmine organization: International Digital Lab, Warwick University |
BookMark | eNqNkU9P3DAQxa2KSl22_QY9ROLCgSz-n5gLQqsWkJB6adXeLCc7RkaJvdhe0H77Ok25cID1xSPN773RzDtGRz54QOgrwSuCW3xOmFSEtH9WFBO2ahssFP2AFoTLtuZc0qNSF6SemE_oOKUHXJ7EzQL9Xgdvd8kFf1b1wecYhsr4TalHG2K-qLYRRtg4k52_r9wGfHZ5X43Gm_vS8LlyvrJuGP-pMgzw5Ca3z-ijNUOCL___Jfr1_dvP9U199-P6dn11V_eiZbluO0O54GB7zjhhoDohJCisaGeY6gAz0aiW0o5A13FDaAeyAWaBYgu4sWyJTmffbQyPO0hZjy71MAzGQ9glTaTEuIyQ6jCUECbY-6gQSqqWNfQQlJQtFG8KevIKfQi76Mt5CsUFloTyaTafqT6GlCJYvY1uNHGvCdZT3Polbj3Free4i-xyljlfghvNc4jDRmezH0K00fjeJc3edPgL6daxlQ |
CitedBy_id | crossref_primary_10_1108_K_06_2013_0126 crossref_primary_10_2478_nor_2020_0006 crossref_primary_10_1080_1369118X_2015_1118522 |
Cites_doi | 10.1111/j.1539-6924.2008.01069.x 10.1109/TEM.2008.919728 10.14375/NP.9782070136292 10.4018/joeuc.2006070101 10.1080/07359680802125980 10.1007/s11673-010-9228-4 10.1016/j.jretconser.2010.03.007 10.1080/0144929X.2011.553741 10.7208/chicago/9780226118758.001.0001 10.1353/lm.2004.0006 10.1109/JPROC.2003.819605 10.1177/1477370808100543 10.1057/9780230245372 10.1080/09537320600777168 10.1177/0967010608088773 10.1007/978-3-642-20317-6 10.1086/209154 10.1086/671052 10.1080/09537320600777002 10.1057/ejis.2008.2 |
ContentType | Journal Article |
Copyright | 2013 The Author(s). Published by Taylor & Francis. 2013 Copyright Taylor & Francis Ltd. 2014 |
Copyright_xml | – notice: 2013 The Author(s). Published by Taylor & Francis. 2013 – notice: Copyright Taylor & Francis Ltd. 2014 |
DBID | 0YH AAYXX CITATION 7SC 7U4 8BJ 8FD BHHNA DWI E3H F2A FQK JBE JQ2 L7M L~C L~D WZK 8BP |
DOI | 10.1080/1369118X.2013.870592 |
DatabaseName | Taylor & Francis Open Access CrossRef Computer and Information Systems Abstracts Sociological Abstracts (pre-2017) International Bibliography of the Social Sciences (IBSS) Technology Research Database Sociological Abstracts Sociological Abstracts Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) International Bibliography of the Social Sciences International Bibliography of the Social Sciences ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Sociological Abstracts (Ovid) Library & Information Sciences Abstracts (LISA) - CILIP Edition |
DatabaseTitle | CrossRef Sociological Abstracts (pre-2017) International Bibliography of the Social Sciences (IBSS) Technology Research Database Computer and Information Systems Abstracts – Academic Library and Information Science Abstracts (LISA) Sociological Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Library & Information Sciences Abstracts (LISA) - CILIP Edition |
DatabaseTitleList | Sociological Abstracts (pre-2017) Sociological Abstracts (pre-2017) International Bibliography of the Social Sciences (IBSS) Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: 0YH name: Taylor & Francis Open Access url: https://www.tandfonline.com sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sociology & Social History |
EISSN | 1468-4462 |
EndPage | 1000 |
ExternalDocumentID | 3372851741 10_1080_1369118X_2013_870592 870592 |
Genre | Articles Feature |
GroupedDBID | .7I .QK 0BK 0R~ 0YH 29I 3R3 4.4 5GY 5VS 77K AAAVI AAGZJ AAMFJ AAMIU AAPUL AATTQ AAZMC ABBKH ABCCY ABFIM ABIVO ABJVF ABLIJ ABPEM ABPTK ABPTX ABQHQ ABSSG ABTAI ABXUL ABZLS ACGFS ACGOD ACHQT ACLSK ACTIO ACTOA ADAHI ADCVX ADLRE ADXPE AECIN AEGYZ AEISY AEKEX AEMXT AEOZL AEPSL AEYOC AEZRU AFOLD AFWLO AGDLA AGMYJ AGRBW AIJEM AJWEG AKBVH ALMA_UNASSIGNED_HOLDINGS ALQZU AVBZW AWYRJ BEJHT BLEHA BMOTO BOHLJ CCCUG CQ1 CS3 DGFLZ DKSSO EBS EJD E~B E~C FUNRP G-F GTTXZ H13 HF~ HZ~ IPNFZ J.O KDLKA KYCEM M4Z MS~ NA5 O9- P2P PQEST PQQKQ RIG RNANH ROSJB RSYQP S-F STATR TCF TFH TFL TFW TNTFI TRJHH UPT UT5 UT9 V1K VAE ~01 ~S~ AAYXX ABJNI ABXYU ADKVQ AHDZW CITATION TBQAZ TDBHL TUROJ 7SC 7U4 8BJ 8FD BHHNA DWI E3H F2A FQK JBE JQ2 L7M L~C L~D WZK 8BP |
ID | FETCH-LOGICAL-c583t-8ba2454efc43413e9b556e9092ba39be03579822b1ebb4a12be67e3fe20fe07f3 |
IEDL.DBID | 0YH |
ISSN | 1369-118X |
IngestDate | Fri Aug 16 08:25:21 EDT 2024 Sat Aug 17 00:29:05 EDT 2024 Fri Aug 16 08:37:01 EDT 2024 Sat Aug 17 01:39:09 EDT 2024 Thu Oct 10 15:27:27 EDT 2024 Fri Aug 23 01:57:47 EDT 2024 Tue Jun 13 19:49:43 EDT 2023 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 8 |
Language | English |
License | open-access: This is an Open Access article. Non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly attributed, cited, and is not altered, transformed, or built upon in any way, is permitted. The moral rights of the named author(s) have been asserted. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c583t-8ba2454efc43413e9b556e9092ba39be03579822b1ebb4a12be67e3fe20fe07f3 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 ObjectType-Article-1 ObjectType-Feature-2 |
OpenAccessLink | https://www.tandfonline.com/doi/abs/10.1080/1369118X.2013.870592 |
PQID | 1545061243 |
PQPubID | 53080 |
PageCount | 15 |
ParticipantIDs | proquest_miscellaneous_1660024569 proquest_journals_1545061243 proquest_miscellaneous_1559698372 proquest_miscellaneous_1660011353 proquest_miscellaneous_1551035947 crossref_primary_10_1080_1369118X_2013_870592 informaworld_taylorfrancis_310_1080_1369118X_2013_870592 |
PublicationCentury | 2000 |
PublicationDate | 20140914 |
PublicationDateYYYYMMDD | 2014-09-14 |
PublicationDate_xml | – month: 09 year: 2014 text: 20140914 day: 14 |
PublicationDecade | 2010 |
PublicationPlace | Abingdon |
PublicationPlace_xml | – name: Abingdon |
PublicationTitle | Information, communication & society |
PublicationYear | 2014 |
Publisher | Routledge Taylor & Francis Ltd |
Publisher_xml | – name: Routledge – name: Taylor & Francis Ltd |
References | CIT0050 Bretnor R. (CIT0012) 1974 CIT0031 CIT0011 CIT0033 Scholes R. (CIT0043) 1977 CIT0038a Johnson S. (CIT0029) 2006 Lefait S. (CIT0032) 2012 Silverstone R. (CIT0044) 1988 Williamson H. R. (CIT0051) 1957 CIT0013 CIT0016 Notoatmodjo G. (CIT0038b) 2009; 98 van Zoonen L. (CIT0053) 2013 CIT0018 Propp V. (CIT0040) 1928 CIT0039 CIT0019 Murnaghan S. (CIT0036) 1987 Bordwell D. (CIT0010) 1985 CIT0021 Davis N. Z. (CIT0020) 1983 CIT0042 CIT0001 Campbell J. (CIT0017) 1949 Dierkes M. (CIT0022) 1992 CIT0045 Lyon D. (CIT0034) 2007 Humby C. (CIT0027) 2008 Bennett C. (CIT0007) 2010 Fiske J. (CIT0023) 1987 Kammerer D. (CIT0030) 2002; 2 Boltanski L. (CIT0008) 2012 CIT0005 CIT0026 CIT0006 CIT0028 Andrejevic M. (CIT0002) 2004 CIT0009 |
References_xml | – ident: CIT0042 doi: 10.1111/j.1539-6924.2008.01069.x – ident: CIT0026 doi: 10.1109/TEM.2008.919728 – volume-title: Énigmes et complots: Une enquête à propos d'enquêtes year: 2012 ident: CIT0008 doi: 10.14375/NP.9782070136292 contributor: fullname: Boltanski L. – start-page: 20 volume-title: Media, myths and narrative: Television and the press year: 1988 ident: CIT0044 contributor: fullname: Silverstone R. – ident: CIT0028 doi: 10.4018/joeuc.2006070101 – ident: CIT0045 doi: 10.1080/07359680802125980 – ident: CIT0001 doi: 10.1007/s11673-010-9228-4 – start-page: 80 volume-title: Barthes’ mythologies today: Readings of contemporary culture year: 2013 ident: CIT0053 contributor: fullname: van Zoonen L. – volume-title: Narration in the fiction film year: 1985 ident: CIT0010 contributor: fullname: Bordwell D. – volume-title: The hero with a thousand faces year: 1949 ident: CIT0017 contributor: fullname: Campbell J. – ident: CIT0018 doi: 10.1016/j.jretconser.2010.03.007 – volume-title: Scoring points: How Tesco continues to win customer loyalty year: 2008 ident: CIT0027 contributor: fullname: Humby C. – volume-title: Who was the man in the iron mask? and other historical enigmas year: 1957 ident: CIT0051 contributor: fullname: Williamson H. R. – ident: CIT0013 doi: 10.1080/0144929X.2011.553741 – volume-title: Television culture year: 1987 ident: CIT0023 contributor: fullname: Fiske J. – volume: 2 start-page: 464 issue: 2 year: 2002 ident: CIT0030 publication-title: Surveillance & Society contributor: fullname: Kammerer D. – volume-title: Morphology of the folktale year: 1928 ident: CIT0040 contributor: fullname: Propp V. – ident: CIT0019 doi: 10.7208/chicago/9780226118758.001.0001 – ident: CIT0031 doi: 10.1353/lm.2004.0006 – volume-title: Disguise and recognition in the Odyssey year: 1987 ident: CIT0036 contributor: fullname: Murnaghan S. – volume: 98 start-page: 71 volume-title: Proceedings of the seventh australasian conference on information security year: 2009 ident: CIT0038b contributor: fullname: Notoatmodjo G. – ident: CIT0039 doi: 10.1109/JPROC.2003.819605 – ident: CIT0038a doi: 10.1177/1477370808100543 – ident: CIT0050 doi: 10.1057/9780230245372 – ident: CIT0033 doi: 10.1080/09537320600777168 – volume-title: The privacy advocates: Resisting the spread of surveillance year: 2010 ident: CIT0007 contributor: fullname: Bennett C. – volume-title: Science fiction today and tomorrow year: 1974 ident: CIT0012 contributor: fullname: Bretnor R. – ident: CIT0021 doi: 10.1177/0967010608088773 – start-page: 193 volume-title: MediaSpace: Place, scale and culture in a media age year: 2004 ident: CIT0002 contributor: fullname: Andrejevic M. – volume-title: Science fiction: History, science, vision year: 1977 ident: CIT0043 contributor: fullname: Scholes R. – volume-title: Surveillance studies: An overview year: 2007 ident: CIT0034 contributor: fullname: Lyon D. – ident: CIT0016 doi: 10.1007/978-3-642-20317-6 – volume-title: Leitbild und Technik: Zur Entstehung und Steuerung technisher Innovationen year: 1992 ident: CIT0022 contributor: fullname: Dierkes M. – volume-title: Surveillance on screen: Monitoring contemporary films and television programs year: 2012 ident: CIT0032 contributor: fullname: Lefait S. – ident: CIT0005 doi: 10.1086/209154 – ident: CIT0006 doi: 10.1086/671052 – volume-title: The return of Martin Guerre year: 1983 ident: CIT0020 contributor: fullname: Davis N. Z. – volume-title: Everything bad is good for you: How today's popular culture is actually making us smarter year: 2006 ident: CIT0029 contributor: fullname: Johnson S. – ident: CIT0011 doi: 10.1080/09537320600777002 – ident: CIT0009 doi: 10.1057/ejis.2008.2 |
SSID | ssj0000607 |
Score | 2.0734634 |
Snippet | A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The... |
SourceID | proquest crossref informaworld |
SourceType | Aggregation Database Publisher |
StartPage | 986 |
SubjectTerms | Biometrics Comfort Confusion Corruption future technologies Horizon Identity identity management Implants Management Motion pictures Myth Narratives Perceptions Personal information premediation Repositories Science fiction Science fiction & fantasy Security management Surveillance Technology Television Television programs Threat Transplants & implants Trust users' trust |
Title | Confusion, control and comfort: premediating identity management in film and television |
URI | https://www.tandfonline.com/doi/abs/10.1080/1369118X.2013.870592 https://www.proquest.com/docview/1545061243 https://search.proquest.com/docview/1551035947 https://search.proquest.com/docview/1559698372 https://search.proquest.com/docview/1660011353 https://search.proquest.com/docview/1660024569 |
Volume | 17 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1NS8MwNIi76EH8xOkcEcST0bRJ2sabiKMM9CCK81SSNYWB60S7g__e9_rFhjjBW0vfS8nL-0ryPgg54ykYVZ6mjAfGZzJ1lhnuFEsFOreRkWEZTXj_EMTPcjhSo4UsfgyrxD10VhWKKHU1Crexn01E3JUnAhDRaISBWeISGE5pUMIdHzxv5HT-Gi_o4jJhGjEYojTJc7-MsmSclkqX_lDVpf0ZbJOt2nGkN9VK75A1l--SzYVygrvkqM0-oee0yrulVRmQrz3ygrl9czwbu6B1fDoFCsDzFP5fXNN3PCnEvh0wFp1U-btfdNqGx9BJTrPJ27TEKtq09H3yPLh7uo1Z3VWBjVUkChZZ40slXTaWaMGctkoFTnPtWyO0dRxWCYv6Wc9ZK43nWxeETmTO55njYSYOyHo-y90hoVrq0PhjMIJcwD4N-QH2u-DTeDZQbmy6hDXkTN6r4hmJV9ckbcifIPmTivxdEi3SPCnKQ4us6jCSiNWovWZ9kloKPxN0D9GFk6JLTtvPID94KWJyN5sjDNYUVFqGK2F0oGFq_gqYAF1H7CLyBwzeNOuj_8_0mGzAm8SYFU_2yHrxMXcn4BgVtl_yfp90nh6HcfwNWo8FtQ |
link.rule.ids | 315,786,790,27533,27955,27956,59496,59497,60004,60793 |
linkProvider | Taylor & Francis |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6h7YFy4FFAbCngShUnvDjxIzE3hKhCaXuotmpvlp040go2rWj2UH49njhZbYvYSvQWyQ_F9oxnPP7mM8Aeq4JRZVVFmbIpFZV31DIvacXRuc2tyDo04dGxKk7Fwbkc0IRXPawSz9B1JIro9mpUbgxGD5C4jwlXQUfzc0Rm8UmQOKnDLryh0EEZwcb05KAoVrbjLmca21BsNOTP_aOfG_bpBnvpX7t1Z4L2n4Abfj4iT35MFq2blL9v8Trea3RP4XHvoJLPUaKewQPfbMGjFdrCLdheZrmQ9yTm95JIN3L9HM4wh3CBMbgPpMfBk_Av4XseBtl-IpcYkcT3QUJfZBbzhK_JfAnDIbOG1LOf865Vu0x_fwGn-1-nXwrav95AS5nzlubOpkIKX5cCLaXXTkrlNdOps1w7z4I0IHmgS7xzwiap8yrzvPYpqz3Lav4SRs1F418B0UJnNi2DsWU8nAdR7sK5OvhOiVPSl3YMdFgzcxlJOkzSc58Os2lwNk2czTHkqwtr2i44UseXTAxf33RnEALTa_uVQTcUXUXBx7C7LA56ipcvtvEXC6yD3IVSi2xtHa10GFq6po5CFxVfK7mjDt5o6-3_H-k7eFhMjw7N4bfj769hM5QIxMkkYgdG7a-FfxOcsda97dXtDy6FKQs |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwED9NnTTBAx8DtI4BRpp4wsWJPxLzhoCqG9s0oU30zbITR6qgWQXpw_jr8cVJ1YEoEnuL5DsrZ9_5zvbdzwCHrAxOlZUlZcqmVJTeUcu8pCXH4Da3ImuzCU_P1ORSHE_ldK2KH9MqcQ9dRaCIdq1G416UVZ8R9ybhKphoPsXELD4KCid1WIS3FWK9DWD74vPxZLK2Grcl08hDkakvn_tLPzfc0w3w0j8W69YDje-D7f89Jp58HS0bNyp-_gbreBvhHsC9Ljwl76I-PYQtX-_C3TXQwl3YX9W4kFckVveSCDZy_Qi-YAXhEk_gXpMuC56EXwnf8yBj85Ys8DwSXwcJfZFZrBK-JvNVEg6Z1aSafZu3XM2q-P0xXI4_Xryf0O7tBlrInDc0dzYVUviqEOgnvXZSKq-ZTp3l2nkWdAGhA13inRM2SZ1XmeeVT1nlWVbxJzCor2q_B0QLndm0CK6W8bAbRK0Lu-oQOSVOSV_YIdB-yswiQnSYpEM-7UfT4GiaOJpDyNfn1TTt0UgV3zExfDPrQa8DprP1HwaDUAwUBR_Cy1VzsFK8erG1v1oiDSIXSi2yjTRa6SBauoFGYYCKb5X8gwbvs_X-_0v6AnbOP4zNydHZp6dwJzQITJJJxAEMmu9L_yxEYo173hnbL78SJ8o |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Confusion%2C+control+and+comfort%3A+premediating+identity+management+in+film+and+television&rft.jtitle=Information%2C+communication+%26+society&rft.au=Turner%2C+Georgina&rft.au=van+Zoonen%2C+Liesbet&rft.au=Harvey%2C+Jasmine&rft.date=2014-09-14&rft.issn=1369-118X&rft.volume=17&rft.issue=8&rft.spage=986&rft.epage=1000&rft_id=info:doi/10.1080%2F1369118X.2013.870592&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1369-118X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1369-118X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1369-118X&client=summon |