Journal articles on the topic 'Going public (Securities)'

To see the other types of publications on this topic, follow the link: Going public (Securities).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 36 journal articles for your research on the topic 'Going public (Securities).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ewens, Michael, and Joan Farre-Mensa. "The Deregulation of the Private Equity Markets and the Decline in IPOs." Review of Financial Studies 33, no. 12 (May 9, 2020): 5463–509. http://dx.doi.org/10.1093/rfs/hhaa053.

Full text
Abstract:
Abstract The deregulation of securities laws—in particular the National Securities Markets Improvement Act (NSMIA) of 1996—has increased the supply of private capital to late-stage private startups, which are now able to grow to a size that few private firms used to reach. NSMIA is one of a number of factors that have changed the going-public versus staying-private trade-off, helping bring about a new equilibrium where fewer startups go public, and those that do are older. This new equilibrium does not reflect an initial public offering (IPO) market failure. Rather, founders are using their increased bargaining power vis-à-vis investors to stay private longer.
APA, Harvard, Vancouver, ISO, and other styles
2

Khan, Ihtesham, Sikandar Shah, and Wisal Ahmad. "The Impact of Going Public Decision on Company Performance: Evidence from Pakistan." Global Social Sciences Review V, no. III (September 30, 2020): 156–65. http://dx.doi.org/10.31703/gssr.2020(v-iii).17.

Full text
Abstract:
This study inspected the association of company performance with the choice of IPO of the firm's registered on the Pakistan Stock Exchange. In particular, two dimensions of performance, Return on Sales and Return on Asset as operating and Tobbin Q as Market performance as dependent variables, Bank debts, Capital Expenditure, Ownership Concentration, Sales Growth and Firm Size as independent variables along with the age of the firm as control variable have been used. Sample of 40 Pakistani IPOstaken for the period of 2005-2016. OLS inferences confirmed that the performance of both pre-IPO and Post-IPO show an influential association with the independent variables. This study provided a path to smaller firms that are in the process to go public. Whereas glimpses for the investors also provided who want to add profitable securities to their portfolio bucket.
APA, Harvard, Vancouver, ISO, and other styles
3

Nicholas, Phil. "The Agency That Kept Going: The Late New Deal SEC and Shareholder Democracy." Journal of Policy History 16, no. 3 (July 2004): 212–38. http://dx.doi.org/10.1353/jph.2004.0017.

Full text
Abstract:
Discussions of New Deal policymaking suggest that many reforms were enacted from 1933 to 1937, but after this the New Deal ended. Although this analysis provides a generally accurate portrayal of presidential-congressional power relations, it overlooks the ability of some federal agencies to advance policies opposed by political and economic elites, and assumes that the plight of government agencies is always closely tied to the fortunes of elected leaders. The history of the Securities and Exchange Commission provides a somewhat different story. The SEC continued to pursue policies opposed by the securities industry despite increased political opposition in the late New Deal. This was due largely to the liberal-reformist ideology held by a large number of SEC commissioners and staff. They believed the agency should adopt a more mandate-driven approach and issue greater numbers of regulations than the SEC had in the early New Deal. As a result of the commissioners he appointed, President Franklin Roosevelt was largely responsible for this change in SEC policymaking.
APA, Harvard, Vancouver, ISO, and other styles
4

Noronha, Gregory, and Kenneth Yung. "Reverse LBO Underpricing: Information Asymmetry Or Price Support?" Journal of Applied Business Research (JABR) 13, no. 3 (September 7, 2011): 67. http://dx.doi.org/10.19030/jabr.v13i3.5753.

Full text
Abstract:
<span>Most studies attribute the underpricing of initial public offerings of equity securities to the ex ante uncertainty resulting from the information differential between the firm going public and the market. Rund (1991, 1993), however, proposes that underpricing could result from underwriter price support in the early after-market. In this paper we examine firms that were once public, went private via leveraged buyout and then went public again. It is reasonable to expect that since these reverse LBOs (RLBOs) were once publicly traded, they should have less of an information differential with the market than firms going public for the first time. Our tests indicate that there is little or no information asymmetry between RLBOs and the market. We find that RLBO initial returns are more consistent with price support than with information asymmetry.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

Geiger, Marshall A., and K. Raghunandan. "Bankruptcies, Audit Reports, and the Reform Act." AUDITING: A Journal of Practice & Theory 20, no. 1 (March 1, 2001): 187–95. http://dx.doi.org/10.2308/aud.2001.20.1.187.

Full text
Abstract:
The Private Securities Litigation Reform Act (Reform Act) was enacted as law in 1995 and represents a major victory for the public accounting profession. Since audit reporting for publicly traded companies that enter bankruptcy continues to be of interest to legislators and the public, the Reform Act also includes audit reporting requirements regarding the auditor's assessments of a company's ability to continue as a going concern. This study examines the potential impact of the Reform Act on auditor reporting by examining audit reports for 383 bankrupt companies during the 1991–1998 period. The results indicate that, after controlling for financial stress, company size, default status, audit reporting lag and bankruptcy filing lag, auditors were less likely to have issued prior going-concern modified audit reports for bankrupt companies after the Reform Act.
APA, Harvard, Vancouver, ISO, and other styles
6

Wachira, Moses Muchemi, and Peter Ng’ang’a. "Macroeconomic Effects of Initial Public Offer and Performance Equity Prices of Firms Listed in Nairobi Securities Exchange, Kenya." International Journal of Current Aspects in Finance, Banking and Accounting 3, no. 2 (October 21, 2021): 65–78. http://dx.doi.org/10.35942/ijcfa.v3i2.197.

Full text
Abstract:
Market reacts differently to various factors ranging from economic political, and socio-cultural. The stock prices of quoted companies in Kenya are affected either positivity or negatively by a number of factors occurring within or without the economic system. Initial public offering is often issued by smaller, younger companies seeking the capital to expand, but can also be done by large privately owned companies looking to become publicly traded. The initial public offering is a vital step for young entrepreneurial firms, providing them access to the public equity market for the first time. Previous literature had focused primarily on initial public offering under-pricing phenomenon to measure the performance of companies. However, researchers argued that initial public offering pricing, which was a key factor in under-pricing had remained relatively unexplored in literature. The study employed descriptive research design. The study targeted a total population of 7 quoted companies in Nairobi security market, which had issued IPO from 2006-2020. The study depended on secondary data collected from the Nairobi Securities Exchange. Data was analysed by the use of SPSS. From the panel regression analysis, the interclass correlation (rho) was 0.310 implying that 31% of the variations in equity share prices are due to differences among the quoted firms. The within and between R-square was 0.0154 and 0.9967 respectively. The overall R2 was 0.9885, indicating that the variables considered in the model account for about 98.85% percent change in the dependent variables, while the remaining percent change may be as a result of other variables not addressed by this model. Dividend per share improved significantly after the IPO. Dividend per share was also established to improved significantly after the IPO. The study concludes that dividend per share, market capitalization and market liquidity improved in the post going public period. This is due to the proceeds received by companies from the sale of their shares to the public. In addition, the study concludes that firms benefit by going public despite potentially higher agency problems, at least for the first few years after the IPO. Becoming publicly traded provides financial capital to firms that helps them commercialize their products.
APA, Harvard, Vancouver, ISO, and other styles
7

Brady, Andrew, Brian Breheny, Michelle Gasaway, Stacy Kanter, Michael Zeidel, and Monika Zhou. "SEC permits all issuers to submit confidential draft registration statements." Journal of Investment Compliance 18, no. 4 (November 6, 2017): 16–21. http://dx.doi.org/10.1108/joic-08-2017-0051.

Full text
Abstract:
Purpose To explain the US Securities and Exchange Commission’s (SEC’s) June 29, 2017 announcement (as updated August 17, 2017) that the staff of its Division of Corporation Finance will accept draft registration statement submissions from all companies for nonpublic review, thereby expanding a popular benefit previously available only to emerging growth companies (ECGs) under the JOBS Act and, in limited circumstances, to certain foreign private issuers under historical Staff practices. Design/methodology/approach Explains the rationale and limitations of the new policy, the existing confidential submission process, the expanded class of issuers and transactions that now qualifies for the nonpublic review process, and content and staff processing details. Findings Recognizing that the confidential submission process for EGCs proved highly popular and quickly became standard practice for eligible companies seeking to conduct an IPO, the SEC has made the nonpublic review process available to an expanded class of issuers and transactions. The expanded confidential submission process for IPOs addresses some of the typical concerns associated with engaging in the IPO process by giving a company more time and flexibility to determine whether it actually will be able to achieve the benefits of going public before it incurs the burdens and expenses of doing so. Originality/value Practical guidance from experienced securities and corporate finance lawyers.
APA, Harvard, Vancouver, ISO, and other styles
8

Clayton, John. "The Two Faces of Janus: The Jurisprudential Past and New Beginning of Rule 10b-5." University of Michigan Journal of Law Reform, no. 47.3 (2014): 853. http://dx.doi.org/10.36646/mjlr.47.3.two.

Full text
Abstract:
Section 10(b) of the Securities Exchange Act and its implementing Rule 10b-5 are the primary antifraud provisions for both private and public enforcement of the federal securities laws. Neither the statute nor the rule expressly provides for a private right of action, but federal courts have long recognized such an implied right, and the Securities and Exchange Commission has supported the implied private right of action as a “necessary supplement” to its own efforts. However, after a decade of applying an expansive interpretation to Section 10(b), in the early 1970s the U.S. Supreme Court began to narrowly interpret this implied private right of action, citing concerns about the costs that frivolous litigation may impose on capital markets. Most recently, in Janus Capital Group, Inc. v. First Derivative Traders, the Supreme Court constricted the ambit of Rule 10b-5(b) — which imposes liability for fraudulent misstatements — by narrowly interpreting the word “make” in a way that effectively removes entire categories of plaintiffs from liability under Rule 10b-5(b). While Janus involved private plaintiffs, the Court’s interpretation cannot easily be distinguished on the basis of the plaintiff’s identity. Therefore, Janus appears to limit the Commission to the same extent that it does private plaintiffs, even if such a limitation was not the Court’s intent. This Note offers a solution to the Commission’s Janus problem, whereby the Commission could use its rulemaking authority to implement a “New Rule 10b-5.” This New Rule 10b-5 would be drafted so that only the Commission could use it to prosecute fraud, addressing the Court’s concern about the potential costs of expanding private litigation. Additionally, the New Rule 10b-5 could substitute different language for the word “make” so that the Commission could sidestep the Court’s restrictive interpretation of that word’s meaning. Going forward, this bifurcated approach to Section 10(b) — with separate rules for private and public enforcement — would allow the courts to interpret the contours of each cause of action without inadvertently restricting or expanding the scope of the other.
APA, Harvard, Vancouver, ISO, and other styles
9

Bortolon, Patricia Maria, and Annor da Silva Junior. "Determining Factors for Delisting of Companies Listed on BM&FBOVESPA." Revista Contabilidade & Finanças 26, no. 68 (July 10, 2015): 140–53. http://dx.doi.org/10.1590/1808-057x201500910.

Full text
Abstract:
<p>Traditionally, the capital market has attracted the interest of scholars and researchers, motivated to understand the process of going public and trading securities of companies on a stock exchange. In this research context, an aspect had been neglected, something which indi cates a gap in the body of knowledge about the capital market and corporate governance: delisting of companies. We aim to identify the determining factors for delisting companies from the Commodity & Futures Exchange BOVESPA (BM&FBOVESPA). Methodologically, this research has related a set of variables collected from secondary data available on the database of the Securities Commission of Brazil (CVM), BM&FBOVESPA, and Economatica. By analyzing 227 listing cancellations, between 2001 and 2012, the results indicate that de listing of companies from BM&FBOVESPA is determined by the following factors: (i) greater concentration of ownership and control; (ii) lower free float; (iii) lower liquidity of shares; (iv) greater availability of cash; and (v) larger size. The fact that the controlling shareholder is a public or private company determines significant differences in the decision to delist. While in the first case cash availability is the most important factor, in the second liquidity is the main determining factor for delisting. From the academic viewpoint, this research extends the studies on delisting, still incipient in the Brazilian capital market context. For the capital market, identifying the characteristics of companies prone to cancel listing may prevent investors concerned about inherent risks at the time of acquiring shares by the controlling group interested in delisting.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Dutta, Saurav K., Dennis H. Caplan, and David J. Marcinko. "Growing Pains at Groupon." Issues in Accounting Education 29, no. 1 (August 1, 2013): 229–45. http://dx.doi.org/10.2308/iace-50595.

Full text
Abstract:
ABSTRACT On November 4, 2011, Groupon Inc. went public with an initial market capitalization of $13 billion. The business was formed a couple of years earlier as an offshoot of “The Point.” The business grew rapidly and increased its reported revenue from $14.5 million in 2009 to $1.6 billion in 2011. Soon after going public, prior to its announcement of its first-quarter results, the company's auditors required Groupon to disclose a material weakness in its internal controls over financial reporting that impacted its disclosures on revenue and its estimation of returns. This case uses Groupon to motivate discussion of financial reporting issues in e-commerce businesses. Specifically, the case focuses on (1) revenue recognition practices for “agency” type e-commerce businesses, (2) accounting for sales with a right of return for new products, and (3) use of alternative financial metrics to better convey the intrinsic value of a business. The case requires students to critically read, analyze, and apply authoritative accounting guidance, and to read and analyze communications between the Securities and Exchange Commission (SEC) and the registrant.
APA, Harvard, Vancouver, ISO, and other styles
11

Maikel Sanger, Winston Pontoh, and Sri Murni. "INTEGRASI PASAR MODAL INDONESIA TERHADAP BEBERAPA PASAR MODAL YANG TERGABUNG DALAM PRESIDENSI G20 (SESUDAH UANG BARU TAHUN EMISI 2022 BEREDAR)." JMBI UNSRAT (Jurnal Ilmiah Manajemen Bisnis dan Inovasi Universitas Sam Ratulangi). 10, no. 3 (October 30, 2023): 2061–78. http://dx.doi.org/10.35794/jmbi.v10i3.52754.

Full text
Abstract:
Abstract. The G20 is a multilateral cooperation forum consisting of 19 major countries and the European Union (EU). The G20 represents more than 60% of the world's population, 75% of global trade and 80% of world GDP. The G20 members consist of South Africa, the United States, Saudi Arabia, Argentina, Australia, Brazil, India, Indonesia, the United Kingdom, Italy, Japan, Germany, Canada, Mexico, the Republic of Korea, Russia, France, China, Turkey and the European Union. Companies that need funds can sell their securities on the capital market. Securities newly issued by the company are sold in the primary market. The newly sold securities can be in the form of an initial public offering (IPO) or additional new securities if the company has gone public (these additional securities are often called seasoned new issues). The results of the research show that the Indonesian capital market towards the South African capital market obtained a value of 0.553 so that the level of closeness of the relationship is moderate. The Indonesian capital market against the United States capital market obtained a value of 0.473, so the level of close relationship is moderate. The Indonesian capital market against the Australian capital market obtained a value of 0.435 so that the level of close relationship is moderate. The Indonesian capital market against the British capital market obtained a value of 0.699 so that the level of closeness of the relationship is Strong. The Indonesian capital market against the Chinese capital market obtained a value of 0.713 so that the level of closeness of the relationship is strong. The Indonesian capital market against the Japanese capital market obtained a value of 0.597 so that the level of closeness of the relationship is moderate. The Indonesian capital market against the South Korean capital market obtained a value of 0.693 so that the close relationship is strong. The Indonesian capital market against the French capital market obtained a value of 0.508 so it can be concluded that the level of closeness of the relationship is moderate. Abstrak. G20 adalah forum kerja sama multilateral yang terdiri dari 19 negara utama dan Uni Eropa (EU). G20 merepresentasikan lebih dari 60% populasi bumi, 75% perdagangan global, dan 80% PDB dunia. Anggota G20 terdiri dari Afrika Selatan, Amerika Serikat, Arab Saudi, Argentina, Australia, Brasil, India, Indonesia, Inggris, Italia, Jepang, Jerman, Kanada, Meksiko, Republik Korea, Rusia, Perancis, Tiongkok, Turki dan Uni Eropa. Perusahaan yang membutuhkan dana dapat menjual surat berharganya dipasar modal. Surat berharga yang baru dikeluarkan oleh perusahaan dijual di pasar primer (primary market). Surat berharga yang baru dijual dapat berupa penawaran perdana ke public (initial public offering atau IPO) atau tambahan surat berharga baru jika perusahaan sudah going public (sekuritas tambahan ini sering disebut dengan seasoned new issues). Hasil penelitian menunjukkan bahwa pasar modal Indonesia terhadap pasar modal Afrika Selatan memperoleh nilai sebesar 0.553 sehingga tingkat keeratan hubungan yang dimiliki adalah sedang. Pasar modal Indonesia terhadap pasar modal Amerika Serikat memperoleh nilai sebesar 0.473 sehingga tingkat keeratan hubungan yang dimiliki adalah sedang. Pasar modal Indonesia terhadap pasar modal Australia memperoleh nilai sebesar 0.435 sehingga tingkat keeratan hubungan yang dimiliki adalah sedang. Pasar modal Indonesia terhadap pasar modal Inggris memperoleh nilai sebesar 0.699 sehingga tingkat keeratan hubungan yang dimiliki adalah Kuat. Pasar modal Indonesia terhadap pasar modal China memperoleh nilai sebesar 0.713 sehingga tingkat keeratan hubungan yang dimiliki adalah kuat. Pasar modal Indonesia terhadap pasar modal Jepang memperoleh nilai sebesar 0.597 sehingga tingkat keeratan hubungan yang dimiliki adalah sedang. Pasar modal Indonesia terhadap pasar modal Korea Selatan memperoleh nilai sebesar 0.693 sehingga keeratan hubungan yang dimiliki adalah kuat. Pasar modal Indonesia terhadap pasar modal Perancis memperoleh nilai sebesar 0.508 sehingga dapat disimpulkan bahwa tingkat keeratan hubungan yang dimiliki adalah sedang.
APA, Harvard, Vancouver, ISO, and other styles
12

Biondi, Yuri. "Sovereign Debt Restructuring, Refinancing and the Financial Market." Accounting, Economics, and Law: A Convivium 6, no. 3 (December 1, 2016): 179–88. http://dx.doi.org/10.1515/ael-2016-0024.

Full text
Abstract:
Abstract Lienau’s book on ‘Rethinking Sovereign Debt’ delves into international finance to shed light on its background rules, overarching ideologies and interacting actors, disentangling the social norm of sovereign debt continuity and its institutional foundations. What a formalistic legal reasoning would interpret as a self-contained bilateral contract is then situated in historical time and social space populated by a variety of actors (debtors and creditors), co-existing legal regimes and evolving principles of reference. Her focus on odious debt highlights situations where debt continuity is challenged by major events in the sovereign borrower status (such as major political regime change, corruption and human rights abuse) which challenge debt legitimacy. This comment expands on her thoughtful analysis by linking debt continuity to the borrowing sovereign entity as a going concern. Sovereign borrowing makes lenders involved with this ongoing entity through time and circumstances. Ongoing sovereign debt management is featured by both debt securities market trading and the refinancing mechanism. In turn, refinancing involves public finances with their public benefit missions, central banking and the monetary base management. In this context, socially responsible lending and borrowing may be facilitated by acknowledging the bonding relationship between the borrowing sovereign entity and its creditors, including when default occurs.
APA, Harvard, Vancouver, ISO, and other styles
13

Mungure, Sheila. "EFFECT OF ECONOMY PRICING STRATEGY ON THE PROFITABILITY OF INSURANCE FIRMS IN KENYA." International Journal of Finance and Accounting 2, no. 3 (February 14, 2017): 24. http://dx.doi.org/10.47604/ijfa.318.

Full text
Abstract:
Purpose: The objectives of the study were to analyze effect of an IPO on the financial performance of listed companies in the Nairobi securities exchangeMethodology:The study will adopt an events study. The target of this study is companies that have issued IPOs and are listed in the Nairobi Securities Exchange.The sample will consist of companies that issued IPOs between 1996 and 2011.Our sample size is 13 listed companies in the NSE (Appendix II).The study will make use of secondary data.Market model will be used in coming up with Expected/Normal Return (R), Abnormal Return (AR), the Cumulative Abnormal Return (CAR) and then lastly, test for the significance of the study.Results:It was also possible to conclude that there was a positive but insignificant relationship between mean market return and PBT.It was psosoble to conlude that the mean abnormal retruns after the IPO were higher than before IPOIt was possible to conclude that going public allows the firm to enhance its bargaining power with bankers and financial creditors, and consequently reduces the firm’s cost of credit. It is also possible to conclude that selling shares to the public enhances a firm’s financial flexibility by generating additional sources of capital to finance growth and expansion and these is reflected by the high share prices. The study also concludes that increase in investor recognition and shareholder base due to an IPO lowers the firm’s cost of equity; enhances stock liquidity which is valuable for managerial incentive schemes, which inturn turn increases firm value. .Policy recommendation: The study recommends that the current efforts of listing small firms/SMEs should be fast tracked so as to facilitate the listing of small firms. It was recommended that the listed companies to go public as this enhances a firm’s financial flexibility by generating additional sources of capital to finance growth and expansion. This is reflected in their share prices.The study recommends that each county should have security exchange so that the private firms in the county can be listed. It was recommended that CMA should encourage firms to list as doing so would increases investor recognition and shareholder base which would lowers the firm’s cost of equity and improves frims value
APA, Harvard, Vancouver, ISO, and other styles
14

Siri and Zhu. "Will the EU Commission Successfully Integrate Sustainability Risks and Factors in the Investor Protection Regime? A Research Agenda." Sustainability 11, no. 22 (November 8, 2019): 6292. http://dx.doi.org/10.3390/su11226292.

Full text
Abstract:
Building a common EU framework for sustainable finance undoubtedly implies the integration of sound and sustainable processes and skills across the whole structure and governance of financial institutions. Consequently, a new financial paradigm is going to be needed, which will require the strengthening of investor care and protection, so contributing to the restoration of trust in the financial sector. In particular, on 18 December 2018, the European Securities and Markets Authority (ESMA) launched two public consultations on draft technical advice for the integration of sustainability risks and factors into the Directive on Markets in Financial Instruments (MiFID), the Alternative Investment Fund Managers Directive (AIFMD), and the Undertakings for Collective Investment in Transferable Securities Directive (UCITS) regimes, with the aim to clarify the so-called fiduciary duties and to increase transparency in the financial services industry. However, the success of the EU initiatives on investor protection regulation may be seriously endangered by the existence of many challenges, weaknesses, and contradictions raised by economists and stakeholders in relation to the definition of sustainability, ESG data availability and reliability, the development of an EU taxonomy, conflicts of interest, product governance, and suitability assessment. This paper starts by briefly analyzing the recent developments of the regulation of sustainable finance at the global level, then offers a more detailed view on the establishment of a common regime on sustainable finance in the EU, with particular reference to the action plan ‘Financing Sustainable Growth’. Then, it examines the recent proposals for regulation on sustainable finance, specifically considering the barriers to the integration of sustainability risks and factors in the EU investor protection regulation—with particular reference to investment services—with respect to its four main dimensions: (1) disclosure of product information, (2) conduct of business (COB) rules, (3) product governance and intervention, and (4) financial education. The paper concludes that the EU reforming proposals, though admirable, risk oversimplifying a complex issue that cannot be easily solved without considering its practical implications on each category of financial operators in the performance of different financial services.
APA, Harvard, Vancouver, ISO, and other styles
15

Dinda Silviana Putri. "Regulation A+ Sebagai Alternatif Penghimpun Dana Untuk UMKM Dan Start-Up." JURNAL YUSTIKA: MEDIA HUKUM DAN KEADILAN 24, no. 01 (November 24, 2021): 37–48. http://dx.doi.org/10.24123/yustika.v24i01.4119.

Full text
Abstract:
Capital is a problem that is often faced by start-up companies and Micro, Small and Medium Enterprises (MSMEs). On the other hand, these activities are often the choice of Indonesia's lower and middle class as an effort to improve their economy. For this reason, the Government through the Financial Services Authority (OJK) provides steps to raise capital through a crowdfunding method using information technology (equity crowdfunding / ECF). ECF activities are a solution for start-ups and MSMEs to raise capital in ways that are almost similar to Initial Public Offering (IPO) activities by involving publishers, organizers, and investors. Unfortunately, even though it has been going on since 2018, business activities using the ECF as a real effort to provide additional capital have not been maximally implemented. This is because there are several records that can hinder the optimization of the ECF itself, such as the Investors criteria, shares Flexibility, and maximum securities ownership. This research is normative legal research using a conceptual approach, a statutory approach, and a comparative approach and the development of ECF regulations in Indonesia and reformation on investor limitation law in the ECF in Indonesia as research problems. The results of this study indicate that the application and regulation of the ECF in Indonesia still have various deficiencies. Therefore, a solution is needed by adopting several provisions in Regulation A + in America as an effort to overcome these deficiencies.
APA, Harvard, Vancouver, ISO, and other styles
16

Seroja, Triana Dewi, David Tan, Winda Fitri, and Shelvi Rusdiana. "Dual-Class Share Structure in the Indonesian Equity Market." Lentera Hukum 10, no. 3 (February 22, 2024): 433. http://dx.doi.org/10.19184/ejlh.v10i3.43733.

Full text
Abstract:
A lot of major equity markets abroad have allowed the listing of the Dual-Class Share Structure (DCSS) corporations. DCSS is an agreement in which two types of shares are issued by the very same firm, with one type of share conferring greater power compared to the other. The Indonesian Stock Exchange only allows for limited access for DCSS technology-related corporations to list on its Mainboard. To remain attractive as Southeast Asia's top financial centre, Indonesia needs to alter its securities regulations while making its listing market adaptable to meet the needs of various enterprises. This research aims to analyse and elaborate on permitting DCSS corporations to go public and devise suitable governance safeguards to guarantee the highest possible standards of corporate governance are upheld. This research explores the legal certainty and applicability of DCSS in the Indonesian equity market and abroad, using a qualitative approach and thematic analysis of secondary data. The major finding of this research is the acceptance of DCSS adds to issues with abuse of power by the controlling shareholders, which was outweighed by their cash flow rights. While those in favour of DCSS argue that the existing shareholders' main reason for choosing a DCSS arrangement is to preserve company control. Most major exchanges in the world have taken action to accommodate DCSS going public, like those in the USA, Hong Kong, Singapore, and China. Considering the magnitude of the Asian market, Indonesia can emulate the accomplishments of other exchanges too. A series of recommendations are provided to guarantee the highest standards of corporate governance can be upheld, such as: permitting DCSS for new entrants and innovative businesses, regulating the ownership of enhanced voting shares, and setting out sunset provisions for DCSS arrangement.
APA, Harvard, Vancouver, ISO, and other styles
17

Kaur, Amanpreet, and Balwinder Singh. "Edifying role of corporate reputation in new issue market: Indian evidence." Asia-Pacific Journal of Business Administration 11, no. 2 (July 16, 2019): 159–70. http://dx.doi.org/10.1108/apjba-06-2018-0098.

Full text
Abstract:
PurposeThe purpose of this paper is to examine the relationship between corporate reputation and initial public offering (IPO) underpricing for a sample of 269 IPOs hitting the Indian capital market for the first time during the period ranging from April 1, 2007 to November 8, 2016.Design/methodology/approachThe study is based on secondary data (of 269 Indian companies going public) obtained from websites of capital market, Chittorgarh and Securities and Exchange Board of India (from where prospectus of each company was downloaded individually to extract data on financial variables). The study devises the technique of multivariate regression analysis to arrive at the results.FindingsThe results of the study reveal that corporate reputation serves as a signal to naive investors that assures them of issuer company’s credibility, resulting in lower underpricing. In addition to it, the study also observes the level of gender diversity on Indian boards. It is disappointing to notice low level of female representation on Indian boards and the improvement if any made in the number of female directors on Indian boards is due to provisions of new companies’ act, 2013 that mandates at least one women director on the board of every listed company. Thus, females do not constitute a critical mass on Indian boards.Research limitations/implicationsThe current study scrutinizes the impact of corporate reputation on IPO underpricing only. Furthermore, the study analyzes the underpricing of only book built IPOs. Incorporating both book built and fixed price IPOs could have provided better insights into the issue.Practical implicationsThe study outlines significant implications for managers of issuer company to portray company’s own reputation as a signal instead of showcasing borrowed reputation of external agents at the crucial juncture of going public.Originality/valueMany signals portraying quality of the offering are sent by issuer company in public arena to make IPO launch a successful event. Among many such signals like underwriting reputation, auditor reputation, director’s and CEO’s reputation, the corporate audience has started giving more impetus to issuer company’s own reputation. Thus, financial academia witnessed a paradigm shift from external agents reputation to internal agent’s reputation and now the loci of interest has shifted to company’s own reputation. Giving emphasis to corporate reputation seems more relevant in emerging economies like India where naive investors rely on their own judgments while making investment decision who take clue from various signals to infer quality of the offer. It is momentous to observe whether reputation of the company acts as a conspicuous signal to decipher IPO quality. Furthermore, there hardly exists any empirical research directly examining the impact of corporate reputation on IPO underpricing in the Indian context. Hence, the present study is a modest attempt to fill this gap in literature.
APA, Harvard, Vancouver, ISO, and other styles
18

Hunton, James E., Arnold M. Wright, and Sally Wright. "Continuous Reporting and Continuous Assurance: Opportunities for Behavioral Accounting Research." Journal of Emerging Technologies in Accounting 1, no. 1 (January 1, 2004): 91–102. http://dx.doi.org/10.2308/jeta.2004.1.1.91.

Full text
Abstract:
The movement to more continuous reporting (CR) and continuous assurance (CA) of financial statements appears to be a matter of when and how such changes will take place, rather than if they will occur. Research evidence suggests that computing infrastructures and software applications have advanced to the point where it is now technically and economically feasible to begin preparing and disseminating financial statements on at least a monthly basis (Hunton, Wright, and Wright 2003), and someday it is likely that full or partial financial and nonfinancial disclosures will be processed and presented in real time. Additionally, information consumers are demanding, and the Securities and Exchange Commission (SEC), American Institute of Certified Public Accountants (AICPA), and International Accounting Standards Board (IASB) are contemplating reporting and assurance changes of this nature. Thus, whether “continuous” is defined in terms of monthly, daily, hourly, or real-time reporting, rapidly converging market factors indicate that in the foreseeable future firms will publish and auditors will assure financial information on a more frequent basis than the current quarterly interval. The major challenge going forward for behavioral researchers in accounting is to investigate how changes of this nature might affect the decision-making processes and consequential outcomes of various constituent groups, such as investors, preparers, and assurers. The combinations of affected parties, contexts, and tasks that could be examined are too numerous to explore in a single article. Accordingly, to keep the following discussion focused and manageable, the scope of this paper is aimed at understanding the potential impact of CR and CA on individual investors. Perhaps by identifying a number of the psychological issues and reviewing some of the studies in this area, accounting behavioral researchers will be motivated to investigate many of the issues and opportunities related to this new and exciting line of research.
APA, Harvard, Vancouver, ISO, and other styles
19

Belghazi, Soraya. "Preparing to comply with the CSD Regulation." Journal of Securities Operations & Custody, January 1, 2014. http://dx.doi.org/10.69554/vpia7555.

Full text
Abstract:
This paper looks at what is going to change with the soon-to-be-adopted European Regulation on Central Securities Depositories (CSDs), focusing on the adaptations that will be required of CSDs and market participants. Not only will CSDs face harmonised and sometimes stricter safety standards, but their clients also will be subject to new requirements, such as stringent penalties if they fail to deliver securities on time. Together with other public initiatives like TARGET2-securities, the CSD Regulation also will open the post-trade market to further competition, progressively replacing national specificities by common European standards.
APA, Harvard, Vancouver, ISO, and other styles
20

Elisabeth de Fontenay and Gabriel Rauterberg. "The New Public/Private Equilibrium and the Regulation of Public Companies." Columbia Business Law Review 2021, no. 3 (January 28, 2022). http://dx.doi.org/10.52214/cblr.v2021i3.9108.

Full text
Abstract:
This Symposium Article examines how the public/private divide works today and maps out some of the potential implications for major issues in securities law. Classic debates in securities law were often predicated on the idea that public companies are a coherent class of firms that differ markedly from private companies. For more than fifty years after the adoption of the federal securities laws, this view was justified. During that period, the vast majority of successful and growing private firms eventually accepted the regulatory obligations of being public in order to access a wider and deeper pool of capital, among other benefits. This was a descriptive reality, but it had important normative implications as well. An identifiable class of large, growing firms went public, and they generally went public for a reason they shared: raising capital. As a result, regulatory interventions imposed on the category of “public companies” had a coherent target. We argue that firms’ going public decisions are now shaped by a much larger and more varied set of factors. These factors are complex, cross-cutting, and impact firms considering going public in very heterogeneous ways. This complexity results from several developments and we emphasize two. First, it is a result of the fact that while the public/private divide was created by securities law, public and private markets now provide two widely different ecologies for firms, which profoundly shape firms’ governance as well as the issuance and trading of their shares. Second, long-term advances in the ease of capital raising in private markets have made it possible for firms to remain private indefinitely and have diminished or eliminated the capital-raising advantages of public markets. The result of this latter change has been rightly called a “new equilibrium.” In that equilibrium, fewer and older firms go public, while other successful firms remain private indefinitely. In this equilibrium, capital raising is no longer the primary reason firms go public. Rather, we argue, firms go public due to one or more of the many other features of the public market’s ecology. The normative implication of this new equilibrium is to reduce the coherency of the regulation of public companies. The benefits and costs of being public (or private) apply unevenly to firms eligible to go public. Instead, to a greater degree firms now face idiosyncratic, company-specific tradeoffs between being public or private, and they often go public for reasons unrelated to the original design of the public/private divide. Regulations imposed on public firms are likely to not only be increasingly under- and over-inclusive, but also to apply to a class of companies whose coherency as an economic phenomenon may be increasingly suspect.
APA, Harvard, Vancouver, ISO, and other styles
21

Hardana, Ali, Mohammad Zahrudin Sahri, and Ahmad Ramadhan. "Comparative Analysis Of The Profitability Of PT. Bank Panin Syariah Securities Before And After Going Public." Journal of Islamic Financial Technology 1, no. 2 (December 8, 2022). http://dx.doi.org/10.24952/jiftech.v1i2.6683.

Full text
Abstract:
The approach taken with the theories put forward is related to the profitability ratios including Return On Assets (ROA), which is used as an indicator to measure a company's ability to carry out company operations. While the profitability ratio Return On Equity (ROE) that can be used as an indicator to measure the ability of the company's equity in obtaining net income available to shareholders of the company. This research is a quantitative research using comparative analysis. the type of data used is secondary data in the form of company financial statements obtained from the company's official website, namely www.anualreport.co.id in 2010-2019. The research sampling method used saturated sampling.The results of this study indicate that there is no significant difference between the profitability ratios before and after going public at PT. Bank Panin Syariah Sekuritas in this case is seen from the indicators of Return On Assets (ROA) and Return On Equity (ROE). Keywords: Profitability Ratio, Performance, go public.
APA, Harvard, Vancouver, ISO, and other styles
22

Sinha, Abhishek, and D. Satish. "Burger King India IPO: Investment Dilemma." Asian Journal of Management Cases, February 1, 2023, 097282012211441. http://dx.doi.org/10.1177/09728201221144109.

Full text
Abstract:
Burger King India (BKI), a master franchisee of the leading global quick service restaurant (QSR) chain Burger King US, filed its red herring prospectus (RHP) on 5 November 2019, with the Securities Exchange Board of India (SEBI) expressing its interest in going public. BKI was a major franchise of a multinational QSR, and its going public in India showed the confidence that large global QSRs had in the Indian markets. Despite the volatility caused by the global COVID-19 pandemic, BKI launched its IPO on 2 December 2020. The case study captures the complexity and challenges faced by the growing Indian QSR market and its diverse players and provides information for industry analysis. The case also provides strategic and financial information along with initial public offer (IPO) information to assess BKI’s performance and debate whether the price set is appropriate given that BKI was a loss-making firm and the uncertainty surrounding the pandemic continued.
APA, Harvard, Vancouver, ISO, and other styles
23

He, Xianjie, Jeffrey Pittman, Sarah E. Stein, and Huifang Yin. "Does Investment Bankers’ Prior Experience in Public Accounting Reduce Earnings Management in IPO Firms?" Auditing: A Journal of Practice & Theory, September 1, 2023, 1–27. http://dx.doi.org/10.2308/ajpt-2021-005.

Full text
Abstract:
SUMMARY We examine whether firms undertaking an initial public offering (IPO) exhibit less earnings management when individual investment bankers have prior experience in public accounting. Although auditors are primarily responsible for providing external monitoring of the financial reporting process, individual bankers also have strong incentives to improve accounting quality in firms going public. We predict a negative relation between public accounting experience and IPO firms’ earnings management because working in public practice fosters individual bankers’ accounting expertise and conservative personalities. In exploiting unique disclosures of investment bankers’ identities and characteristics in China, our analysis indicates that bankers with early-career public accounting experience constrain IPO firms’ accrual-based earnings management. Consistent with expectations, we find that this evidence is more pronounced if the accounting firm that employed the future investment banker is larger, is permitted to audit listed companies, and was previously subject to a regulatory sanction. Data Availability: Most data are publicly available from the sources identified in the paper. Hand-collected data from the Securities Association of China (SAC) can be made available upon request. JEL Classifications: G24; M41; M42.
APA, Harvard, Vancouver, ISO, and other styles
24

Balaji, Ch, and G. Praveen Kumar. "A Study on Volatility of Selected Public Sector Banks with BSE Bank Index." MUDRA : Journal of Finance and Accounting 5, no. 2 (December 22, 2018). http://dx.doi.org/10.17492/mudra.v5i2.14332.

Full text
Abstract:
Risk investigation can be characterized in a wide range of ways, and a significant part of the definition relies upon how chance examination identifies with different ideas. The arrival comprises of the wage and the capital increases relative on a venture, and it is typically cited as a rate. A value speculation for the most part alludes to the purchasing and holding of offers of stock on a securities exchange by people and firms fully expecting wage from profits and capital increases. The extent of the investigation is to look at the connection amongst hazard and returns in value shares, by taking previous five years (quarterly) information of State Bank of India and Bank of Baroda. Time of the examination the investigation for the monetary years from 2012-13 to 2017-18.It is inferred that regarding hazard the two banks State Bank of India and Bank of Baroda are performing great. Be that as it may, when going to the profits the State Bank of India was performing admirably in contrast with Bank of Baroda.
APA, Harvard, Vancouver, ISO, and other styles
25

Bellovary, Jodi L., Don E. Giacomino, and Michael D. Akers. "A Review Of Going Concern Prediction Studies: 1976 To Present." Journal of Business & Economics Research (JBER) 5, no. 5 (February 7, 2011). http://dx.doi.org/10.19030/jber.v5i5.2541.

Full text
Abstract:
<p class="MsoNormal" style="text-justify: inter-ideograph; text-align: justify; margin: 0in 0.5in 0pt;"><span style="font-size: 10pt; mso-bidi-font-style: italic; mso-bidi-font-size: 12.0pt;"><span style="font-family: Times New Roman;">In 1962, the Securities and Exchange Commission (SEC) was the first to address going concern issues with Accounting Series Release (ASR) No. 90.&nbsp;&nbsp; Then, in 1963, the AICPA issued Statement on Auditing Procedures (SAP) No. 33, in response to ASR No. 90.&nbsp; Both ASR No. 90 and SAP No. 33 addressed qualifications for issues that were unresolved and the results of which were indeterminable at the statement date. Soon after the issuance of Statement on Auditing Standards (SAS) No. 2 in 1974, researchers began to conduct studies on going concern issues.&nbsp; This paper provides a comprehensive review of the literature on going concern studies and updates studies by Mutchler (1983) and Asare (1990) which provide detailed reviews of the evolution of the going concern report and requirements of the standards related to auditors' assessment of going concern.&nbsp; Since SAS No. 2, the profession has not provided additional guidance on going concern.&nbsp; Even the Sarbanes-Oxley Act of 2002 (SOX), makes no modifications to the requirements for considering going concern and the Public Company Accounting Oversight Board has not issued guidance addressing going concern. Starting with the first going concern prediction study [McKee, 1976], this paper identifies 27 models developed for predicting the going concern opinion and identifies the primary methods used for model development; multivariate discriminant analysis (MDA), logit analysis, probit analysis, and neural networks are.&nbsp; This paper also identifies; the most popular type of focused model and identifies three non-U.S. firm models, the number of factors considered in any one study,&nbsp; and the predictive abilities of the models. The paper also provides an annotated bibliography for the 27 models.</span></span></p>
APA, Harvard, Vancouver, ISO, and other styles
26

Palkar, Darshana. "Corporate fraud and industry peer effects on IPO underpricing." International Journal of Managerial Finance, May 31, 2023. http://dx.doi.org/10.1108/ijmf-10-2022-0430.

Full text
Abstract:
PurposeExisting studies suggest that negative impacts emanating from corporate fraud revelations may diffuse to other firms through lower trust and lower market participation. Extending this literature stream, the authors examine whether corporate fraud revelations are associated with higher costs of raising capital through initial public offerings (IPOs) for industry peers.Design/methodology/approachThe authors employ several analysis techniques including univariate analysis, multivariate regressions, propensity score matching methodology, and probit estimation. The sample consists of 3,015 US IPO firms for the 1996–2021 period.FindingsBy adopting US private securities class action lawsuits as a proxy for the presence of corporate fraud, the authors find that fraud revelations are associated with higher IPO underpricing, higher post-IPO stock return volatility and increased likelihood of withdrawal from the offering for industry peers. The findings are robust to alternative industry definitions and litigation proxies and to the inclusion of a battery of controls, including industry, state and year fixed effects.Originality/valueThis study presents private firms with an additional industry litigation factor to consider when assessing the marginal costs of going public.
APA, Harvard, Vancouver, ISO, and other styles
27

Strange, Martha, John R. Ezzell, and Aref N. Dajani. "Initial Public Offerings: The Case Of Health Maintenance Organizations (HMOs)." International Business & Economics Research Journal (IBER) 1, no. 6 (March 2, 2011). http://dx.doi.org/10.19030/iber.v1i6.3949.

Full text
Abstract:
Objective: To determine whether the returns of initial public offerings (IPOs) of HMOs in the days following issue are similar to the return behavior of IPOs in previous studies.Data Source: The Center for Research in Security Prices (CRSP) tapes compiled by the Graduate School of Business at the University of Chicago provides daily stock prices, holding period returns, and other data pertinent to research in traded securities.Study Design: The hypothesis to be tested is whether the mean excess return surrounding the offer date is equal to zero. To adjust the initial returns of the IPOs for overall market movements, Standard & Poors Composite Index (S&P 500) was selected as the proxy for the market in general. We compute the long-run performance for the HMOs and compare that return to the S&P 500 and the CRSP AMEX/NYSE equally-weighted and value-weighted indices.Data Collection/Extraction Method: We matched for-profit HMOs listed in the National Directory of Managed & Integrated Care Organizations to the commitment offerings reported by Securities Data Corporation to the same firms on the daily CRSP tapes. This left 49 firms that went public between 1971 through 1997. The Wharton Research and Data Services External (WRDSX) was used for data extraction and SAS was used for statistical analysis.Principal Findings: IPOs of HMOs are underpriced and demonstrate abnormal returns. The average initial return on these IPOs is less than that of the average in the United States. On a long-run performance basis, they performed better than the broad market indices.Conclusions: Returns follow a similar pattern as do IPOs in general except for the long-run performance. This needs further research as well as a comparison of performance before and after going public in cases where accounting data is available.
APA, Harvard, Vancouver, ISO, and other styles
28

Syahdinda, Nabilla, and Arman Nefi. "The Role of Capital Market Notary in Corporate Backdoor Listing Actions in Indonesia." Pena Justisia: Media Komunikasi dan Kajian Hukum 22, no. 2 (June 30, 2023). http://dx.doi.org/10.31941/pj.v22i2.2865.

Full text
Abstract:
<p><em>The Rapid of economic development certainly affects the business world seen from the efforts of a company to expand its business, where business expansion certainly requires large funding. One of the ways to obtain funding is through activities in the capital market. A Limited Liability Company will trade securities but previously the company must have been listed on the Stock Exchange. The mechanism of going public by way of an Initial Public Offering (IPO) has conditions that are difficult to fulfill for some companies, so some companies take an alternative by doing Backdoor Listings, in order to be listed and get benefits like a public company. The author uses a normative juridical approach by examining literature or secondary data related to tertiary legal principles and norms and materials, which will be analyzed descriptively. The author sees that, there is no specific regulation related to backdoor listing corporate actions in the implementation of capital market activities in Indonesia and likewise with the absence of regulations that can be used as guidelines by notaries in the capital market sector in supporting backdoor listing corporate actions.</em></p><p><strong>`</strong></p><p><strong><em>Keywords: Backdoor Listing, Notary, IPO, Go Public, the </em></strong><strong><em>Financial Services Authority</em></strong><strong><em></em></strong></p>
APA, Harvard, Vancouver, ISO, and other styles
29

Subedi, Meena. "Principles based accounting standards, audit fees and going concern: evidence using advanced machine learning." International Journal of Accounting & Information Management, December 21, 2023. http://dx.doi.org/10.1108/ijaim-02-2023-0026.

Full text
Abstract:
Purpose The current study uses an advanced machine learning method and aims to investigate whether auditors perceive financial statements that are principles-based as less risky. More specifically, this study aims to explore the association between principles-based accounting standards and audit pricing and between principles-based accounting standards and the likelihood of receiving a going concern opinion. Design/methodology/approach The study uses an advanced machine-learning method to understand the role of principles-based accounting standards in predicting audit fees and going concern opinion. The study also uses multiple regression models defining audit fees and the probability of receiving going concern opinion. The analyses are complemented by additional tests such as economic significance, firm fixed effects, propensity score matching, entropy balancing, change analysis, yearly regression results and controlling for managerial risk-taking incentives and governance variables. Findings The paper provides empirical evidence that auditors charge less audit fees to clients whose financial statements are more principles-based. The finding suggests that auditors perceive financial statements that are principles-based less risky. The study also provides evidence that the probability of receiving a going-concern opinion reduces as firms rely more on principles-based standards. The finding further suggests that auditors discount the financial numbers supplied by the managers using rules-based standards. The study also reveals that the degree of reliance by a US firm on principles-based accounting standards has a negative impact on accounting conservatism, the risk of financial statement misstatement, accruals and the difficulty in predicting future earnings. This suggests potential mechanisms through which principles-based accounting standards influence auditors’ risk assessments. Research limitations/implications The authors recognize the limitation of this study regarding the sample period. Prior studies compare rules vs principles-based standards by focusing on the differences between US generally accepted accounting principles (GAAP) and international financial reporting standards (IFRS) or pre- and post-IFRS adoption, which raises questions about differences in cross-country settings and institutional environment and other confounding factors such as transition costs. This study addresses these issues by comparing rules vs principles-based standards within the US GAAP setting. However, this limits the sample period to the year 2006 because the measure of the relative extent to which a US firm is reliant upon principles-based standards is available until 2006. Practical implications The study has major public policy suggestions as it responds to the call by Jay Clayton and Mary Jo White, the former Chairs of the US Securities and Exchange Commission (SEC), to pursue high-quality, globally accepted accounting standards to ensure that investors continue to receive clear and reliable financial information globally. The study also recognizes the notable public policy implications, particularly in light of the current Chair of the International Accounting Standards Board (IASB) Andreas Barckow’s recent public statement, which emphasizes the importance of principles-based standards and their ability to address sustainability concerns, including emerging risks such as climate change. Originality/value The study has major public policy suggestions because it demonstrates the value of principles-based standards. The study responds to the call by Jay Clayton and Mary Jo White, the former Chairs of the US SEC, to pursue high-quality, globally accepted accounting standards to ensure that investors continue to receive clear and reliable financial information as business transactions and investor needs continue to evolve globally. The study also recognizes the notable public policy implications, particularly in light of the current Chair of the IASB Andreas Barckow’s recent public statement, which emphasizes the importance of principles-based standards and their ability to address sustainability concerns, including emerging risks like climate change. The study fills the gap in the literature that auditors perceive principles-based financial statements as less risky and further expands the literature by providing empirical evidence that the likelihood of receiving a going concern opinion is increasing in the degree of rules-based standards.
APA, Harvard, Vancouver, ISO, and other styles
30

Stowell, David P., and Evan Meagher. "Investment Banking in 2008 (B): A Brave New World." Kellogg School of Management Cases, January 20, 2017, 1–17. http://dx.doi.org/10.1108/case.kellogg.2016.000161.

Full text
Abstract:
In recent years Lehman Brothers, one of the five largest investment banks in the United States, had grown increasingly reliant on its fixed income trading and underwriting division, which served as the primary engine for its strong profit growth. The bank had also significantly increased its leverage over the same timeframe, going from a debt-to-equity ratio of 23.7x in 2003 to 35.2x in 2007. As leverage increased, the ongoing erosion of the mortgage-backed industry began to impact Lehman significantly and its stock price plummeted. Unfortunately, public outcry over taxpayer assumption of $29 billion in potential Bear losses made repeating such a move politically untenable. The surreal scene of potential buyers traipsing into an investment bank's headquarters over the weekend to consider various merger or spin-out scenarios repeated itself once again. This time, the Fed refused to back the failing bank's liabilities, attempting instead to play last-minute suitors Bank of America, HSBC, Nomura Securities, and Barclay's off each other, jawboning them by arguing that failing to step up to save Lehman would cause devastating counterparty runs on their own capital positions. The Fed's desperate attempts to arrange its second rescue of a major U.S. investment bank in six months failed when it refused to backstop losses from Lehman's toxic mortgage holdings. Complicating matters was Lehman's reliance on short-term repo loans to finance its balance sheet. Unfortunately, such loans required constant renewal by counterparties, who had grown increasingly nervous that Lehman would lose the ability to make good on its trades. With this sentiment swirling around Wall Street, Lehman was forced to announce the largest Chapter 11 filing in U.S. history, listing assets of $639 billion and liabilities of $768 billion. The second domino had fallen. It would not be the last.This case covers the period from the sale of Bear Stearns to JP Morgan to the conversion into bank holding companies by Goldman Sachs and Morgan Stanley, including the Lehman Brothers bankruptcy and the sale of Merrill Lynch to Bank of America. The case explains the new global paradigm for the investment banking industry, including increased regulation, fewer competitors, lower leverage, reduced proprietary trading, and-potentially-reduced profits.
APA, Harvard, Vancouver, ISO, and other styles
31

Lukacovic, Marta N. "“Wars” on COVID-19 in Slovakia, Russia, and the United States: Securitized Framing and Reframing of Political and Media Communication Around the Pandemic." Frontiers in Communication 5 (December 23, 2020). http://dx.doi.org/10.3389/fcomm.2020.583406.

Full text
Abstract:
This study analyzes securitized discourses and counter narratives that surround the COVID-19 pandemic. Controversial cases of security related political communication, salient media enunciations, and social media reframing are explored through the theoretical lenses of securitization and cascading activation of framing in the contexts of Slovakia, Russia, and the United States. The first research question explores whether and how the frame element of moral evaluation factors into the conversations on the securitization of the pandemic. The analysis tracks the framing process through elite, media, and public levels of communication. The second research question focused on fairly controversial actors— “rogue actors” —such as individuals linked to far-leaning political factions or militias. The proliferation of digital media provides various actors with opportunities to join publicly visible conversations. The analysis demonstrates that the widely differing national contexts offer different trends and degrees in securitization of the pandemic during spring and summer of 2020. The studied rogue actors usually have something to say about the pandemic, and frequently make some reframing attempts based on idiosyncratic evaluations of how normatively appropriate is their government's “war” on COVID-19. In Slovakia, the rogue elite actors at first failed to have an impact but eventually managed to partially contest the dominant frame. Powerful Russian media influencers enjoy some conspiracy theories but prudently avoid direct challenges to the government's frame, and so far only marginal rogue actors openly advance dissenting frames. The polarized political and media environment in the US has shown to create a particularly fertile ground for rogue grassroots movements that utilize online platforms and social media, at times going as far as encouragement of violent acts to oppose the government and its pandemic response policy.
APA, Harvard, Vancouver, ISO, and other styles
32

Quinan, C. L., and Hannah Pezzack. "A Biometric Logic of Revelation: Zach Blas’s SANCTUM (2018)." M/C Journal 23, no. 4 (August 12, 2020). http://dx.doi.org/10.5204/mcj.1664.

Full text
Abstract:
Ubiquitous in airports, border checkpoints, and other securitised spaces throughout the world, full-body imaging scanners claim to read bodies in order to identify if they pose security threats. Millimetre-wave body imaging machines—the most common type of body scanner—display to the operating security agent a screen with a generic body outline. If an anomaly is found or if an individual does not align with the machine’s understanding of an “average” body, a small box is highlighted and placed around the “problem” area, prompting further inspection in the form of pat-downs or questioning. In this complex security regime governed by such biometric, body-based technologies, it could be argued that nonalignment with bodily normativity as well as an attendant failure to reveal oneself—to become “transparent” (Hall 295)—marks a body as dangerous. As these algorithmic technologies become more pervasive, so too does the imperative to critically examine their purported neutrality and operative logic of revelation and readability.Biometric technologies are marketed as excavators of truth, with their optic potency claiming to demask masquerading bodies. Failure and bias are, however, an inescapable aspect of such technologies that work with narrow parameters of human morphology. Indeed, surveillance technologies have been taken to task for their inherent racial and gender biases (Browne; Pugliese). Facial recognition has, for example, been critiqued for its inability to read darker skin tones (Buolamwini and Gebru), while body scanners have been shown to target transgender bodies (Keyes; Magnet and Rodgers; Quinan). Critical security studies scholar Shoshana Magnet argues that error is endemic to the technological functioning of biometrics, particularly since they operate according to the faulty notion that bodies are “stable” and unchanging repositories of information that can be reified into code (Magnet 2).Although body scanners are presented as being able to reliably expose concealed weapons, they are riddled with incompetencies that misidentify and over-select certain demographics as suspect. Full-body scanners have, for example, caused considerable difficulties for transgender travellers, breast cancer patients, and people who use prosthetics, such as artificial limbs, colonoscopy bags, binders, or prosthetic genitalia (Clarkson; Quinan; Spalding). While it is not in the scope of this article to detail the workings of body imaging technologies and their inconsistencies, a growing body of scholarship has substantiated the claim that these machines unfairly impact those identifying as transgender and non-binary (see, e.g., Beauchamp; Currah and Mulqueen; Magnet and Rogers; Sjoberg). Moreover, they are constructed according to a logic of binary gender: before each person enters the scanner, transportation security officers must make a quick assessment of their gender/sex by pressing either a blue (corresponding to “male”) or pink (corresponding to “female”) button. In this sense, biometric, computerised security systems control and monitor the boundaries between male and female.The ability to “reveal” oneself is henceforth predicated on having a body free of “abnormalities” and fitting neatly into one of the two sex categorisations that the machine demands. Transgender and gender-nonconforming individuals, particularly those who do not have a binary gender presentation or whose presentation does not correspond to the sex marker in their documentation, also face difficulties if the machine flags anomalies (Quinan and Bresser). Drawing on a Foucauldian analysis of power as productive, Toby Beauchamp similarly illustrates how surveillance technologies not only identify but also create and reshape the figure of the dangerous subject in relation to normative configurations of gender, race, and able-bodiedness. By mobilizing narratives of concealment and disguise, heightened security measures frame gender nonconformity as dangerous (Beauchamp, Going Stealth). Although national and supranational authorities market biometric scanning technologies as scientifically neutral and exact methods of identification and verification and as an infallible solution to security risks, such tools of surveillance are clearly shaped by preconceptions and prejudgements about race, gender, and bodily normativity. Not only are they encoded with “prototypical whiteness” (Browne) but they are also built on “grossly stereotypical” configurations of gender (Clarkson).Amongst this increasingly securitised landscape, creative forms of artistic resistance can offer up a means of subverting discriminatory policing and surveillance practices by posing alternate visualisations that reveal and challenge their supposed objectivity. In his 2018 audio-video artwork installation entitled SANCTUM, UK-based American artist Zach Blas delves into how biometric technologies, like those described above, both reveal and (re)shape ontology by utilising the affectual resonance of sexual submission. Evoking the contradictory notions of oppression and pleasure, Blas describes SANCTUM as “a mystical environment that perverts sex dungeons with the apparatuses and procedures of airport body scans, biometric analysis, and predictive policing” (see full description at https://zachblas.info/works/sanctum/).Depicting generic mannequins that stand in for the digitalised rendering of the human forms that pass through body scanners, the installation transports the scanners out of the airport and into a queer environment that collapses sex, security, and weaponry; an environment that is “at once a prison-house of algorithmic capture, a sex dungeon with no genitals, a weapons factory, and a temple to security.” This artistic reframing gestures towards full-body scanning technology’s germination in the military, prisons, and other disciplinary systems, highlighting how its development and use has originated from punitive—rather than protective—contexts.In what follows, we adopt a methodological approach that applies visual analysis and close reading to scrutinise a selection of scenes from SANCTUM that underscore the sadomasochistic power inherent in surveillance technologies. Analysing visual and aural elements of the artistic intervention allows us to complicate the relationship between transparency and recognition and to problematise the dynamic of mandatory complicity and revelation that body scanners warrant. In contrast to a discourse of visibility that characterises algorithmically driven surveillance technology, Blas suggests opacity as a resistance strategy to biometrics' standardisation of identity. Taking an approach informed by critical security studies and queer theory, we also argue that SANCTUM highlights the violence inherent to the practice of reducing the body to a flat, inert surface that purports to align with some sort of “core” identity, a notion that contradicts feminist and queer approaches to identity and corporeality as fluid and changing. In close reading this artistic installation alongside emerging scholarship on the discriminatory effects of biometric technology, this article aims to highlight the potential of art to queer the supposed objectivity and neutrality of biometric surveillance and to critically challenge normative logics of revelation and readability.Corporeal Fetishism and Body HorrorThroughout both his artistic practice and scholarly work, Blas has been critical of the above narrative of biometrics as objective extractors of information. Rather than looking to dominant forms of representation as a means for recognition and social change, Blas’s work asks that we strive for creative techniques that precisely queer biometric and legal systems in order to make oneself unaccounted for. For him, “transparency, visibility, and representation to the state should be used tactically, they are never the end goal for a transformative politics but are, ultimately, a trap” (Blas and Gaboury 158). While we would simultaneously argue that invisibility is itself a privilege that is unevenly distributed, his creative work attempts to refuse a politics of visibility and to embrace an “informatic opacity” that is attuned to differences in bodies and identities (Blas).In particular, Blas’s artistic interventions titled Facial Weaponization Suite (2011-14) and Face Cages (2013-16) protest against biometric recognition and the inequalities that these technologies propagate by making masks and wearable metal objects that cannot be detected as human faces. This artistic-activist project contests biometric facial recognition and their attendant inequalities by, as detailed on the artist’s website,making ‘collective masks’ in workshops that are modelled from the aggregated facial data of participants, resulting in amorphous masks that cannot be detected as human faces by biometric facial recognition technologies. The masks are used for public interventions and performances.One mask explores blackness and the racist implications that undergird biometric technologies’ inability to detect dark skin. Meanwhile another mask, which he calls the “Fag Face Mask”, points to the heteronormative underpinnings of facial recognition. Created from the aggregated facial data of queer men, this amorphous pink mask implicitly references—and contests—scientific studies that have attempted to link the identification of sexual orientation through rapid facial recognition techniques.Building on this body of creative work that has advocated for opacity as a tool of social and political transformation, SANCTUM resists the revelatory impulses of biometric technology by turning to the use and abuse of full-body imaging. The installation opens with a shot of a large, dark industrial space. At the far end of a red, spotlighted corridor, a black mask flickers on a screen. A shimmering, oscillating sound reverberates—the opening bars of a techno track—that breaks down in rhythm while the mask evaporates into a cloud of smoke. The camera swivels, and a white figure—the generic mannequin of the body scanner screen—is pummelled by invisible forces as if in a wind tunnel. These ghostly silhouettes appear and reappear in different positions, with some being whipped and others stretched and penetrated by a steel anal hook. Rather than conjuring a traditional horror trope of the body’s terrifying, bloody interior, SANCTUM evokes a new kind of feared and fetishized trope that is endemic to the current era of surveillance capitalism: the abstracted body, standardised and datafied, created through the supposedly objective and efficient gaze of AI-driven machinery.Resting on the floor in front of the ominous animated mask are neon fragments arranged in an occultist formation—hands or half a face. By breaking the body down into component parts— “from retina to fingerprints”—biometric technologies “purport to make individual bodies endlessly replicable, segmentable and transmissible in the transnational spaces of global capital” (Magnet 8). The notion that bodies can be seamlessly turned into blueprints extracted from biological and cultural contexts has been described by Donna Haraway as “corporeal fetishism” (Haraway, Modest). In the context of SANCTUM, Blas illustrates the dangers of mistaking a model for a “concrete entity” (Haraway, “Situated” 147). Indeed, the digital cartography of the generic mannequin becomes no longer a mode of representation but instead a technoscientific truth.Several scenes in SANCTUM also illustrate a process whereby substances are extracted from the mannequins and used as tools to enact violence. In one such instance, a silver webbing is generated over a kneeling figure. Upon closer inspection, this geometric structure, which is reminiscent of Blas’s earlier Face Cages project, is a replication of the triangulated patterns produced by facial recognition software in its mapping of distance between eyes, nose, and mouth. In the next scene, this “map” breaks apart into singular shapes that float and transform into a metallic whip, before eventually reconstituting themselves as a penetrative douche hose that causes the mannequin to spasm and vomit a pixelated liquid. Its secretions levitate and become the webbing, and then the sequence begins anew.In another scene, a mannequin is held upside-down and force-fed a bubbling liquid that is being pumped through tubes from its arms, legs, and stomach. These depictions visualise Magnet’s argument that biometric renderings of bodies are understood not to be “tropic” or “historically specific” but are instead presented as “plumbing individual depths in order to extract core identity” (5). In this sense, this visual representation calls to mind biometrics’ reification of body and identity, obfuscating what Haraway would describe as the “situatedness of knowledge”. Blas’s work, however, forces a critique of these very systems, as the materials extracted from the bodies of the mannequins in SANCTUM allude to how biometric cartographies drawn from travellers are utilised to justify detainment. These security technologies employ what Magnet has referred to as “surveillant scopophilia,” that is, new ways and forms of looking at the human body “disassembled into component parts while simultaneously working to assuage individual anxieties about safety and security through the promise of surveillance” (17). The transparent body—the body that can submit and reveal itself—is ironically represented by the distinctly genderless translucent mannequins. Although the generic mannequins are seemingly blank slates, the installation simultaneously forces a conversation about the ways in which biometrics draw upon and perpetuate assumptions about gender, race, and sexuality.Biometric SubjugationOn her 2016 critically acclaimed album HOPELESSNESS, openly transgender singer, composer, and visual artist Anohni performs a deviant subjectivity that highlights the above dynamics that mark the contemporary surveillance discourse. To an imagined “daddy” technocrat, she sings:Watch me… I know you love me'Cause you're always watching me'Case I'm involved in evil'Case I'm involved in terrorism'Case I'm involved in child molestersEvoking a queer sexual frisson, Anohni describes how, as a trans woman, she is hyper-visible to state institutions. She narrates a voyeuristic relation where trans bodies are policed as threats to public safety rather than protected from systemic discrimination. Through the seemingly benevolent “daddy” character and the play on ‘cause (i.e., because) and ‘case (i.e., in case), she highlights how gender-nonconforming individuals are predictively surveilled and assumed to already be guilty. Reflecting on daddy-boy sexual paradigms, Jack Halberstam reads the “sideways” relations of queer practices as an enactment of “rupture as substitution” to create a new project that “holds on to vestiges of the old but distorts” (226). Upending power and control, queer art has the capacity to both reveal and undermine hegemonic structures while simultaneously allowing for the distortion of the old to create something new.Employing the sublimatory relations of bondage, discipline, sadism, and masochism (BDSM), Blas’s queer installation similarly creates a sideways representation that re-orientates the logic of the biometric scanners, thereby unveiling the always already sexualised relations of scrutiny and interrogation as well as the submissive complicity they demand. Replacing the airport environment with a dark and foreboding mise-en-scène allows Blas to focus on capture rather than mobility, highlighting the ways in which border checkpoints (including those instantiated by the airport) encourage free travel for some while foreclosing movement for others. Building on Sara Ahmed’s “phenomenology of being stopped”, Magnet considers what happens when we turn our gaze to those “who fail to pass the checkpoint” (107). In SANCTUM, the same actions are played out again and again on spectral beings who are trapped in various states: they shudder in cages, are chained to the floor, or are projected against the parameters of mounted screens. One ghostly figure, for instance, lies pinned down by metallic grappling hooks, arms raised above the head in a recognisable stance of surrender, conjuring up the now-familiar image of a traveller standing in the cylindrical scanner machine, waiting to be screened. In portraying this extended moment of immobility, Blas lays bare the deep contradictions in the rhetoric of “freedom of movement” that underlies such spaces.On a global level, media reporting, scientific studies, and policy documents proclaim that biometrics are essential to ensuring personal safety and national security. Within the public imagination, these technologies become seductive because of their marked ability to identify terrorist attackers—to reveal threatening bodies—thereby appealing to the anxious citizen’s fear of the disguised suicide bomber. Yet for marginalised identities prefigured as criminal or deceptive—including transgender and black and brown bodies—the inability to perform such acts of revelation via submission to screening can result in humiliation and further discrimination, public shaming, and even tortuous inquiry – acts that are played out in SANCTUM.Masked GenitalsFeminist surveillance studies scholar Rachel Hall has referred to the impetus for revelation in the post-9/11 era as a desire for a universal “aesthetics of transparency” in which the world and the body is turned inside-out so that there are no longer “secrets or interiors … in which terrorists or terrorist threats might find refuge” (127). Hall takes up the case study of Umar Farouk Abdulmutallab (infamously known as “the Underwear Bomber”) who attempted to detonate plastic explosives hidden in his underwear while onboard a flight from Amsterdam to Detroit on 25 December 2009. Hall argues that this event signified a coalescence of fears surrounding bodies of colour, genitalia, and terrorism. News reports following the incident stated that Abdulmutallab tucked his penis to make room for the explosive, thereby “queer[ing] the aspiring terrorist by indirectly referencing his willingness … to make room for a substitute phallus” (Hall 289). Overtly manifested in the Underwear Bomber incident is also a desire to voyeuristically expose a hidden, threatening interiority, which is inherently implicated with anxieties surrounding gender deviance. Beauchamp elaborates on how gender deviance and transgression have coalesced with terrorism, which was exemplified in the wake of the 9/11 attacks when the United States Department of Homeland Security issued a memo that male terrorists “may dress as females in order to discourage scrutiny” (“Artful” 359). Although this advisory did not explicitly reference transgender populations, it linked “deviant” gender presentation—to which we could also add Abdulmutallab’s tucking of his penis—with threats to national security (Beauchamp, Going Stealth). This also calls to mind a broader discussion of the ways in which genitalia feature in the screening process. Prior to the introduction of millimetre-wave body scanning technology, the most common form of scanner used was the backscatter imaging machine, which displayed “naked” body images of each passenger to the security agent. Due to privacy concerns, these machines were replaced by the scanners currently in place which use a generic outline of a passenger (exemplified in SANCTUM) to detect possible threats.It is here worth returning to Blas’s installation, as it also implicitly critiques the security protocols that attempt to reveal genitalia as both threatening and as evidence of an inner truth about a body. At one moment in the installation a bayonet-like object pierces the blank crotch of the mannequin, shattering it into holographic fragments. The apparent genderlessness of the mannequins is contrasted with these graphic sexual acts. The penetrating metallic instrument that breaks into the loin of the mannequin, combined with the camera shot that slowly zooms in on this action, draws attention to a surveillant fascination with genitalia and revelation. As Nicholas L. Clarkson documents in his analysis of airport security protocols governing prostheses, including limbs and packies (silicone penis prostheses), genitals are a central component of the screening process. While it is stipulated that physical searches should not require travellers to remove items of clothing, such as underwear, or to expose their genitals to staff for inspection, prosthetics are routinely screened and examined. This practice can create tensions for trans or disabled passengers with prosthetics in so-called “sensitive” areas, particularly as guidelines for security measures are often implemented by airport staff who are not properly trained in transgender-sensitive protocols.ConclusionAccording to media technologies scholar Jeremy Packer, “rather than being treated as one to be protected from an exterior force and one’s self, the citizen is now treated as an always potential threat, a becoming bomb” (382). Although this technological policing impacts all who are subjected to security regimes (which is to say, everyone), this amalgamation of body and bomb has exacerbated the ways in which bodies socially coded as threatening or deceptive are targeted by security and surveillance regimes. Nonetheless, others have argued that the use of invasive forms of surveillance can be justified by the state as an exchange: that citizens should willingly give up their right to privacy in exchange for safety (Monahan 1). Rather than subscribing to this paradigm, Blas’ SANCTUM critiques the violence of mandatory complicity in this “trade-off” narrative. Because their operationalisation rests on normative notions of embodiment that are governed by preconceptions around gender, race, sexuality and ability, surveillance systems demand that bodies become transparent. This disproportionally affects those whose bodies do not match norms, with trans and queer bodies often becoming unreadable (Kafer and Grinberg). The shadowy realm of SANCTUM illustrates this tension between biometric revelation and resistance, but also suggests that opacity may be a tool of transformation in the face of such discriminatory violations that are built into surveillance.ReferencesAhmed, Sara. “A Phenomenology of Whiteness.” Feminist Theory 8.2 (2007): 149–68.Beauchamp, Toby. “Artful Concealment and Strategic Visibility: Transgender Bodies and U.S. State Surveillance after 9/11.” Surveillance & Society 6.4 (2009): 356–66.———. Going Stealth: Transgender Politics and U.S. Surveillance Practices. Durham, NC: Duke UP, 2019.Blas, Zach. “Informatic Opacity.” The Journal of Aesthetics and Protest 9 (2014). <http://www.joaap.org/issue9/zachblas.htm>.Blas, Zach, and Jacob Gaboury. 2016. “Biometrics and Opacity: A Conversation.” Camera Obscura: Feminism, Culture, and Media Studies 31.2 (2016): 154-65.Buolamwini, Joy, and Timnit Gebru. “Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification.” Proceedings of Machine Learning Research 81 (2018): 1-15.Browne, Simone. Dark Matters: On the Surveillance of Blackness. Durham, NC: Duke UP, 2015.Clarkson, Nicholas L. “Incoherent Assemblages: Transgender Conflicts in US Security.” Surveillance & Society 17.5 (2019): 618-30.Currah, Paisley, and Tara Mulqueen. “Securitizing Gender: Identity, Biometrics, and Transgender Bodies at the Airport.” Social Research 78.2 (2011): 556-82.Halberstam, Jack. The Queer Art of Failure. Durham: Duke UP, 2011.Hall, Rachel. “Terror and the Female Grotesque: Introducing Full-Body Scanners to U.S. Airports.” Feminist Surveillance Studies. Eds. Rachel E. Dubrofsky and Shoshana Amielle Magnet. Durham, NC: Duke UP, 2015. 127-49.Haraway, Donna. “Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective.” Feminist Studies 14.3 (1988): 575-99.———. Modest_Witness@Second_Millennium. FemaleMan_Meets_OncoMouse: Feminism and Technoscience. New York: Routledge, 1997.Kafer, Gary, and Daniel Grinberg. “Queer Surveillance.” Surveillance & Society 17.5 (2019): 592-601.Keyes, O.S. “The Misgendering Machines: Trans/HCI Implications of Automatic Gender Recognition.” Proceedings of the ACM on Human-Computer Interaction 2. CSCW, Article 88 (2018): 1-22.Magnet, Shoshana Amielle. When Biometrics Fail: Gender, Race, and the Technology of Identity. Durham: Duke UP, 2011.Magnet, Shoshana, and Tara Rodgers. “Stripping for the State: Whole Body Imaging Technologies and the Surveillance of Othered Bodies.” Feminist Media Studies 12.1 (2012): 101–18.Monahan, Torin. Surveillance and Security: Technological Politics and Power in Everyday Life. New York: Routledge, 2006.Packer, Jeremy. “Becoming Bombs: Mobilizing Mobility in the War of Terror.” Cultural Studies 10.5 (2006): 378-99.Pugliese, Joseph. “In Silico Race and the Heteronomy of Biometric Proxies: Biometrics in the Context of Civilian Life, Border Security and Counter-Terrorism Laws.” Australian Feminist Law Journal 23 (2005): 1-32.Pugliese, Joseph. Biometrics: Bodies, Technologies, Biopolitics New York: Routledge, 2010.Quinan, C.L. “Gender (In)securities: Surveillance and Transgender Bodies in a Post-9/11 Era of Neoliberalism.” Eds. Stef Wittendorp and Matthias Leese. Security/Mobility: Politics of Movement. Manchester: Manchester UP, 2017. 153-69.Quinan, C.L., and Nina Bresser. “Gender at the Border: Global Responses to Gender Diverse Subjectivities and Non-Binary Registration Practices.” Global Perspectives 1.1 (2020). <https://doi.org/10.1525/gp.2020.12553>.Sjoberg, Laura. “(S)he Shall Not Be Moved: Gender, Bodies and Travel Rights in the Post-9/11 Era.” Security Journal 28.2 (2015): 198-215.Spalding, Sally J. “Airport Outings: The Coalitional Possibilities of Affective Rupture.” Women’s Studies in Communication 39.4 (2016): 460-80.
APA, Harvard, Vancouver, ISO, and other styles
33

Burns, Alex. "Oblique Strategies for Ambient Journalism." M/C Journal 13, no. 2 (April 15, 2010). http://dx.doi.org/10.5204/mcj.230.

Full text
Abstract:
Alfred Hermida recently posited ‘ambient journalism’ as a new framework for para- and professional journalists, who use social networks like Twitter for story sources, and as a news delivery platform. Beginning with this framework, this article explores the following questions: How does Hermida define ‘ambient journalism’ and what is its significance? Are there alternative definitions? What lessons do current platforms provide for the design of future, real-time platforms that ‘ambient journalists’ might use? What lessons does the work of Brian Eno provide–the musician and producer who coined the term ‘ambient music’ over three decades ago? My aim here is to formulate an alternative definition of ambient journalism that emphasises craft, skills acquisition, and the mental models of professional journalists, which are the foundations more generally for journalism practices. Rather than Hermida’s participatory media context I emphasise ‘institutional adaptiveness’: how journalists and newsrooms in media institutions rely on craft and skills, and how emerging platforms can augment these foundations, rather than replace them. Hermida’s Ambient Journalism and the Role of Journalists Hermida describes ambient journalism as: “broad, asynchronous, lightweight and always-on communication systems [that] are creating new kinds of interactions around the news, and are enabling citizens to maintain a mental model of news and events around them” (Hermida 2). His ideas appear to have two related aspects. He conceives ambient journalism as an “awareness system” between individuals that functions as a collective intelligence or kind of ‘distributed cognition’ at a group level (Hermida 2, 4-6). Facebook, Twitter and other online social networks are examples. Hermida also suggests that such networks enable non-professionals to engage in ‘communication’ and ‘conversation’ about news and media events (Hermida 2, 7). In a helpful clarification, Hermida observes that ‘para-journalists’ are like the paralegals or non-lawyers who provide administrative support in the legal profession and, in academic debates about journalism, are more commonly known as ‘citizen journalists’. Thus, Hermida’s ambient journalism appears to be: (1) an information systems model of new platforms and networks, and (2) a normative argument that these tools empower ‘para-journalists’ to engage in journalism and real-time commentary. Hermida’s thesis is intriguing and worthy of further discussion and debate. As currently formulated however it risks sharing the blind-spots and contradictions of the academic literature that Hermida cites, which suffers from poor theory-building (Burns). A major reason is that the participatory media context on which Hermida often builds his work has different mental models and normative theories than the journalists or media institutions that are the target of critique. Ambient journalism would be a stronger and more convincing framework if these incorrect assumptions were jettisoned. Others may also potentially misunderstand what Hermida proposes, because the academic debate is often polarised between para-journalists and professional journalists, due to different views about institutions, the politics of knowledge, decision heuristics, journalist training, and normative theoretical traditions (Christians et al. 126; Cole and Harcup 166-176). In the academic debate, para-journalists or ‘citizen journalists’ may be said to have a communitarian ethic and desire more autonomous solutions to journalists who are framed as uncritical and reliant on official sources, and to media institutions who are portrayed as surveillance-like ‘monitors’ of society (Christians et al. 124-127). This is however only one of a range of possible relationships. Sole reliance on para-journalists could be a premature solution to a more complex media ecology. Journalism craft, which does not rely just on official sources, also has a range of practices that already provides the “more complex ways of understanding and reporting on the subtleties of public communication” sought (Hermida 2). Citizen- and para-journalist accounts may overlook micro-studies in how newsrooms adopt technological innovations and integrate them into newsgathering routines (Hemmingway 196). Thus, an examination of the realities of professional journalism will help to cast a better light on how ambient journalism can shape the mental models of para-journalists, and provide more rigorous analysis of news and similar events. Professional journalism has several core dimensions that para-journalists may overlook. Journalism’s foundation as an experiential craft includes guidance and norms that orient the journalist to information, and that includes practitioner ethics. This craft is experiential; the basis for journalism’s claim to “social expertise” as a discipline; and more like the original Linux and Open Source movements which evolved through creative conflict (Sennett 9, 25-27, 125-127, 249-251). There are learnable, transmissible skills to contextually evaluate, filter, select and distil the essential insights. This craft-based foundation and skills informs and structures the journalist’s cognitive witnessing of an event, either directly or via reconstructed, cultivated sources. The journalist publishes through a recognised media institution or online platform, which provides communal validation and verification. There is far more here than the academic portrayal of journalists as ‘gate-watchers’ for a ‘corporatist’ media elite. Craft and skills distinguish the professional journalist from Hermida’s para-journalist. Increasingly, media institutions hire journalists who are trained in other craft-based research methods (Burns and Saunders). Bethany McLean who ‘broke’ the Enron scandal was an investment banker; documentary filmmaker Errol Morris first interviewed serial killers for an early project; and Neil Chenoweth used ‘forensic accounting’ techniques to investigate Rupert Murdoch and Kerry Packer. Such expertise allows the journalist to filter information, and to mediate any influences in the external environment, in order to develop an individualised, ‘embodied’ perspective (Hofstadter 234; Thompson; Garfinkel and Rawls). Para-journalists and social network platforms cannot replace this expertise, which is often unique to individual journalists and their research teams. Ambient Journalism and Twitter Current academic debates about how citizen- and para-journalists may augment or even replace professional journalists can often turn into legitimation battles whether the ‘de facto’ solution is a social media network rather than a media institution. For example, Hermida discusses Twitter, a micro-blogging platform that allows users to post 140-character messages that are small, discrete information chunks, for short-term and episodic memory. Twitter enables users to monitor other users, to group other messages, and to search for terms specified by a hashtag. Twitter thus illustrates how social media platforms can make data more transparent and explicit to non-specialists like para-journalists. In fact, Twitter is suitable for five different categories of real-time information: news, pre-news, rumours, the formation of social media and subject-based networks, and “molecular search” using granular data-mining tools (Leinweber 204-205). In this model, the para-journalist acts as a navigator and “way-finder” to new information (Morville, Findability). Jaron Lanier, an early designer of ‘virtual reality’ systems, is perhaps the most vocal critic of relying on groups of non-experts and tools like Twitter, instead of individuals who have professional expertise. For Lanier, what underlies debates about citizen- and para-journalists is a philosophy of “cybernetic totalism” and “digital Maoism” which exalts the Internet collective at the expense of truly individual views. He is deeply critical of Hermida’s chosen platform, Twitter: “A design that shares Twitter’s feature of providing ambient continuous contact between people could perhaps drop Twitter’s adoration of fragments. We don’t really know, because it is an unexplored design space” [emphasis added] (Lanier 24). In part, Lanier’s objection is traceable back to an unresolved debate on human factors and design in information science. Influenced by the post-war research into cybernetics, J.C.R. Licklider proposed a cyborg-like model of “man-machine symbiosis” between computers and humans (Licklider). In turn, Licklider’s framework influenced Douglas Engelbart, who shaped the growth of human-computer interaction, and the design of computer interfaces, the mouse, and other tools (Engelbart). In taking a system-level view of platforms Hermida builds on the strength of Licklider and Engelbart’s work. Yet because he focuses on para-journalists, and does not appear to include the craft and skills-based expertise of professional journalists, it is unclear how he would answer Lanier’s fears about how reliance on groups for news and other information is superior to individual expertise and judgment. Hermida’s two case studies point to this unresolved problem. Both cases appear to show how Twitter provides quicker and better forms of news and information, thereby increasing the effectiveness of para-journalists to engage in journalism and real-time commentary. However, alternative explanations may exist that raise questions about Twitter as a new platform, and thus these cases might actually reveal circumstances in which ambient journalism may fail. Hermida alludes to how para-journalists now fulfil the earlier role of ‘first responders’ and stringers, in providing the “immediate dissemination” of non-official information about disasters and emergencies (Hermida 1-2; Haddow and Haddow 117-118). Whilst important, this is really a specific role. In fact, disaster and emergency reporting occurs within well-established practices, professional ethics, and institutional routines that may involve journalists, government officials, and professional communication experts (Moeller). Officials and emergency management planners are concerned that citizen- or para-journalism is equated with the craft and skills of professional journalism. The experience of these officials and planners in 2005’s Hurricane Katrina in the United States, and in 2009’s Black Saturday bushfires in Australia, suggests that whilst para-journalists might be ‘first responders’ in a decentralised, complex crisis, they are perceived to spread rumours and potential social unrest when people need reliable information (Haddow and Haddow 39). These terms of engagement between officials, planners and para-journalists are still to be resolved. Hermida readily acknowledges that Twitter and other social network platforms are vulnerable to rumours (Hermida 3-4; Sunstein). However, his other case study, Iran’s 2009 election crisis, further complicates the vision of ambient journalism, and always-on communication systems in particular. Hermida discusses several events during the crisis: the US State Department request to halt a server upgrade, how the Basij’s shooting of bystander Neda Soltan was captured on a mobile phone camera, the spread across social network platforms, and the high-velocity number of ‘tweets’ or messages during the first two weeks of Iran’s electoral uncertainty (Hermida 1). The US State Department was interested in how Twitter could be used for non-official sources, and to inform people who were monitoring the election events. Twitter’s perceived ‘success’ during Iran’s 2009 election now looks rather different when other factors are considered such as: the dynamics and patterns of Tehran street protests; Iran’s clerics who used Soltan’s death as propaganda; claims that Iran’s intelligence services used Twitter to track down and to kill protestors; the ‘black box’ case of what the US State Department and others actually did during the crisis; the history of neo-conservative interest in a Twitter-like platform for strategic information operations; and the Iranian diaspora’s incitement of Tehran student protests via satellite broadcasts. Iran’s 2009 election crisis has important lessons for ambient journalism: always-on communication systems may create noise and spread rumours; ‘mirror-imaging’ of mental models may occur, when other participants have very different worldviews and ‘contexts of use’ for social network platforms; and the new kinds of interaction may not lead to effective intervention in crisis events. Hermida’s combination of news and non-news fragments is the perfect environment for psychological operations and strategic information warfare (Burns and Eltham). Lessons of Current Platforms for Ambient Journalism We have discussed some unresolved problems for ambient journalism as a framework for journalists, and as mental models for news and similar events. Hermida’s goal of an “awareness system” faces a further challenge: the phenomenological limitations of human consciousness to deal with information complexity and ambiguous situations, whether by becoming ‘entangled’ in abstract information or by developing new, unexpected uses for emergent technologies (Thackara; Thompson; Hofstadter 101-102, 186; Morville, Findability, 55, 57, 158). The recursive and reflective capacities of human consciousness imposes its own epistemological frames. It’s still unclear how Licklider’s human-computer interaction will shape consciousness, but Douglas Hofstadter’s experiments with art and video-based group experiments may be suggestive. Hofstadter observes: “the interpenetration of our worlds becomes so great that our worldviews start to fuse” (266). Current research into user experience and information design provides some validation of Hofstadter’s experience, such as how Google is now the ‘default’ search engine, and how its interface design shapes the user’s subjective experience of online search (Morville, Findability; Morville, Search Patterns). Several models of Hermida’s awareness system already exist that build on Hofstadter’s insight. Within the information systems field, on-going research into artificial intelligence–‘expert systems’ that can model expertise as algorithms and decision rules, genetic algorithms, and evolutionary computation–has attempted to achieve Hermida’s goal. What these systems share are mental models of cognition, learning and adaptiveness to new information, often with forecasting and prediction capabilities. Such systems work in journalism areas such as finance and sports that involve analytics, data-mining and statistics, and in related fields such as health informatics where there are clear, explicit guidelines on information and international standards. After a mid-1980s investment bubble (Leinweber 183-184) these systems now underpin the technology platforms of global finance and news intermediaries. Bloomberg LP’s ubiquitous dual-screen computers, proprietary network and data analytics (www.bloomberg.com), and its competitors such as Thomson Reuters (www.thomsonreuters.com and www.reuters.com), illustrate how financial analysts and traders rely on an “awareness system” to navigate global stock-markets (Clifford and Creswell). For example, a Bloomberg subscriber can access real-time analytics from exchanges, markets, and from data vendors such as Dow Jones, NYSE Euronext and Thomson Reuters. They can use portfolio management tools to evaluate market information, to make allocation and trading decisions, to monitor ‘breaking’ news, and to integrate this information. Twitter is perhaps the para-journalist equivalent to how professional journalists and finance analysts rely on Bloomberg’s platform for real-time market and business information. Already, hedge funds like PhaseCapital are data-mining Twitter’s ‘tweets’ or messages for rumours, shifts in stock-market sentiment, and to analyse potential trading patterns (Pritchett and Palmer). The US-based Securities and Exchange Commission, and researchers like David Gelernter and Paul Tetlock, have also shown the benefits of applied data-mining for regulatory market supervision, in particular to uncover analysts who provide ‘whisper numbers’ to online message boards, and who have access to material, non-public information (Leinweber 60, 136, 144-145, 208, 219, 241-246). Hermida’s framework might be developed further for such regulatory supervision. Hermida’s awareness system may also benefit from the algorithms found in high-frequency trading (HFT) systems that Citadel Group, Goldman Sachs, Renaissance Technologies, and other quantitative financial institutions use. Rather than human traders, HFT uses co-located servers and complex algorithms, to make high-volume trades on stock-markets that take advantage of microsecond changes in prices (Duhigg). HFT capabilities are shrouded in secrecy, and became the focus of regulatory attention after several high-profile investigations of traders alleged to have stolen the software code (Bray and Bunge). One public example is Streambase (www.streambase.com), a ‘complex event processing’ (CEP) platform that can be used in HFT, and commercialised from the Project Aurora research collaboration between Brandeis University, Brown University, and Massachusetts Institute of Technology. CEP and HFT may be the ‘killer apps’ of Hermida’s awareness system. Alternatively, they may confirm Jaron Lanier’s worst fears: your data-stream and user-generated content can be harvested by others–for their gain, and your loss! Conclusion: Brian Eno and Redefining ‘Ambient Journalism’ On the basis of the above discussion, I suggest a modified definition of Hermida’s thesis: ‘Ambient journalism’ is an emerging analytical framework for journalists, informed by cognitive, cybernetic, and information systems research. It ‘sensitises’ the individual journalist, whether professional or ‘para-professional’, to observe and to evaluate their immediate context. In doing so, ‘ambient journalism’, like journalism generally, emphasises ‘novel’ information. It can also inform the design of real-time platforms for journalistic sources and news delivery. Individual ‘ambient journalists’ can learn much from the career of musician and producer Brian Eno. His personal definition of ‘ambient’ is “an atmosphere, or a surrounding influence: a tint,” that relies on the co-evolution of the musician, creative horizons, and studio technology as a tool, just as para-journalists use Twitter as a platform (Sheppard 278; Eno 293-297). Like para-journalists, Eno claims to be a “self-educated but largely untrained” musician and yet also a craft-based producer (McFadzean; Tamm 177; 44-50). Perhaps Eno would frame the distinction between para-journalist and professional journalist as “axis thinking” (Eno 298, 302) which is needlessly polarised due to different normative theories, stances, and practices. Furthermore, I would argue that Eno’s worldview was shaped by similar influences to Licklider and Engelbart, who appear to have informed Hermida’s assumptions. These influences include the mathematician and game theorist John von Neumann and biologist Richard Dawkins (Eno 162); musicians Eric Satie, John Cage and his book Silence (Eno 19-22, 162; Sheppard 22, 36, 378-379); and the field of self-organising systems, in particular cyberneticist Stafford Beer (Eno 245; Tamm 86; Sheppard 224). Eno summed up the central lesson of this theoretical corpus during his collaborations with New York’s ‘No Wave’ scene in 1978, of “people experimenting with their lives” (Eno 253; Reynolds 146-147; Sheppard 290-295). Importantly, he developed a personal view of normative theories through practice-based research, on a range of projects, and with different creative and collaborative teams. Rather than a technological solution, Eno settled on a way to encode his craft and skills into a quasi-experimental, transmittable method—an aim of practitioner development in professional journalism. Even if only a “founding myth,” the story of Eno’s 1975 street accident with a taxi, and how he conceived ‘ambient music’ during his hospital stay, illustrates how ambient journalists might perceive something new in specific circumstances (Tamm 131; Sheppard 186-188). More tellingly, this background informed his collaboration with the late painter Peter Schmidt, to co-create the Oblique Strategies deck of aphorisms: aleatory, oracular messages that appeared dependent on chance, luck, and randomness, but that in fact were based on Eno and Schmidt’s creative philosophy and work guidelines (Tamm 77-78; Sheppard 178-179; Reynolds 170). In short, Eno was engaging with the kind of reflective practices that underpin exemplary professional journalism. He was able to encode this craft and skills into a quasi-experimental method, rather than a technological solution. Journalists and practitioners who adopt Hermida’s framework could learn much from the published accounts of Eno’s practice-based research, in the context of creative projects and collaborative teams. In particular, these detail the contexts and choices of Eno’s early ambient music recordings (Sheppard 199-200); Eno’s duels with David Bowie during ‘Sense of Doubt’ for the Heroes album (Tamm 158; Sheppard 254-255); troubled collaborations with Talking Heads and David Byrne (Reynolds 165-170; Sheppard; 338-347, 353); a curatorial, mentor role on U2’s The Unforgettable Fire (Sheppard 368-369); the ‘grand, stadium scale’ experiments of U2’s 1991-93 ZooTV tour (Sheppard 404); the Zorn-like games of Bowie’s Outside album (Eno 382-389); and the ‘generative’ artwork 77 Million Paintings (Eno 330-332; Tamm 133-135; Sheppard 278-279; Eno 435). Eno is clearly a highly flexible maker and producer. Developing such flexibility would ensure ambient journalism remains open to novelty as an analytical framework that may enhance the practitioner development and work of professional journalists and para-journalists alike.Acknowledgments The author thanks editor Luke Jaaniste, Alfred Hermida, and the two blind peer reviewers for their constructive feedback and reflective insights. References Bray, Chad, and Jacob Bunge. “Ex-Goldman Programmer Indicted for Trade Secrets Theft.” The Wall Street Journal 12 Feb. 2010. 17 March 2010 ‹http://online.wsj.com/article/SB10001424052748703382904575059660427173510.html›. Burns, Alex. “Select Issues with New Media Theories of Citizen Journalism.” M/C Journal 11.1 (2008). 17 March 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/view/30›.———, and Barry Saunders. “Journalists as Investigators and ‘Quality Media’ Reputation.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 281-297. 17 March 2010 ‹http://eprints.vu.edu.au/15229/1/CPRF09BurnsSaunders.pdf›.———, and Ben Eltham. “Twitter Free Iran: An Evaluation of Twitter’s Role in Public Diplomacy and Information Operations in Iran’s 2009 Election Crisis.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 298-310. 17 March 2010 ‹http://eprints.vu.edu.au/15230/1/CPRF09BurnsEltham.pdf›. Christians, Clifford G., Theodore Glasser, Denis McQuail, Kaarle Nordenstreng, and Robert A. White. Normative Theories of the Media: Journalism in Democratic Societies. Champaign, IL: University of Illinois Press, 2009. Clifford, Stephanie, and Julie Creswell. “At Bloomberg, Modest Strategy to Rule the World.” The New York Times 14 Nov. 2009. 17 March 2010 ‹http://www.nytimes.com/2009/11/15/business/media/15bloom.html?ref=businessandpagewanted=all›.Cole, Peter, and Tony Harcup. Newspaper Journalism. Thousand Oaks, CA: Sage Publications, 2010. Duhigg, Charles. “Stock Traders Find Speed Pays, in Milliseconds.” The New York Times 23 July 2009. 17 March 2010 ‹http://www.nytimes.com/2009/07/24/business/24trading.html?_r=2andref=business›. Engelbart, Douglas. “Augmenting Human Intellect: A Conceptual Framework, 1962.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era. London: Phaidon Press, 2002. 60-67. Eno, Brian. A Year with Swollen Appendices. London: Faber and Faber, 1996. Garfinkel, Harold, and Anne Warfield Rawls. Toward a Sociological Theory of Information. Boulder, CO: Paradigm Publishers, 2008. Hadlow, George D., and Kim S. Haddow. Disaster Communications in a Changing Media World, Butterworth-Heinemann, Burlington MA, 2009. Hemmingway, Emma. Into the Newsroom: Exploring the Digital Production of Regional Television News. Milton Park: Routledge, 2008. Hermida, Alfred. “Twittering the News: The Emergence of Ambient Journalism.” Journalism Practice 4.3 (2010): 1-12. Hofstadter, Douglas. I Am a Strange Loop. New York: Perseus Books, 2007. Lanier, Jaron. You Are Not a Gadget: A Manifesto. London: Allen Lane, 2010. Leinweber, David. Nerds on Wall Street: Math, Machines and Wired Markets. Hoboken, NJ: John Wiley and Sons, 2009. Licklider, J.C.R. “Man-Machine Symbiosis, 1960.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era, London: Phaidon Press, 2002. 52-59. McFadzean, Elspeth. “What Can We Learn from Creative People? The Story of Brian Eno.” Management Decision 38.1 (2000): 51-56. Moeller, Susan. Compassion Fatigue: How the Media Sell Disease, Famine, War and Death. New York: Routledge, 1998. Morville, Peter. Ambient Findability. Sebastopol, CA: O’Reilly Press, 2005. ———. Search Patterns. Sebastopol, CA: O’Reilly Press, 2010.Pritchett, Eric, and Mark Palmer. ‘Following the Tweet Trail.’ CNBC 11 July 2009. 17 March 2010 ‹http://www.casttv.com/ext/ug0p08›. Reynolds, Simon. Rip It Up and Start Again: Postpunk 1978-1984. London: Penguin Books, 2006. Sennett, Richard. The Craftsman. London: Penguin Books, 2008. Sheppard, David. On Some Faraway Beach: The Life and Times of Brian Eno. London: Orion Books, 2008. Sunstein, Cass. On Rumours: How Falsehoods Spread, Why We Believe Them, What Can Be Done. New York: Farrar, Straus and Giroux, 2009. Tamm, Eric. Brian Eno: His Music and the Vertical Colour of Sound. New York: Da Capo Press, 1995. Thackara, John. In the Bubble: Designing in a Complex World. Boston, MA: The MIT Press, 1995. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Science of Mind. Boston, MA: Belknap Press, 2007.
APA, Harvard, Vancouver, ISO, and other styles
34

Rose, Megan Catherine. "The Future Is Furby." M/C Journal 26, no. 2 (April 25, 2023). http://dx.doi.org/10.5204/mcj.2955.

Full text
Abstract:
Fig. 1: “Pink Flamingo Furby” (2000), “Peachy Furby Baby” (1999), and “Owl Furby” (1999) Sunlight Up (“Dah-ay-loh oo-tye”): Introduction As playthings at the junction of human experience and imagination, toys like Furby present an interesting touch point to explore cultural imaginations, hopes, and fears about zoomorphic robots and AI toys. This year marks their 25th anniversary. Created by Dave Hampton and Caleb Chung, Furby publicly debuted at the American International Toy Fair in 1998. Originally released by Tiger Electronics, this toy was later sold to Hasbro in 2005 to 2007. Since their introduction to the market, Furbys have been occupying our shelves and basements, perceived as “annoying little owl-like dolls with embedded sound-recording chips” (Gullin) that speak their own language “furbish” (shown throughout in parenthesis). Early reportage likened Furby to all kinds of cute critters: mogwais, hamsters, and Star Trek’s tribbles. Narratively Furbys are framed as a benevolent, alien species, living in space in a cloud known as Furbyland. For motivations not revealed, Furbys, in looking down on our planet, were so struck by the beautiful view of nature and its signs of peacefulness — “no worry (boo boh-bay)” — that they jumped, plummeting to us like tiny fluffy asteroids. Little did they know that their arrival would spark an intergalactic diplomatic incident. During its introduction in 1998, the initial discourse in media reportage emphasised anxieties of the unknown. What lies beneath the surface of Furby, as a toy that might blur the line between the real and imagined for children? What technologies might it harbour? As a hybrid of technology and animal, Furby appeared as a creepy-cute cultural icon that simultaneously delighted and horrified children and adults alike. Today adult fans reimagine Furby through play and customisation as part of their reflections on their childhood experiences of this cultural moment, and as a way of exploring new futures. Furby provides an opportunity to reflect on adults’ interactions with toys, including parents, members of the public, and fans motivated by nostalgia. At the time of its release Furby presented adults with moments of “dissonance” towards new horrifying technologies that “might occur at the seams [of] … monumental cultural shifts” (Powell 4). But for adult fans today, as a childhood memory, the toy represents both strangeness and future possibilities; it has become a tool of “disrupt[ing] and challeng[ing] beliefs and connections” (Rand 9). In this article I primarily analyse the “original” Furbys of 1998 to 2002, but also mention a range of later versions. This includes: the Emoto-tronic Furbys (2006) which were designed to have more expressive faces; the Furby Boom (2003), a toy whose personality changes according to the level of care it is provided with; and the Furby Connect (2016), which has bluetooth capacity. This discussion is supported by a thematic analysis of 3800 news articles about Furby from 1998 to 2000, visual analysis of both the original and customised iterations of Furby, as well as my reflections as a member of the Furby fandom community. You Play? (U-nye-loo-lay-doo?): Furby Encounters A key part of the discourse around Furby since its introduction in 1998 was, “who would want one?” Indeed, the answer at the time appeared to be “several million of us, the toy demons hope” (Weeks). After their release in American toy stores on 2 October 1998 in limited supplies, a Furbish frenzy ensued, resulting in altercations between shoppers and staff (e.g. Munroe; Warmbir; Associated Press). Aged 10, I recall my little black and white Furby, Coco, waiting for me on the shelves of the electronics section of Big W in Australia, fortunately with no such commotion. Furby is classed by the Guinness World Records as the world’s first AI toy, but it was certainly not the first electronic toy to enter the market; at the time of Furby’s release, Tickle Me Elmo and My Interactive Pooh presented competition, and by the late 1980s there was already concern about how electronic pet toys might erode emotion and connection (Turkle, “Authenticity”; Turkle, “Nascent”). Speculation over the reason for the Furby mass hysteria ensued. Some suggested the appeal was the toy’s status symbol status (Beck), whereas others cited its broad appeal: “it's not gender specific; it doesn't appeal to a particular age group; and most important, it's affordable and doesn't require additional equipment or a computer” (Davis). Some experts offered their commentary of the cyberpet phenomena in general, suggesting that it is a way of dealing with isolation and loneliness (Yorkshire Post). Indeed, all of these features are important to note when we consider the transformation of Furby into queer icon. Central to Furby’s cultural narrative is the idea of contact, or a meeting between robot and user; through play children “teach” their new pet Earth’s new ways (Marsh, “Coded”; Marsh, “Uncanny”). And with this contact also comes a sense of the unknown: what lies beneath the creature’s surface? In their study of zoomorphic robots, Hirofumi Katsumi and Daniel White suggest that Donna Haraway’s work on animal encounters might help us understand this idea of contact. As “animal-like” creature, Furby recalls the transformative potentials of meeting with the more-than-human. Furby’s presence on toy shelves, in classrooms and in homes was one of the first times society had to consider what it meant to “enter the world of becoming with” zoomorphic robots, and to reflect on “who or what ... is precisely at stake” in this entanglement (Haraway 19). What do we learn about ourselves and the unknown through our encounters with Furby? “Monster” (Moh-moh): Technological Threat, Monstrous Other In media reportage, Furby is framed as both new and innovative, but also as a threatening fluffy anarchist. With its technology largely unknown, Furby at the time of its release presented society with a sense of “technohorror” and “imaginings of [social] collapse” (Powell 24). A common concern was that Furby might record and repeat inappropriate language in an act of rebellion. Occasionally tabloid newspapers would report claims such as, "MUM … was horrified when she sat down to play with her daughter's new Furby toy and it squeaked: "F*** me" (The Sun). Some concerns were quite serious, including that Furby could emit electromagnetic fields that would create interference for medical devices and aircraft instruments; this was later disproven by engineers (Tan and Hinberg; Basky; Computer Security). Other urban myths pointed to a more whimsical Furby, whose sensors had the capacity to launch spacecraft (Watson). One persistent concern was the surveillance potentials of Furby. In 1999 the US National Security Agency (NSA) issued a ban on Furby in their Fort Mead headquarters, with concern that they might record and repeat confidential information (Gullin; Ramalho; Borger). This was denied by Tiger Electronics, who emphatically stated “Furby is not a spy” (Computer Security). Engineers performing “autopsies” on Furbys quickly put much of this anxiety to rest (Phobe). This was met with mirthful rebuttals of how future Furbys might be transformed into cute and ubiquitous “wireless furby transmitters” to gather intelligence in warzones (Gullin). As a result, the initial anxiety about surveillance and toys dissipated. However, academics continue to remind us of the real risks of smart toys (e.g. Lupton; Milkaite and Lievens). The 2016 Furby Connect, equipped with voice recognition and Bluetooth capacities has been shown to be hackable (Williams). Further, Maria Ramalho has reported Snowden’s 2014 claims that both NSA and the UK Government Communication Headquarters have been accessing the data collected. In this context, Furby has become “Big Brother transmogrified into ambiguous, cute” unaccountable creature (Ramalho). Through this, we can see how our entanglement with Furby as an object of technohorror speaks both to our anxieties and the real possibilities of technology. In order to craft a narrative around Furby that speaks to this monstrous potential, many have drawn comparisons between Furby and the character Gizmo from the Gremlins franchise. This reference to Gizmo appears in the majority of the media articles sampled for this research. Gizmo is a “mogwai” (trans. demon) with both cute and monstrous potential; like Furby, it also has the potential to transform into a threat to “good society” (Chesher 153-4). This comparison speaks to Gremlins as an anti-technology statement (Sale). However, when we consider how media rhetoric has framed Furby as something to be tamed and controlled, it’s important we approach this comparison with caution in light of the Orientalist underpinnings of the Gremlins franchise. Wendy Allison Lee highlights how Gremlins reflects xenophobic themes of invasion and assimilation. While Gizmo is a “cute, well-behaved” character who “strives to assimilate” much like how Furby might, through play with children, it also harbours a threat to order. In this encounter are resonances of “racist love” that can sometimes underpin our affection for cuteness (Bow). Further reflection is needed on how we might unentangle ourselves from this framing and imagine more inclusive futures with toys like Furby. Fig. 2: Interactive Gizmo, a “Furby Friend” produced by Hasbro, Tiger and Warner Bros in 1999 Big Fun! (Dah doo-ay wah!): Queer Re-Imaginings of Furby Fig. 3: Party time! Adult fans around the world now gather under the “Furby” banner, participating in a colourful array of playful mischief. Reddit forum r/furby (11,200 subscribers) creates a fun space to enjoy the whimsy of Furby, transforming the figure into a sweet and kind companion. Under this umbrella, r/oddbodyfurby (997 subscribers) explore the horrifying potentials of Furby to its playful and surprising ends, which I discuss in this section. In other forums, such as Furby Collectors and Customisers (4.1k members) on Facebook, these different interests come together in a playful and creative space. There was also an active community on Tumblr, where some of the most creatively generative activities around Furby have occurred (Tiffany). In Japan, there is a lively community of fans on Twitter who dress and photograph Emoto-tronic Furbys in a range of cute and charming ways. This forms part of a broader network of creatives, such as “Circuit Benders” who tear down toys and rework them into instruments in a process known as “frankensteining”, such as Look Mum No Computer’s Furby Organ (Deahl). As fans and artists, people act as “queer accessories” to help Furby escape the world and narrative that sought to enclose it, so it might enact its revenge or transcend as a non-binary queer icon (Rand 9-11). As small, collectible and customisable friends, images of happy and creepy Furbys are part of a network of cute media that provides my generation with a source of comfort during times of precarity, occupying our spaces with their own vitality and presence as soothing companions (e.g. Stevens; Allison; Yano). Cuteness as media also lends itself to hybridisation; a mixing and matching with seemingly “opposing” aesthetics. For many fans, the charm of Furby lies in its nostalgic pull as a creature of childhood creepy-cute nightmares. Indeed, it seems that early concerns that Furby may “blur the line between the real and imagined for many children” were in fact valid (Knowlton). While we knew they weren’t “alive” in the true sense, to us they appeared “sort of alive” as our everyday environments became increasingly technological with a dazzling array of electronics (Turkle, “Authenticity”). As Allison (179) explains, we had to “adjust to a world where the border between the imaginary and the real” began to shift rapidly, leaving us open to dream, imagine, and craft narratives populated by a fear of the mechanised undead. Many Millennials were convinced as children that their Furby was waiting for them in the dark, watching, chuckling (“he he heeeee”). Patrick Lenton, diarising his adventures with a rescue Furby this year recalls his childhood toy as “a riot of noise and fury, the kind of demonic household terror”. Some adults, recalling these memories now refer to Furby as “it” or “evil” (Marsh, “Uncanny” 59). In 2020, adult Furby fans, thinking back to their childhood toys, speculated if the positioning of Furby’s eyes at the front of its head meant it was a predator (Watson). Some suggested that their short legs meant they are ambush predators, their infra-red sensor enabling them to detect prey in the dark. Other playful lore suggested that they were made of real cat and dog fur. Through this act of imaginative play, adults reach back to the playful horrors of their childhoods, combining their sense of dread with glee. This has been recently animated by films such as The Mitchells vs. The Machines (2021), where Furbys equipped with “PAL” chips transmogrify into a horrific pack of menacing creatures, and exact revenge. The main contributing factor to this experience is in part the puppetry of Furby. The 1999 Furby presents an exaggerated performance that is both “alive” and “unalive”, its wild rocking, owlish blinking, and cackling creating a sense of “dread and creeping horror” (Freud 2; Marsh, “Uncanny”). Through a blend of animation and imagination, agency is diffused between toy and child to give Furby “life” (Silvio 423). Interestingly, studies of the 2016 Furby Connect and its friendly and social programming that is designed to encourage positive care and engagement has counteracted some of this experience for children (Marsh, “Uncanny” 54). Likewise, in discussing the 2013 Furby Boom Chesher (151) describes this animation as “zany”, working with Sianne Ngai’s conceptualisation of this aesthetic and its relationship to cuteness. While some might praise these later developments in the Furby franchise as having saved another generation of children from nightmares, compared to the original Furby these later editions are less popular among fans; perhaps there is less “material” to work with. Fans as adults now draw on Furby as a playful and cute text to experiment with and hybridise with a variety of horrifying and surprising potentials. This leans into Furby’s design as a chimera, as it uses a combination of cute features to create a “short-hand” for life and also evoke the “idea” or “character” of appealing animals that form part of cultures “charismatic megafauna” (Nishimura 179; Stuck and Rogers; Gn). With cat-like ears, a tuft of hair that drifts with sympathetic movement, two wide eyes, framed with coquettish false lashes, a bird’s beak, and two paws, Furby both suspends and confounds our disbelief. Following the principles of the Kindchenschema (Lorenz) to a “100% ratio” its body is reduced to a round form, its most dominant feature its large eyes (Borgi, Cogliati-Dezza, Brelsford Meints, and Cirulli). While large eyes generally are thought to have an affective pull to them (Harris 4), their fixed placement in the original Furby’s skull creates a dead-pan gaze, that morphs into a Kubrik stare as the toy tilts forward to greet the viewer. Fig. 4: Kindschenschema at work in Furby’s design Furby fans mischievously extend this hybridisation of Furby’s body further through a range of customisation practices. Through “skinning”, Furby’s faux fur surfaces are removed and replaced with a fantastic array of colours and textures. Through breaking into their mechatronic shell – a practice known as “shucking” – their parts are repaired or modified. This results in a range of delightfully queer, non-binary representations of Furby with a range of vibrant furs, piercings, and evocative twinkling and gentle eyes (“tee-wee-lah!”). These figures act as both avatars and as companions for fans. Sporting earrings and rainbow bead necklaces, they are photographed resting in grassy fields, soft crochet rainbows, and bookshelves: they are an expression of all that is joyful in the world. Some fans push the customisation further to create whimsical creatures from another dimension. Some Furbys appear with moss and lichen for fur, sprouting tiny toadstools. Furbys are also transformed into “oddbodies” of varying species. Some appear both as winged fairies, and as transcendental multi-eyed and winged “biblically accurate” angels. Others are hybridised with plush toys or are reworked into handbags. Some veer into the realm of body horror, using doll limbs and bodies to create humanoid forms. The most iconic is the “long furby”, created by Tumblr user FurbyFuzz in 2018. Elongated and insect-like, the Long Furby wriggles into homes and curls up on soft furnishings. Collectors gather “haunted photos from the dark recesses of the internet” to document their escapades (Long Furby). Sometimes, hybridised Furbys appear not through creator interventions but rather emerge from nature itself. One such mythical creature is Murby, an original Furby unearthed in 2013 on an old farm property. Once toy, now woodland spirit, Murby gazes upon and blesses fans with dreamy, clouded eyes, its body an entanglement of thick moss, rich earth and time. Furby’s queerness, strangeness, and hybridity speaks to fans in different ways. Personally, as a neurodivergent person, I experience the coding and the playful reimaginings of Furby as a reflection of my own life experience. Neurodivergent people have a high capacity for care and empathy for objects as curiosities, supports, and friends (e.g. Atherton and Cross; White and Remington; Clutterbuck, Shah and Livingston). Like Furby, I am an alien whom people want to tame. My body and movement are treated with the same infantilising bemusement and suspicion. I feel like a chimera myself; an entanglement of many parts that make a whole, each on their own charming, but together forming a chaotic attempt to connect with neurotypicals. For me, what lies beneath Furby’s surface is my own psyche; rescuing and customising Furbys is a symbolic act, a creative expression of my desire to transcend and resist ableist forces. Together my Furbys and I revel in our strangeness in solidarity, plotting our mischievous revenge (“party time!”). This micro-level resistance will not overturn ableism but brings me a sense of reprieve as I work with my allies to bring socio-cultural change. Fig. 5: The author, Furby Queen. Photo by Sherbet Birdie Photography. Through their creative work, fans explore how Furbys could be reimagined. While fannish activities may at first glance appear fringe or frivolous, they hold up a mirror to our own limitations, anxieties, and practices as a society. The future is Furby. Go to Sleep Now (U-nye-way-loh-nee-way): Conclusions As a source of technohorror and queer potential, Furby provides a vessel by which we can imagine the futures of toys. Through encounter and contact, this seemingly harmless fluffy robot brought about disruption and chaos as a threat to securities and social fabrics. Adult fans, now recalling this cultural moment, lean into this creature’s promise of new possibilities, queering its cultural narrative. Through exploring adults’ interactions with toys, we explore new potentials for change and futures that are playful and creative. Acknowledgments This article was produced with the support of a Vitalities Lab Scholarship and the Australian Research Council Centre of Excellence for Automated Decision-Making and Society. I also thank Deborah Lupton and David Eastwood for their support in the production of an arts-based project that draws on this research into cyberpet histories. References Allison, Anne. Millennial Monsters: Japanese Toys and the Global Imagination. Berkeley: U of California P, 2006. Associated Press. “Two Injured in Flurry over Furby.” Charleston Daily Mail 28 Nov. 1998. Atherton, Gray, and Liam Cross. “Seeing More than Human: Autism and Anthropomorphic Theory of Mind.” Frontiers in Psychology 9 (2018): 1–18. Basky, Greg. “Furby Not Guilty as ‘Charged’.” The Western Journal of Medicine 172 (2000): 59. Beck, Rachel. “‘Must-Have’ Toys Created by Intense Publicity Campaigns.” AP Business Writer 16 Oct. 1998. Borgi, Marta, Irene Cogliati-Dezza, Victoria Brelsford, Kerstin Meints, and Francesca Cirulli. “Baby Schema in Human and Animal Faces Induces Cuteness Perception and Gaze Allocation in Children.” Frontiers in Psychology 5 (2014): 1–12. Borger, Julian. “Secret Agent Furby Sneaks into Spies’ Inner Sanctum.” The Guardian 14 Jan. 1999. <https://www.theguardian.com/world/1999/jan/14/julianborger1>. Bow, Leslie. Racist Love: Asian Abstraction and the Pleasures of Fantasy. Durham: Duke UP. Chesher, Chris. “Toy Robots on YouTube: Consumption and Peer Production at the Robotic Moment.” Convergence 25 (2019): 148–160. Clutterbuck, Rachel A., Punit Shah, and Lucy A. Livingston. “Anthropomorphic Tendencies in Autism: A Conceputal Replication and Extension of White and Remington (2019) and Preliminary Development of a Novel Anthropomorphism Measure.” Autism 26.4 (2021): 940–950. Computer Security. “Furby Alert: A National Security Concern?” Computer Security 36 (1999): 87–88. Davis, Pamela. “Too Cute to Mute?” St. Petersburg Times 9 Nov. 1998. Deahl, Dani. “Circuit Bending: Hacking a Furby in the Name of Music.” The Verge 14 Sep. 2018. Francescani, Christopher, and Tracy Connor. “Hot Toy’s a Doll Order; $30 Cuddlers Now Going for $100.” New York Post 29 Nov. 1998: 5. Freud, Sigmund. The Uncanny. Trans. D. McLintok. London: Penguin, 1919 [2003]. Gn, Joel. “Designing Affection: On the Curious Case of Machine Cuteness.” The Aesthetics and Affects of Cuteness. Eds. Joshua Paul Dale, Joyce Goggin, Julia Leyda, Anthony McIntyre, and Diane Negra. New York: Routledge, 2017. Gremlins. Dir. Joe Dante. Warner Bros, 1984. Gremlins 2. Dir. Joe Dante. Warner Bros, 1990. Guinness World Records. “First AI Robot Toy.” Guinness World Records, 2023. <https://www.guinnessworldrecords.com/world-records/100867-first-ai-robot-toy>. Gullin, Paul. “The Future Is Furbys.” Computerworld 33 (1999): 30. Harris, David. Cute, Quaint, Hungry and Romantic: The Aesthetics of Consumerism. New York: Basic. Katsuno, Hirofumi, and Daniel White. “Haptic Creatures: Tactile Affect and Human-Robot Intimacy in Japan.” Consumer Culture Theory in Asia: History and Contemporary Issues. Eds. Yuko Minowa and Russell Belk. New York: Routledge. 242–262. Knowlton, Brian. “If Raggedy Ann Could Talk.” International Herald Tribune 9. Nov 1998. Long Furby. 2018. <https://www.longfurby.com/>. Lorenz, Konrad. “Die angeborenen Formen möglicher Erfahrung [The Innate Condition of the Possibility of Experience].” Zeitschrift für Tierpsychologie 5.2 (1943): 245–409. Lupton, Deborah, and Ben Williamson. “The Datafied Child: The Dataveillance of Children and Implications for Their Rights.” New Media & Society 19 (2017): 780–794. Marsh, Alison. “Coded for Cuteness.” IEE Spectrum 56.1 (2019): 60. Marsh, Jackie. “The Uncanny Valley Revisited: Play with the Internet of Toys.” The Internet of Toys: Practices, Affordances and the Political Economy of Children’s Smart Play. Eds. Giovanna Mascheroni and Donell Holloway. London: Palgrave Macmillan, 2019. Milkaite, Ingrida, and Eva Lievens. “The Internet of Toys: Playing Games with Children’s Data?” The Internet of Toys: Practices, Affordances and the Political Economy of Children’s Smart Play. Eds. Giovanna Mascheroni and Donell Holloway. London: Palgrave Macmillan, 2019. Lee, Wendy Allison. “Cute. Dangerous. Asian American. 'Gremlins' @ 35.” Public Books, 2019. <https://www.publicbooks.org/cute-dangerous-asian-american-gremlins-35/>. Lenton, Patrick. “Happy 25th Birthday Furby, the Toy That Stole a Generation’s Hearts.” Sydney Morning Herald 6 Apr. 2023. <https://www.smh.com.au/culture/comedy/happy-25th-birthday-furby-the-toy-that-stole-a-generation-s-hearts-20230403-p5cxoe.html>. The Mitchells vs. The Machines. Dir. Mike Rianda. Sony Pictures Animation, 2021 Munroe, Tony. “Fur Flies at Mass. Malls over Hasbro’s Furby Doll.” Reuters, 28 Nov. 1998. Ngai, Sianne. Our Aesthetic Categories: Zany, Cute, Interesting. Cambridge: Harvard UP, 2012. Nishimura, Keiko. Communication Robot: Animating a Technological Solution in Twenty-First Century Japan. Dissertation. University of North Carolina at Chapel Hill, 2021. Phobe. Furby Autopsy, 1998. <http://www.phobe.com/furby/>. Powell, Daniel. Horror Culture in the New Millennium: Digital Dissonance and Technohorror. Washington, D.C.: Lexington, 2018. Ramalho, Maria Irene. “The Private Is Public or Furbies Are Us.” e-cadernos 27 (2017). <http://journals.openedition.org/eces/2199>. Rand, Erica. Barbie’s Queer Accessories. Carolina: Duke UP. Sale, Kirkpatrick. Rebels against the Future. London: Quartet Books, 1996. Silvio, Terry. “Animation: The New Performance.” Journal of Linguistic Anthropology 20: 422–438. Stevens, Carolyn. “Cute But Relaxed: Ten Years of Rilakkuma in Precarious Japan.” M/C Journal 17.2 (2014). <https://doi.org/10.5204/mcj.783>. Stuck, Rachel E., and Wendy A. Rogers. “Older Adults Perceptions of Supporting Factors of Trust in a Robot Care Providers.” Journal of Robotics (2018): 6519713. The Sun. “Frisky Furby Fun.” 31 Dec. 1999. Tan, Kok-Swang, and Irwin Hinberg, “Furby Does Not Interfere with Medical Devices.” Canadian Medical Association Journal 161 (1999): 971. Tiffany, Kaitlyn. “Every Furby Gets a Home.” Vox, 21 Dec. 2018. <https://www.vox.com/the-goods/2018/12/21/18149004/furby-collectors-tumblr-vintage-robots-fandom>. Turkle, Sherry. “Authenticity in the Age of Digital Companions.” Interaction Studies: Social Behaviour and Communication in Biological and Artificial Systems 8 (2007): 501–517. Turkle, Sherry. “A Nascent Robotics Culture: New Complicities for Companionship.” Machine Ethics and Robot Ethics. London: Routledge, 2017. Warmbir, Steve. “Mild Weather Draws Shoppers Out into the Sun. But Furby Frenzy Drives Desperate into Long Lines.” Chicago Daily Herald, 28 Nov. 1998: 4. Watson, Averie. “A Dark Furby Theory May Reveal Them as Flesh-Devouring Predators.” CBR, 20 Nov. 2021. <https://www.cbr.com/dark-furby-predator-theory/>. White, Rebecca, and Anna Remington. “Object Personification in Autism: This Paper Will Be Very Sad If You Don’t Read It.” Autism 23.4 (2018): 1042–1045. Williams, Al. “Mission Impossible: Infiltrating Furby.” Hackaday, 26 Nov. 2017. <https://hackaday.com/2017/11/26/mission-impossible-infiltrating-furby/>. Weeks, Linton. “The Great Furby Fuss.” The Washington Post, 24 Nov. 1998. <https://www.washingtonpost.com/archive/lifestyle/1998/11/24/the-great-furby-fuss/30a0a340-658a-4609-ae07-f38ff368c7c4/>. Yano, Christine. “Reach Out and Touch Someone: Thinking through Sanrio’s Social Communication Empire.” Japanese Studies 31.1 (2011): 23–36. Yorkshire Post. “Cyberpets – Harmless Fun or Addictive Craze?” 9 Nov. 1998: 9.
APA, Harvard, Vancouver, ISO, and other styles
35

Russell, Francis. "NFTs and Value." M/C Journal 25, no. 2 (April 25, 2022). http://dx.doi.org/10.5204/mcj.2863.

Full text
Abstract:
Depending on your perspective, Non-Fungible Token (NFT) artworks are inaugurating an exciting new chapter in the history of art, or a dangerous new chapter in the history of online market bubbles. NFTs index artworks, and are typically strings of characters stored on a blockchain such as Ethereum. NFTs are not exclusively used to index artworks, and have been used to index a range of collectibles, but it is the sale of NFTs associated with artworks that has launched the phenomenon into public consciousness. Perhaps the most famous example of this is the digital artist Beeple’s sale of an NFT for the equivalent of $69 million (Krastrenakes). For some, such staggering prices suggest NFTs are poised to become the next Beanie Babies—i.e., commodities without utility that sell at vastly inflated prices. Despite such cynicism, some argue that NFTs have revolutionary technical import, such that they could overturn many common and unequal practices within the contemporary art market (Rennie et al.). Chief among these is the supposed disposability of digital artworks, which are viewed as difficult to sell, resell, and protect from piracy. Such issues are thought to be ameliorated by NFTs, since they function as a token that is understood to stand as a “definitive indicator of ownership” of digital artworks (Mackenzie and Bērziņa 2). Or, as Rachel O’Dwyer has summarised, NFT art auctions like the Ethereal Summit held in New York in 2018 allow individuals to bid for the “ownership and provenance details of the works of art encrypted in the Ethereum blockchain and represented by a token” (O’Dwyer). Unlike a more conventional artwork, such as a painting, NFT artworks typically take the form of JPEGs or GIFs, and therefore circulate the Internet widely, regardless of who owns the token that designates ownership. While reproductions and printed documentations of traditional artworks are commonplace—e.g., art gallery giftshops will often sell relatively low-cost posters of masterpieces like Picasso’s Guernica, or coffee table books showcasing the masterworks of influential movements like post-impressionism—there are obvious material differences between the reproduction and the original. In the case of the typically digital NFT artworks, this distinction does not apply. Accordingly, the academic and popular discussions that surround NFT artworks have reignited theoretical questions around the ontological status of artworks, and the source of their economic value. For some, the NFT market is a financial bubble and the prices attracted by particular NFT-linked artworks have no underlying value (BBC News). For others, the value of NFTs can be explained through an appeal to the value subjectively attributed to the image or animation by the purchaser (Nguyen), while for others the value of NFTs should be understood in terms of digital scarcity and provenance (Rennie et al.; Joselit) or as a technological means for artists to maintain a greater share of their artwork’s value (Kugler). While the NFT market is novel, and is worthy of study in terms of its specific technological and economic forms, this article will argue that NFTs can be placed in a longer history of the emergence of what Luc Boltanski and Arnauld Esquerre have called the “enrichment economy”. In their Enrichment: A Critique of Commodities, Boltanski and Esquerre argue that, since at least the last quarter of the twentieth century, a new site of valorisation has emerged in post-industrial economies. According to Boltanski and Esquerre, globalisation and deindustrialisation provoked many economies to embrace tourism, luxury good production, and the commodification of heritage and culture as new sites of extraction. As the viability of the mass production of commodities has receded, the production of unique commodities and transient yet “unforgettable” experiences have become more economically significant. For Boltanski and Esquerre, enrichment refers both to the often-discursive refining and redefining of existing commodities—such that they fetch greater prices—and a greater emphasis on an economy for those with disposable income—such as tourists, art collectors, and the wealthy more generally (3-4). Often, Boltanski and Esquerre argue, the enrichment economies of art and luxury tend to mine and exploit the “underlying substratum that is purely and simply the past” (2). For this reason, the enrichment economy requires the production of new forms of authenticity, “aura”, and belief, such that the overlooked or taken-for-granted objects of the past can be reframed as unique and worthy of investment or consumption. The interesting question, then, is not necessarily that of why someone would pay a large sum of money to own a piece of code on a blockchain, but, instead, that of how a particular piece of contemporary art or an NFT comes to be “enriched” with authenticity and aura. While a thoroughgoing discussion of this topic would require a longer piece, this article will nevertheless attempt to open up connections between art history, debates around the production of artistic value during and after Modernism, and the newly emerging NFT art market. While many have declared that NFTs are “disrupting the art market” (Tripathi)—supposedly evinced by the staggering growth of the NFT market, and emerging institutional recognition, such as ArtReview’s decision to place an NFT at the top of their Power 100 List for 2021—this article seeks to locate the NFT explosion within a slightly longer timeframe, one in which NFTs would feature as a continuation—albeit a non-linear one—rather than a disruption of ongoing cultural and economic logics. Value and Void Despite the incredulity that commonly meets NFT artworks, the contemporary art market similarly flaunts conventional understandings of aesthetic and economic value. While many would surely agree with journalist Amy Castor’s claim that “it’s hard to justify that a Bored Ape NFT is worth $300,000 based on the art” (quoted in Artnet), almost identical criticisms have been raised around the contemporary artist Maurizio Cattelan’s 2019 work Comedian. Released in an edition of three, Comedian consisted of a banana duct-taped to a wall, with two of the three selling for $120,000 each. As Sara Callahan puts it, works like Comedian reignited debates around “what makes something a high-priced artwork when another, seemingly identical, object is not?” (Callahan). While NFTs are reawakening interest in the question of artistic value, the financialisation of cheaply made and mass-produced artworks has a much longer history. Indeed, by the 1960s, a booming secondary art market that traded in increasingly expensive, yet cheap-to-produce avant-garde works—often requiring relatively small amounts of time and inexpensive materials—raised suspicions that art was becoming indistinguishable from more traditional financial assets. In response, in 1968 the influential art critic Leo Steinberg argued that, “avant-garde art, lately Americanized, is for the first time associated with big money. … Another decade, and we shall have mutual funds based on securities in the form of pictures held in bank vaults” (quoted in Beech 300). As Dave Beech has shown, in the ensuing period, “art’s relationship to finance capital has outstripped Steinberg’s worst fears” (Beech 301). By the 1980s, banks allowed individuals to borrow large sums of money against the value of their art collections, and investment in artworks became a normal practice of portfolio diversification (Beech 299–300). When interest rates are low, investments in productive capital offer low levels of liquidity, and international markets appear vulnerable to shocks, artworks—whether physical or in the form of an NFT—offer a means of hedging against future losses. Furthermore, in both the contemporary art market and the NFT market, purchases of artworks at inflated prices often allow an individual to prevent “the bottom from falling out of a market they have already invested in” (O’Dwyer). The fact that artworks could hold a value well in excess of the cost of the materials or labour time required to produce them, was not solely recognised by art collectors and investors. Instead, this period saw a great number of artists explicitly playing with the aporia that had emerged around art’s economic value—insofar as ready-made artworks could now fetch prices typically reserved for laboriously produced and unique masterpieces. Take, for example, Yves Klein’s project Zones of Immaterial Pictorial Sensibility, which he developed over the late 1950s and early 1960s. In these works, Klein offered collectors the opportunity to purchase a void or “immaterial zone” for varying quantities of gold, with “20 grams (3/4 ounce) of pure gold for the Zones of series no. 1, the least expensive, to 1,280 grams (27/8 pounds) for those of series no. 7, the most expensive” (Cras 24). In exchange for the gold, the void-owner would receive a receipt as proof of purchase. However, for the work to be completed, Klein requested that the receipt be burned by the collector, and in response Klein would throw half of the received gold into the river Seine (Cras 24). By destroying the proof of purchase, and by releasing some of the gold into the river, the collector would receive “the full authentic immaterial value of the work” (Klein quoted in Cras 24). We see some resemblances here between Klein’s Zones and NFTs—and here Klein is no exception, since, as Cras has documented, the 1960s were replete with artists experimenting with the production of artworks as novel financial assets. For Cras, it was a time in which “the problem of attaching a price to works of art and offering them for sale, traditionally considered to be external to creation in this domain, was now incorporated in artistic practice” (Cras 3). If artists were increasingly embracing the artwork’s status as an asset, and if the price of artworks became divorced from luxurious materials or skilled production, how were artworks able to assert themselves as valuable and worthy of collection and investment? How is that, rather than the decoupling of artworks from some secure material base of value diminishing their market value, such decoupling has instead led to immense growth in the art market? In order to pursue this question, in the next section we will turn to Beech’s rethinking of the Marxist labour theory of value in the context of the art market. Value and Labour Here, it is worthwhile to turn to Beech’s distinction between the price of the artwork and the value of the artwork. For Beech, an artwork’s price is whatever sum of money it can be exchanged for in the market. Most neoclassical economists treat price and value as being synonymous, and, from this position, it makes no sense to ask if an artwork is worth—or if its value is equivalent—to its current price. As Beech writes, “neoclassical economics claims to be able to treat the sale of artworks as a standard transaction with prices determined entirely by demand and the subjective perception of utility by wealthy purchasers” (Beech 291). Against this view, Beech offers a Marxist interpretation of artistic value, one that emphasises labour-time in the production of artistic reputation. Reputation is key here, as Beech dismisses the notion that an increase in artistic labour-time increases the value of an artwork. Against neoclassical economists, Beech (311) writes that “the increase or decrease in the price of artworks is not ‘a floating crap game’, but is determined by the changing circumstances of the artwork itself vis-à-vis the esteem it is held in by the art community”. Accordingly, Beech states that the prices of artworks are seriously affected—perhaps even driven—by the non-purchasing “consumers” of art, namely academics, commentators, and other artists, who determine the general reputation of artworks. Accordingly, if we want to understand the prices of artworks at the marketplace, we need to focus our attention on art’s evaluative discourses, the production of knowledge, and the practices of producing objects that provide an assessment and legacy for a work or body of work, such as photographic reproductions and monographs. Artistic value as reputation is not only expressed through the economic consumption of products, but in the activities of learning from them, asking questions of them, reconfiguring them in new products, combining them and rejecting them. The high prices of art derive from the high status of the work within the discourses of art (Beech 312). Whereas the conventional Marxist labour theory of value focusses on the socially necessary labour time for the production of a commodity, Beech emphasises the labour of the consumer rather than that of the producer. As we have shown, an artwork that takes very little time to produce—such as Cattelan’s Comedian—can attract a much larger price than a painting by a lesser-known artist who spends months in the studio. Nevertheless, Beech argues that the greater the labour time of the non-purchasing consumers of art, the greater the artwork’s value. By maintaining a distinction between price—the quantity of money an artwork can be exchanged for—and value—the total of labour-time expended in discussing, viewing, and reproducing an artwork—Beech provides us with a framework for understanding how prices emerge, without exaggerating the predictive powers of such a framework. If an artist’s work is priced relatively low, but the discourse around their work is expanding rapidly, there is the potential to make a purchase below value, even if this investment is still speculative. By contrast, the neoclassical perspective renders this approach to the price/value relationship unthinkable. What, then, distinguishes artistic—or artworld—discourse from marketing? Beyond the simple observation that marketing teams are directly employed by capitalists in order to push a message that is directly related to increasing surplus-value, Beech argues that “it is a condition of the contribution of art discourse to the inflation of the value of art that it is independent from the economic interests at stake” (Beech 313). Though Beech does not put it this way, we could argue that the gap between artistic discourse and those who stand to financially benefit from the inflation of an artwork’s value produces the “aura” of the artwork. Coca-Cola’s marketing team is unlikely to change its opinion about its famous product, whereas art discourse is produced—for the most part—by a decentralised “artworld” of curators, critics, museologists, historians, philosophers, artists, and viewers, all of whom gravitate towards certain works at certain times—and it is arguably the uncertainty and uncoordinated nature of these shifts in reputational favour that make certain works feel miraculous. While, in the short term, a Bored Ape, and an artwork like Comedian, can attract a high price, it is unlikely that these artworks will maintain that price overtime—for this to happen, one would have to imagine an ongoing process of enrichment, one that would find new conversations to have about such works beyond the novelty of their unlikely price tags. Enriching the Blockchain While recent years have seen the publication of impressive and sophisticated quantitative studies of the NFT market, such studies have focussed on the quantifiable aspects of value and reputation (Vasan et al.; Nadini et al.). While such research has shown that connection to prominent collectors, and visibility on popular crypto-platforms, is an indicator of the expected price of an NFT, Beech’s research suggests that a range of difficult-to-quantify factors must be taken into consideration. While quantifiable forms of influence are of course important, the capacity for an artwork—linked to an NFT or not—to be discursively enriched, such that its status as historically and culturally significant appears independent from the testimony of those who would financially benefit from its revaluation, appears vital for its long-term enrichment and accrual of value. Some have attempted to articulate the emerging value of the NFT market in such terms. For example, Paul Dylan-Ennis claims that in order to understand CryptoPunks—one of the older artistic series to be linked to NFTs, and which can sell for up to $1.6 million—we must appreciate that they “are sought after because of their age, like blockchain antiques” (Dylan-Ennis). For Dylan-Ennis, NFTs like Cryptopunks are valuable insofar as they are “the oldest NFTs”, and, accordingly, it is “their ‘metadata’” or their “longevity on the blockchain” that is desired (Dylan-Ennis). In Dylan-Ennis’s account, NFTs are worth investing in because their past will one day be historically significant, hence his injunction for us to “look past the art and look at the medium to get what is going on” (Dylan-Ennis). But rather than looking at the medium, perhaps it is more fruitful to look to the institutional forms that nurture, generate, and circulate the reputational discourses that modify artistic value. In doing so, we will not only avoid the conservative move of denouncing NFT artworks on the basis of an arbitrary aesthetic standard, but also the utopian move of associating NFTs with the fantasy of a future “in which the subject is free from coercive mediating institutions, the state chief among them, wielding data certainty as a means of freedom and social transformation” (Jutel 4). Rather than NFTs freeing the digital artist from the problems imposed by ease of reproduction, we can see that the reputational value of the artwork linked to a non-fungible token requires the fungibility of reproduction, circulation, commentary, and discussion. NFT boosters have been quick to critique the institutions that have traditionally provided the training that fosters such discourse and expertise—in the form of the non-purchasing consumers discussed by Beech— as gatekeepers that exploit artists. While we should acknowledge the gross inequities of the artworld and academia, such institutions have nevertheless been relatively historically successful in their attempt to produce large audiences that can participate in the enrichment of past objects, and the connection of new objects to that past. The challenge that the cryptoworld will face, is whether, like the artworld, it can marshal similar long-term discursive labour in the process of enrichment. If it cannot, we may ironically see the same “gatekeeping” institutions of the artworld invoked to bolster the value of the NFT market. References Artnet. “‘They’ve Created Perceived Value Out of Thin Air’: The Whole Bored Ape Yacht Club Phenomenon, Explained.” 8 April 2022 <https://news.artnet.com/multimedia/the-art-angle-podcast-bored-ape-yacht-club-2094073>. BBC News. “What Are NFTs and Why Are Some Worth Millions?” 23 Sep. 2021. <https://www.bbc.com/news/technology-56371912>. Beech, Dave. Art and Value: Art’s Economic Exceptionalism in Classical, Neoclassical and Marxist Economics. Leiden: Brill, 2015. Boltanski, Christian, and Arnauld Esquerre. Enrichment: A Critique of Commodities. Trans. Catherine Porter. London: Polity, 2020. Callahan, Sara. “The Value of a Banana: Understanding Absurd and Ephemeral Artwork.” The Conversation 8 Oct. 2020. <https://theconversation.com/the-value-of-a-banana-understanding-absurd-and-ephemeral-artwork-147689>. Cras, Sophie. The Artist as Economist: Art and Capitalism in the 1960s. Trans. Malcolm DeBevoise. Massachusetts: Yale UP, 2019. Dylan-Ennis, Paul. “NFT Art: The Bizarre World Where Burning a Banksy Can Make It More Valuable.” The Conversation 6 Mar. 2021. <https://theconversation.com/nft-art-the-bizarre-world-where-burning-a-banksy-can-make-it-more-valuable-156605>. Krastrenakes, Jacob. “Beeple Sold an NFT for $69 Million.” The Verge 11 Mar. 2021. <https://www.theverge.com/2021/3/11/22325054/beeple-christies-nft-sale-cost-everydays-69-million>. Kugler, Logan. “Non-Fungible Tokens and the Future of Art.” Communications of the ACM 64.9 (2021). DOI: 10.1145/3474355. Mackenzie, Simon, and Diāna Bērziņa. “NFTs: Digital Things and Their Criminal Lives.” Crime Media Culture (2021). DOI: 10.1177/17416590211039797. Nadini, Matthieu, et al. “Mapping the NFT Revolution: Market Trends, Trade Networks, and Visual Features.” Scientific Reports 11.20902 (2021). DOI: 10.1038/s41598021000538. Nguyen, Terry. “The Value of NFTs, Explained by an Expert: How Emotional Attachment to Certain Items and Gifts Could Affect Our Understanding of Value.” Vox 31 Mar. 2021. <https://www.vox.com/the-goods/22358262/value-of-nfts-behavioral-expert>. O’Dwyer, Rachel. “A Celestial Cyberdimension: Art Tokens and the Artwork as Derivative.” Circa Art Magazine 3 Dec. 2018. <https://circaartmagazine.net/a-celestial-cyberdimension-art-tokens-and-the-artwork-as-derivative/#_ftn21>. Joselit, David. “NFTs, or the Readymade Reversed.” October 175 (2021): 3–4. Jutel, Olivier. “Blockchain Imperialism in the Pacific.” Big Data & Society (2021). DOI: 10.1177/2053951720985249. Rennie, Ellie, et al. “Provocation Paper: Blockchain and the Creative Industries.” RMIT, 2019. <https://apo.org.au/sites/default/files/resource-files/2019-11/apo-nid267131.pdf>. Tripathi, Smita. “How NFTs Are Disrupting the Art World.” Business Today 20 Feb. 2022. <https://www.businesstoday.in/magazine/luxury-lifestyle/story/how-nfts-are-disrupting-the-art-world-321706-2022-02-15>. Vasan, Kishore, et al. “Quantifying NFT-Driven Networks in Crypto Art.” Scientific Reports 12.2769 (2022). DOI: 10.1038/s41598-022-05146-6.
APA, Harvard, Vancouver, ISO, and other styles
36

Caluya, Gilbert. "The Architectural Nervous System." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2689.

Full text
Abstract:
If the home is traditionally considered to be a space of safety associated with the warm and cosy feeling of the familial hearth, it is also continuously portrayed as a space under threat from the outside from which we must secure ourselves and our families. Securing the home entails a series of material, discursive and performative strategies, a host of precautionary measures aimed at regulating and ultimately producing security. When I was eleven my family returned home from the local fruit markets to find our house had been ransacked. Clothes were strewn across the floor, electrical appliances were missing and my parents’ collection of jewellery – wedding rings and heirlooms – had been stolen. Few things remained untouched and the very thought of someone else’s hands going through our personal belongings made our home feel tainted. My parents were understandably distraught. As Filipino immigrants to Australia the heirlooms were not only expensive assets from both sides of my family, but also signifiers of our homeland. Added to their despair was the fact that this was our first house – we had rented prior to that. During the police interviews, we discovered that our area, Sydney’s Western suburbs, was considered ‘high-risk’ and we were advised to install security. In their panic my parents began securing their home. Grills were installed on every window. Each external wooden door was reinforced by a metal security door. Movement detectors were installed at the front of the house, which were set to blind intruders with floodlights. Even if an intruder could enter the back through a window a metal grill security door was waiting between the backroom and the kitchen to stop them from getting to our bedrooms. In short, through a series of transformations our house was made into a residential fortress. Yet home security had its own dangers. A series of rules and regulations were drilled into me ‘in case of an emergency’: know where your keys are in case of a fire so that you can get out; remember the phone numbers for an emergency and the work numbers of your parents; never let a stranger into the house; and if you need to speak to a stranger only open the inside door but leave the security screen locked. Thus, for my Filipino-migrant family in the 1990s, a whole series of defensive behaviours and preventative strategies were produced and disseminated inside and around the home to regulate security risks. Such “local knowledges” were used to reinforce the architectural manifestations of security at the same time that they were a response to the invasion of security systems into our house that created a new set of potential dangers. This article highlights “the interplay of material and symbolic geographies of home” (Blunt and Varley 4), focusing on the relation between urban fears circulating around and within the home and the spatial practices used to negotiate such fears. In exploring home security systems it extends the exemplary analysis of home technologies already begun in Lynn Spigel’s reading of the ‘smart home’ (381-408). In a similar vein, David Morley’s analysis of mediated domesticity shows how communications technology has reconfigured the inside and outside to the extent that television actually challenges the physical boundary that “protects the privacy and solidarity of the home from the flux and threat of the outside world” (87). Television here serves as a passage in which the threat of the outside is reframed as news or entertainment for family viewing. I take this as a point of departure to consider the ways that this mediated fear unfolds in the technology of our homes. Following Brian Massumi, I read the home as “a node in a circulatory network of many dimensions (each corresponding to a technology of transmission)” (85). For Massumi, the home is an event-space at the crossroads of media technologies and political technologies. “In spite of the locks on the door, the event-space of the home must be seen as one characterized by a very loose regime of passage” (85). The ‘locked door’ is not only a boundary marker that defines the inside from the outside but another technology that leads us outside the home into other domains of inquiry: the proliferation of security technologies and the mundane, fearful intimacies of the home. In this context, we should heed Iris Marion Young’s injunction to feminist critics that the home does provide some positives including a sense of privacy and the space to build relationships and identities. Yet, as Colomina argues, the traditional domestic ideal “can only be produced by engaging the home in combat” (20). If, as Colomina’s comment suggests, ontological security is at least partially dependent on physical security, then this article explores the ontological effects of our home security systems. Houses at War: Targeting the Family As Beatriz Colomina reminds us, in times of war we leave our homelands to do battle on the front line, but battle lines are also being drawn in our homes. Drawing inspiration from Virilio’s claim that contemporary war takes place without fighting, Colomina’s article ‘Domesticity at War’ contemplates the domestic interior as a “battlefield” (15). The house, she writes, is “a mechanism within a war where the differences between defense [sic] and attack have become blurred” (17). According to the Home Security Precautions, New South Wales, October 1999 report conducted by the Australian Bureau of Statistics, 47% of NSW dwellings were ‘secure’ (meaning that they either had a burglar alarm, or all entry points were secured or they were inside a security block) while only 9% of NSW households had no home security devices present (Smith 3). In a similar report for Western Australia conducted in October 2004, an estimated 71% of WA households had window security of some sort (screens, locks or shutters) while 67% had deadlocks on at least one external door (4). An estimated 27% had a security alarm installed while almost half (49%) had sensor lights (Hubbard 4-5). This growing sense of insecurity means big business for those selling security products and services. By the end of June 1999, there were 1,714 businesses in Australia’s security services industry generating $1,395 million of income during 1998-99 financial year (McLennan 3; see also Macken). This survey did not include locksmith services or the companies dealing with alarm manufacturing, wholesaling or installing. While Colomina’s article focuses on the “war with weather” and the attempts to control environmental conditions inside the home through what she calls “counterdomesticity” (20), her conceptualisation of the house as a “military weapon” (17) provides a useful tool for thinking the relation between the home, architecture and security. Conceiving of the house as a military weapon might seem like a stretch, but we should recall that the rhetoric of war has already leaked into the everyday. One hears of the ‘war on drugs’ and the ‘war on crime’ in the media. ‘War’ is the everyday condition of our urban jungles (see also Diken and Lausten) and in order to survive, let alone feel secure, one must be able to defend one’s family and home. Take, for example, Signal Security’s website. One finds a panel on the left-hand side of the screen to all webpages devoted to “Residential Products”. Two circular images are used in the panel with one photograph overlapping the other. In the top circle, a white nuclear family (stereotypical mum, dad and two kids), dressed in pristine white clothing bare their white teeth to the internet surfer. Underneath this photo is another photograph in which an arm clad in a black leather jacket emerges through a smashed window. In the foreground a black-gloved hand manipulates a lock, while a black balaclava masks an unrecognisable face through the broken glass. The effect of their proximity produces a violent juxtaposition in which the burglar visually intrudes on the family’s domestic bliss. The panel stages a struggle between white and black, good and bad, family and individual, security and insecurity, recognisability and unidentifiability. It thus codifies the loving, knowable family as the domestic space of security against the selfish, unidentifiable intruder (presumed not to have a family) as the primary reason for insecurity in the family home – and no doubt to inspire the consumption of security products. Advertisements of security products thus articulate the family home as a fragile innocence constantly vulnerable from the outside. From a feminist perspective, this image of the family goes against the findings of the National Homicide Monitoring Program, which shows that 57% of the women killed in Australia between 2004 and 2005 were killed by an intimate partner while 17% were killed by a family member (Mouzos and Houliaras 20). If, on the one hand, the family home is targeted by criminals, on the other, it has emerged as a primary site for security advertising eager to exploit the growing sense of insecurity – the family as a target market. The military concepts of ‘target’ and ‘targeting’ have shifted into the benign discourse of strategic advertising. As Dora Epstein writes, “We arm our buildings to arm ourselves from the intrusion of a public fluidity, and thus our buildings, our architectures of fortification, send a very clear message: ‘avoid this place or protect yourself’” (1997: 139). Epstein’s reference to ‘architectures of fortification’ reminds us that the desire to create security through the built environment has a long history. Nan Ellin has argued that fear’s physical manifestation can be found in the formation of towns from antiquity to the Renaissance. In this sense, towns and cities are always already a response to the fear of foreign invaders (Ellin 13; see also Diken and Lausten 291). This fear of the outsider is most obviously manifested in the creation of physical walls. Yet fortification is also an effect of spatial allusions produced by the configuration of space, as exemplified in Fiske, Hodge and Turner’s semiotic reading of a suburban Australian display home without a fence. While the lack of a fence might suggest openness, they suggest that the manicured lawn is flat so “that eyes can pass easily over it – and smooth – so that feet will not presume to” (30). Since the front garden is best viewed from the street it is clearly a message for the outside, but it also signifies “private property” (30). Space is both organised and lived, in such a way that it becomes a medium of communication to passers-by and would-be intruders. What emerges in this semiotic reading is a way of thinking about space as defensible, as organised in a way that space can begin to defend itself. The Problematic of Defensible Space The incorporation of military architecture into civil architecture is most evident in home security. By security I mean the material systems (from locks to electronic alarms) and precautionary practices (locking the door) used to protect spaces, both of which are enabled by a way of imagining space in terms of risk and vulnerability. I read Oscar Newman’s 1972 Defensible Space as outlining the problematic of spatial security. Indeed, it was around that period that the problematic of crime prevention through urban design received increasing attention in Western architectural discourse (see Jeffery). Newman’s book examines how spaces can be used to reinforce human control over residential environments, producing what he calls ‘defensible space.’ In Newman’s definition, defensible space is a model for residential environments which inhibits crime by creating the physical expression of a social fabric that defends itself. All the different elements which combine to make a defensible space have a common goal – an environment in which latent territoriality and sense of community in the inhabitants can be translated into responsibility for ensuring a safe, productive, and well-maintained living space (3). Through clever design space begins to defend itself. I read Newman’s book as presenting the contemporary problematic of spatialised security: how to structure space so as to increase control; how to organise architecture so as to foster territorialism; how to encourage territorial control through amplifying surveillance. The production of defensible space entails moving away from what he calls the ‘compositional approach’ to architecture, which sees buildings as separate from their environments, and the ‘organic approach’ to architecture, in which the building and its grounds are organically interrelated (Newman 60). In this approach Newman proposes a number of changes to space: firstly, spaces need to be multiplied (one no longer has a simple public/private binary, but also semi-private and semi-public spaces); secondly, these spaces must be hierarchised (moving from public to semi-public to semi-private to private); thirdly, within this hierarchy spaces can also be striated using symbolic or material boundaries between the different types of spaces. Furthermore, spaces must be designed to increase surveillance: use smaller corridors serving smaller sets of families (69-71); incorporate amenities in “defined zones of influence” (70); use L-shaped buildings as opposed to rectangles (84); use windows on the sides of buildings to reveal the fire escape from outside (90). As he puts it, the subdivision of housing projects into “small, recognisable and comprehensible-at-a-glance enclaves is a further contributor to improving the visual surveillance mechanism” (1000). Finally, Newman lays out the principle of spatial juxtaposition: consider the building/street interface (positioning of doors and windows to maximise surveillance); consider building/building interface (e.g. build residential apartments next to ‘safer’ commercial, industrial, institutional and entertainment facilities) (109-12). In short, Newman’s book effectively redefines residential space in terms of territorial zones of control. Such zones of influence are the products of the interaction between architectural forms and environment, which are not reducible to the intent of the architect (68). Thus, in attempting to respond to the exigencies of the moment – the problem of urban crime, the cost of housing – Newman maps out residential space in what Foucault might have called a ‘micro-physics of power’. During the mid-1970s through to the 1980s a number of publications aimed at the average householder are printed in the UK and Australia. Apart from trade publishing (Bunting), The UK Design Council released two small publications (Barty, White and Burall; Design Council) while in Australia the Department of Housing and Construction released a home safety publication, which contained a small section on security, and the Australian Institute of Criminology published a small volume entitled Designing out Crime: Crime prevention through environmental design (Geason and Wilson). While Newman emphasised the responsibility of architects and urban planners, in these publications the general concerns of defensible space are relocated in the ‘average homeowner’. Citing crime statistics on burglary and vandalism, these publications incite their readers to take action, turning the homeowner into a citizen-soldier. The householder, whether he likes it or not, is already in a struggle. The urban jungle must be understood in terms of “the principles of warfare” (Bunting 7), in which everyday homes become bodies needing protection through suitable architectural armour. Through a series of maps and drawings and statistics, the average residential home is transformed into a series of points of vulnerability. Home space is re-inscribed as a series of points of entry/access and lines of sight. Simultaneously, through lists of ‘dos and don’ts’ a set of precautionary behaviours is inculcated into the readers. Principles of security begin codifying the home space, disciplining the spatial practices of the intimate, regulating the access and mobility of the family and guests. The Architectural Nervous System Nowadays we see a wild, almost excessive, proliferation of security products available to the ‘security conscious homeowner’. We are no longer simply dealing with security devices designed to block – such as locks, bolts and fasteners. The electronic revolution has aided the production of security devices that are increasingly more specialised and more difficult to manipulate, which paradoxically makes it more difficult for the security consumer to understand. Detection systems now include continuous wiring, knock-out bars, vibration detectors, breaking glass detectors, pressure mats, underground pressure detectors and fibre optic signalling. Audible alarm systems have been upgraded to wire-free intruder alarms, visual alarms, telephone warning devices, access control and closed circuit television and are supported by uninterruptible power supplies and control panels (see Chartered Institution of Building Service Engineers 19-39). The whole house is literally re-routed as a series of relays in an electronic grid. If the house as a security risk is defined in terms of points of vulnerability, alarm systems take these points as potential points of contact. Relays running through floors, doors and windows can be triggered by pressure, sound or dislocation. We see a proliferation of sensors: switching sensors, infra-red sensors, ultrasonic sensors, microwave radar sensors, microwave fence sensors and microphonic sensors (see Walker). The increasing diversification of security products attests to the sheer scale of these architectural/engineering changes to our everyday architecture. In our fear of crime we have produced increasingly more complex security products for the home, thus complexifying the spaces we somehow inherently feel should be ‘simple’. I suggest that whereas previous devices merely reinforced certain architectural or engineering aspects of the home, contemporary security products actually constitute the home as a feeling, architectural body capable of being affected. This recalls notions of a sensuous architecture and bodily metaphors within architectural discourse (see Thomsen; Puglini). It is not simply our fears that lead us to secure our homes through technology, but through our fears we come to invest our housing architecture with a nervous system capable of fearing for itself. Our eyes and ears become detection systems while our screams are echoed in building alarms. Body organs are deterritorialised from the human body and reterritorialised on contemporary residential architecture, while our senses are extended through modern security technologies. The vulnerable body of the family home has become a feeling body conscious of its own vulnerability. It is less about the physical expression of fear, as Nan Ellin has put it, than about how building materialities become capable of fearing for themselves. What we have now are residential houses that are capable of being more fully mobilised in this urban war. Family homes become bodies that scan the darkness for the slightest movements, bodies that scream at the slightest possibility of danger. They are bodies that whisper to each other: a house can recognise an intrusion and relay a warning to a security station, informing security personnel without the occupants of that house knowing. They are the newly produced victims of an urban war. Our homes are the event-spaces in which mediated fear unfolds into an architectural nervous system. If media plug our homes into one set of relations between ideologies, representations and fear, then the architectural nervous system plugs that back into a different set of relations between capital, fear and the electronic grid. The home is less an endpoint of broadcast media than a node in an electronic network, a larger nervous system that encompasses the globe. It is a network that plugs architectural nervous systems into city electronic grids into mediated subjectivities into military technologies and back again, allowing fear to be disseminated and extended, replayed and spliced into the most banal aspects of our domestic lives. References Barty, Euan, David White, and Paul Burall. Safety and Security in the Home. London: The Design Council, 1980. Blunt, Alison, and Ann Varley. “Introduction: Geographies of Home.” Cultural Geographies 11.1 (2004): 3-6. Bunting, James. The Protection of Property against Crime. Folkestone: Bailey Brothers & Sinfen, 1975. Chartered Institution of Building Service Engineers. Security Engineering. London: CIBSE, 1991. Colomina, Beatriz. “Domesticity at War.” Assemblage 16 (1991): 14-41. Department of Housing and Construction. Safety in and around the Home. Canberra: Australian Government Publishing Service, 1981. Design Council. The Design Centre Guide to Domestic Safety and Security. London: Design Council, 1976. Diken, Bülent, and Carsten Bagge Lausten. “Zones of Indistinction: Security and Terror, and Bare Life.” Space and Culture 5.3 (2002): 290-307. Ellin, Nan. “Shelter from the Storm or Form Follows Fear and Vice Versa.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Epstein, Dora. “Abject Terror: A Story of Fear, Sex, and Architecture.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Fiske, John, Bob Hodge, and Graeme Turner. Myths of Oz: Reading Australian Popular Culture. Sydney: Allen & Unwin, 1987. Geason, Susan, and Paul Wilson. Designing Out Crime: Crime Prevention through Environmental Design. Canberra: Australian Institute of Criminology, 1989. Hubbard, Alan. Home Safety and Security, Western Australia. Canberra: Australian Bureau of Statistics, 2005. Jeffery, C. Ray. Crime Prevention through Environmental Design. Beverley Hills: Sage, 1971. Macken, Julie. “Why Aren’t We Happier?” Australian Financial Review 26 Nov. 1999: 26. Mallory, Keith, and Arvid Ottar. Architecture of Aggression: A History of Military Architecture in North West Europe, 1900-1945. Hampshire: Architectural Press, 1973. Massumi, Brian. Parables of the Virtual: Movement, Affect, Sensation. Durham: Duke University Press, 2002. McLennan, W. Security Services, Australia, 1998-99. Canberra: Australian Bureau of Statistics, 2000. Morley, David. Home Territories: Media, Mobility and Identity. London and New York: Routledge, 2000. Mouzos, Jenny, and Tina Houliaras. Homicide in Australia: 2004-05 National Homicide Monitoring Program (NHMP) Annual Report. Research and Public Policy Series 72. Canberra: Australian Institute of Criminology, 2006. Newman, Oscar. Defensible Space: Crime Prevention through Urban Design. New York: Collier, 1973. Puglini, Luigi. HyperArchitecture: Space in the Electronic Age. Basel: Bikhäuser, 1999. Signal Security. 13 January 2007 http://www.signalsecurity.com.au/securitysystems.htm>. Smith, Geoff. Home Security Precautions, New South Wales, October 1999. Canberra: Australian Bureau of Statistics, 2000. Spigel, Lynn. Welcome to the Dreamhouse: Popular Media and Postwar Suburbs. Durham and London: Duke University Press, 2001. Thomsen, Christian W. Sensuous Architecture: The Art of Erotic Building. Munich and New York: Prestel, 1998. Walker, Philip. Electronic Security Systems: Better Ways to Crime Prevention. London: Butterworths, 1983. Young, Iris Marion. “House and Home: Feminist Variations on a Theme.” Feminist Interpretations of Martin Heidegger. Eds. Nancy J. Holland and Patricia Huntington. University Park, Pennsylvania: Pennsylvania State UP, 2001. Citation reference for this article MLA Style Caluya, Gilbert. "The Architectural Nervous System: Home, Fear, Insecurity." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/05-caluya.php>. APA Style Caluya, G. (Aug. 2007) "The Architectural Nervous System: Home, Fear, Insecurity," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/05-caluya.php>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography