Confusion, control and comfort: premediating identity management in film and television

A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Mo...

Full description

Saved in:
Bibliographic Details
Published inInformation, communication & society Vol. 17; no. 8; pp. 986 - 1000
Main Authors Turner, Georgina, van Zoonen, Liesbet, Harvey, Jasmine
Format Journal Article
LanguageEnglish
Published Abingdon Routledge 14.09.2014
Taylor & Francis Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Most work about IM assumes users to be rational actors making instrumental choices on the basis of perceived usefulness and efficiency; cultural narratives hardly ever come up in current research about acceptance of new identity management technologies (IMTs). Screen representations do not prescribe certain meanings around IM, but create and delineate horizons of imagination; repositories of meanings from which people can draw to make sense of innovations and their consequences. In this paper, we focus on a sample of films, television and web series to examine how IMTs are premediated. Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. We conclude that these dark horizons are anchored in myth and persistent fears about who we are, and thus that new means of IM face a difficult task in gaining users' trust.
AbstractList A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Most work about IM assumes users to be rational actors making instrumental choices on the basis of perceived usefulness and efficiency; cultural narratives hardly ever come up in current research about acceptance of new identity management technologies (IMTs). Screen representations do not prescribe certain meanings around IM, but create and delineate horizons of imagination; repositories of meanings from which people can draw to make sense of innovations and their consequences. In this paper, we focus on a sample of films, television and web series to examine how IMTs are premediated. Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. We conclude that these dark horizons are anchored in myth and persistent fears about who we are, and thus that new means of IM face a difficult task in gaining users' trust.
A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Most work about IM assumes users to be rational actors making instrumental choices on the basis of perceived usefulness and efficiency; cultural narratives hardly ever come up in current research about acceptance of new identity management technologies (IMTs). Screen representations do not prescribe certain meanings around IM, but create and delineate horizons of imagination; repositories of meanings from which people can draw to make sense of innovations and their consequences. In this paper, we focus on a sample of films, television and web series to examine how IMTs are premediated. Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. We conclude that these dark horizons are anchored in myth and persistent fears about who we are, and thus that new means of IM face a difficult task in gaining users' trust. Adapted from the source document.
A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Most work about IM assumes users to be rational actors making instrumental choices on the basis of perceived usefulness and efficiency; cultural narratives hardly ever come up in current research about acceptance of new identity management technologies (IMTs). Screen representations do not prescribe certain meanings around IM, but create and delineate horizons of imagination; repositories of meanings from which people can draw to make sense of innovations and their consequences. In this paper, we focus on a sample of films, television and web series to examine how IMTs are premediated. Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. We conclude that these dark horizons are anchored in myth and persistent fears about who we are, and thus that new means of IM face a difficult task in gaining users' trust. Reprinted by permission of Routledge, Taylor and Francis Ltd.
Author van Zoonen, Liesbet
Harvey, Jasmine
Turner, Georgina
Author_xml – sequence: 1
  givenname: Georgina
  surname: Turner
  fullname: Turner, Georgina
  email: g.turner@lboro.ac.uk
  organization: Department of Social Sciences, Loughborough University
– sequence: 2
  givenname: Liesbet
  surname: van Zoonen
  fullname: van Zoonen, Liesbet
  organization: Department of Social Sciences, Loughborough University
– sequence: 3
  givenname: Jasmine
  surname: Harvey
  fullname: Harvey, Jasmine
  organization: International Digital Lab, Warwick University
BookMark eNqNkU9P3DAQxa2KSl22_QY9ROLCgSz-n5gLQqsWkJB6adXeLCc7RkaJvdhe0H77Ok25cID1xSPN773RzDtGRz54QOgrwSuCW3xOmFSEtH9WFBO2ahssFP2AFoTLtuZc0qNSF6SemE_oOKUHXJ7EzQL9Xgdvd8kFf1b1wecYhsr4TalHG2K-qLYRRtg4k52_r9wGfHZ5X43Gm_vS8LlyvrJuGP-pMgzw5Ca3z-ijNUOCL___Jfr1_dvP9U199-P6dn11V_eiZbluO0O54GB7zjhhoDohJCisaGeY6gAz0aiW0o5A13FDaAeyAWaBYgu4sWyJTmffbQyPO0hZjy71MAzGQ9glTaTEuIyQ6jCUECbY-6gQSqqWNfQQlJQtFG8KevIKfQi76Mt5CsUFloTyaTafqT6GlCJYvY1uNHGvCdZT3Polbj3Free4i-xyljlfghvNc4jDRmezH0K00fjeJc3edPgL6daxlQ
CitedBy_id crossref_primary_10_1108_K_06_2013_0126
crossref_primary_10_2478_nor_2020_0006
crossref_primary_10_1080_1369118X_2015_1118522
Cites_doi 10.1111/j.1539-6924.2008.01069.x
10.1109/TEM.2008.919728
10.14375/NP.9782070136292
10.4018/joeuc.2006070101
10.1080/07359680802125980
10.1007/s11673-010-9228-4
10.1016/j.jretconser.2010.03.007
10.1080/0144929X.2011.553741
10.7208/chicago/9780226118758.001.0001
10.1353/lm.2004.0006
10.1109/JPROC.2003.819605
10.1177/1477370808100543
10.1057/9780230245372
10.1080/09537320600777168
10.1177/0967010608088773
10.1007/978-3-642-20317-6
10.1086/209154
10.1086/671052
10.1080/09537320600777002
10.1057/ejis.2008.2
ContentType Journal Article
Copyright 2013 The Author(s). Published by Taylor & Francis. 2013
Copyright Taylor & Francis Ltd. 2014
Copyright_xml – notice: 2013 The Author(s). Published by Taylor & Francis. 2013
– notice: Copyright Taylor & Francis Ltd. 2014
DBID 0YH
AAYXX
CITATION
7SC
7U4
8BJ
8FD
BHHNA
DWI
E3H
F2A
FQK
JBE
JQ2
L7M
L~C
L~D
WZK
8BP
DOI 10.1080/1369118X.2013.870592
DatabaseName Taylor & Francis Open Access
CrossRef
Computer and Information Systems Abstracts
Sociological Abstracts (pre-2017)
International Bibliography of the Social Sciences (IBSS)
Technology Research Database
Sociological Abstracts
Sociological Abstracts
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Sociological Abstracts (Ovid)
Library & Information Sciences Abstracts (LISA) - CILIP Edition
DatabaseTitle CrossRef
Sociological Abstracts (pre-2017)
International Bibliography of the Social Sciences (IBSS)
Technology Research Database
Computer and Information Systems Abstracts – Academic
Library and Information Science Abstracts (LISA)
Sociological Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Library & Information Sciences Abstracts (LISA) - CILIP Edition
DatabaseTitleList
Sociological Abstracts (pre-2017)
Sociological Abstracts (pre-2017)
International Bibliography of the Social Sciences (IBSS)
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: 0YH
  name: Taylor & Francis Open Access
  url: https://www.tandfonline.com
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sociology & Social History
EISSN 1468-4462
EndPage 1000
ExternalDocumentID 3372851741
10_1080_1369118X_2013_870592
870592
Genre Articles
Feature
GroupedDBID .7I
.QK
0BK
0R~
0YH
29I
3R3
4.4
5GY
5VS
77K
AAAVI
AAGZJ
AAMFJ
AAMIU
AAPUL
AATTQ
AAZMC
ABBKH
ABCCY
ABFIM
ABIVO
ABJVF
ABLIJ
ABPEM
ABPTK
ABPTX
ABQHQ
ABSSG
ABTAI
ABXUL
ABZLS
ACGFS
ACGOD
ACHQT
ACLSK
ACTIO
ACTOA
ADAHI
ADCVX
ADLRE
ADXPE
AECIN
AEGYZ
AEISY
AEKEX
AEMXT
AEOZL
AEPSL
AEYOC
AEZRU
AFOLD
AFWLO
AGDLA
AGMYJ
AGRBW
AIJEM
AJWEG
AKBVH
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AVBZW
AWYRJ
BEJHT
BLEHA
BMOTO
BOHLJ
CCCUG
CQ1
CS3
DGFLZ
DKSSO
EBS
EJD
E~B
E~C
FUNRP
G-F
GTTXZ
H13
HF~
HZ~
IPNFZ
J.O
KDLKA
KYCEM
M4Z
MS~
NA5
O9-
P2P
PQEST
PQQKQ
RIG
RNANH
ROSJB
RSYQP
S-F
STATR
TCF
TFH
TFL
TFW
TNTFI
TRJHH
UPT
UT5
UT9
V1K
VAE
~01
~S~
AAYXX
ABJNI
ABXYU
ADKVQ
AHDZW
CITATION
TBQAZ
TDBHL
TUROJ
7SC
7U4
8BJ
8FD
BHHNA
DWI
E3H
F2A
FQK
JBE
JQ2
L7M
L~C
L~D
WZK
8BP
ID FETCH-LOGICAL-c583t-8ba2454efc43413e9b556e9092ba39be03579822b1ebb4a12be67e3fe20fe07f3
IEDL.DBID 0YH
ISSN 1369-118X
IngestDate Fri Aug 16 08:25:21 EDT 2024
Sat Aug 17 00:29:05 EDT 2024
Fri Aug 16 08:37:01 EDT 2024
Sat Aug 17 01:39:09 EDT 2024
Thu Oct 10 15:27:27 EDT 2024
Fri Aug 23 01:57:47 EDT 2024
Tue Jun 13 19:49:43 EDT 2023
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 8
Language English
License open-access: This is an Open Access article. Non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly attributed, cited, and is not altered, transformed, or built upon in any way, is permitted. The moral rights of the named author(s) have been asserted.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c583t-8ba2454efc43413e9b556e9092ba39be03579822b1ebb4a12be67e3fe20fe07f3
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ObjectType-Article-1
ObjectType-Feature-2
OpenAccessLink https://www.tandfonline.com/doi/abs/10.1080/1369118X.2013.870592
PQID 1545061243
PQPubID 53080
PageCount 15
ParticipantIDs proquest_miscellaneous_1660024569
proquest_journals_1545061243
proquest_miscellaneous_1559698372
proquest_miscellaneous_1660011353
proquest_miscellaneous_1551035947
crossref_primary_10_1080_1369118X_2013_870592
informaworld_taylorfrancis_310_1080_1369118X_2013_870592
PublicationCentury 2000
PublicationDate 20140914
PublicationDateYYYYMMDD 2014-09-14
PublicationDate_xml – month: 09
  year: 2014
  text: 20140914
  day: 14
PublicationDecade 2010
PublicationPlace Abingdon
PublicationPlace_xml – name: Abingdon
PublicationTitle Information, communication & society
PublicationYear 2014
Publisher Routledge
Taylor & Francis Ltd
Publisher_xml – name: Routledge
– name: Taylor & Francis Ltd
References CIT0050
Bretnor R. (CIT0012) 1974
CIT0031
CIT0011
CIT0033
Scholes R. (CIT0043) 1977
CIT0038a
Johnson S. (CIT0029) 2006
Lefait S. (CIT0032) 2012
Silverstone R. (CIT0044) 1988
Williamson H. R. (CIT0051) 1957
CIT0013
CIT0016
Notoatmodjo G. (CIT0038b) 2009; 98
van Zoonen L. (CIT0053) 2013
CIT0018
Propp V. (CIT0040) 1928
CIT0039
CIT0019
Murnaghan S. (CIT0036) 1987
Bordwell D. (CIT0010) 1985
CIT0021
Davis N. Z. (CIT0020) 1983
CIT0042
CIT0001
Campbell J. (CIT0017) 1949
Dierkes M. (CIT0022) 1992
CIT0045
Lyon D. (CIT0034) 2007
Humby C. (CIT0027) 2008
Bennett C. (CIT0007) 2010
Fiske J. (CIT0023) 1987
Kammerer D. (CIT0030) 2002; 2
Boltanski L. (CIT0008) 2012
CIT0005
CIT0026
CIT0006
CIT0028
Andrejevic M. (CIT0002) 2004
CIT0009
References_xml – ident: CIT0042
  doi: 10.1111/j.1539-6924.2008.01069.x
– ident: CIT0026
  doi: 10.1109/TEM.2008.919728
– volume-title: Énigmes et complots: Une enquête à propos d'enquêtes
  year: 2012
  ident: CIT0008
  doi: 10.14375/NP.9782070136292
  contributor:
    fullname: Boltanski L.
– start-page: 20
  volume-title: Media, myths and narrative: Television and the press
  year: 1988
  ident: CIT0044
  contributor:
    fullname: Silverstone R.
– ident: CIT0028
  doi: 10.4018/joeuc.2006070101
– ident: CIT0045
  doi: 10.1080/07359680802125980
– ident: CIT0001
  doi: 10.1007/s11673-010-9228-4
– start-page: 80
  volume-title: Barthes’ mythologies today: Readings of contemporary culture
  year: 2013
  ident: CIT0053
  contributor:
    fullname: van Zoonen L.
– volume-title: Narration in the fiction film
  year: 1985
  ident: CIT0010
  contributor:
    fullname: Bordwell D.
– volume-title: The hero with a thousand faces
  year: 1949
  ident: CIT0017
  contributor:
    fullname: Campbell J.
– ident: CIT0018
  doi: 10.1016/j.jretconser.2010.03.007
– volume-title: Scoring points: How Tesco continues to win customer loyalty
  year: 2008
  ident: CIT0027
  contributor:
    fullname: Humby C.
– volume-title: Who was the man in the iron mask? and other historical enigmas
  year: 1957
  ident: CIT0051
  contributor:
    fullname: Williamson H. R.
– ident: CIT0013
  doi: 10.1080/0144929X.2011.553741
– volume-title: Television culture
  year: 1987
  ident: CIT0023
  contributor:
    fullname: Fiske J.
– volume: 2
  start-page: 464
  issue: 2
  year: 2002
  ident: CIT0030
  publication-title: Surveillance & Society
  contributor:
    fullname: Kammerer D.
– volume-title: Morphology of the folktale
  year: 1928
  ident: CIT0040
  contributor:
    fullname: Propp V.
– ident: CIT0019
  doi: 10.7208/chicago/9780226118758.001.0001
– ident: CIT0031
  doi: 10.1353/lm.2004.0006
– volume-title: Disguise and recognition in the Odyssey
  year: 1987
  ident: CIT0036
  contributor:
    fullname: Murnaghan S.
– volume: 98
  start-page: 71
  volume-title: Proceedings of the seventh australasian conference on information security
  year: 2009
  ident: CIT0038b
  contributor:
    fullname: Notoatmodjo G.
– ident: CIT0039
  doi: 10.1109/JPROC.2003.819605
– ident: CIT0038a
  doi: 10.1177/1477370808100543
– ident: CIT0050
  doi: 10.1057/9780230245372
– ident: CIT0033
  doi: 10.1080/09537320600777168
– volume-title: The privacy advocates: Resisting the spread of surveillance
  year: 2010
  ident: CIT0007
  contributor:
    fullname: Bennett C.
– volume-title: Science fiction today and tomorrow
  year: 1974
  ident: CIT0012
  contributor:
    fullname: Bretnor R.
– ident: CIT0021
  doi: 10.1177/0967010608088773
– start-page: 193
  volume-title: MediaSpace: Place, scale and culture in a media age
  year: 2004
  ident: CIT0002
  contributor:
    fullname: Andrejevic M.
– volume-title: Science fiction: History, science, vision
  year: 1977
  ident: CIT0043
  contributor:
    fullname: Scholes R.
– volume-title: Surveillance studies: An overview
  year: 2007
  ident: CIT0034
  contributor:
    fullname: Lyon D.
– ident: CIT0016
  doi: 10.1007/978-3-642-20317-6
– volume-title: Leitbild und Technik: Zur Entstehung und Steuerung technisher Innovationen
  year: 1992
  ident: CIT0022
  contributor:
    fullname: Dierkes M.
– volume-title: Surveillance on screen: Monitoring contemporary films and television programs
  year: 2012
  ident: CIT0032
  contributor:
    fullname: Lefait S.
– ident: CIT0005
  doi: 10.1086/209154
– ident: CIT0006
  doi: 10.1086/671052
– volume-title: The return of Martin Guerre
  year: 1983
  ident: CIT0020
  contributor:
    fullname: Davis N. Z.
– volume-title: Everything bad is good for you: How today's popular culture is actually making us smarter
  year: 2006
  ident: CIT0029
  contributor:
    fullname: Johnson S.
– ident: CIT0011
  doi: 10.1080/09537320600777002
– ident: CIT0009
  doi: 10.1057/ejis.2008.2
SSID ssj0000607
Score 2.0734634
Snippet A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The...
SourceID proquest
crossref
informaworld
SourceType Aggregation Database
Publisher
StartPage 986
SubjectTerms Biometrics
Comfort
Confusion
Corruption
future technologies
Horizon
Identity
identity management
Implants
Management
Motion pictures
Myth
Narratives
Perceptions
Personal information
premediation
Repositories
Science fiction
Science fiction & fantasy
Security management
Surveillance
Technology
Television
Television programs
Threat
Transplants & implants
Trust
users' trust
Title Confusion, control and comfort: premediating identity management in film and television
URI https://www.tandfonline.com/doi/abs/10.1080/1369118X.2013.870592
https://www.proquest.com/docview/1545061243
https://search.proquest.com/docview/1551035947
https://search.proquest.com/docview/1559698372
https://search.proquest.com/docview/1660011353
https://search.proquest.com/docview/1660024569
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1NS8MwNIi76EH8xOkcEcST0bRJ2sabiKMM9CCK81SSNYWB60S7g__e9_rFhjjBW0vfS8nL-0ryPgg54ykYVZ6mjAfGZzJ1lhnuFEsFOreRkWEZTXj_EMTPcjhSo4UsfgyrxD10VhWKKHU1Crexn01E3JUnAhDRaISBWeISGE5pUMIdHzxv5HT-Gi_o4jJhGjEYojTJc7-MsmSclkqX_lDVpf0ZbJOt2nGkN9VK75A1l--SzYVygrvkqM0-oee0yrulVRmQrz3ygrl9czwbu6B1fDoFCsDzFP5fXNN3PCnEvh0wFp1U-btfdNqGx9BJTrPJ27TEKtq09H3yPLh7uo1Z3VWBjVUkChZZ40slXTaWaMGctkoFTnPtWyO0dRxWCYv6Wc9ZK43nWxeETmTO55njYSYOyHo-y90hoVrq0PhjMIJcwD4N-QH2u-DTeDZQbmy6hDXkTN6r4hmJV9ckbcifIPmTivxdEi3SPCnKQ4us6jCSiNWovWZ9kloKPxN0D9GFk6JLTtvPID94KWJyN5sjDNYUVFqGK2F0oGFq_gqYAF1H7CLyBwzeNOuj_8_0mGzAm8SYFU_2yHrxMXcn4BgVtl_yfp90nh6HcfwNWo8FtQ
link.rule.ids 315,786,790,27533,27955,27956,59496,59497,60004,60793
linkProvider Taylor & Francis
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6h7YFy4FFAbCngShUnvDjxIzE3hKhCaXuotmpvlp040go2rWj2UH49njhZbYvYSvQWyQ_F9oxnPP7mM8Aeq4JRZVVFmbIpFZV31DIvacXRuc2tyDo04dGxKk7Fwbkc0IRXPawSz9B1JIro9mpUbgxGD5C4jwlXQUfzc0Rm8UmQOKnDLryh0EEZwcb05KAoVrbjLmca21BsNOTP_aOfG_bpBnvpX7t1Z4L2n4Abfj4iT35MFq2blL9v8Trea3RP4XHvoJLPUaKewQPfbMGjFdrCLdheZrmQ9yTm95JIN3L9HM4wh3CBMbgPpMfBk_Av4XseBtl-IpcYkcT3QUJfZBbzhK_JfAnDIbOG1LOf865Vu0x_fwGn-1-nXwrav95AS5nzlubOpkIKX5cCLaXXTkrlNdOps1w7z4I0IHmgS7xzwiap8yrzvPYpqz3Lav4SRs1F418B0UJnNi2DsWU8nAdR7sK5OvhOiVPSl3YMdFgzcxlJOkzSc58Os2lwNk2czTHkqwtr2i44UseXTAxf33RnEALTa_uVQTcUXUXBx7C7LA56ipcvtvEXC6yD3IVSi2xtHa10GFq6po5CFxVfK7mjDt5o6-3_H-k7eFhMjw7N4bfj769hM5QIxMkkYgdG7a-FfxOcsda97dXtDy6FKQs
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwED9NnTTBAx8DtI4BRpp4wsWJPxLzhoCqG9s0oU30zbITR6qgWQXpw_jr8cVJ1YEoEnuL5DsrZ9_5zvbdzwCHrAxOlZUlZcqmVJTeUcu8pCXH4Da3ImuzCU_P1ORSHE_ldK2KH9MqcQ9dRaCIdq1G416UVZ8R9ybhKphoPsXELD4KCid1WIS3FWK9DWD74vPxZLK2Grcl08hDkakvn_tLPzfc0w3w0j8W69YDje-D7f89Jp58HS0bNyp-_gbreBvhHsC9Ljwl76I-PYQtX-_C3TXQwl3YX9W4kFckVveSCDZy_Qi-YAXhEk_gXpMuC56EXwnf8yBj85Ys8DwSXwcJfZFZrBK-JvNVEg6Z1aSafZu3XM2q-P0xXI4_Xryf0O7tBlrInDc0dzYVUviqEOgnvXZSKq-ZTp3l2nkWdAGhA13inRM2SZ1XmeeVT1nlWVbxJzCor2q_B0QLndm0CK6W8bAbRK0Lu-oQOSVOSV_YIdB-yswiQnSYpEM-7UfT4GiaOJpDyNfn1TTt0UgV3zExfDPrQa8DprP1HwaDUAwUBR_Cy1VzsFK8erG1v1oiDSIXSi2yjTRa6SBauoFGYYCKb5X8gwbvs_X-_0v6AnbOP4zNydHZp6dwJzQITJJJxAEMmu9L_yxEYo173hnbL78SJ8o
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Confusion%2C+control+and+comfort%3A+premediating+identity+management+in+film+and+television&rft.jtitle=Information%2C+communication+%26+society&rft.au=Turner%2C+Georgina&rft.au=van+Zoonen%2C+Liesbet&rft.au=Harvey%2C+Jasmine&rft.date=2014-09-14&rft.issn=1369-118X&rft.volume=17&rft.issue=8&rft.spage=986&rft.epage=1000&rft_id=info:doi/10.1080%2F1369118X.2013.870592&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1369-118X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1369-118X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1369-118X&client=summon