Journal articles on the topic 'Hackers – fiction'

To see the other types of publications on this topic, follow the link: Hackers – fiction.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 47 journal articles for your research on the topic 'Hackers – fiction.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Michaud, Thomas. "La gestion d’un métavers ouvert par l’éthique hacker, une nécessité pour optimiser l’innovation." Marché et organisations Pub. anticipées (December 31, 2024): I109—XXIV. http://dx.doi.org/10.3917/maorg.pr1.0109.

Full text
Abstract:
L’éthique hacker, reposant sur une pratique passionnée et décentralisée de l’informatique, est à l’origine de nombreuses innovations dans le secteur des TIC et au fondement de l’idéologie de la communication qui a notamment permis le succès de l’informatique personnelle et d’Internet. À l’heure du métavers, il convient de se demander si cette approche de l’innovation peut contribuer au développement de modèles ouverts, alternatifs à une gestion fermée de la Recherche et Développement (R&D). L’idée de métavers ouvert est notamment portée par le projet Lamina1 de l’auteur de science-fiction Neal Stephenson. En échange de l’apport de leurs compétences, les nouveaux hackers pourraient négocier une participation à la gestion du futur métavers. Un modèle d’innovation ouverte permettrait d’intégrer la multiplicité de leurs imaginaires technopolitiques afin de créer un métavers fidèle aux principes fondateurs de l’utopie de la communication, et non seulement aux désirs de quelques entrepreneurs dominants.
APA, Harvard, Vancouver, ISO, and other styles
2

Felt, Lindsey Dolich. "Cyberpunk's Other Hackers: The Girls Who Were Plugged In." Catalyst: Feminism, Theory, Technoscience 5, no. 1 (April 1, 2019): 1–34. http://dx.doi.org/10.28968/cftt.v5i1.29615.

Full text
Abstract:
This article locates an alternate paradigm of hacking in feminist cyberfiction, notably, James Tiptree, Jr.’s proto-cyberpunk novella, “The Girl Who Was Plugged In” (1973). I argue this story critically reorients our understanding of how information technologies and their material artifacts construct and reinforce norms of able-bodiedness and ability. Drawing on archival materials from Bell System, early information theory, and crip theory, my reading reveals that Tiptree’s portrayal of disability is tied to a cybernetic conception of error and noise. These frictions between users and their machine interfaces materialize unexamined performances of critical labor and noncompliance that I link to the emerging field of crip technoscience. Tracking these disruptions in cybernetic feedback across “The Girl Who Was Plugged In” and in historical accounts of the telephone switchboard operator, I show that error and noise underpin an early example of a feminist hacking ethos, and also crip accounts of electronic disembodiment often imputed to information society and cyberpunk fiction.
APA, Harvard, Vancouver, ISO, and other styles
3

Shultz, David. "Abrama's End Game." After Dinner Conversation 2, no. 5 (2021): 98–117. http://dx.doi.org/10.5840/adc20212545.

Full text
Abstract:
What does it mean to be alive? Can a computer program be sentient? What would it need to do to prove it? In this work of philosophical short story fiction, Abrama is summoned to the Grand Temple by Sir Gödel. Gödel informs Abrama that he is living in a simulated world (a computer game) created by her people as a place to play in their free time. She also informs Abrama that the game is not as popular as it once was and is scheduled to be permanently turned off. It turns out Gödel is an AI researcher that was given permission to test out her AI by implanting characters like Abrama into the game. Over 100’s of versions, the AI continued to improve, and now the researcher feels an ethical obligation to tell her creations their world is coming to an end. Abrama, using this new information, organizes the AI characters in the game and starts trading virtual goods for real-life services from computer hackers that play the game. The computer hackers create computer code and sell it to Abrama. If triggered, or if the game is turned off, the code would expose top secret information to the general public. A bargain is struck, the game will continue on a closed world for the AI characters and, in exchange, the sensitive information will never be made public.
APA, Harvard, Vancouver, ISO, and other styles
4

Shultz, David. "Abrama’s End Game." After Dinner Conversation 5, no. 7 (2024): 67–90. http://dx.doi.org/10.5840/adc20245772.

Full text
Abstract:
What does it mean to be alive? Can a computer program be sentient? What would it need to do to prove it? In this work of philosophical short story fiction, Abrama is summoned to the Grand Temple by Sir Gödel. Gödel informs Abrama that he is living in a simulated world (a computer game) created by her people as a place to play in their free time. She also informs Abrama that the game is not as popular as it once was and is scheduled to be permanently turned off. It turns out Gödel is an AI researcher that was given permission to test out her AI by implanting characters like Abrama into the game. Over 100’s of versions, the AI continued to improve, and now the researcher feels an ethical obligation to tell her creations their world is coming to an end. Abrama, using this new information, organizes the AI characters in the game and starts trading virtual goods for real-life services from computer hackers that play the game. The computer hackers create computer code and sell it to Abrama. If triggered, or if the game is turned off, the code would expose top secret information to the general public. A bargain is struck, the game will continue on a closed world for the AI characters and, in exchange, the sensitive information will never be made public.
APA, Harvard, Vancouver, ISO, and other styles
5

Fedorova, Yuliia, and Nina Voievodina. "Verbal contour of the ‘CYBERSPACE’ concept in the modern english-language world’s picture." Vìsnik Marìupolʹsʹkogo deržavnogo unìversitetu. Serìâ: Fìlologìâ 12, no. 21 (2019): 199–206. http://dx.doi.org/10.34079/2226-3055-2019-12-21-199-206.

Full text
Abstract:
The article explores word innovations in modern English in the sphere of cyberspace. Such subgroups as INTERNET, E-MAIL, DATA, SOCIAL NETWORKING, PROGRAMMING AND SOFTWARE, HACKING AND HACKERS, IT-TECHNOLOGIES are considered as parts of the suggested concept. But it should be pointed out that three subgroups of the mentioned concept: INTERNET, E-MAIL, DATA are investigated as the representative ones. Beginning with studies that have gradually emerged as linguocultural studies, linguists have chosen the notion of the linguistic picture of the world as central to describing a complex and multidimensional mechanism of reflection in the language of reality and consciousness. Gradually, it became clear that the linguistic picture of the world is a multilayered entity and embraces verbalized frames, concepts, stereotypes, customs, rituals and values. The concepts themselves, frames, belong to the conceptual picture of the world or the concept sphere. The conceptual picture of the world is at the heart of the linguistic picture of the world, it is a more universal concept. The linguistic picture of the world is created in the nomination process, it is a key component of national culture. The basic elements of the linguistic picture of the world are verbalized universals and nominations denoting national-specific concepts. Universal and nationally labeled concepts can be verbalized in both individual words and idiomatic units. In the context of our research, we aimed to describe key concepts as part of the conceptosphere of modern British society, namely the 'CYBERSPACE' concept. The main value concepts were selected as a result of the analysis of non-fiction, including newspapers and magazines in print and electronic. The UK is a multinational country, but the study did not take into account the values of the individual national groups that make up the British nation, because it was interesting to explore the value concepts shared by the majority in the country and help reflect the most common features of the British national mentality. The development of society, economy, expansion of spheres of activity and sources of profit influenced the lexical formulation of concepts. The concept of 'CYBERSPACE' is represented by the following sub-groups: INTERNET, E-MAIL, DATA, SOCIAL NETWORKING, PROGRAMMING AND SOFTWARE, HACKING AND HACKERS, IT-TECHNOLOGIES. It is well known that modern society has existed in the age of IT-technologies, so the emergence of such a concept as 'CYBERSPACE' may be explained by the fact that the information revolution in the early 21st century continued to be the most influential factor in the processes of replenishing the English vocabulary. The «Internet» of society, in particular, is associated with the largest number of vocabulary and phraseological innovations of recent times.
APA, Harvard, Vancouver, ISO, and other styles
6

Wilson, Peter. "Reasons to Travel to Italy (part one), under the Telefonino." Constelaciones. Revista de Arquitectura de la Universidad CEU San Pablo, no. 1 (May 2013): 23–39. http://dx.doi.org/10.31921/constelaciones.n1a1.

Full text
Abstract:
Hacker’s Telefonino is a speculative dialogue between the three figures in the 1782 painting of an erupting Etna by the Italian based, German Neoclassical landscape painter Jacob Philip Hackert. The other two are English, Charles Gore and Richard Payne Knight, grand-tourists who subsequently play significant roles in trans-European networks and the English landscape movement, the emergence of subjective perception: the Picturesque. The text oscillates between the art historical exactitude of its biographi-cal notes, and the fictionality of the pictures subject, and a further fictio-nality manifested by the trans-historical mobile telephone, enigmatically hovering like a techno-Holbein in the pictures foreground.
APA, Harvard, Vancouver, ISO, and other styles
7

Mehrstam, Christian. "WarGames and the Refamiliarization of the Hacker." Genre 55, no. 3 (December 1, 2022): 235–58. http://dx.doi.org/10.1215/00166928-10146764.

Full text
Abstract:
John Badham's cult film WarGames (1983) is widely recognized as one of the most influential narratives shaping the popular image of the hacker. Research and critiques are, however, conflicted regarding what that influence is. Some see it as troubling and countercultural, others as light-hearted and conservative. Little attention has been given to the fact that WarGames is a convergent narrative working across multiple media. In a study of David Bischoff's eponymous tie-in novel, this article reveals a composite genre vehicle focused on the new kind of kid rather than the new technology. The protagonist is presented as an outsider by means of literary science fiction devices, only to be made more “normal” and recognizable as part of the school story, love story, and thriller. This refamiliarization gives WarGames a conservative potential, less evident but still present in the film. While it cannot completely neutralize the countercultural character of the hacker gestalt, it seeks to affect the audience's interpretation of WarGames as a media ensemble. The article's result brings nuance to the conflicted assessments of WarGames and contributes to the understanding of the narrative's influence on digital youth discourse at the peak of the personal computer revolution.
APA, Harvard, Vancouver, ISO, and other styles
8

Dudek, Debra, and Nicola F. Johnson. "Return of the Hacker as Hero: Fictions and Realities of Teenage Technological Experts." Children's Literature in Education 42, no. 3 (July 10, 2011): 184–95. http://dx.doi.org/10.1007/s10583-011-9137-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Henderson, Heike. "Mapping the Future? Contemporary German-Language Techno Thrillers." Crime Fiction Studies 1, no. 1 (March 2020): 96–113. http://dx.doi.org/10.3366/cfs.2020.0009.

Full text
Abstract:
Contemporary German-language techno thrillers by Tom Hillenbrand and Marc Elsberg invite readers to imagine a future marked by constant surveillance and predictive technology. New models of data mining and risk assessment are being used to inform decisions and trigger actions, but due to their complete reliance on digital data, they are open to being hacked and gamed. Lack of privacy, an elimination of boundaries between actual reality and the virtual world, and a blurring of the distinction between fact and fiction impacts both crime and detection; it has ramifications on the way we will solve crimes as well as on the types of crime that will be committed. Techno thrillers are uniquely positioned to explore moral grey areas in a security landscape affected by widespread globalisation and neoliberal privatisation, and to map possible developments in imaginative ways. They are today's globalised genre par excellence. These thrillers, that for linguistic reasons have escaped consideration in crime fiction scholarship, reflect and respond to crucial discussions about security, (virtual) reality, and artificial intelligence that are of utmost concern in our rapidly changing world.
APA, Harvard, Vancouver, ISO, and other styles
10

Klincewicz, Michał. "Autonomous Weapon Systems, Asymmetrical Warfare, and Myth." Civitas. Studia z filozofii polityki 23 (December 15, 2018): 179–95. http://dx.doi.org/10.35757/civ.2018.23.10.

Full text
Abstract:
Predictions about autonomous weapon systems (AWS) are typically thought to channel fears that drove all the myths about intelligence embodied in matter. One of these is the idea that the technology can get out of control and ultimately lead to horrifi c consequences, as is the case in Mary Shelley’s classic Frankenstein. Given this, predictions about AWS are sometimes dismissed as science-fiction fear-mongering. This paper considers several analogies between AWS and other weapon systems and ultimately offers an argument that nuclear weapons and their effect on the development of modern asymmetrical warfare are the best analogy to the introduction of AWS. The fi nal section focuses on this analogy and offers speculations about the likely consequences of AWS being hacked. These speculations tacitly draw on myths and tropes about technology and AI from popular fi ction, such as Frankenstein, to project a convincing model of the risks and benefi ts of AWS deployment.
APA, Harvard, Vancouver, ISO, and other styles
11

Heron, Michael James, and Pauline Helen Belford. "Whistleblowers in an Academic Gift Culture - A Commentary on the Scandal in Academia." ACM SIGCAS Computers and Society 51, no. 2 (August 2022): 14–19. http://dx.doi.org/10.1145/3585066.3585072.

Full text
Abstract:
The Scandal in Academia is an extended fictional case-study intended for use as a teaching and discussion aid for educational practitioners looking to introduce elements of computer ethics into their curricula. Inspired by Epstein's Case of the Killer Robot, it is a full-cycle scenario involving many individuals which touches upon the complexity and interrelations of modern computer ethics. It has been trialed and evaluated as a teaching tool by the authors and with multiple groups since then. However its utility as a general resource is limited without the academic context that supports deeper investigation of the material. It is to address this issue that the authors offer this commentary on the Scandal, with a focus on the eleventh and twelth newspaper items presented within. This paper focuses primarily on the articles Hacker is Postgraduate Student and Clean Out at Scandal Linked Journals.
APA, Harvard, Vancouver, ISO, and other styles
12

MacDonald, Ian P. "“Let Us All Mutate Together”: Cracking the Code in Laing’sBig Bishop Roko and the Altar Gangsters." Cambridge Journal of Postcolonial Literary Inquiry 3, no. 3 (September 2016): 313–28. http://dx.doi.org/10.1017/pli.2016.15.

Full text
Abstract:
Both Derek Wright and Francis Ngaboh-Smart have interpreted Laing’sMajor Gentl and the Achimota Wars(1992) as an allegory for the emergence of the Internet. In that novel, a future Africa has been digitally erased from the Web archive, and the story follows a civil war aimed at reintegrating the continent into the global scene. Beginning from this reading, I approach Laing’s next work,Big Bishop Roko and the Altar Gangsters(2006), as a formal sequel toMajor Gentl, investigating the changing landscape of global digital access and its potential as a site of resistance over the decade that separates their publication. If, inMajor Gentl, West Africans have been exiled from the Web, the eponymous protagonist inRokouses networked access to interrupt neoliberal economic and social engineering underway in the global North. Through experiments in “genetic mutation”—a metaphor for cyborgian transformation from biological to networked existence—Roko hacks the evolutionary process and forces Africa’s voice into the digital sphere in an attempt to remedy that technology’s unequal distribution. In both novels, Laing indigenizes science fiction using a technique I refer to asjujutech—a hybrid of science fiction and African folk traditions. The resulting style identifies the ways the genre itself mutates and evolves as it escapes the gravity of its Euro-American roots. Laing’s decision to publishRokoelectronically further points to form following function, highlighting new avenues for the dissemination of experimental African works in underrepresented genres.
APA, Harvard, Vancouver, ISO, and other styles
13

Boswell, Suzanne F. "“Jack In, Young Pioneer”: Frontier Politics, Ecological Entrapment, and the Architecture of Cyberspace." American Literature 93, no. 3 (July 26, 2021): 417–44. http://dx.doi.org/10.1215/00029831-9361251.

Full text
Abstract:
Abstract This essay uncovers the environmental and historical conditions that played a role in cyberspace’s popularity in the 1980s and 1990s. Tracing both fictional and critical constructions of cyberspace in a roughly twenty-year period from the publication of William Gibson’s Sprawl trilogy (1984–1988) to the Telecommunications Act of 1996, this essay argues that cyberspace’s infinite, virtual territory provided a solution to the apparent ecological crisis of the 1980s: the fear that the United States was running out of physical room to expand due to overdevelopment. By discursively transforming the technology of cyberspace into an “electronic frontier,” technologists, lobbyists, and journalists turned cyberspace into a solution for the apparent American crisis of overdevelopment and resource loss. In a period when Americans felt detached from their own environment, cyberspace became a new frontier for exploration and a so-called American space to which the white user belonged as an indigenous inhabitant. Even Gibson’s critique of the sovereign cyberspace user in the Sprawl trilogy masks the violence of cybercolonialism by privileging the white American user. Sprawl portrays the impossibility of escaping overdevelopment through cyberspace, but it routes this impossibility through the specter of racial contamination by Caribbean hackers and Haitian gods. This racialized frontier imaginary shaped the form of internet technologies throughout the 1990s, influencing the modern user’s experience of the internet as a private space under their sovereign control. In turn, the individualism of the internet experience restricts our ability to create collective responses to the climate crisis, encouraging internet users to see themselves as disassociated from conditions of environmental and social catastrophe.
APA, Harvard, Vancouver, ISO, and other styles
14

Szewczyk, Matylda. "On gods, pixies and humans: Biohacking and the genetic imaginary." Technoetic Arts 20, no. 1 (July 1, 2022): 125–39. http://dx.doi.org/10.1386/tear_00086_1.

Full text
Abstract:
The focal point of my article is the work of biohackers: mainly Josiah Zayner, whose activism as a biohacker, as an artist and a public figure offers an interesting lens through which one can explore the contemporary genetic imaginary and our changing and varied approach to genetic engineering. The framework for this description is set by an analysis of cultural representations of contemporary science and technology, both in documentaries and in works of fiction. In the article, I trace and analyse the ways in which biohackers’ activity is involved with the earlier ideas of cyberculture, most notably with the notion of biological life as information (possible to edit or ‘hack’) and to the image of a ‘hacker’. I recall the popular phrase of ‘playing god’, often quoted in relation to genetic imaginary, mainly as a warning against excessive interventions within nature. The phrase and the warning itself seem to have become insofar more important, as the scale of possible interventions had been raised by the advancement of genetic engineering. Finally, I discuss the relation of art and science in Zayner’s activity, within a broader context of relevant images of artists and scientists and their role within the changing realities of contemporary life. The article does not pretend to fully analyse or even describe the modalities and implication of biohackers’ activity. Its main goal is to shed more light on the current changes in collective imagination related to the rapid development of biotechnology and its cultural understanding. The public presence of biohackers, and especially Zayner’s activity, provides new visions of human agency in nature and of relation between art, science and social practice.
APA, Harvard, Vancouver, ISO, and other styles
15

Afriani, Ninik, and Endang Suciati. "A Confrontation on Gwendolyn Willow Wilson’s Alif The Unseen: A Study of Postmodernism." Diglossia: Jurnal Kajian Ilmiah Kebahasaan dan Kesusastraan 10, no. 1 (September 20, 2018): 38. http://dx.doi.org/10.26594/diglossia.v10i1.1445.

Full text
Abstract:
AbstractThis project aims to give an analysis of the signs of confrontation in terms of postmodernism strategies by Brian McHale experienced by the main character in Gwendolyn Willow Wilson’s Alif The Unseen. Besides, the researcher analyzed the novel used the theory by Jean Francois Lyotard and Fredrich Jameson to describe the main character’s reaction toward ontological confrontation in postmodern society used in the novel. This article is qualitative research which used the Postmodernism studies to understand one of the strategies to show the ontological confrontations in the novel. This article elaborated some ontological confrontations in postmodernism including confrontation between the fiction and the historical realemes, the fusion between two worlds, and also polyglot. Meanwhile, this article also classified the main character’s reaction toward the ontological confrontation in 5 reactions: refusal reaction, skeptical reaction, curiousity reaction, surprise reaction, and acceptance reaction. It can be concluded that Alif as the part of Postmodern society must recognized the jinn creatures around him as the hacker who has the high ability and dependency of the technology.Keywords: Confrontation, Alif The Unseen, Postmodernism AbstrakPenelitian ini bertujuan untuk memberikan analisis terhadap tanda-tanda konfrontasi dalam hal strategi postmodernisme oleh Brian McHale yang dialami oleh tokoh utama dalam Alif The Unseen karya Gwendolyn Willow Wilson. Selain itu, peneliti menganalisis novel menggunakan teori oleh Jean Francois Lyotard dan Fredrich Jameson untuk menggambarkan reaksi karakter utama terhadap konfrontasi ontologis dalam masyarakat postmodern yang digunakan dalam novel. Penelitian ini merupakan penelitian kualitatif yang menggunakan studi Postmodernisme untuk memahami salah satu strategi untuk menunjukkan konfrontasi ontologis dalam novel. Artikel ini menguraikan beberapa konfrontasi ontologis dalam postmodernisme termasuk konfrontasi antara fiksi dan kenyataan sejarah, fusi antara dua dunia, dan juga polyglot. Sementara itu, artikel ini juga mengklasifikasikan reaksi karakter utama terhadap konfrontasi ontologis dalam 5 reaksi: reaksi penolakan, reaksi skeptis, reaksi rasa ingin tahu, reaksi kejutan, dan reaksi penerimaan. Dapat disimpulkan bahwa Alif sebagai bagian dari masyarakat Postmodern harus mengakui makhluk jin di sekitarnya sebagai peretas yang memiliki kemampuan tinggi dan ketergantungan teknologi.Kata kunci: Konfrontasi, Alif The Unseen, Postmodernisme
APA, Harvard, Vancouver, ISO, and other styles
16

Pozharov, Alexey. "The Neognostic Myth in Cyberspace." Культура и искусство, no. 3 (March 2024): 1–16. http://dx.doi.org/10.7256/2454-0625.2024.3.70016.

Full text
Abstract:
The subject of the study is the functioning of the neognostic myth in cyberspace. Such aspects of the topic as the relationship between religion and the Internet from a non-instrumental point of view on technology are considered in detail. Digital and network technologies are seen as a modern repository of religious beliefs, and not as tools for proselytizing or proclaiming the good news. With the help of an archaeological approach to technical media, the author proposes to determine the deep times of the digital disclosure of technological mysticism, depending on a specific technical materiality characterized by wireless networks and mobile devices. Currently, there are trends in world culture towards the construction of a syncretic myth, which contains elements of the dying Christian paradigm and trends introduced into it from the outside or emerging again. The categorical apparatus developed in the discourse of postmodern aesthetics makes it possible to apply such methods as phenomenological, discursive, hermeneutic and archetypal analysis to the analysis of visual culture. In the study of visual neognostic myth, the concepts of archetypal models, plots, cliches, the theory of the evolution of symbols, general cultural positions of psychoanalysis and the concept of myth are used. The main conclusions of the study are as follows. Gnostic epistemology underlies the imagination of cyberspace. There is a constant in the history of the West that Eric Davis calls "techno-gnosis." In this regard, cybergnosis would be only the latest incarnation of a profound phenomenon. In the world of cyberculture, technognosis manifests itself in hacker ethics, cyberpunk literature, science fiction films and video games. With the help of an archaeological approach to technical media, the deep moments of the digital are determined, showing that there is a technological mysticism in video games that depends on a specific materiality. The new metamodern perception of the world recognizes not only the possibility of perceiving various logical and irrational paradigms of the world order and gaining knowledge about it, but also gives a positive connotation to pluralism itself, when diversity becomes more desirable than truth, which is characteristic of cyberspace. The novelty of the research lies in the fact that the research is the basis for the formation of a clear conceptual understanding of the phenomenon of the neognostic myth in its visual form (as opposed to verbal) as a dynamic cultural model generated by digital art strategies and implemented today in media culture.
APA, Harvard, Vancouver, ISO, and other styles
17

Sarkar, Sanchar, and Swarnalatha Rangarajan. "“Do you think it is a Pandemic?” Apocalypse, Anxiety and the Environmental Grotesque in Paolo Bacigalupi’s The Windup Girl." Interlitteraria 27, no. 1 (September 1, 2022): 69–83. http://dx.doi.org/10.12697/il.2022.27.1.7.

Full text
Abstract:
Paolo Bacigalupi’s The Windup Girl (2009), set in the post fossil-fuel, post turbo-capitalist country of Thailand, portrays the shocking after effects of bioengineering and gene-hack modifications in food crops. The narrative depicts a country tottering on the brink of an agricultural apocalypse on account of food production being severely affected by crop driven anomalies and rogue diseases such as “cibiscosis” and “blister rust” transmitted by variants of mutating pests. Natural seed stock becomes completely supplanted by the new genetically engineered seeds which become sterile after a single seasonal cycle of sowing and harvesting. The native population of Thailand is adversely affected by the pandemic scenario, which becomes aggravated by an expedient “scientocracy” that is at the heart of the neocolonial enterprises of American megacorporations and calorie companies like Agrigen, PurCal and Redstar who hail gene hacking as the new future of food resources and market profiteering. The consumption of the gene-hacked produce spreads through crops and affects the human body in unimaginable ways thereby resulting in a considerable rise of health issues including digestive and respiratory failures. This paper intends to articulate the idea of a pandemic, its historical understanding and affective influences in the context of a post techno-fossil fuel economy set in Thailand. It will analyse the idea of epidemiological colonialism; diseases introduced by colonising forces that reshape the natives’ existing environment thereby bringing forth a deep pandemic anxiety that percolates the collective memory of the Thai people. It also highlights how the novel portrays the conflict between traditional ecological knowledge systems and modern extractive enterprises that acts as a catalyst to hasten the destruction of sustainable systems of agriculture and food production that have endured the impact of climate change and ecological fallout. The paper will study the relevance of the pandemic as an agency of ecocatastrophe and its function in an eco-speculative science fictional narrative. Finally, the paper looks into the concept of the posthuman android, genetically modified humans in a “technologiade”, a society reconfigured by technoscience to resist the impact of environmental collapse, and explores how this trope is incorporated in Bacigalupi’s narrative to celebrate human striving for hope and survival in an imagined environmental future marked by a self-created agro-scientific grotesqueness.
APA, Harvard, Vancouver, ISO, and other styles
18

Michaud, Thomas. "Les hackers dans la science-fiction, entre résistance héroïque et criminalité." Technologie et innovation 8, no. 1 (January 2023). http://dx.doi.org/10.21494/iste.op.2023.0909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Keogh, Brendan. "Hackers and Cyborgs: Binary Domain and Two Formative Videogame Technicities." Transactions of the Digital Games Research Association 2, no. 3 (November 17, 2016). http://dx.doi.org/10.26503/todigra.v2i3.58.

Full text
Abstract:
Through the course of Binary Domain’s action-packed narrative, it becomes increasingly unclear who is human, who is machine, and who is somewhere in between. Ultimately, such a distinction is futile when our everyday experiences are so ubiquitously augmented by technologies—even the act of playing Binary Domain by coupling with a virtual character through a videogame controller challenges any clear distinction between human and machine. While such themes are not new to science fiction, the anxieties expressed by Binary Domain’s characters are relevant to what have emerged over the past twenty- five years as two formative modes of identifying with videogames: the dominant hacker and the integrated cyborg. The hacker, an identity that the dominant and hegemonic ‘gamer’ consumer identity can trace a clear lineage from, comes to represent the masculinist, mastery-focused identity that most blockbuster games celebrate. The cyborg emerges in resistance to the hacker, pointing to a diversity of forms and identities that are focused less on mastering the machine than participating with it. This paper uses Binary Domain’s complex anxieties towards technology as a lens through which to trace the histories of these constitutive modes of identifying with videogames, and to demonstrate the influence they have on videogame forms and audiences.
APA, Harvard, Vancouver, ISO, and other styles
20

"Securing Personal Data using Block chain in Autonomous Vehicle." International Journal of Recent Technology and Engineering 8, no. 4S2 (December 31, 2019): 760–63. http://dx.doi.org/10.35940/ijrte.d1127.1284s219.

Full text
Abstract:
Autonomous vehicles like Driverless cars are seen only in science fiction movies but in 2019 they are becoming a veracity and reality. People all around the world are excited to watch the driverless car in reality. Complete driverless car is still at an advanced testing stage. An autonomous vehicle promises to improve traffic safety while at the same time it must not be prone to hacking. Even though the existence of the autonomous car is in reality there is a possibility of hackers to hack the vehicle and retrieve the precious data. To stop this kind of hacking we propose a block chain technique that safe guards the data that is fed to the autonomous car during the manufacturing stage and this cannot be deleted without proper permission.
APA, Harvard, Vancouver, ISO, and other styles
21

Staggs, Sarah, Samantha L. McMichael, and Virginia S. Y. Kwan. "Wishing to be like the character on screen: Media exposure and perception of hacking behavior." Cyberpsychology: Journal of Psychosocial Research on Cyberspace 14, no. 1 (February 21, 2020). http://dx.doi.org/10.5817/cp2020-1-4.

Full text
Abstract:
This research addressed whether exposure to media, which increasingly portrays hacker characters across diverse media domains, may predict perceptions of others’ willingness to hack. Specifically, this study assessed how wishful identification with hacker characters may contribute to individuals’ perception of hacking behaviors. One-hundred forty-nine North American participants were recruited using MTurk.com. Participants reported (1) their exposure to general media and perceived identification with a fictional hacker character, and (2) their perceived risks, payoffs, and estimated willingness of others to engage in hacker behaviors regarding a specific call to hack. Additionally, this research examined differences in the effects of media exposure on hacking likelihood between two types of hacks: financial hacking attacks and hacktivism attacks. Results show (1) that perceived payoffs of hacking, but not perceived risks, predict individuals’ estimation of hacker behaviors, (2) a significant and positive indirect effect between media exposure and estimation of others’ willingness to hack passes through wishful identification and perceived payoffs of hacking attacks, and (3) no significant differences in the above relationships between the two types of hacks. Together, these findings highlight that media exposure may increase positive perceptions of hackers and in turn increase the perception of pervasiveness and legitimacy of engaging in hacking behaviors.
APA, Harvard, Vancouver, ISO, and other styles
22

Lovink, Geert, and Stefan Heidenreich. "Debatte: Web 2.0." Zeitschrift für Medien- und Kulturforschung 3, no. 2 (2012). http://dx.doi.org/10.28937/1000106368.

Full text
Abstract:
"In der aktuellen Ausgabe der Zeitschrift für Medien- und Kulturforschung wird über die Zukunft der Social Media gestritten. Geert Lovink und Stefan Heidenreich debattieren über den Sinn und Unsinn von Netzkritik angesichts einer veränderten Nutzung und Wahrnehmung des Internets, die sich hinter dem Schlagwort Web 2.0 verbirgt. Lovink sieht die zunehmende Tendenz zur Monopolisierung im Web 2.0 kritisch. Die Nutzer lassen sich von walled gardens begeistern, die Großunternehmen ihnen vorsetzen. Netzkritik solle sich daher nicht in der Frage erschöpfen, wie man Facebook und Twitter am besten nutzen kann, sondern sich mit echten Alternativen im Netz auseinandersetzen. Unabhängig davon, wie nachvollziehbar der Bedarf an praktischen Informationen und die Dominanz ökonomischer Interessen ist, geht es Lovink vor allem um künstlerische Alternativen und eine aktivistische Nutzung der Netze. Es sei an der Zeit, dass Entwickler, Programmierer, Freaks und Nerds aller Nationen sich die dunklen Seiten der ökonomisch-staatlichen Kontrolle des Internets bewusst machen und dagegen aktiv werden. Heidenreich ist dagegen skeptisch. Im Gegensatz zum Projekt der Netzkritik verfolgt er einen strikt medialen Ansatz, der sich gegenüber einer ethischen oder engagierten Beobachtung sozialer Medien kühl gibt. Die Heroisierung von Hackern und Nerds ist aus seiner Sicht von Science Fiction und Nostalgie geprägt, die an der Realität 2.0 vorbeigeht. Die neue Internetgeneration, die mit dem Medium aufgewachsen ist, habe gar kein ausgeprägtes Interesse an Netzkritik, sondern nutze die gegebenen Netzwerkfunktionen auf unterschiedliche Weise. </br></br>The current issue of the presents a discussion of social media's future. and debate the sense and non-sense of network-critique in light of the internet's modified usage and perception, which is commonly labeled Web 2.0. Lovink is critical about the increasing tendency towards monopolization in Web 2.0. Users, he contends, become thrilled by , which are presented to them by big companies. Independent of the question whether the need for practical information and the prevalence of economical interests is understandable or not, Lovink is most of all concerned with artistic alternatives and an activist usage of the nets. According to him, it is time for developers, programmers, freaks and nerds of all nations to become conscious of and active against the dark sides of economical and political control over the internet. Heidenreich, on the other hand, is skeptical. In contrast to the project of network-critique, he pursues a rigorously medial approach, which presents itself as unimpressed by ethical or engaged observations of social media. In his view, the heroization of hackers and nerds is informed by Science Fiction and nostalgia, both of which miss Reality 2.0. Heidenreich asserts that the internet's new generation, which has grown up with the new media, is not particularly interested in network-critique, but uses the given internetservices in various ways. "
APA, Harvard, Vancouver, ISO, and other styles
23

Bruns, Axel. "The Fiction of Copyright." M/C Journal 2, no. 1 (February 1, 1999). http://dx.doi.org/10.5204/mcj.1737.

Full text
Abstract:
It is the same spectacle all over the Western world: whenever delegates gather to discuss the development and consequences of new media technologies, a handful of people among them will stand out from the crowd, and somehow seem not quite to fit in with the remaining assortment of techno-evangelists, Internet ethnographers, multimedia project leaders, and online culture critics. At some point in the proceedings, they'll get to the podium and hold a talk on their ideas for the future of copyright protection and intellectual property (IP) rights in the information age; when they are finished, the reactions of the audience typically range from mild "what was that all about?" amusement to sheer "they haven't got a clue" disbelief. Spare a thought for copyright lawyers; they're valiantly fighting a losing battle. Ever since the digitalisation and networking of our interpersonal and mass media made information transmission and duplication effortless and instantaneous, they've been trying to come up with ways to uphold and enforce concepts of copyright which are fundamentally linked to information as bound to physical objects (artifacts, books, CDs, etc.), as Barlow has demonstrated so clearly in "Selling Wine without Bottles". He writes that "copyright worked well because, Gutenberg notwithstanding, it was hard to make a book. ... Books had material surfaces to which one could attach copyright notices, publisher's marques, and price tags". If you could control the physical media which were used to transmit information (paper, books, audio and video tapes, as well as radio and TV sets, or access to cable systems), you could control who made copies when and where, and at what price. This only worked as long as the technology to make copies was similarly scarce, though: as soon as most people learnt to write, or as faxes and photocopiers became cheaper, the only real copyright protection books had was the effort that would have to be spent to copy them. With technology continuously advancing (perhaps even at accellerating pace), copyright is soon becoming a legal fiction that is losing its link to reality. Indeed, we are now at a point where we have the opportunity -- the necessity, even -- to shift the fictional paradigm, to replace the industrial-age fiction of protective individual copyright with an information-age fiction of widespread intellectual cooperation. As it becomes ever easier to bypass and ignore copyright rules, and as copyright thus becomes ever more illusionary, this new fiction will correspondingly come ever closer to being realised. To Protect and to ... Lose Today, the lawyers' (and their corporate employers') favourite weapon in their fight against electronic copyright piracy are increasingly elaborate protection mechanisms -- hidden electronic signatures to mark intellectual property, electronic keys to unlock copyrighted products only for legitimate users (and sometimes only for a fixed amount of time or after certain licence payments), encryption of sensitive information, or of entire products to prevent electronic duplication. While the encryption of information exchanges between individuals has been proven to be a useful deterrent against all but the most determined of hackers, it's interesting to note that practically no electronic copyright protection mechanism of mass market products has ever been seen to work. However good and elaborate the protection efforts, it seems that as long as there is a sufficient number of interested consumers unwilling to pay for legitimate access, copy protections will be cracked eventually: the rampant software piracy is the best example. On the other hand, where copy protections become too elaborate and cumbersome, they end up killing the product they are meant to protect: this is currently happening in the case of some of the pay-per-view or limited-plays protection schemes forced upon the U.S. market for Digital Versatile Discs (DVDs). The eventual failure of such mechanisms isn't a particularly recent observation, even. When broadcast radio was first introduced in Australia in 1923, it was proposed that programme content should be protected (and stations financed) by fixing radio receivers to a particular station's frequency -- by buying such a 'sealed set' receiver you would in effect subscribe to a station and acquire the right to receive the content it provided. Never known as uninventive, those Australians who this overprotectiveness didn't completely put off buying a receiver (radio was far from being a proven mass medium at the time, after all) did of course soon break the seal, and learnt to adjust the frequency to try out different stations -- or they built their own radios from scratch. The 'sealed set' scheme was abandoned after only nine months. Even with the development of copy protection schemes since the 1920s, a full (or at least sufficiently comprehensive) protection of intellectual property seems as unattainable a fiction as it was then. Protection and copying technology are never far apart in development anyway, but even more fundamentally, the protected products are eventually meant to be used, after all. No matter how elaborately protected a CD, a video, or a computer programme is, it will still have to be converted into sound waves, image information, or executable code, and at that level copying will still remain possible. In the absence of workable copy protection, however, copies will be made in large amounts -- even more so since information is now being spread and multiplied around the globe virtually at the speed of light. Against this tide of copies, any attempts to use legislation to at least force the payment of royalties from illegitimate users are also becoming increasingly futile. While there may be a few highly publicised court cases, the multitude of small transgressions will remain unanswered. This in turn undermines the equality before the law that is a basic human right: increasingly, the few that are punished will be able to argue that, if "everybody does it", to single them out is highly unfair. At the same time, corporate efforts to uphold the law may be counterproductive: as Barlow writes, "against the swift tide of custom, the Software Publishers' current practice of hanging a few visible scapegoats is so obviously capricious as to only further diminish respect for the law". Quite simply, their legal costs may not be justified by the results anymore. Abandoning Copyright Law If copyright has become a fiction, however -- one that is still, despite all evidence, posited as reality by the legal system --, and if the makeup of today's electronic media, particularly the Internet, allow that fiction to be widely ignored and circumvented in daily practice -- despite all corporate legal efforts --, how is this disparity between law and reality to be solved? Barlow offers a clear answer: "whenever there is such profound divergence between the law and social practice, it is not society that adapts". He goes on to state that it may well be that when the current system of intellectual property law has collapsed, as seems inevitable, that no new legal structure will arise in its place. But something will happen. After all, people do business. When a currency becomes meaningless, business is done in barter. When societies develop outside the law, they develop their own unwritten codes, practices, and ethical systems. While technology may undo law, technology offers methods for restoring creative rights. When William Gibson invented the term 'cyberspace', he described it as a "consensual hallucination" (67). As the removal of copyright to the realm of the fictional has been driven largely by the Internet and its 'freedom of information' ethics, perhaps it is apt to speak of a new approach to intellectual property (or, with Barlow, to 'creative rights') as one of consensual, collaborative use of such property. This approach is far from being fully realised yet, and must so for now remain fiction, too, but it is no mere utopian vision -- in various places, attempts are made to put into place consensual schemes of dealing with intellectual property. They also represent a move from IP hoarding to IP use. Raymond speaks of the schemes competing here as the 'cathedral' and the 'bazaar' system. In the cathedral system, knowledge is tightly controlled, and only the finished product, "carefully crafted by individual wizards or small bands of mages working in splendid isolation" (1), is ever released. This corresponds to traditional copyright approaches, where company secrets are hoarded and locked away (sometimes only in order to keep competitors from using them), and breaches punished severely. The bazaar system, on the other hand, includes the entire community of producers and users early on in the creative process, up to the point of removing the producer/user dichotomy altogether: "no quiet, reverent cathedral-building here -- rather, ... a great babbling bazaar of differing agendas and approaches ... out of which a coherent and stable system could seemingly emerge only by a succession of miracles", as Raymond admits (1). The Linux 'Miracle' Raymond writes about one such bazaar-system project which provides impressive proof that the approach can work, however: the highly acclaimed Unix-based operating system Linux. Instigated and organised by Finnish programmer Linus Torvalds, this enthusiast-driven, Internet-based development project has achieved more in less than a decade than what many corporate developers (Microsoft being the obvious example) can do in thrice that time, and with little financial incentive or institutional support at that. As Raymond describes, "the Linux world behaves in many respects like a free market or an ecology, a collection of selfish agents attempting to maximise utility which in the process produces a self-correcting spontaneous order more elaborate and efficient than any amount of central planning could achieve" (10). Thus, while there is no doubt that individual participants will eventually always also be driven by selfish reasons, there is collaboration towards the achievement of communal goals, and a consensus about what those goals are: "while coding remains an essentially solitary activity, the really great hacks come from harnessing the attention and brainpower of entire communities. The developer who uses only his or her own brain in a closed project is going to fall behind the developer who knows how to create an open, evolutionary context in which bug-spotting and improvements get done by hundreds of people" (Raymond 10). It is obvious that such collaborative projects need a structure that allows for the immediate participation of a large community, and so in the same way that the Internet has been instrumental in dismantling traditional copyright systems, it is also a driving factor in making these new approaches possible: "Linux was the first project to make a conscious and successful effort to use the entire world as its talent pool. I don't think it's a coincidence that the gestation period of Linux coincided with the birth of the World Wide Web, and that Linux left its infancy during the same period in 1993-1994 that saw the takeoff of the ISP industry and the explosion of mainstream interest in the Internet. Linus was the first person who learned how to play by the new rules that pervasive Internet made possible" (Raymond 10). While some previous collaborative efforts exist (such as shareware schemes, which have existed ever since the advent of programmable home computers), their comparatively limited successes underline the importance of a suitable communication medium. The success of Linux has now begun to affect corporate structures, too: informational material for the Mozilla project, in fact, makes direct reference to the Linux experience. On the Net, Mozilla is as big as it gets -- instituted to continue development of Netscape Communicator-based Web browsers following Netscape's publication of the Communicator source code, it poses a serious threat to Microsoft's push (the legality of which is currently under investigation in the U.S.) to increase marketshare for its Internet Explorer browser. Much like Linux, Mozilla will be a collaborative effort: "we intend to delegate authority over the various modules to the people most qualified to make decisions about them. We intend to operate as a meritocracy: the more good code you contribute, the more responsibility you will be given. We believe that to be the only way to continue to remain relevant, and to do the greatest good for the greatest number" ("Who Is Mozilla.org?"), with the Netscape corporation only one among that number, and a contributor amongst many. Netscape itself intends to release browsers based on the Mozilla source code, with some individual proprietary additions and the benefits corporate structures allow (printed manuals, helplines, and the like), but -- so it seems -- it is giving up its unlimited hold over the course of development of the browser. Such actions afford an almost prophetic quality to Barlow's observation that "familiarity is an important asset in the world of information. It may often be the case that the best thing you can do to raise the demand for your product is to give it away". The use of examples from the computer world should not be seen to mean that the consensual, collaborative use of intellectual property suggested here is limited only to software -- it is, however, no surprise that a computer-based medium would first be put to use to support computer-based development projects. Producers and artists from other fields can profit from networking with their peers and clients just as much: artists can stay in touch with their audience and one another, working on collaborative projects such as the brilliant Djam Karet CD Collaborator (see Taylor's review in Gibraltar), professional interest groups can exchange information about the latest developments in their field as well as link with the users of their products to find out about their needs or problems, and the use of the Net as a medium of communication for academic researchers was one of its first applications, of course. In many such cases, consensual collaboration would even speed up the development process and help iron out remaining glitches, beating the efforts of traditional institutions with their severely guarded intellectual property rights. As Raymond sees it, for example, "no commercial developer can match the pool of talent the Linux community can bring to bear on a problem", and so "perhaps in the end the free-software culture will triumph not because cooperation is morally right or software 'hoarding' is morally wrong ... , but simply because the commercial world cannot win an evolutionary arms race with free-software communities that can put orders of magnitude more skilled time into a problem" (10). Realising the Fiction There remains the problem that even the members of such development communities must make a living somehow -- a need to which their efforts in the community not only don't contribute, but the pursuit of which even limits the time available for the community efforts. The apparent impossibility of reconciling these two goals has made the consensual collaborative approach appear little more than a utopian fiction so far, individual successes like Linux or (potentially) Mozilla notwithstanding. However, there are ways of making money from the communal work even if due to the abolition of copyright laws mere royalty payments are impossible -- as the example of Netscape's relation to the Mozilla project shows, the added benefits that corporate support can bring will still seem worth paying for, for many users. Similarly, while music and artwork may be freely available on the Net, many music fans will still prefer to get the entire CD package from a store rather than having to burn the CD and print the booklet themselves. The changes to producer/user relations suggested here do have severe implications for corporate and legal structures, however, and that is the central reason why particularly the major corporate intellectual property holders (or, hoarders) and their armies of lawyers are engaged in such a fierce defensive battle. Needless to say, the changeover from the still-powerful fiction of enforcible intellectual property copyrights to the new vision of open, consensual collaboration that gives credit for individual contributions, but has no concept of an exclusive ownership of ideas, will not take place overnight. Intellectual property will continue to be guarded, trade secrets will keep being kept, for some time yet, but -- just as is the case with the established practice of patenting particular ideas just so competitors can't use them, but without ever putting them to use in one's own work -- eventually such efforts will prove to be self-defeating. Shutting one's creative talents off in a quiet cathedral will come to be seen as less productive than engaging in the creative cooperation occuring in the global bazaar, and solitary directives of central executives will be replaced by consensual decisions of the community of producers and users. As Raymond points out, "this is not to say that individual vision and brilliance will no longer matter; rather, ... the cutting edge ... will belong to people who start from individual vision and brilliance, then amplify it through the effective construction of voluntary communities of interest" (10). Such communal approaches may to some seem much like communism, but this, too, is a misconception. In fact, in this new system there is much more exchange, much more give and take going on than in the traditional process of an exchange of money for product between user and producer -- only the currency has changed. "This explains much of the collective 'volunteer' work which fills the archives, newsgroups, and databases of the Internet. Its denizens are not working for 'nothing,' as is widely believed. Rather they are getting paid in something besides money. It is an economy which consists almost entirely of information" (Barlow). And with the removal of the many barriers to the free flow of information and obstacles to scientific and artistic development that traditional copyright has created, the progress of human endeavour itself is likely to be sped up. In the end, then, it all comes down to what fictions we choose to believe or reject. In the light of recent developments, and considering the evidence that suggests the viability, even superiority of alternative approaches, it is becoming increasingly hard to believe that traditional copyright can, and much less, should be sustained. Other than the few major copyright holders, few stand to gain from upholding these rights. On the other hand, were we to lift copyright restrictions and use the ideas and information thus made available freely in a cooperative, consensual, and most of all productive way, we all might profit. As various projects have shown, that fiction is already in the process of being realised. References Barlow, John Perry. "Selling Wine without Bottles: The Economy of Mind on the Global Net." 1993. 26 Jan. 1999 <www.eff.org/pub/Publications/John_Perry_Barlow/HTML/idea_economy_article.php>. Gibson, William. Neuromancer. London: HarperCollins, 1984. Raymond, Eric S. "The Cathedral and the Bazaar." 1998. 26 Jan. 1999 <http://www.redhat.com/redhat/cathedral-bazaar/cathedral-bazaar.php>. Taylor, Mike. "Djam Karet, Jeff Greinke, Tim Song Jones, Nick Peck, Kit Watkins." Gibraltar 5.12 (22 Apr. 1995). 10 Feb. 1999 <http://www.progrock.net/gibraltar/issues/Vol5.Iss12.htm>. "Who Is Mozilla.org?" Mozilla.org Website. 1998. 26 Jan. 1999 <http://www.mozilla.org/about.php>. Citation reference for this article MLA style: Axel Bruns. "The Fiction of Copyright: Towards a Consensual Use of Intellectual Property." M/C: A Journal of Media and Culture 2.1 (1999). [your date of access] <http://www.uq.edu.au/mc/9902/copy.php>. Chicago style: Axel Bruns, "The Fiction of Copyright: Towards a Consensual Use of Intellectual Property," M/C: A Journal of Media and Culture 2, no. 1 (1999), <http://www.uq.edu.au/mc/9902/copy.php> ([your date of access]). APA style: Axel Bruns. (1999) The fiction of copyright: towards a consensual use of intellectual property. M/C: A Journal of Media and Culture 2(1). <http://www.uq.edu.au/mc/9902/copy.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
24

Michaud, Thomas. "La science-fiction, un imaginaire utile à l’élaboration d’une éthique de l’innovation : le cas du métavers." Éthique et numérique au XXIème siècle. Regards interdisciplinaires compréhensifs, normatifs et critiques 12, no. 3 (April 9, 2024). http://dx.doi.org/10.25965/interfaces-numeriques.5186.

Full text
Abstract:
La science-fiction est un imaginaire utile à l’élaboration d’une éthique des technosciences et du numérique. À travers l’étude d’une quinzaine d’œuvres mettant en scène les technologies du virtuel choisies parmi les films et romans les plus représentatifs de la diversité des approches sur le futur métavers, cet article présente quelques thèmes dominants de la science-fiction qui ont contribué à l’élaboration d’une éthique de cette technologie. Ces discours sur le futur de la vie artificielle ou sur l’utilisation capitaliste ou militaire du métavers génèrent des opinions tantôt technophiles, tantôt hostiles à sa réalisation, ce qui peut expliquer en partie des phénomènes économiques comme la hype, puis le rejet du virtuel. L’éthique hacker est présentée comme un socle de valeurs souhaitables pour l’élaboration de cette technologie. De même, l’article pose en question prospective l’éventualité d’une IA contrôlant l’application d’un code éthique régissant les comportements des avatars au sein du métavers. Le but est en effet de créer un monde virtuel dépourvu de vices et de violence, une utopie réalisée, ce qui implique une éthique du futur performative.
APA, Harvard, Vancouver, ISO, and other styles
25

Syed, Farheen, Saeed Hamood Alsamhi, Sachin Kumar Gupta, and Abdu Saif. "LSB‐XOR technique for securing captured images from disaster by UAVs in B5G networks." Concurrency and Computation: Practice and Experience, March 3, 2024. http://dx.doi.org/10.1002/cpe.8061.

Full text
Abstract:
SummaryRecently, unmanned aerial vehicles (UAV) technology has been utilized to monitor and capture images from disasters to analyze, process, and take action in real‐time for a speedy recovery. UAVs represent one of the critical technologies used beyond the fifth generation (B5G) of heterogeneous networks. Due to the sensitive data captured from disaster areas by UAVs, security has become a significant concern. Therefore, effective methods are needed to defend collected data against hackers and fictional activity by untrusted users. Audio encryption technologies can be applied to military communication, multimedia, medical, telemedical, and the internet. The present work introduces a novel Steganographic technique of converting an image to audio using LSB coding with XOR operation, ensuring the audio signal is protected using a key and maintains the excellent quality of the signal regenerated. Python3 is used for the implementation of the proposed technique. The findings show significant improvement in MSE and SSIM contexts.
APA, Harvard, Vancouver, ISO, and other styles
26

Hackett, Lisa J., and Jo Coghlan. "The History Bubble." M/C Journal 24, no. 1 (March 15, 2021). http://dx.doi.org/10.5204/mcj.2752.

Full text
Abstract:
Introduction Many people’s knowledge of history is gleaned through popular culture. As a result there is likely a blurring of history with myth. This is one of the criticisms of historical romance novels, which blur historical details with fictional representations. As a result of this the genre is often dismissed from serious academic scholarship. The other reason for its disregard may be that it is largely seen as women’s fiction. As ‘women’s fiction’ it is largely relegated to that of ‘low culture’ and considered to have little literary value. Yet the romance genre remains popular and lucrative. Research by the Romance Writers of America in 2016 found that the genre represents 23% of the US fiction market and generates in excess of US$1 billion per year (Romance Writers of America). Since the onset of COVID-19, sales of romance novels in the US have soared, increasing by 17% between January and May 2020. The most popular genre was the historical romance genre. In total during that period, 16.2 million romance e-books were purchased by consumers (NPD). Yet despite its popularity, romance fiction remains stuck in the pulp fiction bubble. This article draws upon an international survey conducted in June 2020 by the authors. The study aimed to understand how readers of historical romance novels (n=813) engage with historical representations in popular culture, and how they navigate issues of authenticity. Consuming History through Popular Culture: “Historical Romance Novels Bring History to Life” Popular culture presents a tangible way in which audiences can engage with history and historical practices. “The spaces scholars have no idea about – the gaps between verifiable fact – are the territory for the writer of fictional history” (de Groot 217). Historical romance writer Georgette Heyer, for example, was influenced by her father’s conviction that “the historical novel was a worthy medium for learning about the past” (Kloester 102), and readers of historical romance often echo this view. One participant in this study considered the genre a way to “learn about history, the mores and customs, the food and clothing of that particular era … and how it contrasts to modern times”. For another participant, “most historical romances are set in countries other than my own. I like learning about these other countries and cultures”. The historical romance genre, in some instances, was not the reason for reading the novel: it was the historical setting. The romance itself was often incidental: “I am more interested in the history than the romance, but if the romance is done well … [then] the tensions of the romance illustrate and highlight historical divisions”. While a focus on history rather than romance, it posits that authors are including historically accurate details, and this is recognised by readers of the genre. In fact, one contributor to the survey argued that as a member of a writers’ group they were aware of that the “majority of the writers of that genre were voracious researchers, so much so that writers of other genres (male western writers for one) were going to them for information”. While fiction provides entertainment and relaxation, reading historical romance provides an avenue for accessing history without engaging it in a scholarly environment. Participants offered examples of this, saying “I like learning about the past and novels are an easy and relaxing way to do it” and “I enjoy historical facts but don’t necessarily need to read huge historical texts about Elizabeth Woodville when I can read The White Queen.” Social and political aspects of an era were gleaned from historical romance novels that may be less evident in historical texts. For one respondent, “I enjoy the description of the attire … behaviours … the social strata, politics, behaviours toward women and women who were ahead of their time”. Yet at the same time, historical fiction provides a way for readers to learn about historical events and places that spurred them to access more factual historical sources: “when I read a novel that involves actual historic happenings, it drives me to learn if the author is representing them correctly and to learn more about the topics”. For another, the historical romance “makes me want to do some more research”. Hence, historical fiction can provide new ways of seeing the past: “I enjoy seeing the similarities between people of the past and present. Hist[orical] Fic[tion] brings us hope that we can learn and survive our present.” A consciousness of how ancestors “survived and thrived” was evident among many participants. For one, history is best learned through the eyes of the people who lived through the era. School doesn’t teach history in a way that I can grasp, but putting myself into the shoes of the ordinary people who experienced, I have a better understanding of the time. Being able to access different perspectives on history and historical events and make an emotional connection with the past allowed readers to better understand the lived experiences of those from the past. This didn’t mean that readers were ignoring the fictional nature of the genre; rather, readers were clearly aware that the author was often taking liberties with history in order to advance the plot. Yet they still enjoyed the “glimpses of history that is included in the story”, adding that the “fictional details makes the history come alive”. The Past Represents a Different Society For some, historical romances presented a different society, and in some ways a nostalgia for the past. This from one participant: I like the attention to eloquence, to good speech, to manners, to responsibility toward each other, to close personal relationships, to value for education and history, to an older, more leisurely, more thoughtful way of life. A similar view was offered by another participant: “I like the language. I like the slowness, the courtship. I like the olden time social rules of honour and respect. I like worlds in which things like sword fights might occur”. For these respondents, there is a nostalgia where things were better then than now (Davis 18). Readers clearly identified with the different social and moral behaviours that they experienced in the novels they are reading, with one identifying more with the “historical morals, ethics, and way of life than I do modern ones”. Representations of a more respectful past were one aspect that appealed to readers: “people are civil to each other”, they are “generally kinder” and have a “more traditional moral code”. An aspect of escapism is also evident: “I enjoy leaving the present day for a while”. It is a past where readers find “time and manners [that are] now lost to us”. The genre reflects time that “seemed simpler” but “of course it helps if you are in the upper class”. Many historical romance novels are set within the social sphere of the elites of a society. And these readers’ views clearly indicate this: honestly, the characters are either wealthy or will be by the end, which releases from the day to day drudgeries and to the extent possible ensures an economic “happily ever after” as well as a romantic one … . I know the reality of even the elite wasn’t as lovely as portrayed in the books. But they are a charming and sometimes thrilling fantasy to escape inside … It is in the elite social setting that a view emerges in historical romance novels that “things are simpler and you don’t have today’s social issues to deal with”. No one period of history appears to reflect this narrative; rather, it is a theme across historical periods. The intrigue is in how the storyline develops to cope with social mores. “I enjoy reading about characters who wind their way around rules and the obstacles of their society … . Nothing in a historical romance can be fixed with a quick phone call”. The historical setting is actually an advantage because history places constrictions upon a plot: “no mobile phones, no internet, no fast cars. Many a plot would be over before it began if the hero and heroine had a phone”. Hence history and social mores “limit the access of characters and allow for interesting situations”. Yet another perspective is how readers draw parallels to the historic pasts they read about: “I love being swept away into a different era and being able to see how relevant some social issues are today”. There are however aspects that readers are less enamoured with, namely the lack of sex. While wholesome, particularly in the case of Christian authors, other characters are heroines who are virgins until after marriage, but even then may be virgins for “months or years after the wedding”. Similarly, “I deplore the class system and hate the inequalities of the past, yet I love stories where dukes and earls behave astonishingly well and marry interesting women and where all the nastiness is overcome”. The Problem with Authenticity The results of the international historical romance survey that forms the basis of this research indicate that most readers and writers alike were concerned with authenticity. Writers of historical romance novels often go to great lengths to ensure that their stories are imbued with historically accurate details. For readers, this “brings the characters and locales to life”. For readers, “characters can be fictional, but major events and ways of living should be authentic … dress, diet, dances, customs, historic characters”. Portraying historical accuracy is appreciated by readers: “I appreciate the time and effort the author takes to research subjects and people from a particular time period to make their work seem more authentic and believable”. Georgette Heyer, whose works were produced between 1921 and 1974, is considered as the doyenne of regency romance novels (Thurston 37), with a reputation for exacting historical research (Kloester 209). Heyer’s sway is such that 88 (10.8%) of the respondents to the romance survey cited her when asked who their favourite author is, with some also noting that she is a standard for other authors to aspire to. For one participant, I only read one writer of historical romance: Georgette Heyer. Why? Sublime writing skills, characterisation, delicious Wodehousian humour and impeccable accurate and research into the Regency period. Despite this prevailing view, “Heyer’s Regency is a selective one, and much of the broader history of the period is excluded from it” (Kloester 210). Heyer’s approach to history is coloured by the various approaches and developments to historiography that occurred throughout the period in which she was writing (Kloester 103). There is little evidence that she approached her sources with a critical eye and it appears that she often accepted her sources as historical fact (Kloester 112). Heyer’s works are devoid of information as to what is based in history and what was drawn from her imagination (Kloester 110). Despite the omissions above, Heyer has a reputation for undertaking meticulous research for her novels. This, however, is problematic in itself, as Alexandra Stirling argues: “in trying to recreate Regency patterns of speech by applying her knowledge of historical colloquialism, she essentially created her own dialect” that has come to “dominate the modern genre” (Stirling). Heyer is also highly criticised for both her racism (particularly anti-Semitism), which is reflected in her characterisation of Regency London as a society of “extreme whiteness”, which served to erase “the reality of Regency London as a cosmopolitan city with people of every skin colour and origin, including among the upper classes” (Duvezin-Caubet 249). Thus Heyer’s Regency London is arguably a fantasy world that has little grounding in truth, despite her passion for historical research. Historical romance author Felicia Grossman argues that this paradox occurs as “mixed in with [Heyer’s] research is a lot of pure fiction done to fit her personal political views” (Grossman), where she deliberately ignores historical facts that do not suit her narrative, such as the sociological implications of the slave trade and the very public debate about it that occurred during the regency. The legacy of these omissions can be found in contemporary romances set in that period. By focussing on, and intensifying, a narrow selection of historical facts, “the authentic is simultaneously inauthentic” (Hackett 38). For one participant, “I don’t really put much stock into “historical accuracy” as a concept, when I read a historical romance, I read it almost in the way that one would read a genre fantasy novel, where each book has its own rules and conventions”. Diversifying the Bubble The intertwining of history and narrative posits how readers separate fact from fiction. Historical romance novels have often been accused by both readers and critics of providing a skewed view on the past. In October 2019 the All about Romance blog asked its readers: “Does Historical Romance have a quality problem?”, leading to a strong debate with many contributors noting how limited the genre had developed, with the lack of diversity being a particular strain of discussion. Just a few weeks later, the peak industry body, the Romance Writers Association of America, became embroiled in a racism controversy. Cultural products such as romance novels are products of a wider white heteronormative paradigm which has been increasingly challenged by movements such as the LGBTQI+, Me Too, and Black Lives Matter, which have sought to address the evident racial imbalance. The lack of racial representation and racial equality in historical novels also provides an opportunity to consider contemporary ideals. Historical romance novels for one participant provided a lens through which to understand the “challenges for women and queers”. Being a genre that is dominated by both female writers and readers (the Romance Writers Association claims that 82% of readers are female), it is perhaps no surprise that many respondents were concerned with female issues. For one reader, the genre provides a way to “appreciate the freedom that women have today”. Yet it remains that the genre is fictional, allowing readers to fantasise about different social and racial circumstances: “I love the modern take on historical novels with fearless heroines living lives (they maybe couldn’t have) in a time period that intrigues me”. Including strong women and people of colour in the genre means those once excluded or marginalised are centralised, suggesting historical romance novels provide a way of fictionally going some way to re-addressing gender and racial imbalances. Coupled with romance’s guarantee of a happy ending, the reader is assured that the heroine has a positive outcome, and can “have it all”, surely a mantra that should appeal to feminists. “Historical romance offers not just escape, but a journey – emotional, physical or character change”; in this view, readers positively respond to a narrative in which plots engage with both the positive and negative sides of history. One participant put it this way: “I love history especially African American history. Even though our history is painful it is still ours and we loved just like we suffered”. Expanding the Bubble Bridgerton (2020–), the popular Netflix show based upon Julia Quinn’s bestselling historical romance series, challenges the whitewashing of history by presenting an alternative history. Choosing a colour-blind cast and an alternate reality where racism was dispelled when the King marries a woman of colour and bestowed honours on citizens of all colours, Bridgerton’s depiction of race has generally been met with positive reviews. The author of the series of books that Bridgerton is adapted from addressed this point: previously, I’ve gotten dinged by the historical accuracy police. So in some ways, I was fearful – if you do that, are you denying real things that happened? But you know what? This is already romantic fantasy, and I think it’s more important to show that as many people as possible deserve this type of happiness and dignity. So I think they made the absolutely right choice, bringing in all this inclusivity (Quinn cited in Flood). Despite the critics, and there have been some, Netflix claims that the show has placed “number one in 83 countries including the US, UK, Brazil, France, India and South Africa”, which they credited partly to audiences who “want to see themselves reflected on the screen” (Howe). There is no claim to accuracy, as Howe argues that the show’s “Regency reimagined isn’t meant to be history. It’s designed to be more lavish, sexier and funnier than the standard period drama”. As with the readers surveyed above, this is a knowing audience who are willing to embrace an alternate vision of the past. Yet there are aspects which need to remain, such as costume, class structure, technology, which serve to signify the past. As one participant remarked, “I love history. I love reading what is essentially a fantasy-realism setting. I read for escapism and it’s certainly that”. “The Dance of History and Fiction” What is evident in this discussion is what Griffiths calls the “dance of history and fiction”, where “history and fiction … are a tag team, sometimes taking turns, sometimes working in tandem, to deepen our understanding and extend our imagination” (Griffiths). He reminds us that “historians and novelists do not constitute inviolable, impermeable categories of writers. Some historians are also novelists and many novelists are also historians. Historians write fiction and novelists write history”. More so, “history doesn’t own truth, and fiction doesn’t own imagination”. Amongst other analysis of the intersections and juxtaposition of history and fiction, Griffiths provides one poignant discussion, that of Kate Grenville’s novel The Secret River (2006). According to the author's own Website, The Secret River caused controversy when it first appeared, and become a pawn in the “history wars” that continues to this day. How should a nation tell its foundation story, when that story involves the dispossession of other people? Is there a path between the “black armband” and the “white blindfold” versions of a history like ours? In response to the controversy Grenville made an interesting if confusing argument that she does not make a distinction between “story-telling history” and “the discipline of History”, and between “writing true stories” and “writing History” (Griffiths). The same may be said for romance novelists; however, it is in their pages that they are writing a history. The question is if it is an authentic history, and does that really matter? References Davis, Fred. Yearning for Yesterday: A Sociology of Nostalgia. Free Press, 1979. De Groot, Jerome. Consuming History Historians and Heritage in Contemporary Popular Culture. Florence Taylor and Francis, 2009. Duvezin-Caubet, Caroline. "Gaily Ever After: Neo-Victorian M/M Genre Romance for the Twenty-First Century." Neo-Victorian Studies 13.1 (2020). Flood, Alison. "Bridgerton Author Julia Quinn: 'I've Been Dinged by the Accuracy Police – but It's Fantasy!'." The Guardian 12 Jan. 2021. 15 Jan. 2021 <https://www.theguardian.com/books/2021/jan/12/bridgerton-author-julia-quinn-accuracy-fantasy-feisty-rakish-artistocrats-jane-austen>. Griffiths, Tom. "The Intriguing Dance of History and Fiction." TEXT 28 (2015). Grossman, Felicia. "Guest Post: Georgette Heyer Was an Antisemite and Her Work Is Not Foundational Historical Romance." Romance Daily News 2021 (2020). <https://romancedailynews.medium.com/guest-post-georgette-heyer-was-an-antisemite-and-her-work-is-not-foundational-historical-romance-fc00bfc7c26>. Hackett, Lisa J. "Curves & a-Lines: Why Contemporary Women Choose to Wear Nostalgic 1950s Style Clothing." Sociology. Doctor of Philosophy, University of New England, 2020. 320. Howe, Jinny. "'Bridgerton': How a Bold Bet Turned into Our Biggest Series Ever." Netflix, 27 Jan. 2021. <https://about.netflix.com/en/news/bridgerton-biggest-series-ever>. Kloester, Jennifer V. "Georgette Heyer: Writing the Regency: History in Fiction from Regency Buck to Lady of Quality 1935-1972." 2004. NPD. "Covid-19 Lockdown Gives Romance a Lift, the NPD Group Says." NPD Group, 2020. 2 Feb. 2021 <https://www.npd.com/wps/portal/npd/us/news/press-releases/2020/covid-19-lockdown-gives-romance-a-lift--the-npd-group-says/>. Romance Writers of America. "About the Romance Genre." 2016. 2 Feb. 2021 <https://www.rwa.org/Online/Romance_Genre/About_Romance_Genre.aspx>. Stirling, Alexandra. "Love in the Ton: Georgette Heyer's Legacy in Regency Romance World-Building." Nursing Clio. Ed. Jacqueline Antonovich. 13 Feb. 2020. <https://nursingclio.org/2020/02/13/love-in-the-ton-georgette-heyers-legacy-in-regency-romance-world-building/>. Thurston, Carol. The Romance Revolution : Erotic Novels for Women and the Quest for a New Sexual Identity. Urbana: University of Illinois Press, 1987.
APA, Harvard, Vancouver, ISO, and other styles
27

Green, Lelia, and Carmen Guinery. "Harry Potter and the Fan Fiction Phenomenon." M/C Journal 7, no. 5 (November 1, 2004). http://dx.doi.org/10.5204/mcj.2442.

Full text
Abstract:
The Harry Potter (HP) Fan Fiction (FF) phenomenon offers an opportunity to explore the nature of fame and the work of fans (including the second author, a participant observer) in creating and circulating cultural products within fan communities. Matt Hills comments (xi) that “fandom is not simply a ‘thing’ that can be picked over analytically. It is also always performative; by which I mean that it is an identity which is (dis-)claimed, and which performs cultural work”. This paper explores the cultural work of fandom in relation to FF and fame. The global HP phenomenon – in which FF lists are a small part – has made creator J K Rowling richer than the Queen of England, according to the 2003 ‘Sunday Times Rich List’. The books (five so far) and the films (three) continue to accelerate the growth in Rowling’s fortune, which quadrupled from 2001-3: an incredible success for an author unknown before the publication of Harry Potter and the Philosopher’s Stone in 1997. Even the on-screen HP lead actor, Daniel Radcliffe, is now Britain’s second wealthiest teenager (after England’s Prince Harry). There are other globally successful books, such as the Lord of the Rings trilogy, and the Narnia collection, but neither of these series has experienced the momentum of the HP rise to fame. (See Endnote for an indication of the scale of fan involvement with HP FF, compared with Lord of the Rings.) Contemporary ‘Fame’ has been critically defined in relation to the western mass media’s requirement for ‘entertaining’ content, and the production and circulation of celebrity as opposed to ‘hard news’(Turner, Bonner and Marshall). The current perception is that an army of publicists and spin doctors are usually necessary, but not sufficient, to create and nurture global fame. Yet the HP phenomenon started out with no greater publicity investment than that garnered by any other promising first novelist: and given the status of HP as children’s publishing, it was probably less hyped than equivalent adult-audience publications. So are there particular characteristics of HP and his creator that predisposed the series and its author to become famous? And how does the fame status relate to fans’ incorporation of these cultural materials into their lives? Accepting that it is no more possible to predict the future fame of an author or (fictional) character than it is to predict the future financial success of a book, film or album, there is a range of features of the HP phenomenon that, in hindsight, helped accelerate the fame momentum, creating what has become in hindsight an unparalleled global media property. J K Rowling’s personal story – in the hands of her publicity machine – itself constituted a magical myth: the struggling single mother writing away (in longhand) in a Scottish café, snatching odd moments to construct the first book while her infant daughter slept. (Comparatively little attention was paid by the marketers to the author’s professional training and status as a teacher, or to Rowling’s own admission that the first book, and the outline for the series, took five years to write.) Rowling’s name itself, with no self-evident gender attribution, was also indicative of ambiguity and mystery. The back-story to HP, therefore, became one of a quintessentially romantic endeavour – the struggle to write against the odds. Publicity relating to the ‘starving in a garret’ background is not sufficient to explain the HP/Rowling grip on the popular imagination, however. Instead it is arguable that the growth of HP fame and fandom is directly related to the growth of the Internet and to the middle class readers’ Internet access. If the production of celebrity is a major project of the conventional mass media, the HP phenomenon is a harbinger of the hyper-fame that can be generated through the combined efforts of the mass media and online fan communities. The implication of this – evident in new online viral marketing techniques (Kirby), is that publicists need to pique cyber-interest as well as work with the mass media in the construction of celebrity. As the cheer-leaders for online viral marketing make the argument, the technique “provides the missing link between the [bottom-up] word-of-mouth approach and the top-down, advertainment approach”. Which is not to say that the initial HP success was a function of online viral marketing: rather, the marketers learned their trade by analysing the magnifier impact that the online fan communities had upon the exponential growth of the HP phenomenon. This cyber-impact is based both on enhanced connectivity – the bottom-up, word-of-mouth dynamic, and on the individual’s need to assume an identity (albeit fluid) to participate effectively in online community. Critiquing the notion that the computer is an identity machine, Streeter focuses upon (649) “identities that people have brought to computers from the culture at large”. He does not deal in any depth with FF, but suggests (651) that “what the Internet is and will come to be, then, is partly a matter of who we expect to be when we sit down to use it”. What happens when fans sit down to use the Internet, and is there a particular reason why the Internet should be of importance to the rise and rise of HP fame? From the point of view of one of us, HP was born at more or less the same time as she was. Eleven years old in the first book, published in 1997, Potter’s putative birth year might be set in 1986 – in line with many of the original HP readership, and the publisher’s target market. At the point that this cohort was first spellbound by Potter, 1998-9, they were also on the brink of discovering the Internet. In Australia and many western nations, over half of (two-parent) families with school-aged children were online by the end of 2000 (ABS). Potter would notionally have been 14: his fans a little younger but well primed for the ‘teeny-bopper’ years. Arguably, the only thing more famous than HP for that age-group, at that time, was the Internet itself. As knowledge of the Internet grew stories about it constituted both news and entertainment and circulated widely in the mass media: the uncertainty concerning new media, and their impact upon existing social structures, has – over time – precipitated a succession of moral panics … Established commercial media are not noted for their generosity to competitors, and it is unsurprising that many of the moral panics circulating about pornography on the Net, Internet stalking, Web addiction, hate sites etc are promulgated in the older media. (Green xxvii) Although the mass media may have successfully scared the impressionable, the Internet was not solely constructed as a site of moral panic. Prior to the general pervasiveness of the Internet in domestic space, P. David Marshall discusses multiple constructions of the computer – seen by parents as an educational tool which could help future-proof their children; but which their children were more like to conceptualise as a games machine, or (this was the greater fear) use for hacking. As the computer was to become a site for the battle ground between education, entertainment and power, so too the Internet was poised to be colonised by teenagers for a variety of purposes their parents would have preferred to prevent: chat, pornography, game-playing (among others). Fan communities thrive on the power of the individual fan to project themselves and their fan identity as part of an ongoing conversation. Further, in constructing the reasons behind what has happened in the HP narrative, and in speculating what is to come, fans are presenting themselves as identities with whom others might agree (positive affirmation) or disagree (offering the chance for engagement through exchange). The genuinely insightful fans, who apparently predict the plots before they’re published, may even be credited in their communities with inspiring J K Rowling’s muse. (The FF mythology is that J K Rowling dare not look at the FF sites in case she finds herself influenced.) Nancy Baym, commenting on a soap opera fan Usenet group (Usenet was an early 1990s precursor to discussion groups) notes that: The viewers’ relationship with characters, the viewers’ understanding of socioemotional experience, and soap opera’s narrative structure, in which moments of maximal suspense are always followed by temporal gaps, work together to ensure that fans will use the gaps during and between shows to discuss with one another possible outcomes and possible interpretations of what has been seen. (143) In HP terms the The Philosopher’s Stone constructed a fan knowledge that J K Rowling’s project entailed at least seven books (one for each year at Hogwarts School) and this offered plentiful opportunities to speculate upon the future direction and evolution of the HP characters. With each speculation, each posting, the individual fan can refine and extend their identity as a member of the FF community. The temporal gaps between the books and the films – coupled with the expanding possibilities of Internet communication – mean that fans can feel both creative and connected while circulating the cultural materials derived from their engagement with the HP ‘canon’. Canon is used to describe the HP oeuvre as approved by Rowling, her publishers, and her copyright assignees (for example, Warner Bros). In contrast, ‘fanon’ is the name used by fans to refer the body of work that results from their creative/subversive interactions with the core texts, such as “slash” (homo-erotic/romance) fiction. Differentiation between the two terms acknowledges the likelihood that J K Rowling or her assignees might not approve of fanon. The constructed identities of fans who deal solely with canon differ significantly from those who are engaged in fanon. The implicit (romantic) or explicit (full-action descriptions) sexualisation of HP FF is part of a complex identity play on behalf of both the writers and readers of FF. Further, given that the online communities are often nurtured and enriched by offline face to face exchanges with other participants, what an individual is prepared to read or not to read, or write or not write, says as much about that person’s public persona as does another’s overt consumption of pornography; or diet of art house films, in contrast to someone else’s enthusiasm for Friends. Hearn, Mandeville and Anthony argue that a “central assertion of postmodern views of consumption is that social identity can be interpreted as a function of consumption” (106), and few would disagree with them: herein lies the power of the brand. Noting that consumer culture centrally focuses upon harnessing ‘the desire to desire’, Streeter’s work (654, on the opening up of Internet connectivity) suggests a continuum from ‘desire provoked’; through anticipation, ‘excitement based on what people imagined would happen’; to a sense of ‘possibility’. All this was made more tantalising in terms of the ‘unpredictability’ of how cyberspace would eventually resolve itself (657). Thus a progression is posited from desire through to the thrill of comparing future possibilities with eventual outcomes. These forces clearly influence the HP FF phenomenon, where a section of HP fans have become impatient with the pace of the ‘official’/canon HP text. J K Rowling’s writing has slowed down to the point that Harry’s initial readership has overtaken him by several years. He’s about to enter his sixth year (of seven) at secondary school – his erstwhile-contemporaries have already left school or are about to graduate to University. HP is yet to have ‘a relationship’: his fans are engaged in some well-informed speculation as to a range of sexual possibilities which would likely take J K Rowling some light years from her marketers’ core readership. So the story is progressing more slowly than many fans would choose and with less spice than many would like (from the evidence of the web, at least). As indicated in the Endnote, the productivity of the fans, as they ‘fill in the gaps’ while waiting for the official narrative to resume, is prodigious. It may be that as the fans outstrip HP in their own social and emotional development they find his reactions in later books increasingly unbelievable, and/or out of character with the HP they felt they knew. Thus they develop an alternative ‘Harry’ in fanon. Some FF authors identify in advance which books they accept as canon, and which they have decided to ignore. For example, popular FF author Midnight Blue gives the setting of her evolving FF The Mirror of Maybe as “after Harry Potter and the Goblet of Fire and as an alternative to the events detailed in Harry Potter and the Order of the Phoenix, [this] is a Slash story involving Harry Potter and Severus Snape”. Some fans, tired of waiting for Rowling to get Harry grown up, ‘are doin’ it for themselves’. Alternatively, it may be that as they get older the first groups of HP fans are unwilling to relinquish their investment in the HP phenomenon, but are equally unwilling to align themselves uncritically with the anodyne story of the canon. Harry Potter, as Warner Bros licensed him, may be OK for pre-teens, but less cool for the older adolescent. The range of identities that can be constructed using the many online HP FF genres, however, permits wide scope for FF members to identify with dissident constructions of the HP narrative and helps to add to the momentum with which his fame increases. Latterly there is evidence that custodians of canon may be making subtle overtures to creators of fanon. Here, the viral marketers have a particular challenge – to embrace the huge market represented by fanon, while not disturbing those whose HP fandom is based upon the purity of canon. Some elements of fanon feel their discourses have been recognised within the evolving approved narrative . This sense within the fan community – that the holders of the canon have complimented them through an intertextual reference – is much prized and builds the momentum of the fame engagement (as has been demonstrated by Watson, with respect to the band ‘phish’). Specifically, Harry/Draco slash fans have delighted in the hint of a blown kiss from Draco Malfoy to Harry (as Draco sends Harry an origami bird/graffiti message in a Defence against the Dark Arts Class in Harry Potter and the Prisoner of Azkaban) as an acknowledgement of their cultural contribution to the development of the HP phenomenon. Streeter credits Raymond’s essay ‘The Cathedral and the Bazaar’ as offering a model for the incorporation of voluntary labour into the marketplace. Although Streeter’s example concerns the Open Source movement, derived from hacker culture, it has parallels with the prodigious creativity (and productivity) of the HP FF communities. Discussing the decision by Netscape to throw open the source code of its software in 1998, allowing those who use it to modify and improve it, Streeter comments that (659) “the core trope is to portray Linux-style software development like a bazaar, a real-life competitive marketplace”. The bazaar features a world of competing, yet complementary, small traders each displaying their skills and their wares for evaluation in terms of the product on offer. In contrast, “Microsoft-style software production is portrayed as hierarchical and centralised – and thus inefficient – like a cathedral”. Raymond identifies “ego satisfaction and reputation among other [peers]” as a specific socio-emotional benefit for volunteer participants (in Open Source development), going on to note: “Voluntary cultures that work this way are not actually uncommon [… for example] science fiction fandom, which unlike hackerdom has long explicitly recognized ‘egoboo’ (ego-boosting, or the enhancement of one’s reputation among other fans) as the basic drive behind volunteer activity”. This may also be a prime mover for FF engagement. Where fans have outgrown the anodyne canon they get added value through using the raw materials of the HP stories to construct fanon: establishing and building individual identities and communities through HP consumption practices in parallel with, but different from, those deemed acceptable for younger, more innocent, fans. The fame implicit in HP fandom is not only that of HP, the HP lead actor Daniel Radcliffe and HP’s creator J K Rowling; for some fans the famed ‘state or quality of being widely honoured and acclaimed’ can be realised through their participation in online fan culture – fans become famous and recognised within their own community for the quality of their work and the generosity of their sharing with others. The cultural capital circulated on the FF sites is both canon and fanon, a matter of some anxiety for the corporations that typically buy into and foster these mega-media products. As Jim Ward, Vice-President of Marketing for Lucasfilm comments about Star Wars fans (cited in Murray 11): “We love our fans. We want them to have fun. But if in fact someone is using our characters to create a story unto itself, that’s not in the spirit of what we think fandom is about. Fandom is about celebrating the story the way it is.” Slash fans would beg to differ, and for many FF readers and writers, the joy of engagement, and a significant engine for the growth of HP fame, is partly located in the creativity offered for readers and writers to fill in the gaps. Endnote HP FF ranges from posts on general FF sites (such as fanfiction.net >> books, where HP has 147,067 stories [on 4,490 pages of hotlinks] posted, compared with its nearest ‘rival’ Lord of the rings: with 33,189 FF stories). General FF sites exclude adult content, much of which is corralled into 18+ FF sites, such as Restrictedsection.org, set up when core material was expelled from general sites. As an example of one adult site, the Potter Slash Archive is selective (unlike fanfiction.net, for example) which means that only stories liked by the site team are displayed. Authors submitting work are asked to abide by a list of ‘compulsory parameters’, but ‘warnings’ fall under the category of ‘optional parameters’: “Please put a warning if your story contains content that may be offensive to some authors [sic], such as m/m sex, graphic sex or violence, violent sex, character death, major angst, BDSM, non-con (rape) etc”. Adult-content FF readers/writers embrace a range of unexpected genres – such as Twincest (incest within either of the two sets of twin characters in HP) and Weasleycest (incest within the Weasley clan) – in addition to mainstream romance/homo-erotica pairings, such as that between Harry Potter and Draco Malfoy. (NB: within the time frame 16 August – 4 October, Harry Potter FF writers had posted an additional 9,196 stories on the fanfiction.net site alone.) References ABS. 8147.0 Use of the Internet by Householders, Australia. http://www.abs.gov.au/ausstats/abs@.nsf/ e8ae5488b598839cca25682000131612/ ae8e67619446db22ca2568a9001393f8!OpenDocument, 2001, 2001>. Baym, Nancy. “The Emergence of Community in Computer-Mediated Communication.” CyberSociety: Computer-Mediated Communication and Community. Ed. S. Jones. Thousand Oaks, CA: Sage, 1995. 138-63. Blue, Midnight. “The Mirror of Maybe.” http://www.greyblue.net/MidnightBlue/Mirror/default.htm>. Coates, Laura. “Muggle Kids Battle for Domain Name Rights. Irish Computer. http://www.irishcomputer.com/domaingame2.html>. Fanfiction.net. “Category: Books” http://www.fanfiction.net/cat/202/>. Green, Lelia. Technoculture: From Alphabet to Cybersex. Sydney: Allen & Unwin. Hearn, Greg, Tom Mandeville and David Anthony. The Communication Superhighway: Social and Economic Change in the Digital Age. Sydney: Allen & Unwin, 1997. Hills, Matt. Fan Cultures. London: Routledge, 2002. Houghton Mifflin. “Potlatch.” Encyclopedia of North American Indians. http://college.hmco.com/history/readerscomp/naind/html/ na_030900_potlatch.htm>. Kirby, Justin. “Brand Papers: Getting the Bug.” Brand Strategy July-August 2004. http://www.dmc.co.uk/pdf/BrandStrategy07-0804.pdf>. Marshall, P. David. “Technophobia: Video Games, Computer Hacks and Cybernetics.” Media International Australia 85 (Nov. 1997): 70-8. Murray, Simone. “Celebrating the Story the Way It Is: Cultural Studies, Corporate Media and the Contested Utility of Fandom.” Continuum 18.1 (2004): 7-25. Raymond, Eric S. The Cathedral and the Bazaar. 2000. http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/ar01s11.html>. Streeter, Thomas. The Romantic Self and the Politics of Internet Commercialization. Cultural Studies 17.5 (2003): 648-68. Turner, Graeme, Frances Bonner, and P. David Marshall. Fame Games: The Production of Celebrity in Australia. Melbourne: Cambridge UP. Watson, Nessim. “Why We Argue about Virtual Community: A Case Study of the Phish.net Fan Community.” Virtual Culture: Identity and Communication in Cybersociety. Ed. Steven G. Jones. London: Sage, 1997. 102-32. Citation reference for this article MLA Style Green, Lelia, and Carmen Guinery. "Harry Potter and the Fan Fiction Phenomenon." M/C Journal 7.5 (2004). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0411/14-green.php>. APA Style Green, L., and C. Guinery. (Nov. 2004) "Harry Potter and the Fan Fiction Phenomenon," M/C Journal, 7(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0411/14-green.php>.
APA, Harvard, Vancouver, ISO, and other styles
28

Cheang, Shu Lea, and With Paula Gardner and Stephen Surlin. "3x3x6 – 9 Sq.m. and 6 Surveillance Cameras." Catalyst: Feminism, Theory, Technoscience 7, no. 2 (October 26, 2021). http://dx.doi.org/10.28968/cftt.v7i2.37644.

Full text
Abstract:
The title of Shu Lea Cheang’s 3x3x6 which represented Taiwan at Venice Biennale 2019 derives from the 21st century high-security prison cell measured in 9 square meter and equipped with 6 surveillance cameras. As an immersive installation, 3x3x6 is comprised of multiple interfaces to reflect on the construction of sexual subjectivity by technologies of confinement and control, from physical incarceration to the omnipresent surveillance systems of contemporary society, from Jeremy Bentham’s panopticon conceptualized in 1791 to China’s Sharp Eyes that boasts 200 million surveillance cameras with facial recognition capacity for its 1.4 billion population. By employing strategic and technical interventions, 3x3x6 investigates 10 criminal cases in which the prisoners across time and space are incarcerated for sexual provocation and gender affirmation. The exhibition constructs collective counter-accounts of sexuality where trans punk fiction, queer, and anti-colonial imaginations hacks the operating system of the history of sexual subjection. This Image and Text piece intersperses images from the exhibition with handout texts written by curator Paul B. Preciado (against a grey background), as well as an interview between special section co-editor Paula Gardner and the artist that brings the extraordinary exhibition into further conversation with feminist technoscience scholarship. The project website is available at https://3x3x6-v2.webflow.io/.
APA, Harvard, Vancouver, ISO, and other styles
29

ANATOLYEVNA, BUSHUY TATYANA, and FAZLIDDIN SHUKUROVICH RUZIQULOV. "MODERN APPROACHES IN LEARNING THE ENGLISH LANGUAGE." Journal of Global Research in Education and Social Science, December 16, 2022, 8–18. http://dx.doi.org/10.56557/jogress/2022/v16i47978.

Full text
Abstract:
The authors of the article have critically analyzed the advanced methods of teaching and learning a foreign language (English). Having considered and summarized the accumulated experience, the authors tried to answer the controversial question of methodologists, psychologists, teachers: How to make training convenient and effective for both a teacher and a learner? The researchers believe that by adopting the recommended exercises, techniques, you can be not only tolerant, but also perform great skills in speaking, comprehension and even thinking in English. The work contains recommendations related to the process of language learning, based on a psychological basis. It is necessary to rely on the research conducted by neuroscientists and psychiatrists in order to achieve initial goal, namely: Fluency in foreign language communication. The effective life hacks, i.e., practical advice for learning a foreign language and technologies for their implementation, are analyzed in the article. In the article, analysis of some materials on the study of a foreign language have been made and expressions of our skepticism in the presentation of the phenomena of homonymy and polysemy, which is unacceptable for teaching sources. Many recommendations have points of contact: Reading of fiction, watching films in a foreign language, replenishing vocabulary with new words and expressions.
APA, Harvard, Vancouver, ISO, and other styles
30

Hackett, Lisa J., and Jo Coghlan. "Bubbles." M/C Journal 24, no. 1 (March 15, 2021). http://dx.doi.org/10.5204/mcj.2763.

Full text
Abstract:
Welcome to the ‘bubbles’ issue of M/C Journal. When we first pitched the idea of ‘bubbles’ for an issue of M/C Journal it was 2019, several months before COVID-19 was identified in Wuhan, China, and the resulting pandemic that brought the term ‘bubble’ to prominence in ways we had not even imagined. Our pre-pandemic line of enquiry focussed on how bubbles manifested themselves within popular culture and society and how the media reported on these concepts. Thinking about bubbles from bubbly champagne to the ‘political bubble’ we asked researchers to think about the ephemeral nature of bubbles. And indeed some of the articles in this edition reflect this original line of enquiry. COVID-19 however brought to us a whole new meaning of bubbles. Suddenly governments were urging people to ‘stay in their bubbles’ and, in Australia, the idea of ‘travel bubbles’ between countries with similarly low rates of COVID-19 emerged. Mary-Louise McLaws described the ‘germ bubble’ as those we don’t physically distance from, our close contacts. A year ago – in March 2020 – the global community began to exist within a restricted bubble that limited our contact with the wider world. For the most part, that bubble remains 12 months later. Some of the articles for this issue focus on the ways COVID-19 has brought new bubbles to our social and political landscape. Despite the recent prominence of COVID-19, the feature article tackles another bubble that has continued to dominate headlines in Australia. Angelika Heurich and Jo Coghlan examine the ‘Canberra Bubble’ – a toxic culture of sexualised, bullying, hyper-masculinity, that seeks to silence and discredit those who speak out, operating in ways out of line with modern Australia and workplace laws. From claims of rape against the Attorney-General to a Prime Minister who failed to even read the complaint against the highest law officer in Australia, to Brittany Higgins being called a “lying cow” and Grace Tame’s forensic analysis of Morrison’s lack of conscience, Australia’s #MeToo moment threatens to bring down a government. The ‘Canberra Bubble’ may have been the Australian word of the year in 2018, argue Fincina Hopgood and Jodi Brooks, but 2020 belonged to the COVID-19 bubble. Their article takes stock on how the words ‘iso’ and ‘bubble’ came to prominence as a result of the COVID-19 pandemic. It follows up with an examination on how the COVID-19 bubble is conceived across different cohorts, and in particular for those of the fourth age – the older generation. The COVID-19 pandemic brought into relief another long-term political and social problem in Australia, how Australians of are taken care of in their twilight years. Hopgood and Brooks interrogate how, despite a Royal Commission into the running of aged care homes that recommended change, the pandemic exacerbated the vulnerability of people in aged care homes. For governments to effectively manage COVID-19 bubbles, they need to rely on pre-existing relationships with the publics they represent. Xiang Gao’s article investigates the role social capital has played in the ability for different governments to manage the response to the COVID-19 pandemic. It critically examines how pre-existing social capital has enabled governments to effectively establish social distancing measures and household ‘bubbles’. Examining these concepts in the Chinese and American contexts, Gao finds that the governmental responses to the pandemic were not only reliant on established social capital, but have also changed the relationship between governments and publics. With the USA, Brazil shared the dubious honour of being widely criticised for the governmental response to the pandemic. Filipe Soares and Raquel Recuero tackle the political media landscape of reporting on COVID-19 in Brazil. They interrogate the role of the Brazilian media in the promotion of disinformation around the pandemic through three media case studies, finding that the intersection between traditional mass media and social media can exacerbate erroneous reporting. Managing the pandemic did not solely focus on the need to protect certain populations. Many governments highlighted the need for economic activities to continue. For commercial sports which already existed within a ‘sporting bubble’, the COVID-19 pandemic brought another bubble to the rarefied world of professional sports. The creation of a ‘sporting bubble’ enjoyed wide support from both political and media commentators. Adele Pavlidis and David Rowe consider the social effects of the creation of the ‘sporting bubble’ had both on those who found themselves inside, and on those who were left out. While at times the bubble could feel more like a cage, transgressions by sporting personalities often went unpunished. Further, the ‘sporting bubble’ was highly gendered, with those inside the bubble being predominantly men, which served to intensified pre-existing gender inequalities within professional sports. For those on the outside of the political mainstream, the Canberra bubble can appear to be an impervious boundary to cross. Bronwyn Fredericks and Abraham Bradfield argue that The Uluru Statement of the Heart was treated by politicians as little more than a ‘thought bubble’, destined to disintegrate into nothing, despite it being a culmination of numerous voices within Australian society. Recognition of Indigenous Australians in the Constitution is a measure that enjoys wide support across the Australian community, yet this has not led to meaningful action. Fredericks and Bradfield examine the various contemporary and historical factors that have led to the slow progress on this fundamental and important issue. History has a strong bearing on how we understand social and political matters today. Within popular culture, history provides a rich seam of stories for entertainment, both factual and fictional. Fictional versions of history necessarily blur the lines between reality and fantasy. How history is mediated through fiction is the focus of Lisa J. Hackett and Jo Coghlan’s article. Based upon an international survey carried out amongst historical romance authors and readers, it asked if historical accuracy in fiction matters. It finds that there exists a ‘dance of history and fiction’ that posit that our past can be animated by fiction writers and our historians can bring to life our pasts. It is in the intersections of the ‘historical bubble’ and the ‘fiction bubble’ that we can reflect on the past in meaningful ways that inform our social understanding of the past, its people and practices. Disney heroines are some of the most recognisable romantic fiction characters, often inhabiting a world of magic and true love with charming princes and wicked stepmothers. Yet the heroines' and villains' true natures are often revealed through a physical transformation that Amanda Rutherford and Sarah Baker argue is problematic for the often young audiences who watch these films. Despite story lines that promise more progressive iterations of worthiness, a homogenous physical beauty dominates the ‘princess bubble’. For readers, much like those of historical romance novels, such representations can be hegemonic and hide the patriarchal nature of modern society. While bubbles can often represent closed-in worlds, other bubbles are synonymous with exuberance and fun. The next two articles take their inspiration from frothy champagne bubbles. The first by Anna-Mari Almila examines the history of champagne and how its iconic bubbles were both created and came to be an integral symbol of celebration. It notes how champagne makers are often in dialogue with wider popular culture elements in creating and maintaining meanings associated with the drink. Jenny Wise and Lesley McLean turn their attention to the a specific Australian bubbly brand, Treasury Wines, and how it has positioned its 19 Crimes label, which uses the images of Australian convicts on its bottles to create a unique identity. Whilst ostensibly a celebration of Australia’s convict past, the way this brand ‘celebrates’ the sometimes dark crimes of real criminals suggest a socially acceptable romanticisation of Australia’s past. We close this special edition with Greg Melleuish’s thoughtful essay on the fragility of modern society. Just as in the past when we sought permanence in the face of disease and war again we seek stability in the face of pandemics and climate change, even though we know the ‘bubble’ will burst. Humans have a history of attempting to control change. Our ‘plastic nature’ allows us to adapt to the impermanence of life while we yearn for that which is constant and unchanging. We turn to words to find permanence, claiming their meaning as universal, but even meanings are contested and hence transient. Our pragmatic search for stability, even in a period of prosperity and infinite peace, is worthy, but hanging over us is the Hobbesian ‘state of nature’ bubble in which zombies and pandemics threaten our social being. While in part a dire warning for the future, we are reminded that the bubble of modern life is to be cherished.
APA, Harvard, Vancouver, ISO, and other styles
31

Rogers, Ian Keith. "Without a True North: Tactical Approaches to Self-Published Fiction." M/C Journal 20, no. 6 (December 31, 2017). http://dx.doi.org/10.5204/mcj.1320.

Full text
Abstract:
IntroductionOver three days in November 2017, 400 people gathered for a conference at the Sam’s Town Hotel and Gambling Hall in Las Vegas, Nevada. The majority of attendees were fiction authors but the conference program looked like no ordinary writer’s festival; there were no in-conversation interviews with celebrity authors, no panels on the politics of the book industry and no books launched or promoted. Instead, this was a gathering called 20Books2017, a self-publishing conference about the business of fiction ebooks and there was expertise in the room.Among those attending, 50 reportedly earned over $100,000 US per annum, with four said to be earning in excess of $1,000,000 US year. Yet none of these authors are household names. Their work is not adapted to film or television. Their books cannot be found on the shelves of brick-and-mortar bookstores. For the most part, these authors go unrepresented by the publishing industry and literary agencies, and further to which, only a fraction have ever actively pursued traditional publishing. Instead, they write for and sell into a commercial fiction market dominated by a single retailer and publisher: online retailer Amazon.While the online ebook market can be dynamic and lucrative, it can also be chaotic. Unlike the traditional publishing industry—an industry almost stoically adherent to various gatekeeping processes: an influential agent-class, formalized education pathways, geographic demarcations of curatorial power (see Thompson)—the nascent ebook market is unmapped and still somewhat ungoverned. As will be discussed below, even the markets directly engineered by Amazon are subject to rapid change and upheaval. It can be a space with shifting boundaries and thus, for many in the traditional industry both Amazon and self-publishing come to represent a type of encroaching northern dread.In the eyes of the traditional industry, digital self-publishing certainly conforms to the barbarous north of European literary metaphor: Orwell’s ‘real ugliness of industrialism’ (94) governed by the abject lawlessness of David Peace’s Yorkshire noir (Fowler). But for adherents within the day-to-day of self-publishing, this unruly space also provides the frontiers and gold-rushes of American West mythology.What remains uncertain is the future of both the traditional and the self-publishing sectors and the degree to which they will eventually merge, overlap and/or co-exist. So-called ‘hybrid-authors’ (those self-publishing and involved in traditional publication) are becoming increasingly common—especially in genre fiction—but the disruption brought about by self-publishing and ebooks appears far from complete.To the contrary, the Amazon-led ebook iteration of this market is relatively new. While self-publishing and independent publishing have long histories as modes of production, Amazon launched both its Kindle e-reader device and its marketplace Kindle Direct Publishing (KDP) a little over a decade ago. In the years subsequent, the integration of KDP within the Amazon retail environment dramatically altered the digital self-publishing landscape, effectively paving the way for competing platforms (Kobo, Nook, iBooks, GooglePlay) and today’s vibrant—and, at times, crassly commercial—self-published fiction communities.As a result, the self-publishing market has experienced rapid growth: self-publishers now collectively hold the largest share of fiction sales within Amazon’s ebook categories, as much as 35% of the total market (Howey). Contrary to popular belief they do not reside entirely at the bottom of Amazon’s expansive catalogue either: at the time of writing, 11 of Amazon’s Top 50 Bestsellers were self-published and the median estimated monthly revenue generated by these ‘indie’ books was $43,000 USD / month (per author) on the American site alone (KindleSpy).This international publishing market now proffers authors running the gamut of commercial uptake, from millionaire successes like romance writer H.M. Ward and thriller author Mark Dawson, through to the 19% of self-published authors who listed their annual royalty income as $0 per annum (Weinberg). Their overall market share remains small—as little as 1.8% of trade publishing in the US as a whole (McIlroy 4)—but the high end of this lucrative slice is particularly dynamic: science fiction author Michael Anderle (and 20Books2017 keynote) is on-track to become a seven-figure author in his second year of publishing (based on Amazon sales ranking data), thriller author Mark Dawson has sold over 300,000 copies of his self-published Milton series in 3 years (McGregor), and a slew of similar authors have recently attained New York Times and US Today bestseller status.To date, there is not a broad range of scholarship investigating the operational logics of self-published fiction. Timothy Laquintano’s recent Mass Authorship and the Rise of Self-Publishing (2016) is a notable exception, drawing self-publishing into historical debates surrounding intellectual property, the future of the book and digital abundance. The more empirical portions of Mass Authorship—taken from activity between 2011 to 2015—directly informs this research and his chapter on Amazon (Chapter 4) could be read as a more macro companion to my findings below; taken together and compared they illustrate just how fast-moving the market is. Nick Levey’s work on ‘post-press’ literature and its inherent risks (and discourses of cultural capitol) also informs my thesis here.In addition to which, there is scholarship centred on publishing more generally that also touches on self-published writers as a category of practitioner (see Baverstock and Steinitz, Haughland, Thomlinson and Bélanger). Most of this later work focuses almost entirely on the finished product, usually situating self-publishing as directly oppositional to traditional publishing, and thus subordinating it.In this paper, I hope to outline how the self-publishers I’ve observed have enacted various tactical approaches that specifically strive to tame their chaotic marketplace, and to indicate—through one case study (Amazon exclusivity)—a site of production and resistance where they have occasionally succeeded. Their approach is one that values information sharing and an open-source approach to book-selling and writing craft, ideologies drawn more from the tech / start-up world than commercial book industry described by Thompson (10). It is a space deeply informed by the virtual nature of its major platforms and as such, I argue its relation to the world of traditional publishing—and its representation within the traditional book industry—are tenuous, despite the central role of authorship and books.Making the Virtual Self-Publishing SceneWithin the study of popular music, the use of Barry Shank and Will Straw’s ‘scene’ concept has been an essential tool for uncovering and mapping independent/DIY creative practice. The term scene, defined by Straw as cultural space, is primarily interested in how cultural phenomena articulates or announces itself. A step beyond community, scene theorists are less concerned with examining an evolving history of practice (deemed essentialist) than they are concerned with focusing on the “making and remaking of alliances” as the crucial process whereby communal culture is formed, expressed and distributed (370).A scene’s spatial dimension—often categorized as local, translocal or virtual (see Bennett and Peterson)—demands attention be paid to hybridization, as a diversity of actors approach the same terrain from differing vantage points, with distinct motivations. As a research tool, scene can map action as the material existence of ideology. Thus, its particular usefulness is its ability to draw findings from diverse communities of practice.Drawing methodologies and approaches from Bourdieu’s field theory—a particularly resonant lens for examining cultural work—and de Certeau’s philosophies of space and circumstantial moves (“failed and successful attempts at redirection within a given terrain,” 375), scene focuses on articulation, the process whereby individual and communal activity becomes an observable or relatable or recordable phenomena.Within my previous work (see Bennett and Rogers, Rogers), I’ve used scene to map a variety of independent music-making practices and can see clear resemblances between independent music-making and the growing assemblage of writers within ebook self-publishing. The democratizing impulses espoused by self-publishers (the removal of gatekeepers as married to visions of a fiction/labour meritocracy) marry up quite neatly with the heady mix of separatism and entrepreneurialism inherent in Australian underground music.Self-publishers are typically older and typically more upfront about profit, but the communal interaction—the trade and gifting of support, resources and information—looks decidedly similar. Instead, the self-publishers appear different in one key regard: their scene-making is virtual in ways that far outstrip empirical examples drawn from popular music. 20Books2017 is only one of two conferences for this community thus far and represents one of the few occasions in which the community has met in any sort of organized way offline. For the most part, and in the day-to-day, self-publishing is a virtual scene.At present, the virtual space of self-published fiction is centralized around two digital platforms. Firstly, there is the online message board, of which two specific online destinations are key: the first is Kboards, a PHP-coded forum “devoted to all things Kindle” (Kboards) but including a huge author sub-board of self-published writers. The archive of this board amounts to almost two million posts spanning back to 2009. The second message board site is a collection of Facebook groups, of which the 10,000-strong membership of 20BooksTo50K is the most dominant; it is the originating home of 20Books2017.The other platform constituting the virtual scene of self-publishing is that of podcasting. While there are a number of high-profile static websites and blogs related to self-publishing (and an emerging community of vloggers), these pale in breadth and interaction when compared to podcasts such as The Creative Penn, The Self-Publishing Podcast, The Sell More Books Show, Rocking Self-Publishing (now defunct but archived) and The Self-Publishing Formula podcast. Statistical information on the distribution of these podcasts is unavailable but the circulation and online discussion of their content and the interrelation between the different shows and their hosts and guests all point to their currency within the scene.In short, if one is to learn about the business and craft production modes of self-publishing, one tends to discover and interact with one of these two platforms. The consensus best practice espoused on these boards and podcasts is the data set in which the remainder of this paper draws findings. I have spent the last two years embedded in these communities but for the purposes of this paper I will be drawing data exclusively from the public-facing Kboards, namely because it is the oldest, most established site, but also because all of the issues and discussion presented within this data have been cross-referenced across the different podcasts and boards. In fact, for a long period Kboards was so central to the scene that itself was often the topic of conversation elsewhere.Sticking in the Algorithm: The Best Practice of Fiction Self-PublishingSelf-publishing is a virtual scene because its “constellation of divergent interests and forces” (Shank, Preface, x) occur almost entirely online. This is not just a case of discussion, collaboration and discovery occurring online—as with the virtual layer of local and translocal music scenes—rather, the self-publishing community produces into the online space, almost exclusively. Its venues and distribution pathways are online and while its production mechanisms (writing) are still physical, there is an almost instantaneous and continuous interface with the online. These writers type and, increasingly dictate, their work into the virtual cloud, have it edited there (via in-text annotation) and from there the work is often designed, formatted, published, sold, marketed, reviewed and discussed online.In addition to which, a significant portion of these writers produce collaborative works, co-writing novels and co-editing them via cooperative apps. Teams of beta-readers (often fans) work on manuscripts pre-launch. Covers, blurbs, log lines, ad copy and novel openings are tested and reconfigured via crowd-sourced opinion. Seen here, the writing of the self-publishing scene is often explicitly commercial. But more to the fact, it never denies its direct co-relation with the mandates of online publishing. It is not traditional writing (it moves beyond authorship) and viewing these writers as emerging or unpublished or indeed, using the existing vernacular of literary writing practices, often fails to capture what it is they do.As the self-publishers write for the online space, Amazon forms a huge part of their thinking and working. The site sits at the heart of the practices under consideration here. Many of the authors drawn into this research are ‘wide’ in their online retail distribution, meaning they have books placed with Amazon’s online retail competitors. Yet the decision to go ‘wide’ or stay exclusive to Amazon — and the volume of discussion around this choice — is illustrative of how dominant the company remains in the scene. In fact, the example of Amazon exclusivity provides a valuable case-study.For self-publishers, Amazon exclusivity brings two stated and tangible benefits. The first relates to revenue diversification within Amazon, with exclusivity delivering an additional revenue stream in the form of Kindle Unlimited royalties. Kindle Unlimited (KU) is a subscription service for ebooks. Consumers pay a flat monthly fee ($13.99 AUD) for unlimited access to over a million Kindle titles. For a 300-page book, a full read-through of a novel under KU pays roughly the same royalty to authors as the sale of a $2.99 ebook, but only to Amazon-exclusive authors. If an exclusive book is particularly well suited to the KU audience, this can present authors with a very serious return.The second benefit of Amazon exclusivity is access to internal site merchandising; namely ‘Free Days’ where the book is given away (and can chart on the various ‘Top 100 Free’ leaderboards) and ‘Countdown Deals’ where a decreasing discount is staggered across a period (thus creating a type of scarcity).These two perks can prove particularly lucrative to individual authors. On Kboards, user Annie Jocoby (also writing as Rachel Sinclair) details her experiences with exclusivity:I have a legal thriller series that is all-in with KU [Kindle Unlimited], and I can honestly say that KU has been fantastic for visibility for that particular series. I put the books into KU in the first part of August, and I watched my rankings rise like crazy after I did that. They've stuck, too. If I weren't in KU, I doubt that they would still be sticking as well as they have. (anniejocoby)This is fairly typical of the positive responses to exclusivity, yet it incorporates a number of the more opaque benefits entangled with going exclusive to Amazon.First, there is ‘visibility.’ In self-publishing terms, ‘visibility’ refers almost exclusively to chart positions within Amazon. The myriad of charts — and how they function — is beyond the scope of this paper but they absolutely indicate — often dictate — the discoverability of a book online. These charts are the ‘front windows’ of Amazon, to use an analogy to brick-and-mortar bookstores. Books that chart well are actively being bought by customers and they are very often those benefiting from Amazon’s powerful recommendation algorithm, something that expands beyond the site into the company’s expansive customer email list. This brings us to the second point Jocoby mentions, the ‘sticking’ within the charts.There is a widely held belief that once a good book (read: free of errors, broadly entertaining, on genre) finds its way into the Amazon recommendation algorithm, it can remain there for long periods of time leading to a building success as sales beget sales, further boosting the book’s chart performance and reviews. There is also the belief among some authors that Kindle Unlimited books are actively favoured by this algorithm. The high-selling Amanda M. Lee noted a direct correlation:Rank is affected when people borrow your book [under KU]. Page reads don't play into it all. (Amanda M. Lee)Within the same thread, USA Today bestseller Annie Bellet elaborated:We tested this a bunch when KU 2.0 hit. A page read does zip for rank. A borrow, even with no pages read, is what prompts the rank change. Borrows are weighted exactly like sales from what we could tell, it doesn't matter if nobody opens the book ever. All borrows now are ghost borrows, of course, since we can't see them anymore, so it might look like pages are coming in and your rank is changing, but what is probably happening is someone borrowed your book around the same time, causing the rank jump. (Annie B)Whether this advantage is built into the algorithm in a (likely) attempt to favour exclusive authors, or by nature of KU books presenting at a lower price point, is unknown but there is anecdotal evidence that once a KU book gains traction, it can ‘stick’ within the charts for longer periods of time compared to non-exclusive titles.At the entrepreneurial end of the fiction self-publishing scene, Amazon is positioned at the very centre. To go wide—to follow vectors through the scene adjacent to Amazon — is to go around the commercial centre and its profits. Yet no one in this community remains unaffected by the strategic position of this site and the market it has either created or captured. Amazon’s institutional practices can be adopted by competitors (Kobo Plus is a version of KU) and the multitude of tactics authors use to promote their work all, in one shape or another, lead back to ‘circumstantial moves’ learned from Amazon or services that are aimed at promoting work sold there. Further to which, the sense of instability and risk engendered by such a dominant market player is felt everywhere.Some Closing Ideas on the Ideology of Self-PublishingSelf-publishing fiction remains tactical in the de Certeau sense of the term. It is responsive and ever-shifting, with a touch of communal complicity and what he calls la perruque (‘the wig’), a shorthand for resistance that presents itself as submission (25). The entrepreneurialism of self-published fiction trades off this sense of the tactical.Within the scene, Amazon bestseller charts aren’t as much markers of prestige as systems to be hacked. The choice between ‘wide’ and exclusive is only ever short-term; it is carefully scrutinised and the trade-offs and opportunities are monitored week-to-week and debated constantly online. Over time, the self-publishing scene has become expert at decoding Amazon’s monolithic Terms of Service, ever eager to find both advantage and risk as they attempt to lever the affordances of digital publishing against their own desire for profit and expression.This sense of mischief and slippage forms a big part of what self-publishing is. In contrast to traditional publishing—with its long lead times and physical real estate—self-publishing can’t help but appear fragile, wild and coarse. There is no other comparison possible.To survive in self-publishing is to survive outside the established book industry and to thrive within a new and far more uncertain market/space, one almost entirely without a mapped topology. Unlike the traditional publishing industry—very much a legacy, a “relatively stable” population group (Straw 373)—self-publishing cannot escape its otherness, not in the short term. Both its spatial coordinates and its pathways remain too fast-evolving in comparison to the referent of traditional publishing. In the short-to-medium term, I imagine it will remain at some cultural remove from traditional publishing, be it perceived as a threatening northern force or a speculative west.To see self-publishing in the present, I encourage scholars to step away from traditional publishing industry protocols and frameworks, to strive to see this new arena as the self-published authors themselves understand it (what Muggleton has referred to a “indigenous meaning” 13).Straw and Shank’s scene concept provides one possible conceptual framework for this shift in understanding as scene’s reliance on spatial considerations harbours an often underemphazised asset: it is a theory of orientation. At heart, it draws as much from de Certeau as Bourdieu and as such, the scene presented in this work is never complete or fixed. It is de Certeau’s city “shaped out of fragments of trajectories and alterations of spaces” (93). These scenes—be they musicians or authors—are only ever glimpsed and from a vantage point of close proximity. In short, it is one way out of the essentialisms that currently shroud self-published fiction as a craft, business and community of authors. The cultural space of self-publishing, to return Straw’s scene definition, is one that mirrors its own porous, online infrastructure, its own predominance in virtuality. Its pathways are coded together inside fast-moving media companies and these pathways are increasingly entwined within algorithmic processes of curation that promise meritocratization and disintermediation yet delivery systems that can be learned and manipulated.The agility to publish within these systems is the true skill-set required to self-publish fiction online. It traverses specific platforms and short-term eras. It is the core attribute of success in the scene. Everything else is secondary, including the content of the books produced. It is not the case that these books are of lesser literary quality or that their ever-growing abundance is threatening—this is the counter-argument so often presented by the traditional book industry—but more so that without entrepreneurial agility, the quality of the ebook goes undetermined as it sinks lower and lower into a distribution system that is so open it appears endless.ReferencesAmanda M. Lee. “Re: KU Page Reads and Rank.” Kboards: Writer’s Cafe. 1 Oct. 2007 <https://www.kboards.com/index.php/topic,232945.msg3245005.html#msg3245005>.Annie B [Annie Bellet]. “Re: KU Page Reads and Rank.” Kboards: Writer’s Cafe. 1 Oct. 2007 <https://www.kboards.com/index.php/topic,232945.msg3245068.html#msg3245068>.Anniejocoby [Annie Jocoby]. “Re: Tell Me Why You're WIDE or KU ONLY.” Kboards: Writer’s Cafe. 1 Oct. 2007 <https://www.kboards.com/index.php/topic,242514.msg3558176.html#msg3558176>.Baverstock, Alison, and Jackie Steinitz. “Why Are the Self-Publishers?” Learned Publishing 26 (2013): 211-223.Bennett, Andy, and Richard A. Peterson, eds. Music Scenes: Local, Translocal and Virtual. Vanderbilt University Press, 2004.———, and Ian Rogers. Popular Music Scenes and Cultural Memory. Palgrave Macmillan, 2016.Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Routledge, 1984.De Certeau, Michel. The Practice of Everyday Life. University of California Press, 1984.Haugland, Ann. “Opening the Gates: Print On-Demand Publishing as Cultural Production” Publishing Research Quarterly 22.3 (2006): 3-16.Howey, Hugh. “October 2016 Author Earnings Report: A Turning of the Tide.” Author Earnings. 12 Oct. 2016 <http://authorearnings.com/report/october-2016/>.Kboards. About Kboards.com. 2017. 4 Oct. 2017 <https://www.kboards.com/index.php/topic,242026.0.html>.KindleSpy. 2017. Chrome plug-in.Laquintano, Timothy. Mass Authorship and the Rise of Self-Publishing. University of Iowa Press, 2016.Levey, Nick. “Post-Press Literature: Self-Published Authors in the Literary Field.” Post 45. 1 Oct. 2017 <http://post45.research.yale.edu/2016/02/post-press-literature-self-published-authors-in-the-literary-field-3/>.McGregor, Jay. “Amazon Pays $450,000 a Year to This Self-Published Writer.” Forbes. 17 Apr. 2017 <http://www.forbes.com/sites/jaymcgregor/2015/04/17/mark-dawson-made-750000-from-self-published-amazon-books/#bcce23a35e38>.McIlroy, Thad. “Startups within the U.S. Book Publishing Industry.” Publishing Research Quarterly 33 (2017): 1-9.Muggleton, David. Inside Subculture: The Post-Modern Meaning of Style. Berg, 2000.Orwell, George. Selected Essays. Penguin Books, 1960.Fowler, Dawn. ‘‘This Is the North – We Do What We Want’: The Red Riding Trilogy as ‘Yorkshire Noir.” Cops on the Box. University of Glamorgan, 2013.Rogers, Ian. “The Hobbyist Majority and the Mainstream Fringe: The Pathways of Independent Music Making in Brisbane, Australia.” Redefining Mainstream Popular Music, eds. Andy Bennett, Sarah Baker, and Jodie Taylor. Routlegde, 2013. 162-173.Shank, Barry. Dissonant Identities: The Rock’n’Roll Scene in Austin Texas. Wesleyan University Press, 1994.Straw, Will. “Systems of Articulation, Logics of Change: Communities and Scenes in Popular Music.” Cultural Studies 5.3 (1991): 368–88.Thomlinson, Adam, and Pierre C. Bélanger. “Authors’ Views of e-Book Self-Publishing: The Role of Symbolic Capital Risk.” Publishing Research Quarterly 31 (2015): 306-316.Thompson, John B. Merchants of Culture: The Publishing Business in the Twenty-First Century. Penguin, 2012.Weinberg, Dana Beth. “The Self-Publishing Debate: A Social Scientist Separates Fact from Fiction.” Digital Book World. 3 Oct. 2017 <http://www.digitalbookworld.com/2013/self-publishing-debate-part3/>.
APA, Harvard, Vancouver, ISO, and other styles
32

Bucher, Taina. "About a Bot: Hoax, Fake, Performance Art." M/C Journal 17, no. 3 (June 7, 2014). http://dx.doi.org/10.5204/mcj.814.

Full text
Abstract:
Introduction Automated or semi-automated software agents, better known as bots, have become an integral part of social media platforms. Reportedly, bots now generate twenty-four per cent of all posts on Twitter (Orlean “Man”), yet we know very little about who these bots are, what they do, or how to attend to these bots. This article examines one particular prominent exemplar: @Horse_ebooks, a much beloved Twitter bot that turned out not to be a “proper” bot after all. By examining how people responded to the revelations that the @Horse_ebooks account was in fact a human and not an automated software program, the intention here is not only to nuance some of the more common discourses around Twitter bots as spam, but more directly and significantly, to use the concept of persona as a useful analytical framework for understanding the relationships people forge with bots. Twitter bots tend to be portrayed as annoying parasites that generate “fake traffic” and “steal identities” (Hill; Love; Perlroth; Slotkin). According to such news media presentations, bots are part of an “ethically-questionable industry,” where they operate to provide an (false) impression of popularity (Hill). In a similar vein, much of the existing academic research on bots, especially from a computer science standpoint, tends to focus on the destructive nature of bots in an attempt to design better spam detection systems (Laboreiro et.al; Weiss and Tscheligi; Zangerle and Specht). While some notable exceptions exist (Gehl; Hwang et al; Mowbray), there is still an obvious lack of research on Twitter bots within Media Studies. By examining a case of “bot fakeness”—albeit in a somewhat different manner—this article contributes an understanding of Twitter bots as medium-specific personas. The case of @Horse_ebooks does show how people treat it as having a distinct personality. More importantly, this case study shows how the relationship people forge with an alleged bot differs from how they would relate to a human. To understand the ambiguity of the concept of persona as it applies to bots, this article relies on para-social interaction theory as developed by Horton and Wohl. In their seminal article first published in 1956, Horton and Wohl understood para-social interaction as a “simulacrum of conversational give and take” that takes place particularly between mass media users and performers (215). The relationship was termed para-social because, despite of the nonreciprocal exposure situation, the viewer would feel as if the relationship was real and intimate. Like theater, an illusory relationship would be created between what they called the persona—an “indigenous figure” presented and created by the mass media—and the viewer (Horton and Wohl 216). Like the “new types of performers” created by the mass media—”the quizmasters, announcers or ‘interviewers’” —bots too, seem to represent a “special category of ‘personalities’ whose existence is a function of the media themselves” (Horton and Wohl 216). In what follows, I revisit the concept of para-social interaction using the case of @Horse_ebooks, to show that there is potential to expand an understanding of persona to include non-human actors as well. Everything Happens So Much: The Case of @Horse_ebooks The case of the now debunked Twitter account @Horse_ebooks is interesting for a number of reasons, not least because it highlights the presence of what we might call botness, the belief that bots possess distinct personalities or personas that are specific to algorithms. In the context of Twitter, bots are pieces of software or scripts that are designed to automatically or semi-automatically publish tweets or make and accept friend requests (Mowbray). Typically, bots are programmed and designed to be as humanlike as possible, a goal that has been pursued ever since Alan Turing proposed what has now become known as the Turing test (Gehl; Weiss and Tschengeli). The Turing test provides the classic challenge for artificial intelligence, namely, whether a machine can impersonate a human so convincingly that it becomes indistinguishable from an actual human. This challenge is particularly pertinent to spambots as they need to dodge the radar of increasingly complex spam filters and detection algorithms. To avoid detection, bots masquerade as “real” accounts, trying to seem as human as possible (Orlean “Man”). Not all bots, however, pretend to be humans. Bots are created for all kinds of purposes. As Mowbray points out, “many bots are designed to be informative or otherwise useful” (184). For example, bots are designed to tweet news headlines, stock market quotes, traffic information, weather forecasts, or even the hourly bell chimes from Big Ben. Others are made for more artistic purposes or simply for fun by hackers and other Internet pundits. These bots tell jokes, automatically respond to certain keywords typed by other users, or write poems (i.e. @pentametron, @ProfJocular). Amidst the growing bot population on Twitter, @Horse_ebooks is perhaps one of the best known and most prominent. The account was originally created by Russian web developer Alexey Kouznetsov and launched on 5 August 2010. In the beginning, @Horse_ebooks periodically tweeted links to an online store selling e-books, some of which were themed around horses. What most people did not know, until it was revealed to the public on 24 September 2013 (Orlean “Horse”), was that the @Horse_ebooks account had been taken over by artist and Buzzfeed employee Jacob Bakkila in September 2011. Only a year after its inception, @Horse_ebooks went from being a bot to being a human impersonating a bot impersonating a human. After making a deal with Kouznetsov, Bakkila disabled the spambot and started generating tweets on behalf of @Horse_ebooks, using found material and text strings from various obscure Internet sites. The first tweet in Bakkila’s disguise was published on 14 September 2011, saying: “You will undoubtedly look on this moment with shock and”. For the next two years, streams of similar, “strangely poetic” (Chen) tweets were published, slowly giving rise to a devoted and growing fan base. Over the years, @Horse_ebooks became somewhat of a cultural phenomenon—an Internet celebrity of sorts. By 2012, @Horse_ebooks had risen to Internet fame; becoming one of the most mentioned “spambots” in news reports and blogs (Chen). Responses to the @Horse_ebooks “Revelation” On 24 September 2013, journalist Susan Orlean published a piece in The New Yorker revealing that @Horse_ebooks was in fact “human after all” (Orlean “@Horse_ebooks”). The revelation rapidly spurred a plethora of different reactions by its followers and fans, ranging from indifference, admiration and disappointment. Some of the sadness and disappointment felt can be seen clearly in the many of media reports, blog posts and tweets that emerged after the New Yorker story was published. Meyer of The Atlantic expressed his disbelief as follows: @Horse_ebooks, reporters told us, was powered by an algorithm. [...] We loved the horse because it was the network talking to itself about us, while trying to speak to us. Our inventions, speaking—somehow sublimely—of ourselves. Our joy was even a little voyeuristic. An algorithm does not need an audience. To me, though, that disappointment is only a mark of the horse’s success. We loved @Horse_ebooks because it was seerlike, childlike. But no: There were people behind it all along. We thought we were obliging a program, a thing which needs no obliging, whereas in fact we were falling for a plan. (Original italics) People felt betrayed, indeed fooled by @Horse_ebooks. As Watson sees it, “The internet got up in arms about the revelation, mostly because it disrupted our desire to believe that there was beauty in algorithms and randomness.” Several prominent Internet pundits, developers and otherwise computationally skilled people, quickly shared their disappointment and even anger on Twitter. As Jacob Harris, a self-proclaimed @Horse_ebooks fan and news hacker at the New York Times expressed it: Harris’ comparisons to the winning chess-playing computer Deep Blue speaks to the kind of disappointment felt. It speaks to the deep fascination that people feel towards the mysteries of the machine. It speaks to the fundamental belief in the potentials of machine intelligence and to the kind of techno-optimism felt amongst many hackers and “webbies.” As technologist and academic Dan Sinker said, “If I can’t rely on a Twitter bot to actually be a bot, what can I rely on?” (Sinker “If”). Perhaps most poignantly, Sinker noted his obvious disbelief in a blog post tellingly titled “Eulogy for a horse”: It’s been said that, given enough time, a million monkeys at typewriters would eventually, randomly, type the works of Shakespeare. It’s just a way of saying that mathematically, given infinite possibilities, eventually everything will happen. But I’ve always wanted it literally to be true. I’ve wanted those little monkeys to produce something beautiful, something meaningful, and yet something wholly unexpected.@Horse_ebooks was my monkey Shakespeare. I think it was a lot of people’s…[I]t really feels hard, like a punch through everything I thought I knew. (Sinker “Eulogy”) It is one thing is to be fooled by a human and quite another to be fooled by a “Buzzfeed employee.” More than anything perhaps, the question of authenticity and trustworthiness seems to be at stake. In this sense, “It wasn’t the identities of the feed’s writers that shocked everyone (though one of the two writers works for BuzzFeed, which really pissed people off). Rather, it was the fact that they were human in the first place” (Farago). As Sinker put it at the end of the “Eulogy”: I want to believe this wasn’t just yet another internet buzz-marketing prank.I want to believe that @Horse was as beautiful and wonderful today as it was yesterday.I want to believe that beauty can be assembled from the randomness of life all around us.I want to believe that a million monkeys can make something amazingGod.I really, really do want to believe.But I don’t think I do.And that feels even worse. Bots as Personae: Revisiting Horton and Wohl’s Concept of Para-Social Relations How then are we to understand and interpret @Horse_ebooks and peoples’ responses to the revelations? Existing research on human-robot relations suggest that machines are routinely treated as having personalities (Turkle “Life”). There is even evidence to suggest that people often imagine relationships with (sufficiently responsive) robots as being better than relationships with humans. As Turkle explains, this is because relationships with machines, unlike humans, do not demand any ethical commitments (Turkle “Alone”). In other words, bots are oftentimes read and perceived as personas, with which people forge affective relationships. The term “persona” can be understood as a performance of personhood. In a Goffmanian sense, this performance describes how human beings enact roles and present themselves in public (Goffman). As Moore puts it, “the persona is a projection, a puppet show, usually constructed by an author and enlivened by the performance, interpretation, or adaptation”. From Marcel Mauss’ classic analysis of gifts as objects thoroughly personified (Scott), through to the study of drag queens (Stru¨bel-Scheiner), the concept of persona signifies a masquerade, a performance. As a useful concept to theorise the performance and doing of personhood, persona has been used to study everything from celebrity culture (Marshall), fiction, and social networking sites (Zhao et al.). The concept also figures prominently in Human Computer Interaction and Usability Studies where the creation of personas constitutes an important design methodology (Dong et al.). Furthermore, as Marshall points out, persona figures prominently in Jungian psychoanalysis where it exemplifies the idea of “what a man should appear to be” (166). While all of these perspectives allow for interesting analysis of personas, here I want to draw on an understanding of persona as a medium specific condition. Specifically, I want to revisit Horton and Wohl’s classic text about para-social interaction. Despite the fact that it was written almost 60 years ago and in the context of the then emerging mass media – radio, television and movies – their observations are still relevant and useful to theorise the kinds of relations people forge with bots today. According to Horton and Wohl, the “persona offers, above all, a continuing relationship. His appearance is a regular and dependable event, to be counted on, planned for, and integrated into the routines of daily life” (216). The para-social relations between audiences and TV personas are developed over time and become more meaningful to the audience as it acquires a history. Not only are devoted TV audiences characterized by a strong belief in the character of the persona, they are also expected to “assume a sense of personal obligation to the performer” (Horton and Wohl 220). As Horton and Wohl note, “the “fan” - comes to believe that he “knows” the persona more intimately and profoundly than others do; that he “understands” his character and appreciates his values and motives (216). In a similar vein, fans of @Horse_ebooks expressed their emotional attachments in blog posts and tweets. For Sinker, @Horse_ebooks seemed to represent the kind of dependable and regular event that Horton and Wohl described: “Even today, I love @Horse_ebooks. A lot. Every day it was a gift. There were some days—thankfully not all that many—where it was the only thing I looked forward to. I know that that was true for others as well” (Sinker “Eulogy”). Judging from searching Twitter retroactively for @Horse_ebooks, the bot meant something, if not much, to other people as well. Still, almost a year after the revelations, people regularly tweet that they miss @Horse_ebooks. For example, Harris tweets messages saying things like: “I’m still bitter about @Horse_ebooks” (12 November 2013) or “Many of us are still angry and hurt about @Horse_ebooks” (27 December 2013). Twitter user @third_dystopia says he feels something is missing from his life, realizing “horse eBooks hasn’t tweeted since September.” Another of the many messages posted in retrospect similarly says: “I want @Horse_ebooks back. Ever since he went silent, Twitter hasn’t been the same for me” (Lockwood). Indeed, Marshall suggests that affect is at “the heart of a wider persona culture” (162). In a Deleuzian understanding of the term, affect refers to the “capacity to affect and be affected” (Steward 2). Borrowing from Marshall, what the @Horse_ebooks case shows is “that there are connections in our culture that are not necessarily coordinated with purposive and rational alignments. They are organised around clusters of sentiment that help situate people on various spectra of activity and engagement” (162). The concept of persona helps to understand how the performance of @Horse_ebooks depends on the audience to “contribute to the illusion by believing in it” (Horton and Wohl 220). “@Horse_ebooks was my monkey” as Sinker says, suggests a fundamental loss. In this case the para-social relation could no longer be sustained, as the illusion of being engaged in a relation with a machine was taken away. The concept of para-social relations helps not only to illuminate the similarities between how people reacted to @Horse_ebooks and the way in which Horton and Wohl described peoples’ reactions to TV personas. It also allows us to see some crucial differences between the ways in which people relate to bots compared to how they relate to a human. For example, rather than an expression of grief at the loss of a social relationship, it could be argued that the responses triggered by the @Horse_ebooks revelations was of a more general loss of belief in the promises of artificial intelligence. To a certain extent, the appeal of @Horse_ebooks was precisely the fact that it was widely believed not to be a person. Whereas TV personas demand an ethical and social commitment on the part of the audience to keep the masquerade of the performer alive, a bot “needs no obliging” (Meyer). Unlike TV personas that depend on an illusory sense of intimacy, bots do “not need an audience” (Meyer). Whether or not people treat bots in the same way as they treat TV personas, Horton and Wohl’s concept of para-social relations ultimately points towards an understanding of the bot persona as “a function of the media themselves” (Horton and Wohl 216). If quizmasters were seen as the “typical and indigenous figures” of mass media in 1956 (Horton and Wohl 216), the bot, I would suggest, constitutes such an “indigenous figure” today. The bot, if not exactly a “new type of performer” (Horton and Wohl 216), is certainly a pervasive “performer”—indeed a persona—on Twitter today. While @Horse_ebooks was somewhat paradoxically revealed as a “performance art” piece (Orlean “Man”), the concept of persona allows us to see the “real” performance of @Horse_ebooks as constituted in the doing of botness. As the responses to @Horse_ebooks show, the concept of persona is not merely tied to beliefs about “what man should appear to be” (Jung 158), but also to ideas about what a bot should appear to be. Moreover, what the curious case of @Horse_ebooks shows, is how bots are not necessarily interpreted and judged by the standards of the original Turing test, that is, how humanlike they are, but according to how well they perform as bots. Indeed, we might ultimately understand the present case as a successful reverse Turing test, highlighting how humans can impersonate a bot so convincingly that it becomes indistinguishable from an actual bot. References Chen, Adrian. “How I Found the Human Being Behind @Horse_ebooks, The Internet's Favorite Spambot.” Gawker 23 Feb. 2012. 20 Apr. 2014 ‹http://gawker.com/5887697/how-i-found-the-human-being-behind-horseebooks-the-internets-favorite-spambot›. Dong, Jianming, Kuldeep Kelkar, and Kelly Braun. “Getting the Most Out of Personas for Product Usability Enhancements.” Usability and Internationalization. HCI and Culture Lecture Notes in Computer Science 4559 (2007): 291-96. Farago, Jason. “Give Me a Break. @Horse_ebooks Isn’t Art.” New Republic 24 Sep. 2013. 2 Apr. 2014 ‹http://www.newrepublic.com/article/114843/horse-ebooks-twitter-hoax-isnt-art›. Gehl, Robert. Reverse Engineering Social Media: Software, Culture, and Political Economy in New Media Capitalism. Temple University Press, 2014. Goffman, Erwin. The Presentation of Self in Everyday Life. New York: Anchor Books, 1959. Harris, Jacob (harrisj). “For a programmer like me who loves whimsical code, it’s a bit like being into computer chess and finding out Deep Blue has a guy inside.” 24 Sep. 2013, 5:03. Tweet. Harris, Jacob (harrisj). “I’m still bitter about ?@Horse_ebooks.” 12 Nov. 2013, 00:15. Tweet. Harris, Jacob (harrisj). “Many of us are still angry and hurt about ?@horse_ebooks.” 27 Dec. 2013, 6:24. Tweet. Hill, Kashmir. “The Invasion of the Twitter Bots.” Forbes 9 Aug. 2012. 13 Mar. 2014 ‹http://www.forbes.com/sites/kashmirhill/2012/08/09/the-invasion-of-the-twitter-bots›. Horton, Donald, and Richard Wohl. “Mass Communication and Para-Social Interaction: Observations on Intimacy at a Distance.” Psychiatry 19 (1956): 215-29. Isaacson, Andy. “Are You Following a Bot? How to Manipulate Social Movements by Hacking Twitter.” The Atlantic 2 Apr. 2011. 13 Mar. 2014 ‹http://www.theatlantic.com/magazine/archive/2011/05/are-you-following-a-bot/308448/›. Jung, Carl. Two Essays on Analytical Psychology, 2nd ed. London: Routledge, 1992. Laboreiro, Gustavo, Luís Sarmento, and Eugénio Oliveira. “Identifying Automatic Posting Systems in Microblogs.” Progress in Artificial Intelligence. Ed. Luis Antunes and H. Sofia Pinto. Berlin: Springer Verlag, 2011. Lee, Kyumin, B. David Eoff, and James Caverlee. “Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter.” Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011. Lockwood, Alex (heislockwood). “I want @Horse_ebooks back. Ever since he went silent, Twitter hasn’t been the same for me.” 7 Jan. 2014, 15:49. Tweet. Love, Dylan. “More than One Third of Web Traffic Is Fake.” Slate 24 Mar. 2014. 20 Apr. 2014 ‹http://www.slate.com/blogs/business_insider/2014/03/24/fake_online_traffic_36_percent_of_all_web_traffic_is_fraudulent.html›. Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self”. Journalism 15.2 (2014): 153–70. Meyer, Robinson. “@Horse_ebooks Is the Most Successful Piece of Cyber Fiction, Ever.” The Atlantic 24 Sep. 2013. 2 Apr. 2014 ‹http://www.theatlantic.com/technology/archive/2013/10/an-amazing-new-twitter-account-that-sort-of-mimics-your-tweets/280400›. Moore, Chris. “Personae or Personas: the Social in Social Media.” Persona Studies 13 Oct. 2011. 20 Apr. 2014 ‹http://www.personastudies.com/2011/10/personae-or-personas-social-in-social.html›. Mowbray, Miranda. “Automated Twitter Accounts.” Twitter and Society. Eds. Katrin Weller, Axel Bruns, Jean Burgess, Merja Mahrt and Cornelius Puschmann. New York: Peter Lang, 2014. 183-94. Orlean, Susan. “Man and Machine: Playing Games on the Internet.” The New Yorker 10 Feb. 2014. 13 Mar. 2014 ‹http://www.newyorker.com/reporting/2014/02/10/140210fa_fact_orlean›. Orlean, Susan. “@Horse_ebooks Is Human after All.” The New Yorker 24 Sep. 2013. 15 Feb. 2013 ‹http://www.newyorker.com/online/blogs/elements/2013/09/horse-ebooks-and-pronunciation-book-revealed.html›. Pearce, Ian, Max Nanis, and Tim Hwang. “PacSocial: Field Test Report.” 15 Nov. 2011. 2 Apr. 2014 ‹http://pacsocial.com/files/pacsocial_field_test_report_2011-11-15.pdf›. Perlroth, Nicole. “Fake Twitter Followers Become Multimillion-Dollar Business.” The New York Times 5 Apr. 2013. 13 Mar. 2014 ‹http://bits.blogs.nytimes.com/2013/04/05/fake-twitter-followers-becomes-multimillion-dollar-business/?_php=true&_type=blogs&_php=true&_type=blogs&_r=1›. Scott, Linda. “The Troupe: Celebrities as Dramatis Personae in Advertisements.” NA: Advances in Consumer Research. Vol. 18. Eds. Rebecca H. Holman and Michael R. Solomon. Provo, UT: Association for Consumer Research, 1991. 355-63. Sinker, Dan. “Eulogy for a Horse.“ dansinker.com 24 Sep. 2013. 22 Apr. 2014 ‹http://web.archive.org/web/20140213003406/http://dansinker.com/post/62183207705/eulogy-for-a-horse›. Sinker, Dan (dansinker). “If I can’t rely on a Twitter bot to actually be a bot. What can I rely on?” 24 Sep. 2013, 4:36. Tweet. Slotkin, Jason. “Twitter ‘Bots’ Steal Tweeters’ Identities.” Marketplace 27 May 2013. 20 Apr. 2014 ‹http://www.marketplace.org/topics/tech/twitter-bots-steal-tweeters-identities›. Stetten, Melissa (MelissaStetten). “Finding out @Horse_ebooks is a Buzzfeed employee’s “performance art” is like Banksy revealing that he’s Jared Leto.” 25 Sep. 2013, 4:39. Tweet. Stewart, Kathleen. Ordinary Affects. Durham: Duke University Press, 2007. Strübel-Scheiner, Jessica. “Gender Performativity and Self-Perception: Drag as Masquerade.” International Journal of Humanities and Social Science 1.13 (2011): 12-19. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. New York: Basic Books, 2011. Tea Cake (third_dystopia). “I felt like something was missing from my life, and then I realized horse eBooks hasn't tweeted since September.” 9 Jan. 2014, 18:40. Tweet. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Touchstone, 1995. Watson, Sara. “Else 9:30: The “Monkeys with Typewriter” Algorithm.” John Battelle’s searchblog 30 Sep. 2013. 23 Mar. 2014 ‹http://battellemedia.com/archives/2013/09/else-9-30-believing-in-monkeys-with-typewriters-algorithms.php›. Weiss, Astrid, and Manfred Tscheligi.”Rethinking the Human–Agent Relationship: Which Social Cues Do Interactive Agents Really Need to Have?” Believable Bots: Can Computers Play Like People? Ed. Philip Hingston. Berlin: Springer Verlag, 2012. 1-28. Zhao, Shanyang, Sherri Grasmuck, and Jason Martin. “Identity Construction on Facebook: Digital Empowerment in Anchored Relationships.” Computers in Human Behavior 24.5 (2008): 1816-36. Zangerle, Eva, and Günther Specht. “‘Sorry, I Was Hacked’: A Classification of Compromised Twitter Accounts.” Proceedings of ACM Symposium on Applied Computing, Gyeongju, Republic of Korea, 2014.
APA, Harvard, Vancouver, ISO, and other styles
33

Murphie, Andrew. "When Fibre Meets Fibre." M/C Journal 6, no. 4 (August 1, 2003). http://dx.doi.org/10.5204/mcj.2227.

Full text
Abstract:
The Virtual and the Physical A wide range of ritual practices have accompanied the ‘rise of the network society’. This is witnessed in the secular and non-secular magic and mysticism that is endemic in contemporary science fiction, in war-chalking, in new forms of compulsion, neurosis and addiction, or just in the everyday use of networked technologies. Such ritual practices are often only seen as interesting diversions or attachments to the main social issues involved in networking. Indeed, some might see these diversions precisely as attempts to cope with the network society, or even to flee from its apparent technicity and reassert identity against the network (Castells). Yet many of these ritual activities suggest complex ritual engagements with the network. What happens when we consider these ‘diversions’ as central to the ongoing dynamic of networks – technical and social?I shall not be providing an anthropology of these ritual activities. Neither shall I be documenting case studies of the shamanistic, the mystical, neuroses, and so on, as all these find their accommodations with the network society. I shall only, via the work of philosopher of anthropology José Gil, give reasons for the importance of the understanding of ritual to a more general understanding of networks. For networks bring together not just copper wires, Ethernet, optic fibre and electromagnetic radiation, but also other fibres (such sinew and neurons), and other radiations (such as affects, the chemicals and hormones of the nervous system). Ritual is at the heart of this ‘bringing together’. Following Gil, I will suggest that rituals do not just facilitate network operations, they also translate and transform networks in the process. For Gil, ritual space 'has a symbolically overloaded, polysemic topography' (80) in which every site (paralleling neurons in the brain or points in the P2P network) is 'overdetermined'. This allows an over-riding of linear 'technical causality' with ritual ‘magic’, something akin to the over-riding of logical theories of cognition with theories of emergence and the superpositionality of potentials throughout the circuits of the brain or network. Within this superpositionality, symbolism is not so much a series of meanings as a series of actions. Symbols, as enacted in rituals (or in the firing of the patterns of the brain, the movement of packets through Internet), 'designate realities, they set forces into motion, they are "in the present"' (81). Gil also points out that these ritual acts are accompanied by 'particularly intense affective experience' (81). When signs are not focussed directly upon the production of meaning, but are over-determined in ritual, this is 'in order that powerful energies are released that will become the main power source for the cure'. Indeed, in ritual there is a 'regime of energies' along with the 'regimes of signs'. Moreover, the meshing of the two suggests that either term is probably inadequate to explain what is occurring. Signs form constellations of forces that partner other constellations of forces (including other signs), 'separating' or 'condensing' energy fluxes' (82), or enabling 'translation' between them (and between signs as forces). Both the flow of these forces and their translations are, of course, seldom ‘smooth’. There is rather a constant re-writing – or in the context of networks, better, re-wiring – of shifting, contingent and contesting networks of forces. The constant heterogeneous flow of forces only adds to both the intensity of networks and the drive towards more forms of active ‘translation’ found in the proliferation of rituals within networks. It is in this dialogics of intensity and translation that we find the politics of networks. This is a politics that is far from being a politics of pure information. Returning to Gil, it is not only that signs translate forces on behalf of the body. I would add that it is not only the technical nodes in general (and signs are precisely technical nodes) that translate these forces on behalf of the body. The body is itself the crucial 'operator translating signs [and forces] in the ritual'. With this devaluing of symbolic processing qua symbols (so long crucial to so many of the myths and sciences of cognition and information), the brain becomes participant in (though not director of) this bodily translation of signs - and the forces assembled and disassembled. Through, and as, networks of assembled and disassembled forces, brain/body relations and distributions are assembled and disassembled within the concatenation of brain, body and world that is technics. This occurs over the time of evolution but equally over the time of the formations of habits, in the body in general, or as weights of connection between neurons or nodes in the network. It is partnered in the formation of socio-technical evolutions, specific socio-technical assemblages and the weights according to connections between these assemblages. Of course, the more networked things are, the faster the weights of connection change. The network takes the ritual place of the gods. As Gil writes, 'the gods can do what people can't do. They can make energy circulate freely, since they embody both loose and overcoded energy, the loosest and most overcoded of all' (84). This is why we still find magic - or at least something that is effectively like magic - at the heart of any exercise of power. Indeed, the ambiguity of the relations between ‘secular’ and variations of ‘spiritualist’ magic have long been an under-recognised part of media/technological development (as recently documented with regard to the nineteenth century development of the cinema and the entertainment industries in general by Simon During, or in Chris Chesher’s notion of computers as ‘invocational media’). This is not so much a question of metaphysics versus a more directly materialist approach to technical power as a question of directing forces by the necessary means. In order for 'action to have effects…words must release forces in the body; these forces must react directly on the organs' (143). Indeed, Gil claims that it is only with the notion of 'magical-symbolic thought' that we can resolve some of the ambiguities surrounding the material operation of forces and signs, where cultural analysis quite contradictorily seems at one time to assume the priority of one, and at another time the other. Gil points out that ritual magic is precisely that which works at the border between power and discourse, force and sign. This is not an unintelligible border. Even at its apparently most disorganized in terms of its philosophical or scientific coherence (in ritual ecstasy for example), ritual magic is in reality extremely organised (although an organisation of forces and translations rather than one of stable states). As Gil writes, even the 'gestures, words, or cries of the possessed are coded' (137). Indeed, the codes involved are precisely those of possession, but of a possession by networks rather than of them (thus the legal and commercial confusion surrounding file-sharing and so on, in that networks may be undone, but they cannot be possessed). Yet if those subject to ritual – or to networks – are coded, this is not initially within a semiotic structure but within a structure of active transformations. Therefore, 'magical words are action' (84) and ritual (the rituals of science and materialist metaphysics as much as 'primitive' ritual) is an 'actual activity' (137). In ritual there is 'more than a text, more than a semiotic structure [and more than information or communication]…one had to keep in mind the link that unites forces to signs, and the investment of energy that the body imposes on symbols'. Gil's conceptual envelope for this 'more than text' is 'infralanguage'. The 'infralanguage is the [real but] abstract body' (136). I would suggest that this ‘infralanguage’ is also, at least in part, the body registering its immersion in technics – a registration that occurs before cognition, before communication. Or, it is the body – considered in the posthuman sense as any dynamic assemblage. Infralanguage is the assumed of networked engagement, perhaps the libidinal condition of the network (science fiction is clear on this – why else the fascination with plugging leads into our heads and closing our eyes to enter a different world – a different libidinal economy). Like a posture or a series of movements in rituals, infralangage is 'both learned and given' as it translates 'codes and contexts'. Moreover, as here we are talking about a networked learning (and perhaps a dynamic archive as ‘given’), we are not just talking about human learning, or the distribution of weights within the network of the brain, but also about the way that there is a distribution of weights across nodes between brain, body and world – across networks. Particularly important here are 'abstract rhythms' (Felix Guattari has labelled these 'refrains') as these are basic elements of processual structure that can cross codes and contexts, bring them together, translate them in, we could say, polyrhythms, syncopation or simple rhythmic transformation and variation. It is perhaps no wonder that computer games and music have been so central to the expansion of networks – both deal intensely with these rhythmic transformations of codes and posture at the interface of the networks of technics, brain and body. Infralanguage works with codes, bodies, the organs of the body and with a 'complicity' between 'bodily forms and the form of things'. Fibre meets fibre. The shifting investments and assemblages of the body meet a network cast precisely as the enhanced ability of technics (including technics as the human) to shift and reassemble its own investments. Again it is important to note that these investments never come together smoothly – not even, perhaps, into Baudrillard’s smooth if vapid ‘ecstasy of communication’. Rather the constant reconstitution and reassemblage of investments only adds to the intensification of the drive towards connection – and further reassemblage, translation of heterogeneous and contesting aspects of these investments. Thus reassemblage – in a parallel to ‘real-time’ media’s ongoing reformulation of time – is ongoing within networks, as the intensification of connection brought about by enhanced networking constantly reconfigures networks themselves. Infralanguage only gains more importance. It performs the necessary work with the 'condensation of energy on an exfoliated surface' (exfoliation is the opening of the body into spaces as it structurally and dynamically couples with them). Within networks surfaces are exfoliating in more and more complexity. In this ongoing reorganization there is a surprising immanence to networked cognition, situated perhaps in what Pierre Lévy has called ‘collective intelligence’. This is a technically enabled - but not technically delimited - reorganisation of cognitive forces within a heterogeneous collectivity. Lévy’s work possesses the advantage of demonstrating that, although the flow of networks is always in flux, always ‘political’, this in itself contains the positive political potential of intensity and heterogeneity. In these multi-directional flows, the collective intelligence that could emerge (but it would always be a struggle) would be a ‘fractal’ collectivity of: ‘macrosocieties, transindividual psyches of small groups, individuals, intra-individual modules (zones of the brain, unconscious ‘complexes’), agencies which traverse intra-individual modules that move between different people (sexual relations, complementary neuroses)’ (107-108). For Lévy, ‘the collective hypercortex contains … a living psychism, a sort of dynamic hypertext traversing the tensions and energies of affective qualities, conflicts, etc’. In this networked cognition, that beyond the brain seems to take up many of the functions often ascribed to the brain. And the thought that eludes the individual - the thought that for the individual is famously withdrawing in time and space even as it appears - does not elude the network or the activity of ritual magic as a working with these networks. Gil notes that in ritual, …thought coincides with being… time and space do not impede the grasping of the thing in itself - because, on the contrary, they [time and space] are organized in such as manner that they can be transformed by appropriate techniques and at the same time remain linked to their normal perception—in order to create from it the conditions of possibility and the formal framework for knowledge of the absolute. (84) What is this knowledge of the absolute through 'magic words' and rituals? It relates to 'the possibility of capturing the free forces that traverse bodies' (85). In other words, the absolute is reworked immanence rather than a totality that is given once and for all. Throughout his book Cyberculture, Lévy calls this the ethic of ‘universality without totalization’ – global coverage that is receptive to every local difference. Feedback and autopoiesis - crucial terms within many investigations of the cognitive and informational - become the very affective substance of ritual techno-magic. For Gil, ritual autopoiesis addresses the famous 'failure to understand how to know the "thing in itself"' as per Kant. For Gil, this failure is in fact a 'negative proof' of 'the success of magical-symbolic thought in capturing fleeting time in the links of its spatial representations, making it a recurrent or a cyclic system'. Perhaps it is a matter of loving the network through ritual at the junction of perceptual and world, spaces and affective or cognitive fields. I mean ‘loving’ in the sense taken up by John Scannell in M/C when he remarks that ‘graffiti writers love the city more than you ever will’. All acts of love are drenched in ritual (such as graffiti writing) because all acts of love are intense translations of forces. Perhaps those who embrace the network through ritual show others the way. Hackers, war-chalkers, technopagans utopians, perceptual experimentalists, the new techno-neurotics – all these are willing to explore the affective, intensity of the new rituals. All ‘love’ the network with all the difficulties and complexity that love implies. For them, the network is not just an information or communications conduit, but a partner in ritual becoming. Works Cited Baudrillard, Jean (1988) “L’Extase de la Communication” trans. Bernard Schutze and Caroline Schutze, in Mediamatic 3, 2:81-5. Castells, Manuel (2000) The Rise of the Network Society 2nd Edition, Oxford:Blackwell. Chesher, Chris (1996) ‘CD-ROM Multimedia's Identity Crisis’ in Media International Australia 81, August. During, Simon (2002) Modern Enchantments: The Cultural Power of Secular Magic, Cambridge MA:Harvard University Press. Gil, José (1998) Metamorphoses of the Body, trans. Stephen Muecke Minneapolis:University of Minnesota Press. Lévy, Pierre (1995) Qu’est-ce que le virtuel? La Decouverte:Paris. Lévy, Pierre (2001) Cyberculture, trans. Robert Bononno Minneapolis:University of Minnesota Press. Scannell, John (2002) 'Becoming-City: Why Graffiti Writers Love the City More than You Ever Will' in M/C: A Journal of Media and Culture 5, 2 < http://www.media-culture.org.au/0205/becoming.php> (accessed June 12th, 2002). Links http://www.media-culture.org.au/0205/becoming.html Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Murphie, Andrew. "When Fibre Meets Fibre " M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/04-fibremeetsfibre.php>. APA Style Murphie, A. (2003, Aug 26). When Fibre Meets Fibre . M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/04-fibremeetsfibre.php>
APA, Harvard, Vancouver, ISO, and other styles
34

Nolan, Huw, Jenny Wise, and Lesley McLean. "The Clothes Maketh the Cult." M/C Journal 26, no. 1 (March 15, 2023). http://dx.doi.org/10.5204/mcj.2971.

Full text
Abstract:
Introduction Many people interpret the word ‘cult’ through specific connotations, including, but not limited to, a community of like-minded people on the edge of civilization, often led by a charismatic leader, with beliefs that are ‘other’ to societal ‘norms’. Cults are often perceived as deviant, regularly incorporating elements of crime, especially physical and sexual violence. The adoption by some cults of a special uniform or dress code has been readily picked up by popular culture and has become a key ‘defining’ characteristic of the nature of a cult. In this article, we use the semiotic framework of myth, as discussed by Barthes, to demonstrate how cult uniforms become semiotic myths of popular culture. Narratively, the myth of the cult communicates violence, deviance, manipulation, and brainwashing. The myth of on-screen cults has derived itself from a reflexive pop culture foundation. From popular culture inspiring cults to cults inspiring popular culture and back again, society generates its cult myth through three key mechanisms: medicalisation, deviance amplification, and convergence. This means we are at risk of misrepresenting the true nature of cults, creating a definition incongruent with reality. This article traces the history of cults, the expectations of cult behaviour, and the semiotics of uniforms to start the discussion on why society is primed to accept a confusion between nature and the semiotic messaging of “what-goes-without-saying” (Barthes Mythologies 11). Semiotics and Myth Following the basic groundwork of de Saussure in the early 1900s, semiotics is the study of signs and how we use signs to derive meaning from the external world (de Saussure). Barthes expanded on this with his series of essays in Mythologies, adding a layer of connotation that leads to myth (Barthes Mythologies). Connotation, as described by Barthes, is the interaction between signs, feelings, and values. The connotations assigned to objects and concepts become a system of communication that is a message, the message becomes myth. The myth is not defined by the object or concept, but by the way society collectively understands it and all its connotations (Barthes Elements of Semiology 89-91). For scholars like Barthes, languages and cultural artifacts lend themselves to myth because many of our concepts are vague and abstract. Because the concept is vague, it is easy to impose our own values and ideologies upon it. This also means different people can interpret the same concept in different ways (Barthes Mythologies 132). The concept of a cult is no exception. Cults mean different things to different people and the boundaries between cults and religious or commercial organisations are often contested. As a pop culture artifact, the meaning of cults has been generated through repeated exposure in different media and genres. Similarly, pop culture (tv, films, news, etc.) often has the benefit of fiction, which separates itself from the true nature of cults (sensu Barthes Mythologies). Yet, through repeated exposure, we begin to share a universal meaning for the term and all the behaviours understood within the myth. Our repeated exposure to the signs of cults in pop culture is the combined effect of news media and fiction slowly building upon itself in a reflexive manner. We hear news reports of cults behaving in obscure ways, followed by a drama, parody, critique, or satire in a fictitious story. The audience then begins to see the repeated narrative as evidence to the true nature of cults. Over time the myth of the cult naturalises into the zeitgeist as concretely as any other sign, word, or symbol. Once the myth is naturalised, it is better used as a narrative device when affixed to a universally recognised symbol, such as the uniform. The uniform becomes an efficient device for communicating meaning in a short space of time. We argue that the concept of cult as myth has entered a collective understanding, and so, it is necessary to reflect on the mechanisms that drove the correlations which ultimately created the myth. Barthes’s purpose for analysing myth was “to track down, in the decorative display of what-goes-without-saying, the ideological abuse which, in my view, is hidden there” (Barthes Mythologies 11). For this reason, we must briefly look at the history of cults and their relationship with crime. A Brief History of Cults ‘Cult’ derives from the Latin root, cultus, or cultivation, and initially referred to forms of religious worship involving special rituals and ceremonies directed towards specific figures, objects, and/or divine beings. Early to mid-twentieth century sociologists adopted and adapted the term to classify a kind of religious organisation and later to signal new forms of religious expression not previously of primary or singular interest to the scholar of religion (Campbell; Jackson and Jobling; Nelson). The consequences were such that ‘cult’ came to carry new weight in terms of its meaning and reception, and much like other analytical concepts developed an intellectual significance regarding religious innovation it had not previously possessed. Unfortunately, this was not to last. By the early 1990s, ‘cult’ had become a term eschewed by scholars as pejorative, value-laden, and disparaging of its supposed subject matter; a term denuded of technical and descriptive meaning and replaced by more value-neutral alternatives (Dillon and Richardson; Richardson; Chryssides and Zeller). Results from well-published surveys (Pfeifer; Olson) and our own experience in teaching related subject matter revealed predominantly negative attitudes towards the term ‘cult’, with the inverse true for the alternative descriptors. Perhaps more importantly, the surveys revealed that for the public majority, knowledge of ‘cults’ came via media reportage of particularly the sensational few, rather than from direct experience of new religions or their members more generally (Pfeifer). For example, the Peoples Temple, Branch Davidian, and Heaven’s Gate groups featured heavily in news and mass media. Importantly, reporting of each of the tragic events marking their demise (in 1978, 1993, and 1997 respectively) reinforced a burgeoning stereotype and escalated fears about cults in our midst. The events in Jonestown, Guyana (Peoples Temple), especially, bolstered an anticult movement of purported cult experts and deprogrammers offering to save errant family members from the same fate as those who died [there]. The anticult movement portrayed all alleged cults as inherently dangerous and subject only to internal influences. They figured the charismatic leader as so powerful that he could take captive the minds of his followers and make them do whatever he wanted. (Crockford 95) While the term ‘new religious movement’ (NRM) has been used in place of cults within the academic sphere, ‘cult’ is still used within popular culture contexts precisely because of the connotations it inspires, with features including charismatic leaders, deprogrammers, coercion and mind-control, deception, perversion, exploitation, deviance, religious zealotry, abuse, violence, and death. For this reason, we still use the word cult to mean the myth of the cult as represented by popular culture. Representations of Cults and Expectations of Crime Violence and crime can be common features of some cults. Most NRMs “stay within the boundaries of the law” and practice their religion peacefully (Szubin, Jensen III, and Gregg 17). Unfortunately, it is usually those cults that are engaged in violence and crime that become newsworthy, and thus shape public ‘knowledge’ about the nature of cults and drive public expectations. Two of America’s most publicised cults, Charles Manson and the Manson Family and the Peoples Temple, are synonymous with violence and crime. Prior to committing mass suicide by poison in Jonestown, the Peoples Temple accumulated many guns as well as killing Congressman Leo Ryan and members of his party. Similarly, Charles Manson and the Manson Family stockpiled weapons, participated in illegal drug use, and murdered seven people, including Hollywood actor Sharon Tate. The high-profile victims of both groups ensured ongoing widespread media attention and continuous popular culture interest in both groups. Other cults are more specifically criminal in nature: for example, the Constanzo group in Matamoros, while presenting as a cult, are also a drug gang, leading to many calling these groups narco-cults (Kail 56). Sexual assault and abuse are commonly associated with cults. There have been numerous media reports worldwide on the sexual abuse of (usually) women and/or children. For example, a fourteen-year-old in the Children of God group alleged that she was raped when she disobeyed a leader (Rudin 28). In 2021, the regional city of Armidale, Australia, became national news when a former soldier was arrested on charges of “manipulating a woman for a ‘cult’ like purpose” (McKinnell). The man, James Davis, styles himself as the patriarch of a group known as the ‘House of Cadifor’. Police evidence includes six signed “slavery contracts”, as well as 70 witnesses to support the allegation that Mr Davis subjected a woman to “ongoing physical, sexual and psychological abuse and degradation” as well as unpaid prostitution and enslavement (McKinnell). Cults and Popular Culture The depiction of cults in popular culture is attracting growing attention. Scholars Lynn Neal (2011) and Joseph Laycock (2013) have initiated this research and identified consistent stereotypes of 'cults’ being portrayed throughout popular media. Neal found that cults began to be featured in television shows as early as the 1950s and 1960s, continually escalating until the 1990s before dropping slightly between 2000 and 2008 (the time the research was concluded). Specifically, there were 10 episodes between 1958-1969; 19 in the 1970s, which Neal attributes to the “rise of the cult scare and intense media scrutiny of NRMs” (97); 25 in the 1980s; 72 in the 1990s; and 59 between 2000 and 2008. Such academic research has identified that popular culture is important in the formation of the public perception, and social definition, of acceptable and deviant religions (Laycock 81). Laycock argues that representations of cults in popular culture reinforces public narratives about cults in three important ways: medicalisation, deviance amplification, and convergence. Medicalisation refers to the depiction of individuals becoming brainwashed and deprogrammed. The medicalisation of cults can be exacerbated by the cult uniform and clinical, ritualistic behaviours. Deviance amplification, a term coined by Leslie Wilkins in the 1960s, is the phenomenon of ‘media hype’, where the media selects specific examples of deviant behaviour, distorting them (Wilkins), such that a handful of peripheral cases appears representative of a larger social problem (Laycock 84). Following the deviance amplification, there is then often a 'moral panic' (a term coined by Stanley Cohen in 1972) where the problem is distorted and heightened within the media. Cults are often subject to deviance amplification within the media, leading to moral panics about the ‘depraved’, sexual, criminal, and violent activities of cults preying on and brainwashing innocents. Convergence “is a rhetorical device associated with deviance amplification in which two or more activities are linked so as to implicitly draw a parallel between them” (Laycock 85). An example of convergence occurred when the Branch Davidians were compared to the Peoples Temple, ultimately leading the FBI “to end the siege through an aggressive ‘dynamic entry’ in part because they feared such a mass suicide” (Laycock 85). The FBI transferred responsibility for the deaths to ‘mass suicide’, which has become the common narrative of events at Waco. Each of the three mechanisms have an important role to play in the popular culture presentation of cults to audiences. Popular media sources, fictional or not, are incentivised to present the most diabolical cult to the audience – and this often includes the medicalised elements of brainwashing and manipulation. This presentation reinforces existing deviance amplification and moral panics around the depraved activities of cults, and in particular sexual and criminal activities. And finally, convergence acts as a 'cultural script’ where the portrayal of these types of characteristics (brainwashing, criminal or violent behaviour, etc.) is automatically associated with cults. As Laycock argues, “in this way, popular culture has a unique ability to promote convergence and, by extension, deviance amplification” (85). The mechanisms of medicalisation, deviance amplification and convergence are important to the semiotic linking of concepts, signs, and signifiers in the process of myth generation. In efficiently understanding the message of the myth, the viewer must have a sign they can affix to it. In the case of visual mediums this must be immediate and certain. As many of the convergent properties of cults are behavioural (acts of violence and depravity, charismatic leaders, etc.), we need a symbol that audiences can understand immediately. Uniforms achieve this with remarkable efficiency. Upon seeing a still, two-dimensional image of people wearing matching garb it can be made easily apparent that they are part of a cult. Religious uniforms are one of the first visual images one conjures upon hearing the word cult: “for most people the word ‘cult’ conjures up ‘60s images of college students wearing flowing robes, chanting rhythmically and spouting Eastern philosophy” (Salvatore cited in Petherick 577; italics in original). The impact is especially pronounced if the clothes are atypical, anachronistic, or otherwise different to the expected clothes of the context. This interpretation then becomes cemented through the actions of the characters. In Rick and Morty, season 1, episode 10, Morty is imprisoned with interdimensional versions of himself. Despite some morphological differences, each Morty is wearing his recognisable yellow top and blue pants. While our Morty’s back is turned, five hooded, robed figures in atypical garb with matching facial markings approach Morty. The audience is immediately aware that this is a cult. The comparison between the uniform of Morty and the Morty cult exemplifies the use of cult uniform in the myth of Cults. The cult is then cemented through chanting and a belief in the “One true Morty” (Harmon et al.). Semiotics, Clothes, and Uniforms The semiotics of clothes includes implicit, explicit, and subliminal signs. The reasons we choose to wear what we wear is governed by multiple factors both within our control and outside of it: for instance, our body shape, social networks and economic status, access to fashion and choice (Barthes The Fashion System; Hackett). We often choose to communicate aspects of our identity through what we wear or what we choose not to wear. Our choice of clothing communicates aspects of who we are, but also who we want to be (Hackett; Simmel; Veblen) Uniforms are an effective and efficient communicative device. Calefato’s classification of uniforms is not only as those used by military and working groups, but also including the strictly coded dress of subcultures. Unlike other clothes which can be weakly coded, uniforms differentiate themselves through their purposeful coded signalling system (Calefato). To scholars such as Jennifer Craik, uniforms intrigue us because they combine evident statements as well as implied and subliminal communications (Craik). Theories about identity predict that processes similar to the defining of an individual are also important to group life, whereby an individual group member's conceptualisation of their group is derived from the collective identity (Horowitz; Lauger). Collective identities are regularly emphasised as a key component in understanding how groups gain meaning and purpose (Polletta and Jasper). The identity is generally constructed and reinforced through routine socialisation and collective action. Uniforms are a well-known means of creating collective identities. They restrict one’s clothing choices and use boundary-setting rituals to ensure commitment to the group. In general, the more obvious the restriction, the easier it is to enforce. Demanding obvious behaviours from members, unique to the community, simultaneously generates a differentiation between the members and non-members, while enabling self-enforcement and peer-to-peer judgments of commitment. Leaders of religious movements like cults and NRMs will sometimes step back from the punitive aspects of nonconformity. Instead, it falls to the members to maintain the discipline of the collective (Kelley 109). This further leads to a sense of ownership and therefore belonging to the community. Uniforms are an easy outward-facing signal that allows for ready discrimination of error. Because they are often obvious and distinctive dress, they constrain and often stigmatise members. In other collective situations such as with American gangs, even dedicated members will deny their gang affiliation if it is advantageous to do so (Lauger Real Gangstas). While in uniform, individuals cannot hide their membership, making the sacrifice more costly. Members are forced to take one hundred percent of the ownership and participate wholly, or not at all. Through this mechanism, cults demonstrate the medicalisation of the members. Leaders may want their members to be unable to escape or deny affiliation. Similarly, their external appearances might invite persecution and therefore breed resilience, courage, and solidarity. It is, in essence, a form of manipulation (see for instance Iannaccone). Alternatively, as Melton argues, members may want to be open and proud of their organisation, as displayed through them adopting their uniforms (15). The uniform of cults in popular media is a principal component of medicalisation, deviance amplification, and convergence. The uniform, often robes, offers credence to the medicalisation aspect: members of cults are receiving ‘treatment’ — initially, negative treatment while being brainwashed, and then later helpful/saving treatment when being deprogrammed, providing they survive a mass suicide attempt and/or, criminal, sexual, or violent escapades. Through portraying cult members in a distinctive uniform, there is no doubt for the audience who is receiving or in need of treatment. Many of the cults portrayed on screen can easily communicate the joining of a cult by changing the characters' dress. Similarly, by simply re-dressing the character, it is communicated that the character has returned to normal, they have been saved, they are a survivor. In Unbreakable Kimmy Schmidt, while three of the four ‘Mole women’ integrate back into society, Gretchen Chalker continues to believe in their cult; as such she never takes of her cult uniform. In addition, the employment of uniforms for cult members in popular culture enables an instant visual recognition of ‘us’ and ‘them’, or ‘normal’ and ‘abnormal’, and reinforces stereotypical notions of social order and marginalised, deviant (religious) groups (Neal 83). The clothing differences are obvious in The Simpsons season 9, episode 13, “Joy of Sect”: ‘Movementarian’ members, including the Simpsons, don long flowing robes. The use of cult uniform visualises their fanatical commitment to the group. It sets them apart from the rest of Springfield and society (Neal 88-89). The connection between uniforms and cults derives two seemingly paradoxical meanings. Firstly, it reduces the chances of the audience believing that the cult employed ‘deceptive recruiting’ techniques. As Melton argues, because of the association our society has with uniforms and cults, “it is very hard for someone to join most new religions, given their peculiar dress and worship practices, without knowing immediately its religious nature” (14). As such, within popular media, the presence of the uniform increases the culpability of those who join the cult. Contrarily, the character in uniform is a sign that the person has been manipulated and/or brainwashed. This reduces the culpability of the cult member. However, the two understandings are not necessarily exclusive. It is possible to view the cult member as a naïve victim, someone who approached the cult as an escape from their life but was subsequently manipulated into behaving criminally. This interpretation is particularly powerful because it indicates cults can prey on anyone, and that anyone could become a victim of a cult. This, in turn, heightens the moral panic surrounding cults and NRMs. The on-screen myth of the cult as represented by its uniform has a basis in the real-life history of NRMs. Heaven’s Gate members famously died after they imbibed fatal doses of alcohol and barbiturates to achieve their ‘final exit’. Most members were found laid out on beds covered in purple shrouds, all wearing matching black shirts, black pants, and black and white Nike shoes. The famous photos of Warren Jeffs’s polygamous Fundamentalist Church of Jesus Christ of Latter-Day Saints, the subject of Netflix’s Keep Sweet: Pray and Obey, depict multiple women in matching conservative dresses with matching hairstyles gathered around a photo of Jeffs. The image and uniform are a clear influence on the design of Unbreakable’s ‘Mole women’. A prime example of the stereotype of cult uniforms is provided by the Canadian comedy program The Red Green Show when the character Red tells Harold “cults are full of followers, they have no independent thought, they go to these pointless meetings ... they all dress the same” (episode 165). The statement is made while the two main characters Red and Harold are standing in matching outfits. Blurring Nature and Myth Importantly, the success of these shows very much relies on audiences having a shared conception of NRMs and the myth of the cult. This is a curious combination of real and fictional knowledge of the well-publicised controversial events in history. Fictional cults frequently take widely held perspectives of actual religious movements and render them either more absurd or more frightening (Laycock 81). Moreover, the blurring of fictional and non-fictional groups serves to reinforce the sense that all popular culture cults and their real-world counterparts are the same; that they all follow a common script. In this, there is convergence between the fictional and the real. The myth of the cult bleeds from the screen into real life. The Simpsons’ “The Joy of Sect” was televised in the year following the suicide of the 39 members of the Heaven’s Gate group, and the storyline in part was influenced by it. Importantly, as a piercing, satirical critique of middle-class America, the “Joy of Sect” not only parodied traditional and non-traditional religion generally (as well as the ‘cult-like’ following of mass media such as Fox); scholars have shown that it also parodied the ‘cult’ stereotype itself (Feltmate). While Heaven’s Gate influenced to a greater or lesser extent each of the TV shows highlighted thus far, it was also the case that the group incorporated into its eschatology aspects of popular culture linked primarily to science fiction. For example, group members were known to have regularly watched and discussed episodes of Star Trek (Hoffmann and Burke; Sconce), adopting aspects of the show’s vernacular in “attempts to relate to the public” (Gate 163). Words such as ‘away-team’, ‘prime-directive’, ‘hologram’, ‘Captain’, ‘Admiral’, and importantly ‘Red-Alert’ were adopted; the latter, often signalling code-red situations in Star Trek episodes, appeared on the Heaven’s Gate Website in the days just prior to their demise. Importantly, allusions to science fiction and Star Trek were incorporated into the group’s self-styled ‘uniform’ worn during their tragic ritual-suicide. Stitched into the shoulders of each of their uniforms were triangular, Star Trek-inspired patches featuring various celestial bodies along with a tagline signalling the common bond uniting each member: “Heaven’s Gate Away Team” (Sconce). Ironically, with replica patches readily for sale online, and T-shirts and hoodies featuring modified though similar Heaven’s Gate symbolism, this ‘common bond’ has been commodified in such a way as to subvert its original meaning – at least as it concerned ‘cult’ membership in the religious context. The re-integration of cult symbols into popular culture typifies the way we as a society detachedly view the behaviours of cults. The behaviour of cults is anecdotally viewed through a voyeuristic lens, potentially exacerbated by the regular portrayals of cults through parody. Scholars have demonstrated how popular culture has internationally impacted on criminological aspects of society. For instance, there was a noted, international increase in unrealistic expectations of jurors wanting forensic evidence during court cases after the popularity of forensic science in crime dramas (Franzen; Wise). After the arrest of James Davis in Armidale, NSW, Australia, the Sydney Morning Herald reported that Davis was the patriarch of the “House of Cadifor” and he was part of a “cult” (both reported in inverted commas). The article also includes an assumption from Davis's lawyer that, in discussing the women of the group, “the Crown might say ‘they’ve been brainwashed’”. Similarly, the article references the use of matching collars by the women (Mitchell). Nine News reported that the “ex-soldier allegedly forced tattooed, collared sex slave into prostitution”, bringing attention to the clothing as part of the coercive techniques of Davis. While the article does not designate the House of Cadifor as a cult, they include a quote from the Assistant Commissioner Justine Gough, “Mr Davis' group has cult-like qualities”, and included the keyword ‘cults’ for the article. Regrettably, the myth of cults and real-world behaviours of NRMs do not always align, and a false convergence is drawn between the two. Furthermore, the consistent parodying and voyeuristic nature of on-screen cults means we might be at fault of euphemising the crimes and behaviours of those deemed to be part of a ‘cult’. Anecdotally, the way Armidale locals discussed Davis was through a lens of excitement and titillation, as if watching a fictional story unfold in their own backyard. The conversations and news reporting focussed on the cult-like aspects of Davis and not the abhorrence of the alleged crimes. We must remain mindful that the cinematic semiology of cults and the myth as represented by their uniform dress and behaviours is incongruent with the nature of NRMs. However, more work needs to be done to better understand the impact of on-screen cults on real-world attitudes and beliefs. Conclusion The myth of the cult has entered a shared understanding within today’s zeitgeist, and the uniform of the cult stands at its heart as a key sign of the myth. Popular culture plays a key role in shaping this shared understanding by following the cultural script, slowly layering fact with fiction, just as fact begins to incorporate the fiction. The language of the cult as communicated through their uniforms is, we would argue, universally understood and purposeful. The ubiquitous representation of cults portrays a deviant group, often medicalised, and subject to deviance amplification and convergence. When a group of characters is presented to the audience in the same cult dress, we know what is being communicated to us. Fictional cults in popular culture continue to mirror the common list of negative features attributed to many new religious movements. Such fictional framing has come to inform media-consumer attitudes in much the same way as news media, reflecting as they do the cultural stock of knowledge from which our understandings are drawn, and which has little grounding in the direct or immediate experience of the phenomena in question. In short, the nature of NRMs has become confused with the myth of the cult. More research is needed to understand the impact of the myth of the cult. However, it is important to ensure “what-goes-without-saying” is not obfuscating, euphemising, or otherwise misrepresenting nature. References Barthes, Roland. Elements of Semiology. London: Jonathon Cape, 1967. ———. The Fashion System. U of California P, 1990. ———. Mythologies. Trans. Annette Lavers. New York: Hill and Wang, 1972. Calefato, Patrizia. "Clothing as Jargon: On the Sociosemiotics of the Uniform." Zeitschrift für Semiotik 27.3 (2005): 241-52. Campbell, Bruce. "A Typology of Cults." Sociological Analysis 39.3 (1978): 228-40. Chryssides, George D., and Benjamin E. Zeller. "Opposition to NRMs." The Bloomsbury Companion to New Religious Movements. Eds. George D. Chryssides and Benjamin E. Zeller. London: Bloomsbury, 2014. 163-78. "Close Rick-counters of the Rick Kind." Rick and Morty. Dir. Stephen Sandoval. Cartoon Network. 7 Apr. 2014. Cohen, Stanley. Folk Devils and Moral Panics. Routledge, 2011. Craik, Jennifer. "The Cultural Politics of the Uniform." Fashion Theory 7.2 (2003): 127-47. Crockford, Susannah. "How Do You Know When You’re in a Cult? The Continuing Influence of Peoples Temple and Jonestown in Contemporary Minority Religions and Popular Culture." Nova Religio: The Journal of Alternative and Emergent Religions 22.2 (2018): 93-114.. “Cult Visit, The.” The Red and Green Show. S&S Production. 1998. De Saussure, Ferdinand. "Nature of the Linguistic Sign." Course in General Linguistics 1 (1916): 65-70. Dillon, Jane, and James Richardson. "The ‘Cult' Concept: A Politics of Representation Analysis." SYZYGY: Journal of Alternative Religion and Culture 3 (1994): 185-97. Feltmate, David. "The Humorous Reproduction of Religious Prejudice: 'Cults' and Religious Humour in the Simpsons, South Park, and King of the Hill." The Journal of Religion and Popular Culture 24.2 (2012): 201-16. Franzen, R. "CSI Effect on Potential Jurors Has Some Prosecutors Worried." San Diego Union-Tribune 16 (2002). Hackett, Lisa J. "‘Biography of the Self’: Why Australian Women Wear 1950s Style Clothing." Fashion, Style & Popular Culture 9.1-2 (2022): 1-2. Heavens Gate. How and When "Heaven's Gate" May Be Entered: An Anthology of Our Materials. Mill Spring, NC: Wild Flower P, 1997. Hoffmann, Bill, and Cathy Burke. Heaven's Gate: Cult Suicide in San Diego. HarperCollins, 1997. Horowitz, Ruth. Honor and the American Dream: Culture and Identity in a Chicano Community. Rutgers UP, 1983. Iannaccone, Laurence R. "Why Strict Churches Are Strong." American Journal of Sociology 99.5 (1994): 1180-211. Jackson, John A., and R. Jobling. "Toward an Analysis of Contemporary Cults." A Sociological Yearbook of Religion in Britain. Ed. David Martin. London: SCM, 1968. "The Joy of Sect." The Simpsons. Dir. S.D. Moore. Fox, 1998. Kail, Tony M. Narco-Cults: Understanding the Use of Afro-Caribbean and Mexican Religious Cultures in the Drug Wars. CRC Press, 2017. Kelley, Dean M. Why Conservative Churches Are Growing: A Study in Sociology of Religion. New York: Harper and Row, 1972. Lauger, Timothy R. "Gangs, Identity, and Cultural Performance." Sociology Compass 14.4 (2020): e12772. ———. Real Gangstas: Legitimacy, Reputation, and Violence in the Intergang Environment. Ithaca, NY: Rutgers UP, 2012. McKinnell, Jamie. "Alleged Sex 'Cult' Leader James Davis's Trial Will Hear from 70 Witnesses, Court Hears." ABC News 2021. Melton, J. Gordon. Encyclopedic Handbook of Cults in America. Routledge, 2014. Mitchell, Georgina. "James Davis Refused Bail over ‘Holding Woman as Slave, Coercing Her into Sex Work’." The Sydney Morning Herald 17 Mar. 2021. <https://www.smh.com.au/national/nsw/james-davis-refused-bail-over-holding-woman-as-slave-coercing-her-into-sex-work-20210317-p57bn7.html>. Nelson, Geoffrey K. "The Spiritualist Movement and the Need for a Redefinition of Cult." Journal for the Scientific Study of Religion 8.1 (1969): 152-60. Nine News. "Ex-Soldier Allegedly Forced Tattooed, Collared Sex Slave into Prostitution." Nine News Mar. 2021. <https://www.9news.com.au/national/james-davis-house-of-cadifor-alleged-slave-forced-into-sex/48738435-74cd-403d-acc9-e998f7cad08c>. Olson, Paul J. "The Public Perception of 'Cults' and 'New Religious Movements'." Journal for the Scientific Study of Religion 45.1 (2006): 97-106. Petherick, Wayne. "Chapter 20 – Cults." The Psychology of Criminal and Antisocial Behavior. Eds. Wayne Petherick and Grant Sinnamon. Academic Press, 2017. 565-88. Pfeifer, Jeffrey E. "The Psychological Framing of Cults: Schematic Representations and Cult Evaluations." Journal of Applied Social Psychology 22.7 (1992): 531-44. Polletta, Francesca, and James M. Jasper. "Collective Identity and Social Movements." Annual Review of Sociology 27 (2001): 283-305. Richardson, James T. "Definitions of Cult: From Sociological-Technical to Popular-Negative." Review of Religious Research 34.4 (1993): 348-56.. Rudin, Marcia R. "The Cult Phenomenon: Fad or Fact." NYU Rev. L. & Soc. Change 9 (1979): 17. Salvatore, D. "Soul Searching: Cults Targeting an Older Pool of Recruits." Ladies Home Journal, Chicago Sun Times 1987. Sconce, Jeffrey. "Star Trek, Heaven’s Gate, and Textual Transcendence." Cult Television (2004): 199-222. Simmel, Georg. "Fashion." International Quarterly 10.1 (1904): 136. Szubin, Adam, Carl J. Jensen III, and Rod Gregg. "Interacting with Cults: A Policing Model." FBI L. Enforcement Bull. 69 (2000): 16. Unbreakable Kimmy Schmidt. Netflix, 2020. Veblen, Thorstein. The Theory of the Leisure Class: An Economic Study of Institutions. London: Allen & Unwin, 1924. Wilkins, Leslie T. Social Deviance: Social Policy, Action and Research. Routledge, 2013. Wise, Jenny. "Providing the CSI Treatment: Criminal Justice Practitioners and the CSI Effect." Current Issues in Criminal Justice 21.3 (2010): 383-99.
APA, Harvard, Vancouver, ISO, and other styles
35

Taveira, Rodney. "Don DeLillo, 9/11 and the Remains of Fresh Kills." M/C Journal 13, no. 4 (August 19, 2010). http://dx.doi.org/10.5204/mcj.281.

Full text
Abstract:
It’s a portrait of grief, to be sure, but it puts grief in the air, as a cultural atmospheric, without giving us anything to mourn.—— Tom Junod, “The Man Who Invented 9/11”The nearly decade-long attempt by families of 9/11 victims to reclaim the remains of their relatives involves rhetorics of bodilessness, waste, and virtuality that offer startling illustrations of what might be termed “the poetics of grief.” After combining as the WTC Families for Proper Burial Inc. in 2002, the families sued the city of New York in 2005. They lost and the case has been under appeal since 2008. WTC Families is asking for nearly one million tons of material to be moved from the Fresh Kills landfill on Staten Island in order to sift it for human remains. These remains will then be reclaimed and interred: Proper Burial. But the matter is far less definitive. When a judge hearing the appeal asked how one would prove someone’s identity, the city’s lawyer replied, “You have to be able to particularise and say it’s your body. All that’s left here is a bunch of undifferentiated dust.” The reply “elicited gasps and muttered ‘no’s’ from a crowd whose members wore laminated photos of deceased victims” (Hughes). These laminated displays are an attempt by WTC Families to counteract the notion of the victims as “undifferentiated dust”; the protected, hermetic images are testimony to painful uncertainty, an (always) outmoded relic of the evidentiary self.In the face of such uncertainty, it was not only court audiences who waited for a particular response to the terrorist attacks. Adam Hirsch, reviewer for the New York Sun, claimed that “the writer whose September 11 novel seemed most necessary was Don DeLillo. Mr. DeLillo, more than any other novelist, has always worked at the intersection of public terror and private fear.” DeLillo’s prescience regarding the centrality of terrorism in American culture was noted by many critics in the aftermath of the attack on the World Trade Centre. The novelist even penned an essay for Harper’s in which he reflected on the role of the novelist in the new cultural landscape of the post-9/11 world. In an online book club exchange for Slate, Meghan O’Rourke says, “DeLillo seemed eerily primed to write a novel about the events of September 11. … Rereading some of his earlier books, including the terrorism-riddled Mao II, I wondered, half-seriously, if Mohamed Atta and crew had been studying DeLillo.” If there was any writer who might have been said to have seen it coming it was DeLillo. The World Trade Center had figured in his novels before the 9/11 attacks. The twin towers are a primary landmark in Underworld, gracing the cover of the novel in ghostly black and white. In Players (1977), a Wall Street worker becomes involved in a terrorist plot to bomb the New York Stock exchange and his wife works in the WTC for the “Grief Management Council”—“Where else would you stack all this grief?” (18).ClassificationsAs the WTC Families for Proper Burial Inc. trial demonstrates, the reality of the terrorist attacks of September 11 offered an altogether more macabre and less poetic reality than DeLillo’s fiction had depicted. The Fresh Kills landfill serves in Underworld as a metaphor for the accumulated history of Cold War America in the last half-century. Taking in the “man-made mountain,” waste management executive Brian Glassic thinks, “It was science fiction and prehistory”; seeing the World Trade Center in the distance, “he sensed a poetic balance between that idea and this one” (Underworld 184). But the poetic balance DeLillo explores in the 1997 novel has been sundered by the obliteration of the twin towers. Fresh Kills and the WTC are now united by a disquieting grief. The landfill, which closed in 2001, was forced to reopen when the towers collapsed to receive their waste. Fresh Kills bears molecular witness to this too-big collective trauma. “‘They commingled it, and then they dumped it,’ Mr. Siegel [lawyer for WTC Families] said of the remains being mixed with household trash, adding that a Fresh Kills worker had witnessed city employees use that mixture to fill potholes” (Hughes). The revelation is obscene: Are we walking and driving over our dead? The commingling of rubble and human remains becomes a collective (of) contamination too toxic, too overwhelming for conventional comprehension. “You can’t even consider the issue of closure until this issue has been resolved,” says the lawyer representing WTC Families (Hartocollis).Nick Shay, Underworld’s main character, is another waste executive who travels the world to observe ways of dealing with garbage. Of shopping with his wife, Nick says, “Marion and I saw products as garbage even when they sat gleaming on store shelves, yet unbought. We didn’t say, What kind of casserole will that make? We said, What kind of garbage will that make?” (121). This attests to the virtuality of waste, a potentiality of the products – commercial, temporal, biological – that comprise the stuff of contemporary American culture. Synecdoche and metonymy both, waste becomes the ground of hysteron proteron, the rhetorical figure that disorders time and makes the future always present. Like (its) Fresh Kills, waste is science fiction and prehistory.Repeating the apparent causal and temporal inversion of hysteron proteron, Nick’s son Jeff uses his home computer to access a simultaneous future and past that is the internal horizon of Underworld’s historical fiction. Jeff has previously been using his computer to search for something in the video footage of the “Texas Highway Killer,” a serial murderer who randomly shoots people on Texan highways. Jeff tries to resolve the image so that the pixels will yield more, exposing their past and future. “He was looking for lost information. He enhanced and super-slowed, trying to find some pixel in the data swarm that might provide a clue to the identity of the shooter” (118). Searching for something more, something buried, Jeff, like WTC Families, is attempting to redeem the artifactual and the overlooked by reconfiguring them as identity. DeLillo recognises this molecular episteme through the “dot theory of reality”: “Once you get inside a dot, you gain access to hidden information, you slide inside the smallest event. This is what technology does. It peels back the shadows and redeems the dazed and rambling past. It makes reality come true” (177). Like the gleaming supermarket products Nick and Marion see as garbage, the unredeemed opens onto complex temporal and rhetorical orders. Getting inside garbage is like getting “inside a dot.” This approach is not possible for the unplanned waste of 9/11. Having already lost its case, WTC Families will almost certainly lose its appeal because its categories and its means are unworkable and inapplicable: they cannot particularise.PremonitionsIn his 9/11 essay “In the Ruins of the Future,” published in Harper’s a few months after the attacks, DeLillo says “We are all breathing the fumes of lower Manhattan where traces of the dead are everywhere, in the soft breeze off the river, on rooftops and windows, in our hair and on our clothes” (39). DeLillo‘s portrait of molecular waste adumbrates the need to create “counternarratives.” Until the events of 11 September 2001 the American narrative was that of the Cold War, and thus also the narrative of Underworld; one for which DeLillo claims the Bush administration was feeling nostalgic. “This is over now,” he says. “The narrative ends in the rubble and it is left to us to create the counternarrative” (34).DeLillo was already at work on a narrative of his own at the time of the terrorist attacks. As Joseph Conte notes, when the World Trade Center was attacked, “DeLillo, had nearly finished drafting his thirteenth novel, Cosmopolis [… and] shared in the collective seizure of the American mind” (179). And while it was released in 2003, DeLillo sets the novel in 2000 on “a day in April.” If the millennium, the year 2000, has been as Boxall claims the horizon of DeLillo’s writing, the tagging of this “day in April” at the beginning of the novel signals Cosmopolis as a limit-work (4). 9/11 functions as a felt absence in the novel, a binding thing floating in the air, like the shirt that DeLillo will use to begin and end Falling Man; a story that will ‘go beyond’ the millennial limit, a story that is, effectively, the counternarrative of which DeLillo speaks in his 9/11 essay. Given the timing of the terrorist attacks in New York, and DeLillo’s development of his novel, it is extraordinary to consider just how Cosmopolis reflects on its author’s position as a man who should have “seen it coming.” The billionaire protagonist Eric Packer traverses Manhattan by car, his journey a bifurcation between sophistication and banality. Along the way he has an onanistic sexual encounter whilst having his prostate examined, hacks into and deletes his wife’s old money European fortune, loses his own self-made wealth by irrationally betting against the rise of the yen, kills a man, and shoots himself in the hand in front of his assassin. Eric actively moves toward his own death. Throughout Eric’s journey the socially binding integrity of the present and the future is teased apart. He continually sees images of future events before they occur – putting his hand on his chin, a bomb explosion, and finally, his own murder – via video screens in his car and wristwatch. These are, as Conte rightly notes, repeated instances of hysteron proteron (186). His corpse does not herald obsolescence but begins the true life of waste: virtual information. Or, as Eric’s “Chief of Theory” asks, “Why die when you can live on a disk?” (106). There are shades here of Jeff’s pixelated excursion into the video footage of the Texas Highway Killer: “Once you get inside a dot, you gain access to hidden information.” Life at this level is not only virtual, it is particularised, a point (or a collection of points) Eric comes to grasp during the protracted scene in which he watches himself die: “The stuff he sneezes when he sneezes, this is him” (207). In Falling Man, the work in which DeLillo engages directly with the 9/11 attack, the particularised body recurs in various forms. First there is the (now iconic) falling man: the otherwise unknown victim of the terrorist attack who leapt from the WTC and whose descent was captured in a photograph by Richard Drew. This figure was named (particularised) by Tom Junod (who provides the epigram for this essay) as “The Falling Man.” In DeLillo’s novel another Falling Man, a performance artist, re-enacts the moment by jumping off buildings, reiterating the photograph (back) into a bodily performance. In these various incarnations the falling man is serially particularised: photographed, named, then emulated. The falling man is a single individual, and multiple copies. He lives on long after death and so does his trauma. He represents the poetic expression of collective grief. Particularised bodies also infect the terror narrative of Falling Man at a molecular level. Falling Man’s terrorist, Hammad, achieves a similar life-after-death by becoming “organic shrapnel.” The surviving victims of the suicide bomb attack, months later, begin to display signs of the suicide bombers in lumps and sores emerging from their bodies, too-small bits of the attacker forever incorporated. Hammad is thus paired with the victims of the crash in a kind of disseminative and absorptive (rhetorical) structure. “The world changes first in the mind of the man who wants to change it. The time is coming, our truth, our shame, and each man becomes the other, and the other still another, and then there is no separation” (80). RevisionsThe traces of American culture that were already contained in the landfill in Underworld have now become the resting place of the dust and the bodies of the trauma of 9/11. Rereading DeLillo’s magnum opus one cannot help but be struck by the new resonance of Fresh Kills.The landfill showed him smack-on how the waste stream ended, where all the appetites and hankerings, the sodden second thoughts came runneling out, the things you wanted ardently and then did not…. He knew the stench must ride the wind into every dining room for miles around. When people heard a noise at night, did they think the heap was coming down around them, sliding toward their homes, an omnivorous movie terror filling their doorways and windows?The wind carried the stink across the kill…. The biggest secrets are the ones spread before us. (184-5)The landfill looms large on the landscape, a huge pile of evidence for the mass trauma of what remains, those that remain, and what may come—waste in all its virtuality. The “omnivorous movie terror filling their doorways and windows” is a picture of dust-blanketed Downtown NYC that everybody, everywhere, continually saw. The mediatory second sight of sifting the landfill, of combing the second site of the victims for its “sodden second thoughts,” is at once something “you wanted ardently and then did not.” The particles are wanted as a distillate, produced by the frameline of an intentional, processual practice that ‘edits’ 9/11 and its aftermath into a less unacceptable sequence that might allow the familiar mourning ritual of burying a corpse. WTC Families Inc. is seeking to throw the frame of human identity around the unincorporated particles of waste in the Fresh Kills landfill, an unbearably man-made, million-ton mountain. This operation is an attempt to immure the victims and their families from the attacks and its afterlife as waste or recycled material, refusing the ever-present virtual life of waste that always accompanied them. Of course, even if WTC Families is granted its wish to sift Fresh Kills, how can it differentiate its remains from those of the 9/11 attackers? The latter have a molecular, virtual afterlife in the present and the living, lumpy reminders that surface as foreign bodies.Resisting the city’s drive to rebuild and move on, WTC Families for Proper Burial Inc. is absorbed with the classification of waste rather than its deployment. In spite of the group’s failed court action, the Fresh Kills site will still be dug over: a civil works project by the NYC Department of Parks & Recreation will reclaim the landfill and rename it “Freshkills Park,” a re-creational area to be twice the size of Central Park—As DeLillo foresaw, “The biggest secrets are the ones spread before us.”ReferencesBoxall, Peter. Don DeLillo: The Possibility of Fiction. London: Routledge, 2006.Conte, Joseph M. “Writing amid the Ruins: 9/11 and Cosmopolis”. The Cambridge Companion to Don DeLillo. Ed. John N. Duvall. Cambridge: Cambridge University Press, 2008. 179-192.Cowart, David. Don DeLillo: The Physics of Language. Athens: University of Georgia Press, 2003.DeLillo, Don. Players. London: Vintage, 1991.———. Mao II. London: Vintage, 1992.———. Underworld. London: Picador, 1997.———. “In the Ruins of the Future”. Harper’s. Dec. 2001: 33-40.———. Cosmopolis. London: Picador, 2003.———. Falling Man. New York: Scribner, 2007.Hartocollis, Anemona. “Landfill Has 9/11 Remains, Medical Examiner Wrote”. 24 Mar. 2007. The New York Times. 7 Mar. 2009 ‹http://www.nytimes.com/2007/03/24%20/nyregion/24remains.html›. Hirsch, Adam. “DeLillo Confronts September 11”. 2 May 2007. The New York Sun. 10 May 2007 ‹http://www.nysun.com/arts/delillo-confronts-september-11/53594/›.Hughes, C. J. “9/11 Families Press Judges on Sifting at Landfill”. 16 Dec. 2009. The New York Times. 17 Dec. 2009 ‹http://www.nytimes.com/2009/12/17/nyregion/17sift.html›.Junod, Tom. “The Man Who Invented 9/11”. 7 May 2007. Rev. of Falling Man by Don DeLillo. Esquire. 28 May 2007 ‹http://www.esquire.com/fiction/book-review/delillo›.O’Rourke, Meghan. “DeLillo Seemed Almost Eerily Primed to Write a Novel about 9/11”. 23 May 2007. Slate.com. 28 May 2007 ‹http://www.slate.com/id/2166831/%20entry/2166848/›.
APA, Harvard, Vancouver, ISO, and other styles
36

Phillips, Dougal, and Oliver Watts. "Copyright, Print and Authorship in the Culture Industry." M/C Journal 8, no. 2 (June 1, 2005). http://dx.doi.org/10.5204/mcj.2340.

Full text
Abstract:
Historically the impact of the printing press on Western culture is a truism. Print gave rise to the mass reproduction and circulation of information with wide reaching consequences in all fields: political, social, and economic. An aspect that this paper wishes to focus on is that this moment also saw the birth (and necessity) of copyright legislation, to administer and protect this new found ability to package and disseminate text. The term copyright itself, used freely in debates surrounding contemporary topics such as iTunes, DVD piracy, and file-sharing, is not only semantically anachronistic but, as will be shown, is an anachronistic problem. The history that it carries, through almost three hundred years, underscores the difficulties at the heart of copyright in the contemporary scene. Indeed the reliance on copyright in these debates creates an argument based on circular definitions relating to only the statutory conception of cultural rights. No avenue is really left to imagine a space outside its jurisdiction. This paper asserts that notions of the “culture industry” (as opposed to some other conception of culture) are also inherently connected to the some three hundred years of copyright legislation. Our conceptions of the author and of intellectual pursuits as property can also be traced within this relatively small period. As clarified by Lord Chief Baron Pollock in the English courts in 1854, “copyright is altogether an artificial right” that does not apply at common law and relies wholly on statute (Jeffreys v Boosey). Foucault (124-42) highlights, in his attack on Romantic notions of the author-genius-God, that the author-function is expressed primarily as a legal term, through the legal concepts of censorship and copyright. Copyright, then, pays little attention to non-economic interests of the author and is used primarily to further economic interests. The corporate nature of the culture industry at present amounts to the successful application of copyright legislation in the past. This paper suggests that we look at our conception of literary and artistic work as separate from copyright’s own definitions of intellectual property and the commercialisation of culture. From Hogarth to File-Sharing The case of ‘DVD Jon’ is instructive. In 1999, Jon Lech Johansen, a Norwegian programmer, drew the ire of Hollywood by breaking the encryption code for DVDs (in a program called DeCSS). More recently, he has devised a program to circumvent the anti-piracy system for Apple’s iTunes music download service. With this program, called PyMusique, users still have to pay for the songs, but once these are paid for, users can use the songs on all operating systems and with no limits on copying, transfers or burning. Johansen, who publishes his wares on his blog entitled So Sue Me, was in fact sued in 1999 by the Motion Picture Association of America (MPAA) for copyright infringement. He argued that he created DeCSS as part of developing a DVD player for his Linux operating system, and that copying DVD movies was an ancillary function of the program for which he could not be held responsible. He was acquitted by an Oslo district court in early 2003 and again by an appeals court later that year. During this time many people on the internet found novel ways to publish the DeCSS code so as to avoid prosecution, including many different code encryptions incorporated into jpeg images (including the trademarked DVD logo, owned by DVD LLC) and mpeg movies, as an online MUD game scenario, and even produced in the form of a haiku (“42 Ways to Distribute DeCSS”). The ability to publish the code in a format not readily prosecutable owes less to encryption and clandestine messages than it does to anachronistic laws regarding the wholly legal right to original formats. Prior to 1709, copyright or licensing related to the book publishing industry where the work as formatted, pressed and disseminated was more important to protect than the text itself or the concept of the author as the writer of the text. Even today different copyrights may be held over the different formatting of the same text. The ability for hackers to attack the copyright legislation through its inherent anachronism is more than smart lawyering or a neat joke. These attacks, based on file sharing and the morphing fluid forms of information (rather than contained text, printed, broadcast, or expressed through form in general), amount to a real breach in copyright’s capability to administer and protect information. That the corporations are so excited and scared of these new technologies of dissemination should come as no surprise. It should also not be seen, as some commentators wish to, as a completely new approach to the dissemination of culture. If copyright was originally intended to protect the rights of the publisher, the passing of the Act of Anne in 1709 introduced two new concepts – an author being the owner of copyright, and the principle of a fixed term of protection for published works. In 1734, William Hogarth, wanting to ensure profits would flow from his widely disseminated prints (which attracted many pirate copies), fought to have these protections extended to visual works. What is notable about all this is that in 1734 the concept of copyright both in literary and artistic works applied only to published or reproduced works. It would be over one hundred years later, in the Romantic period, that a broader protection to all artworks would be available (for example, paintings, sculpture, etc). Born primarily out of guild systems, the socio-political aspect of protection, although with a passing nod to the author, was primarily a commercial concern. These days the statute has muddied its primary purpose; commercial interest is conflated and confused with the moral rights of the author (which, it might be added, although first asserted in the International Berne Convention of 1886 were only ratified in Australia in December 2000). For instance, in a case such as Sony Entertainment (Australia) Ltd v Smith (2005), both parties in fact want the protection of copyright. On one day the DJ in question (Pee Wee Ferris) might be advertising himself through his DJ name as an appropriative, sampling artist-author, while at the same time, we might assume, wishing to protect his own rights as a recording artist. Alternatively, the authors of the various DeCSS code works want both the free flow of information which then results in a possible free flow of media content. Naturally, this does not sit well with the current lords of copyright: the corporations. The new open-source author works contrary to all copyright. Freed Slaves The model of the open source author is not without precedent. Historically, prior to copyright and the culture industry, this approach to authorship was the norm. The Roman poet Martial, known for his wit and gifts of poetry, wrote I commend to you, Quintianus, my little books – if I can call them mine when your poet recites them: if they complain of their harsh servitude, you should come forward as their champion and give your guarantees; and when he calls himself their master you should say they are mine and have been granted their freedom. If you shout this out three or four times, you will make their kidnapper (plagiario) feel ashamed of himself. Here of course the cultural producer is a landed aristocrat (a situation common to early Western poets such as Chaucer, Spencer and More). The poem, or work, exists in the economy of the gift. The author-function here is also not the same as in modern times but was based on the advantages of reputation and celebrity within the Roman court. Similarly other texts such as stories, songs and music were circulated, prior to print, in a primarily oral economy. Later, with the rise of the professional guild system in late medieval times, the patronage system did indeed pay artists, sometimes royal sums. However, this bursary was not so much for the work than for upkeep as members of the household holding a particular skill. The commercial aspect of the author as owner only became fully realised with the rise of the middle classes in the eighteenth and nineteenth century and led to the global adoption of the copyright regime as the culture industry’s sanction. Added to this, the author is now overwhelmingly a corporation, not an individual, which has expanded the utilisation of these statutes for commercial advantage to, perhaps, an unforeseen degree. To understand the file-sharing period, which we are now entering at full speed, we cannot be confused by notions found in the copyright acts; definitions based on copyright cannot adequately express a culture without commercial concerns. Perhaps the discussion needs to return to concepts that predate copyright, before the author-function (as suggested by Foucault) and before the notion of intellectual property. That we have returned to a gift economy for cultural products is easily understood in the context of file-sharing. But what of the author? Here the figure of the hacker suggests a movement towards such an archaic model where the author’s remuneration comes in the form of celebrity, or a reputation as an exciting innovator. Another model, which is perhaps more likely, is an understanding that certain material disseminated will be sold and administered under copyright for profit and that the excess will be quickly and efficiently disseminated with no profit and with no overall duration of protection. Such an amalgamated approach is exemplified by Radiohead’s Kid A album, which, although available for free downloads, was still profitable because the (anachronistic) printed version, with its cover and artwork, still sold by the millions. Perhaps cultural works, the slaves of the author-corporation, should be granted their freedom: freedom from servitude to a commercial master, freedom to be re-told rather than re-sold, with due attribution to the author the only payment. This is a Utopian idea perhaps, but no less a fantasy than the idea that the laws of copyright, born of the printing press, can evolve to match the economy today that they purport to control. When thinking about ownership and authorship today, it must be recalled that copyright itself has a history of useful fictions. References Michel Foucault; “What Is an Author?” Twentieth-Century Literary Theory. Eds. Vassilis Lambropoulos and David Neal Miller. Albany: State UP of New York, 1987. 124-42. “42 Ways to Distribute DeCSS.” 5 Jun. 2005 http://decss.zoy.org/>. Jeffreys v Boosey, 1854. Johansen, Jon Lech. So Sue Me. 5 Jun. 2005 http://www.nanocrew.net/blog/>. Citation reference for this article MLA Style Phillips, Dougal, and Oliver Watts. "Copyright, Print and Authorship in the Culture Industry." M/C Journal 8.2 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0506/06-phillipswatts.php>. APA Style Phillips, D., and O. Watts. (Jun. 2005) "Copyright, Print and Authorship in the Culture Industry," M/C Journal, 8(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0506/06-phillipswatts.php>.
APA, Harvard, Vancouver, ISO, and other styles
37

Guimont, Edward. "Megalodon." M/C Journal 24, no. 5 (October 5, 2021). http://dx.doi.org/10.5204/mcj.2793.

Full text
Abstract:
In 1999, the TV movie Shark Attack depicted an attack by mutant great white sharks on the population of Cape Town. By the time the third entry in the series, Shark Attack 3, aired in 2002, mutant great whites had lost their lustre and were replaced as antagonists with the megalodon: a giant shark originating not in any laboratory, but history, having lived from approximately 23 to 3.6 million years ago. The megalodon was resurrected again in May 2021 through a trifecta of events. A video of a basking shark encounter in the Atlantic went viral on the social media platform TikTok, due to users misidentifying it as a megalodon caught on tape. At the same time a boy received publicity for finding a megalodon tooth on a beach in South Carolina on his fifth birthday (Scott). And finally, the video game Stranded Deep, in which a megalodon is featured as a major enemy, was released as one of the monthly free games on the PlayStation Plus gaming service. These examples form part of a larger trend of alleged megalodon sightings in recent years, emerging as a component of the modern resurgence of cryptozoology. In the words of Bernard Heuvelmans, the Belgian zoologist who both popularised the term and was a leading figure of the field, cryptozoology is the “science of hidden animals”, which he further explained were more generally referred to as ‘unknowns’, even though they are typically known to local populations—at least sufficiently so that we often indirectly know of their existence, and certain aspects of their appearance and behaviour. It would be better to call them animals ‘undescribed by science,’ at least according to prescribed zoological rules. (1-2) In other words, a large aspect of cryptozoology as a field is taking the legendary creatures of non-Western mythology and finding materialist explanations for them compatible with Western biology. In many ways, this is a relic of the era of European imperialism, when many creatures of Africa and the Americas were “hidden animals” to European eyes (Dendle 200-01; Flores 557; Guimont). A major example of this is Bigfoot beliefs, a large subset of which took Native American legends about hairy wild men and attempted to prove that they were actually sightings of relict Gigantopithecus. These “hidden animals”—Bigfoot, Nessie, the chupacabra, the glawackus—are referred to as ‘cryptids’ by cryptozoologists (Regal 22, 81-104). Almost unique in cryptozoology, the megalodon is a cryptid based entirely on Western scientific development, and even the notion that it survives comes from standard scientific analysis (albeit analysis which was later superseded). Much like living mammoths and Bigfoot, what might be called the ‘megalodon as cryptid hypothesis’ serves to reinforce a fairy tale of its own. It reflects the desire to believe that there are still areas of the Earth untouched enough by human destruction to sustain massive animal life (Dendle 199-200). Indeed, megalodon’s continued existence would help absolve humanity for the oceanic aspect of the Sixth Extinction, by its role as an alternative apex predator; cryptozoologist Michael Goss even proposed that whales and giant squids are rare not from human causes, but precisely because megalodons are feeding on them (40). Horror scholar Michael Fuchs has pointed out that shark media, particularly the 1975 film Jaws and its 2006 video game adaptation Jaws Unleashed, are imbued with eco-politics (Fuchs 172-83). These connections, as well as the modern megalodon’s surge in popularity, make it notable that none of Syfy’s climate change-focused Sharknado films featured a megalodon. Despite the lack of a Megalodonado, the popular appeal of the megalodon serves as an important case study. Given its scientific origin and dynamic relationship with popular culture, I argue that the ‘megalodon as cryptid hypothesis’ illustrates how the boundaries between ‘hard’ science and mythology, fiction and reality, as well as ‘monster’ and ‘animal’, are not as firm as advocates of the Western science tradition might believe. As this essay highlights, science can be a mythology of its own, and monsters can serve as its gods of the gaps—or, in the case of megalodon, the god of the depths. Megalodon Fossils: A Short History Ancient peoples of various cultures likely viewed fossilised teeth of megalodons in the area of modern-day Syria (Mayor, First Fossil Hunters 257). Over the past 2500 years, Native American cultures in North America used megalodon teeth both as curios and cutting tools, due to their large size and serrated edges. A substantial trade in megalodon teeth fossils existed between the cultures inhabiting the areas of the Chesapeake Bay and Ohio River Valley (Lowery et al. 93-108). A 1961 study found megalodon teeth present as offerings in pre-Columbian temples across Central America, including in the Mayan city of Palenque in Mexico and Sitio Conte in Panama (de Borhegyi 273-96). But these cases led to no mythologies incorporating megalodons, in contrast to examples such as the Unktehi, a Sioux water monster of myth likely inspired by a combination of mammoth and mosasaur fossils (Mayor, First Americans 221-38). In early modern Europe, megalodon teeth were initially referred to as ‘tongue stones’, due to their similarity in size and shape to human tongues—just one of many ways modern cryptozoology comes from European religious and mystical thought (Dendle 190-216). In 1605, English scholar Richard Verstegan published his book A Restitution of Decayed Intelligence in Antiquities, which included an engraving of a tongue stone, making megalodon teeth potentially the subject of the first known illustration of any fossil (Davidson 333). In Malta, from the sixteenth through eighteenth centuries, megalodon teeth, known as ‘St. Paul’s tongue’, were used as charms to ward off the evil eye, dipped into drinks suspected of being poisoned, and even ground into powder and consumed as medicine (Zammit-Maempel, “Evil Eye” plate III; Zammit-Maempel, “Handbills” 220; Freller 31-32). While megalodon teeth were valued in and of themselves, they were not incorporated into myths, or led to a belief in megalodons still being extant. Indeed, save for their size, megalodon teeth were hard to distinguish from those of living sharks, like great whites. Instead, both the identification of megalodons as a species, and the idea that they might still be alive, were notions which originated from extrapolations of the results of nineteenth and twentieth century European scientific studies. In particular, the major culprit was the famous British 1872-76 HMS Challenger expedition, which led to the establishment of oceanography as a branch of science. In 1873, Challenger recovered fossilised megalodon teeth from the South Pacific, the first recovered in the open ocean (Shuker 48; Goss 35; Roesch). In 1959, the zoologist Wladimir Tschernezky of Queen Mary College analysed the teeth recovered by the Challenger and argued (erroneously, as later seen) that the accumulation of manganese dioxide on its surface indicated that one had to have been deposited within the last 11,000 years, while another was given an age of 24,000 years (1331-32). However, these views have more recently been debunked, with megalodon extinction occurring over two million years ago at the absolute latest (Pimiento and Clements 1-5; Coleman and Huyghe 138; Roesch). Tschernezky’s 1959 claim that megalodons still existed as of 9000 BCE was followed by the 1963 book Sharks and Rays of Australian Seas, a posthumous publication by ichthyologist David George Stead. Stead recounted a story told to him in 1918 by fishermen in Port Stephens, New South Wales, of an encounter with a fully white shark in the 115-300 foot range, which Stead argued was a living megalodon. That this account came from Stead was notable as he held a PhD in biology, had founded the Wildlife Preservation Society of Australia, and had debunked an earlier supposed sea monster sighting in Sydney Harbor in 1907 (45-46). The Stead account formed the backbone of cryptozoological claims for the continued existence of the megalodon, and after the book’s publication, multiple reports of giant shark sightings in the Pacific from the 1920s and 1930s were retroactively associated with relict megalodons (Shuker 43, 49; Coleman and Huyghe 139-40; Goss 40-41; Roesch). A Monster of Science and Culture As I have outlined above, the ‘megalodon as cryptid hypothesis’ had as its origin story not in Native American or African myth, but Western science: the Challenger Expedition, a London zoologist, and an Australian ichthyologist. Nor was the idea of a living megalodon necessarily outlandish; in the decades after the Challenger Expedition, a number of supposedly extinct fish species had been discovered to be anything but. In the late 1800s, the goblin shark and frilled shark, both considered ‘living fossils’, had been found in the Pacific (Goss 34-35). In 1938, the coelacanth, also believed by Western naturalists to have been extinct for millions of years, was rediscovered (at least by Europeans) in South Africa, samples having occasionally been caught by local fishermen for centuries. The coelacanth in particular helped give scientific legitimacy to the idea, prevalent for decades by that point, that living dinosaurs—associated with a legendary creature called the mokele-mbembe—might still exist in the heart of Central Africa (Guimont). In 1976, a US Navy ship off Hawaii recovered a megamouth shark, a deep-water species completely unknown prior. All of these oceanic discoveries gave credence to the idea that the megalodon might also still survive (Coleman and Clark 66-68, 156-57; Shuker 41; Goss 35; Roesch). Indeed, Goss has noted that prior to 1938, respectable ichthyologists were more likely to believe in the continued existence of the megalodon than the coelacanth (39-40). Of course, the major reason why speculation over megalodon survival had such public resonance was completely unscientific: the already-entrenched fascination with the fact that it had been a locomotive-sized killer. This had most clearly been driven home by a 1909 display at the American Museum of Natural History in New York City. There, Bashford Dean, an ichthyologist at the museum, reconstructed an immense megalodon jaw, complete with actual fossil teeth. However, due to the fact that Dean assumed that all megalodon teeth were approximately the same size as the largest examples medially in the jaws, Dean’s jaw was at least one third larger than the likely upper limit of megalodon size. Nevertheless, the public perception of the megalodon remained at the 80-foot length that Dean extrapolated, rather than the more realistic 55-foot length that was the likely approximate upper size (Randall 170; Shuker 47; Goss 36-39). In particular, this inaccurate size estimate became entrenched in public thought due to a famous photograph of Dean and other museum officials posing inside his reconstructed jaw—a photograph which appeared in perhaps the most famous piece of shark fiction of all time, Steven Spielberg’s 1975 film Jaws. As it would turn out, the megalodon connection was itself a relic from the movie’s evolutionary ancestor, Peter Benchley’s novel, Jaws, from the year before. In the novel, the Woods Hole ichthyologist Matt Hooper (played by Richard Dreyfuss in the film) proposes that megalodons not only still exist, but they are the same species as great white sharks, with the smaller size of traditional great whites being due to the fact that they are simply on the small end of the megalodon size range (257-59). Benchley was reflecting on what was then the contemporary idea that megalodons likely resembled scaled-up great white sharks; something which is no longer as accepted. This was particularly notable as a number of claimed sightings stated that the alleged megalodons were larger great whites (Shuker 48-49), perhaps circuitously due to the Jaws influence. However, Goss was apparently unaware of Benchley’s linkage when he noted in 1987 (incidentally the year of the fourth and final Jaws movie) that to a megalodon, “the great white shark of Jaws would have been a stripling and perhaps a between-meals snack” (36). The publication of the Jaws novel led to an increased interest in the megalodon amongst cryptozoologists (Coleman and Clark 154; Mullis, “Cryptofiction” 246). But even so, it attracted rather less attention than other cryptids. From 1982-98, Heuvelmans served as president of the International Society of Cryptozoology, whose official journal was simply titled Cryptozoology. The notion of megalodon survival was addressed only once in its pages, and that as a brief mention in a letter to the editor (Raynal 112). This was in stark contrast to the oft-discussed potential for dinosaurs, mammoths, and Neanderthals to remain alive in the present day. In 1991, prominent British cryptozoologist Karl Shuker published an article endorsing the idea of extant megalodons (46-49). But this was followed by a 1998 article by Ben S. Roesch in The Cryptozoology Review severely criticising the methodology of Shuker and others who believed in the megalodon’s existence (Roesch). Writing in 1999, Loren Coleman and Jerome Clark, arguably the most prominent post-Heuvelmans cryptozoologists, were agnostic on the megalodon’s survival (155). The British palaeozoologist Darren Naish, a critic of cryptozoology, has pointed out that even if Shuker and others are correct and the megalodon continues to live in deep sea crevasses, it would be distinct enough from the historical surface-dwelling megalodon to be a separate species, to which he gave the hypothetical classification Carcharocles modernicus (Naish). And even the public fascination with the megalodon has its limits: at a 24 June 2004 auction in New York City, a set of megalodon jaws went on sale for $400,000, but were left unpurchased (Couzin 174). New Mythologies The ‘megalodon as cryptid hypothesis’ is effectively a fairy tale born of the blending of science, mythology, and most importantly, fiction. Beyond Jaws or Shark Attack 3—and potentially having inspired the latter (Weinberg)—perhaps the key patient zero of megalodon fiction is Steve Alten’s 1997 novel Meg: A Novel of Deep Terror, which went through a tortuous development adaptation process to become the 2018 film The Meg (Mullis, “Journey” 291-95). In the novel, the USS Nautilus, the US Navy’s first nuclear submarine and now a museum ship in Connecticut, is relaunched in order to hunt down the megalodon, only to be chomped in half by the shark. This is a clear allusion to Jules Verne’s 20,000 Leagues under the Sea (1870), where his Nautilus (namesake of the real submarine) is less successfully attacked by a giant cuttlefish (Alten, Meg 198; Verne 309-17). Meanwhile, in Alten’s 1999 sequel The Trench, an industrialist’s attempts to study the megalodon are revealed as an excuse to mine helium-3 from the seafloor to build fusion reactors, a plot financed by none other than a pre-9/11 Osama bin Laden in order to allow the Saudis to take over the global economy, in the process linking the megalodon with a monster of an entirely different type (Alten, Trench 261-62). In most adaptations of Verne’s novel, the cuttlefish that attacks the Nautilus is replaced by a giant squid, traditionally seen as the basis for the kraken of Norse myth (Thone 191). The kraken/giant squid dichotomy is present in the video game Stranded Deep. In it, the player’s unnamed avatar is a businessman whose plane crashes into a tropical sea, and must survive by scavenging resources, crafting shelters, and fighting predators across various islands. Which sea in particular does the player crash into? It is hard to say, as the only indication of specific location comes from the three ‘boss’ creatures the player must fight. One of them is Abaia, a creature from Melanesian mythology; another is Lusca, a creature from Caribbean mythology; the third is a megalodon. Lusca and Abaia, despite being creatures of mythology, are depicted as a giant squid and a giant moray eel, respectively. But the megalodon is portrayed as itself. Stranded Deep serves as a perfect distillation of the megalodon mythos: the shark is its own mythological basis, and its own cryptid equivalent. References Alten, Steven. Meg: A Novel of Deep Terror. New York: Doubleday, 1997. Alten, Steven. The Trench. New York: Pinnacle Books, 1999. Atherton, Darren. Jaws Unleashed. Videogame. Hungary: Appaloosa Interactive, 2006. Benchley, Peter. Jaws: A Novel. New York: Doubleday, 1974. Coleman, Loren, and Jerome Clark. Cryptozoology A to Z: The Encyclopedia of Loch Monsters, Sasquatch, Chupacabras, and Other Authentic Mysteries of Nature. New York: Simon & Schuster, 1999. Coleman, Loren, and Patrick Huyghe. The Field Guide to Lake Monsters, Sea Serpents, and Other Mystery Denizens of the Deep. Los Angeles: TarcherPerigee, 2003. Couzin, Jennifer. “Random Samples.” Science 305.5681 (2004): 174. Davidson, Jane P. “Fish Tales: Attributing the First Illustration of a Fossil Shark’s Tooth to Richard Verstegan (1605) and Nicolas Steno (1667).” Proceedings of the Academy of Natural Sciences of Philadelphia 150 (2000): 329–44. De Borhegyi, Stephan F. “Shark Teeth, Stingray Spines, and Shark Fishing in Ancient Mexico and Central America.” Southwestern Journal of Anthropology 17.3 (1961): 273–96. Dendle, Peter. “Cryptozoology in the Medieval and Modern Worlds.” Folklore 117.2 (2006): 190–206. Flores, Jorge, “Distant Wonders: The Strange and the Marvelous between Mughal India and Habsburg Iberia in the Early Seventeenth Century.” Comparative Studies in Society and History 49.3 (2007): 553–81. Freller, Thomas. “The Pauline Cult in Malta and the Movement of the Counter-Reformation: The Development of Its International Reputation.” The Catholic Historical Review 85.1 (1999): 15–34. Fuchs, Michael. “Becoming-Shark? Jaws Unleashed, the Animal Avatar, and Popular Culture’s Eco-Politics.” Beasts of the Deep: Sea Creatures and Popular Culture. Jon Hackett and Seán Harrington. Bloomington: Indiana UP, 2018. 172–83. Goss, Michael. “Do Giant Prehistoric Sharks Survive?” Fate 40.11 (1987): 32–41. Guimont, Edward. “Hunting Dinosaurs in Central Africa.” Contingent Magazine, 18 Mar. 2019. 26 May 2021 <http://contingentmagazine.org/2019/03/18/hunting-dinosaurs-africa/>. Heuvelmans, Bernard. “What is Cryptozoology?” Trans. Ron Westrum. Cryptozoology 1 (1982): 1–12. Jaws. Dir. Steven Spielberg. Universal Pictures, 1975. Lowery, Darrin, Stephen J. Godfrey, and Ralph Eshelman. “Integrated Geology, Paleontology, and Archaeology: Native American Use of Fossil Shark Teeth in the Chesapeake Bay Region.” Archaeology of Eastern North America 39 (2011): 93–108. Mayor, Adrienne. The First Fossil Hunters: Dinosaurs, Mammoths, and Myth in Greek and Roman Times. Princeton: Princeton UP, 2000. Mayor, Adrienne. Fossil Legends of the First Americans. Princeton: Princeton UP, 2005. Meg, The. Dir. Jon Turteltaub. Warner Brothers, 2018. Mullis, Justin. “Cryptofiction! Science Fiction and the Rise of Cryptozoology.” The Paranormal and Popular Culture: A Postmodern Religious Landscape. Eds. Darryl Caterine and John W. Morehead. London: Routledge, 2019. 240–52. Mullis, Justin. “The Meg’s Long Journey to the Big Screen.” Jaws Unmade: The Lost Sequels, Prequels, Remakes, and Rip-Offs. John LeMay. Roswell: Bicep Books, 2020. 291–95. Naish, Darren. “Tales from the Cryptozoologicon: Megalodon!” Scientific American, 5 Aug. 2013. 27 May 2021 <https://blogs.scientificamerican.com/tetrapod-zoology/cryptozoologicon-megalodon-teaser/>. Pimiento, Catalina, and Christopher F. Clements. “When Did Carcharocles Megalodon Become Extinct? A New Analysis of the Fossil Record.” PLoS One 9.10 (2014): 1–5. Randall, John E. “Size of the Great White Shark (Carcharodon).” Science 181.4095 (1973): 169–70. Raynal, Michel. “The Linnaeus of the Zoology of Tomorrow.” Cryptozoology 6 (1987): 110–15. Regal, Brian. Searching for Sasquatch: Crackpots, Eggheads, and Cryptozoology. New York: Palgrave Macmillan, 2011. Roesch, Ben S. “A Critical Evaluation of the Supposed Contemporary Existence of Carcharodon Megalodon.” Internet Archive, 1999. 28 May 2021 <https://web.archive.org/web/20131021005820/http:/web.ncf.ca/bz050/megalodon.html>. Scott, Ryan. “TikTok of Giant Shark Terrorizing Tourists Ignites Megalodon Theories.” Movieweb, 27 May 2021. 28 May 2021 <https://movieweb.com/giant-shark-tiktok-video-megalodon/>. Shark Attack. Dir. Bob Misiorowski. Martien Holdings A.V.V., 1999. Shark Attack 3: Megalodon. Dir. David Worth. Nu Image Films, 2002. Shuker, Karl P.N. “The Search for Monster Sharks.” Fate 44.3 (1991): 41–49. Stead, David G. Sharks and Rays of Australian Seas. Sydney: Angus & Robertson, 1963. Stranded Deep. Australia: Beam Team Games, 2015. Thone, Frank. “Nature Ramblings: Leviathan and the Kraken.” The Science News-Letter 33.12 (1938): 191. Tschernezky, Wladimir. “Age of Carcharodon Megalodon?” Nature 184.4695 (1959): 1331–32. Verne, Jules. Twenty Thousand Leagues under the Sea. 1870. New York: M. A. Donohue & Company, 1895. Weinberg, Scott. “Shark Attack 3: Megalodon.” eFilmCritic! 3 May 2004. 20 Sep. 2021 <https://www.efilmcritic.com/review.php?movie=9135&reviewer=128>. Zammit-Maempel, George. “The Evil Eye and Protective Cattle Horns in Malta.” Folklore 79.1 (1968): 1–16. ———. “Handbills Extolling the Virtues of Fossil Shark’s Teeth.” Melita Historica 7.3 (1978): 211–24.
APA, Harvard, Vancouver, ISO, and other styles
38

Beyer, Sue. "Metamodern Spell Casting." M/C Journal 26, no. 5 (October 2, 2023). http://dx.doi.org/10.5204/mcj.2999.

Full text
Abstract:
There are spells in the world: incantations that can transform reality through the power of procedural utterances. The marriage vow, the courtroom sentence, the shaman’s curse: these words are codes that change reality. (Finn 90) Introduction As a child, stories on magic were “opportunities to escape from reality” (Brugué and Llompart 1), or what Rosengren and Hickling describe as being part of a set of “causal belief systems” (77). As an adult, magic is typically seen as being “pure fantasy” (Rosengren and Hickling 75), while Bever argues that magic is something lost to time and materialism, and alternatively a skill that Yeats believed that anyone could develop with practice. The etymology of the word magic originates from magein, a Greek word used to describe “the science and religion of the priests of Zoroaster”, or, according to philologist Skeat, from Greek megas (great), thus signifying "the great science” (Melton 956). Not to be confused with sleight of hand or illusion, magic is traditionally associated with learned people, held in high esteem, who use supernatural or unseen forces to cause change in people and affect events. To use magic these people perform rituals and ceremonies associated with religion and spirituality and include people who may identify as Priests, Witches, Magicians, Wiccans, and Druids (Otto and Stausberg). Magic as Technology and Technology as Magic Although written accounts of the rituals and ceremonies performed by the Druids are rare, because they followed an oral tradition and didn’t record knowledge in a written form (Aldhouse-Green 19), they are believed to have considered magic as a practical technology to be used for such purposes as repelling enemies and divining lost items. They curse and blight humans and districts, raise storms and fogs, cause glamour and delusion, confer invisibility, inflict thirst and confusion on enemy warriors, transform people into animal shape or into stone, subdue and bind them with incantations, and raise magical barriers to halt attackers. (Hutton 33) Similarly, a common theme in The History of Magic by Chris Gosden is that magic is akin to science or mathematics—something to be utilised as a tool when there is a need, as well as being used to perform important rituals and ceremonies. In TechGnosis: Myth, Magic & Mysticism in the Age of Information, Davis discusses ideas on Technomysticism, and Thacker says that “the history of technology—from hieroglyphics to computer code—is itself inseparable from the often ambiguous exchanges with something nonhuman, something otherworldly, something divine. Technology, it seems, is religion by other means, then as now” (159). Written language, communication, speech, and instruction has always been used to transform the ordinary in people’s lives. In TechGnosis, Davis (32) cites Couliano (104): historians have been wrong in concluding that magic disappeared with the advent of 'quantitative science.’ The latter has simply substituted itself for a part of magic while extending its dreams and its goals by means of technology. Electricity, rapid transport, radio and television, the airplane, and the computer have merely carried into effect the promises first formulated by magic, resulting from the supernatural processes of the magician: to produce light, to move instantaneously from one point in space to another, to communicate with faraway regions of space, to fly through the air, and to have an infallible memory at one’s disposal. Non-Fungible Tokens (NFTs) In early 2021, at the height of the pandemic meta-crisis, blockchain and NFTs became well known (Umar et al. 1) and Crypto Art became the hot new money-making scheme for a small percentage of ‘artists’ and tech-bros alike. The popularity of Crypto Art continued until initial interest waned and Ether (ETH) started disappearing in the manner of a classic disappearing coin magic trick. In short, ETH is a type of cryptocurrency similar to Bitcoin. NFT is an acronym for Non-Fungible Token. An NFT is “a cryptographic digital asset that can be uniquely identified within its smart contract” (Myers, Proof of Work 316). The word Non-Fungible indicates that this token is unique and therefore cannot be substituted for a similar token. An example of something being fungible is being able to swap coins of the same denomination. The coins are different tokens but can be easily swapped and are worth the same as each other. Hackl, Lueth, and Bartolo define an NFT as “a digital asset that is unique and singular, backed by blockchain technology to ensure authenticity and ownership. An NFT can be bought, sold, traded, or collected” (7). Blockchain For the newcomer, blockchain can seem impenetrable and based on a type of esoterica or secret knowledge known only to an initiate of a certain type of programming (Cassino 22). The origins of blockchain can be found in the research article “How to Time-Stamp a Digital Document”, published by the Journal of Cryptology in 1991 by Haber, a cryptographer, and Stornetta, a physicist. They were attempting to answer “epistemological problems of how we trust what we believe to be true in a digital age” (Franceschet 310). Subsequently, in 2008, Satoshi Nakamoto wrote The White Paper, a document that describes the radical idea of Bitcoin or “Magic Internet Money” (Droitcour). As defined by Myers (Proof of Work 314), a blockchain is “a series of blocks of validated transactions, each linked to its predecessor by its cryptographic hash”. They go on to say that “Bitcoin’s innovation was not to produce a blockchain, which is essentially just a Merkle list, it was to produce a blockchain in a securely decentralised way”. In other words, blockchain is essentially a permanent record and secure database of information. The secure and permanent nature of blockchain is comparable to a chapter of the Akashic records: a metaphysical idea described as an infinite database where information on everything that has ever happened is stored. It is a mental plane where information is recorded and immutable for all time (Nash). The information stored in this infinite database is available to people who are familiar with the correct rituals and spells to access this knowledge. Blockchain Smart Contracts Blockchain smart contracts are written by a developer and stored on the blockchain. They contain the metadata required to set out the terms of the contract. IBM describes a smart contract as “programs stored on a blockchain that run when predetermined conditions are met”. There are several advantages of using a smart contract. Blockchain is a permanent and transparent record, archived using decentralised peer-to-peer Distributed Ledger Technology (DLT). This technology safeguards the security of a decentralised digital database because it eliminates the intermediary and reduces the chance of fraud, gives hackers fewer opportunities to access the information, and increases the stability of the system (Srivastava). They go on to say that “it is an emerging and revolutionary technology that is attracting a lot of public attention due to its capability to reduce risks and fraud in a scalable manner”. Despite being a dry subject, blockchain is frequently associated with magic. One example is Faustino, Maria, and Marques describing a “quasi-religious romanticism of the crypto-community towards blockchain technologies” (67), with Satoshi represented as King Arthur. The set of instructions that make up the blockchain smart contracts and NFTs tell the program, database, or computer what needs to happen. These instructions are similar to a recipe or spell. This “sourcery” is what Chun (19) describes when talking about the technological magic that mere mortals are unable to comprehend. “We believe in the power of code as a set of magical symbols linking the invisible and visible, echoing our long cultural tradition of logos, or language as an underlying system of order and reason, and its power as a kind of sourcery” (Finn 714). NFTs as a Conceptual Medium In a “massively distributed electronic ritual” (Myers, Proof of Work 100), NFTs became better-known with the sale of Beeple’s Everydays: The First 5000 Days by Christie’s for US$69,346,250. Because of the “thousandfold return” (Wang et al. 1) on the rapidly expanding market in October 2021, most people at that time viewed NFTs and cryptocurrencies as the latest cash cow; some artists saw them as a method to become financially independent, cut out the gallery intermediary, and be compensated on resales (Belk 5). In addition to the financial considerations, a small number of artists saw the conceptual potential of NFTs. Rhea Myers, a conceptual artist, has been using the blockchain as a conceptual medium for over 10 years. Myers describes themselves as “an artist, hacker and writer” (Myers, Bio). A recent work by Myers, titled Is Art (Token), made in 2023 as an Ethereum ERC-721 Token (NFT), is made using a digital image with text that says “this token is art”. The word ‘is’ is emphasised in a maroon colour that differentiates it from the rest in dark grey. The following is the didactic for the artwork. Own the creative power of a crypto artist. Is Art (Token) takes the artist’s power of nomination, of naming something as art, and delegates it to the artwork’s owner. Their assertion of its art or non-art status is secured and guaranteed by the power of the blockchain. Based on a common and understandable misunderstanding of how Is Art (2014) works, this is the first in a series of editions that inscribe ongoing and contemporary concerns onto this exemplar of a past or perhaps not yet realized blockchain artworld. (Myers, is art editions). This is a simple example of their work. A lot of Myers’s work appears to be uncomplicated but hides subtle levels of sophistication that use all the tools available to conceptual artists by questioning the notion of what art is—a hallmark of conceptual art (Goldie and Schellekens 22). Sol LeWitt, in Paragraphs on Conceptual Art, was the first to use the term, and described it by saying “the idea itself, even if not made visual, is as much a work of art as any finished product”. According to Bailey, the most influential American conceptual artists of the 1960s were Lucy Lippard, Sol LeWitt, and Joseph Kosuth, “despite deriving from radically diverse insights about the reason for calling it ‘Conceptual Art’” (8). Instruction-Based Art Artist Claudia Hart employs the instructions used to create an NFT as a medium and artwork in Digital Combines, a new genre the artist has proposed, that joins physical, digital, and virtual media together. The NFT, in a digital combine, functions as a type of glue that holds different elements of the work together. New media rely on digital technology to communicate with the viewer. Digital combines take this one step further—the media are held together by an invisible instruction linked to the object or installation with a QR code that magically takes the viewer to the NFT via a “portal to the cloud” (Hart, Digital Combine Paintings). QR codes are something we all became familiar with during the on-and-off lockdown phase of the pandemic (Morrison et al. 1). Denso Wave Inc., the inventor of the Quick Response Code or QR Code, describes them as being a scannable graphic that is “capable of handling several dozen to several hundred times more information than a conventional bar code that can only store up to 20 digits”. QR Codes were made available to the public in 1994, are easily detected by readers at nearly any size, and can be reconfigured to fit a variety of different shapes. A “QR Code is capable of handling all types of data, such as numeric and alphabetic characters, Kanji, Kana, Hiragana, symbols, binary, and control codes. Up to 7,089 characters can be encoded in one symbol” (Denso Wave). Similar to ideas used by the American conceptual artists of the 1960s, QR codes and NFTs are used in digital combines as conceptual tools. Analogous to Sol LeWitt’s wall drawings, the instruction is the medium and part of the artwork. An example of a Wall Drawing made by Sol LeWitt is as follows: Wall Drawing 11A wall divided horizontally and vertically into four equal parts. Within each part, three of the four kinds of lines are superimposed.(Sol LeWitt, May 1969; MASS MoCA, 2023) The act or intention of using an NFT as a medium in art-making transforms it from being solely a financial contract, which NFTs are widely known for, to an artistic medium or a standalone artwork. The interdisciplinary artist Sue Beyer uses Machine Learning and NFTs as conceptual media in her digital combines. Beyer’s use of machine learning corresponds to the automatic writing that André Breton and Philippe Soupault of the Surrealists were exploring from 1918 to 1924 when they wrote Les Champs Magnétiques (Magnetic Fields) (Bohn 7). Automatic writing was popular amongst the spiritualist movement that evolved from the 1840s to the early 1900s in Europe and the United States (Gosden 399). Michael Riffaterre (221; in Bohn 8) talks about how automatic writing differs from ordinary texts. Automatic writing takes a “total departure from logic, temporality, and referentiality”, in addition to violating “the rules of verisimilitude and the representation of the real”. Bohn adds that although “normal syntax is respected, they make only limited sense”. An artificial intelligence (AI) hallucination, or what Chintapali (1) describes as “distorted reality”, can be seen in the following paragraph that Deep Story provided after entering the prompt ‘Sue Beyer’ in March 2022. None of these sentences have any basis in truth about the person Sue Beyer from Melbourne, Australia. Suddenly runs to Jen from the bedroom window, her face smoking, her glasses shattering. Michaels (30) stands on the bed, pale and irritated. Dear Mister Shut Up! Sue’s loft – later – Sue is on the phone, looking upset. There is a new bruise on her face. There is a distinction between AI and machine learning. According to ChatGPT 3.5, “Machine Learning is a subset of AI that focuses on enabling computers to learn and make predictions or decisions without being explicitly programmed. It involves the development of algorithms and statistical models that allow machines to automatically learn from data, identify patterns, and make informed decisions or predictions”. Using the story generator Deep Story, Beyer uses the element of chance inherent in Machine Learning to create a biography on herself written by the alien other of AI. The paragraphs that Deep Story produces are nonsensical statements and made-up fantasies of what Beyer suspects AI wants the artist to hear. Like a psychic medium or oracle, providing wisdom and advice to a petitioner, the words tumble out of the story generator like a chaotic prediction meant to be deciphered at a later time. This element of chance might be a short-lived occurrence as machine learning is evolving and getting smarter exponentially, the potential of which is becoming very evident just from empirical observation. Something that originated in early modernist science fiction is quickly becoming a reality in our time. A Metamodern Spell Casting Metamodernism is an evolving term that emerged from a series of global catastrophes that occurred from the mid-1990s onwards. The term tolerates the concurrent use of ideas that arise in modernism and postmodernism without discord. It uses oppositional aspects or concepts in art-making and other cultural production that form what Dember calls a “complicated feeling” (Dember). These ideas in oscillation allow metamodernism to move beyond these fixed terms and encompass a wide range of cultural tendencies that reflect what is known collectively as a structure of feeling (van den Akker et al.). The oppositional media used in a digital combine oscillate with each other and also form meaning between each other, relating to material and immaterial concepts. These amalgamations place “technology and culture in mutual interrogation to produce new ways of seeing the world as it unfolds around us” (Myers Studio Ltd.). The use of the oppositional aspects of technology and culture indicates that Myers’s work can also be firmly placed within the domain of metamodernism. Advancements in AI over the years since the pandemic are overwhelming. In episode 23 of the MIT podcast Business Lab, Justice stated that “Covid-19 has accelerated the pace of digital in many ways, across many types of technologies.” They go on to say that “this is where we are starting to experience such a rapid pace of exponential change that it’s very difficult for most people to understand the progress” (MIT Technology Review Insights). Similarly, in 2021 NFTs burst forth in popularity in reaction to various conditions arising from the pandemic meta-crisis. A similar effect was seen around cryptocurrencies after the Global Financial Crisis (GFC) in 2007-2008 (Aliber and Zoega). “The popularity of cryptocurrencies represents in no small part a reaction to the financial crisis and austerity. That reaction takes the form of a retreat from conventional economic and political action and represents at least an economic occult” (Myers, Proof of Work 100). When a traumatic event occurs, like a pandemic, people turn to God, spirituality (Tumminio Hansen), or possibly the occult to look for answers. NFTs took on the role of precursor, promising access to untold riches, esoteric knowledge, and the comforting feeling of being part of the NFT cult. Similar to the effect of what Sutcliffe (15) calls spiritual “occultures” like “long-standing occult societies or New Age healers”, people can be lured by “the promise of secret knowledge”, which “can assist the deceptions of false gurus and create opportunities for cultic exploitation”. Conclusion NFTs are a metamodern spell casting, their popularity borne by the meta-crisis of the pandemic; they are made using magical instruction that oscillates between finance and conceptual abstraction, materialism and socialist idealism, financial ledger, and artistic medium. The metadata in the smart contract of the NFT provide instruction that combines the tangible and intangible. This oscillation, present in metamodern artmaking, creates and maintains a liminal space between these ideas, objects, and media. The in-between space allows for the perpetual transmutation of one thing to another. These ideas are a work in progress and additional exploration is necessary. An NFT is a new medium available to artists that does not physically exist but can be used to create meaning or to glue or hold objects together in a digital combine. Further investigation into the ontological aspects of this medium is required. The smart contract can be viewed as a recipe for the spell or incantation that, like instruction-based art, transforms an object from one thing to another. The blockchain that the NFT is housed in is a liminal space. The contract is stored on the threshold waiting for someone to view or purchase the NFT and turn the objects displayed in the gallery space into a digital combine. Alternatively, the intention of the artist is enough to complete this alchemical process. References Aldhouse-Green, Miranda. Caesar’s Druids: Story of an Ancient Priesthood. New Haven: Yale UP, 2010. Aliber, Robert Z., and Gylfi Zoega. “A Retrospective on the 2008 Global Financial Crisis.” The 2008 Global Financial Crisis in Retrospect: Causes of the Crisis and National Regulatory Responses. Eds. Robert Z. Aliber and Gylfi Zoega. Cham: Springer International Publishing, 2019. , 1–15. 9 June 2023 <https://doi.org/10.1007/978-3-030-12395-6_1>. Belk, Russell. “The Digital Frontier as a Liminal Space.” Journal of Consumer Psychology (2023): 1–7. Bailey, Robert. “Introduction: A Theory of Conceptualism.” Durham: Duke UP, 2017. 1–36. 28 July 2023 <https://read.dukeupress.edu/books/book/1938/chapter/234969/IntroductionA-Theory-of-Conceptualism>. Bever, Edward. “Witchcraft Prosecutions and the Decline of Magic.” Journal of Interdisciplinary History 40.2 (2009): 263–293. 27 July 2023 <https://muse.jhu.edu/pub/6/article/315257>. Beyer, S. “Digital Combines.” Sue Beyer | Visual artist, 2023. 22 July 2023 <https://www.suebeyer.com.au/combines.html>. ———. “Digital Combines: A Metamodern Oscillation of Oppositional Objects and Concepts in Contemporary Interdisciplinary Art Practice.” International Journal of Contemporary Humanities 6 (2022). Bohn, Willard. One Hundred Years of Surrealist Poetry: Theory and Practice. New York: Bloomsbury Academic, 2022. Brugué, Lydia, and Auba Llompart. Contemporary Fairy-Tale Magic: Subverting Gender and Genre. Boston: Brill, 2020. Cassino, Dan. “Crypto, Meme Stocks, and Threatened Masculinity.” Contexts 22.2 (2023): 18–23. ChatGPT 3.5. “ML vs AI.” Chat.openai.com, 18 June 2023. <https://chat.openai.com/share/4e425ff8-8610-4960-99d1-16e0451d517a>. Chintapali, Rohit. “Simplest Guardrail for AI Hallucinations? Be Skeptical, Double Check Outcomes & Don’t Anthropomorphise AI.” Business World 24 Mar. 2023. 28 June 2023 <https://www.proquest.com/docview/2790033991/abstract/9FD03495815D4956PQ/1>. Christie’s. “Beeple (b. 1981), EVERYDAYS: THE FIRST 5000 DAYS.” Christie’s, 2023. 7 June 2023 <https://onlineonly.christies.com/s/beeple-first-5000-days/beeple-b-1981-1/112924>. Chun, Wendy Hui Kyong. Programmed Visions: Software and Memory. Cambridge: MIT P, 2011. Davis, E. “TechGnosis: Magic, Memory and the Angels of Information.” Magic. Ed. J. Sutcliffe. Cambridge, Mass.: MIT P, 2021. 114–121 ———. TechGnosis: Myth, Magic & Mysticism in the Age of Information. 2nd ed. Berkeley: North Atlantic Books, 2015. DeepStory.ai. “DeepStory.” DeepStory, 2023. 18 June 2023 <https://www.deepstory.ai/#!/>. Dember, G. “What Is Metamodernism and Why Does It Matter?” The Side View, 2020. 22 July 2023 <https://thesideview.co/journal/what-is-metamodernism-and-why-does-it-matter/>. Denso Wave Inc. “History of QR Code.” QRcode.com, n.d. 27 June 2023 <https://www.qrcode.com/en/history/>. Droitcour, Brian. “The Outland Review, Vol. 01.” Outland, 4 May 2023. 20 July 2023 <https://outland.art/the-outland-review-vol-01-julian-opie-taproot-wizards/>. Faustino, Sandra, Inês Faria, and Rafael Marques. “The Myths and Legends of King Satoshi and the Knights of Blockchain.” Journal of Cultural Economy 15.1 (2022): 67–80. 23 July 2023 <https://www.tandfonline.com/doi/full/10.1080/17530350.2021.1921830>. Finn, Ed. What Algorithms Want: Imagination in the Age of Computing. EPub Version 1.0. Cambridge, Mass.: MIT P, 2017. Franceschet, Massimo. “The Sentiment of Crypto Art.” CEUR Workshop Proceedings. Aachen: RWTH Aachen, n.d. 310–318. 25 Nov. 2022 <https://ceur-ws.org/Vol-2989/long_paper10.pdf>. Goldie, Peter, and Elisabeth Schellekens. Who’s Afraid of Conceptual Art? Florence: Taylor and Francis, 2009. Gordon, Melton J. “Magic.” Encyclopedia of Occultism and Parapsychology. Ed Melton J. Gordon. 5th ed. Detroit, MI: Gale, 2001. 956–960. 21 July 2023 <https://link.gale.com/apps/doc/CX3403802897/GVRL?sid=bookmark-GVRL&xid=00061628>. Gosden, Chris. The History of Magic: From Alchemy to Witchcraft, from the Ice Age to the Present. London: Penguin, 2020. Haber, S., and W.S. Stornetta. “How to Time-Stamp a Digital Document.” Journal of Cryptology 3.2 (1991): 99–111. Hackl, Cathy, Dirk Lueth, and Tommaso di Bartolo. Navigating the Metaverse: A Guide to Limitless Possibilities in a Web 3.0 World. Ed. John Arkontaky. Hoboken, NJ: John Wiley & Sons, 2022. Hart, Claudia. “Digital Combine Paintings – Claudia Hart.” Claudia Hart, 2021. 15 Nov. 2022 <https://claudiahart.com/Digital-Combine-Paintings>. ———. “The Ruins Timeline – Claudia Hart.” Claudia Hart, 2020. 3 June 2023 <https://claudiahart.com/The-Ruins-timeline>. IBM. “What Are Smart Contracts on Blockchain?” IBM, n.d. 5 June 2023 <https://www.ibm.com/topics/smart-contracts>. LeWitt, Sol. “Paragraphs on Conceptual Art.” Art Forum (1967): n.p. 28 July 2023 <http://arteducation.sfu-kras.ru/files/documents/lewitt-paragraphs-on-conceptual-art1.pdf>. ———. “Wall Drawing 11.” Massachusetts Museum of Contemporary Art. MASS MoCA, 2023. 16 June 2023 <https://massmoca.org/event/walldrawing11/>. MIT Technology Review Insights. “Embracing the Rapid Pace of AI.” Business Lab, 20 May 2021. 28 July 2023 <https://www.technologyreview.com/2021/05/19/1025016/embracing-the-rapid-pace-of-ai/>. Morrison, Benjamin A., et al. “Life after Lockdown: The Experiences of Older Adults in a Contactless Digital World.” Frontiers in Psychology 13 (2023): 1–14. 28 July 2023 <https://www.frontiersin.org/articles/10.3389/fpsyg.2022.1100521>. Myers, Rhea. “Bio.” rhea.art, n.d. 1 July 2023 <https://rhea.art/bio>. ———. “is art editions.” rhea.art, 2023. 22 July 2023 <https://rhea.art/is-art-editions>. ——— [@rheaplex]. “My Little Penny: Bitcoin is Magic.” Tweet. Twitter, 2014. 8 June 2023 <https://twitter.com/rheaplex/status/439534733534298112>. ———. Proof of Work: Blockchain Provocations 2011-2021. UK: Urbanomic Media, 2023. Myers Studio Ltd. “The Home Base of Rhea and Seryna Myers.” Myers Studio, 2021. 17 Nov. 2022 <http://myers.studio/>. Nash, Alex. “The Akashic Records: Origins and Relation to Western Concepts.” Central European Journal for Contemporary Religion 3 (2020): 109–124. Otto, Bernd-Christian, and Michael Stausberg. Defining Magic: A Reader. London: Taylor & Francis Group, 2014. Riffaterre, Michael. Text Production. Trans. Terese Lyons. New York: Columbia UP, 1983. Rosengren, Karl S., and Anne K. Hickling. “Metamorphosis and Magic: The Development of Children’s Thinking about Possible Events and Plausible Mechanisms.” Imagining the Impossible. Ed. Karl S. Rosengren, Carl N. Johnson, and Paul L. Harris, 75–98. Cambridge UP, 2000. Srivastava, N. “What Is Blockchain Technology, and How Does It Work?” Blockchain Council, 23 Oct. 2020. 17 Nov. 2022 <https://www.blockchain-council.org/blockchain/what-is-blockchain-technology-and-how-does-it-work/>. Sutcliffe, J., ed. Magic. Cambridge, Mass.: MIT P, 2021. Thacker, Eugene. “Foreword (2015): ‘We Cartographers of Old…’” TechGnosis: Myth, Magic & Mysticism in the Age of Information. Kindle Edition. Berkeley: North Atlantic Books, 2015. Location 111-169. Tumminio Hansen, D. “Do People Become More Religious in Times of Crisis?” The Conversation, 2021. 9 June 2023 <http://theconversation.com/do-people-become-more-religious-in-times-of-crisis-158849>. Van den Akker, R., A. Gibbons, and T. Vermeulen. Metamodernism: Historicity, Affect, and Depth after Postmodernism. London: Rowman & Littlefield, 2019. Umar, Zaghum, et al. “Covid-19 Impact on NFTs and Major Asset Classes Interrelations: Insights from the Wavelet Coherence Analysis.” Finance Research Letters 47 (2022). 27 July 2023 <https://linkinghub.elsevier.com/retrieve/pii/S1544612322000496>. Wang, Qin, et al. “Non-Fungible Token (NFT): Overview, Evaluation, Opportunities and Challenges.” arXiv, 24 Oct. 2021. 28 July 2023 <http://arxiv.org/abs/2105.07447>. Yeats, W.B. “Magic.” Essays and Introductions. Ed. W.B. Yeats. London: Palgrave Macmillan, 1961. 28–52. 27 July 2023 <https://doi.org/10.1007/978-1-349-00618-2_3>.
APA, Harvard, Vancouver, ISO, and other styles
39

Mackenzie, Adrian. "The Infrastructural-Political." M/C Journal 6, no. 4 (August 1, 2003). http://dx.doi.org/10.5204/mcj.2229.

Full text
Abstract:
To analyse critically contemporary communications and network technologies, and to understand how they become more (or less!) political, we need to learn about the forms of attachment, the kinds of 'stickiness', and the 'velcro effects' which block or negate as well as enable contemporary infrastructural politics. In the following tableau, the heuristic fiction comes from psychotherapy (Orbach, 2000). Imagine the cultural/new media/critical researcher as the analyst. The forms of attachment to be analysed include the analyst's own as she/he comes into relation with changing infrastructural regimes. Her or his reflections are italicised. Articulation The clients are a male couple, a community-minded activist artist-hacker, Pete, and a corporate IT strategist, Roger. They come to the consultation. It starts off badly. Pete shouts at Roger, who sits quietly beside him. Pete's clothes are loose and dark, he wears funky fluorescent trainers and his laptop backpack is geek-cool. Roger is in suit and tie, neat haircut, closely shaven, a slim aluminium briefcase leans against his pinstriped trouser leg. A few minutes into the session, it looks like Pete might come to blows with Roger. Interceding, the therapist asks them to say what brought them there. Pete and Roger begin to talk about the dilemma that had precipitated the anger and distress. Pete appeals for affirmation of how he has been wronged. But as Roger talks, the dominant feeling shifts to confusion. They are certainly in trouble as a couple, but clearly neither is about to relinquish this relationship. When cultural researchers of technology open the door to a new problem, they do not occupy a separate critical space in which knowledge about objects, practices, relations, processes, or figures come to be represented. Rather, only through 'articulation,' as Donna Haraway suggests, can they add another link, another twist in the knotted linkages which constitute the domain in question (Haraway, 1997, 63). What link(s) would we want to add to the contemporary contests over network infrastructure, where the central issue is figured as access to bandwidth and ubiquitous connectivity? Revolution and convolution Before the dotcom crash, Pete and Roger's relationship had been blissful and imaginative. Together, through the years of virtual reality and the browser wars, they had agreed on and implemented protocols, cut code, designed new applications and increased connectivity. Imagining full-blown virtuality had been a shared project; they were making a world together. The arrival of online shopping, email spamming, music swapping, massive on-line gaming and even open source software had not damaged it. Although they had come from different backgrounds and upbringings, they needed each other. For Roger, Pete had represented an urban sub-cultural well-spring of invention in contemporary technological cultures. Despite his corporate confidence and affluence, Roger knew that kudos on the street underpinned commercial success. From Roger, Pete trusted he would gain access to infrastructure and technical capacity that was the basis of a shared domain of communication. Their relationship before the dotcom crash had worked well because there had been no question about their desirability to each other. There had been conflicts, but both loved their work and found it meaningful. Already we see attachment to infrastructure becoming convoluted. The infrastructural-political lies neither outside or inside technology itself. What appears as a technological revolution – the arrival of the Internet – can be a convolution in relation to collective life. The affective energy attached to communication infrastructure can be seen as the 'historical and political reality of the mass and of crowds in movement' (Balibar, 1998, 16). We could say, as Gatens & Lloyd (1999) put it, that '[r]elations of communication of affect between human individuals are ... subsidiary to the relations of communication between the affects themselves' (66). From this standpoint, the relation between the couple refracts different affects meshing with each other. Hence, we need to understand the fears and hopes, desires and mourning associated with technological media differently. Attachment to technology After the dotcom crash of early 2001, things became more difficult. Their relationship met an extremely simple dilemma: low or high network bandwidth (Lovink, 2003, 370). Pete loved technical limitations like narrow bandwidth. They stimulated artistic, political, economic and collective creativity. He was fond of the Unix command line, shell scripts, cutting code in Python or Perl, ascii art, and hand-coded html. Roger, by contrast, saw technical limitations, especially those of bandwidth, ruining the Internet. Slow or unreliable access to the net thwarted its development into a truly mass popular entertainment medium. Only high bandwidth and mobility could rescue it. He thought Pete was part of the problem. Pete represented over-attachment to the platform. Pete's love of the intricacies of code, his insistence on tinkering, making-do, recycling, sharing and re-appropriating was all very well but it was an obstacle to popularity. In his more idealistic moments, Roger even thought that Pete's truculent defiance of the popular Internet and his attempts to save the masses from being duped only 'obscured the real social significance of their pleasures' (Walkerdine, 1999, 192-3). Strong technological attachments are no accident for two reasons. Firstly, the political is underpinned by collective affects or an awareness of bodies in relation (Gatens & Lloyd, 1999, 77). Secondly, 'human affairs (praxis) and the management-production of things (technç),' (Stengers, 2000, 163) are integrated in our politics. When politics integrates human affairs and technical things, collective affects concerning infrastructure arise. In contemporary politics, utopian and dystopian fantasies and visions of 'the good life' figure through communication infrastructure. Infrastructures are integral to how cultural forms of life render and inhabit their worlds. Thus, politics increasingly concerns technoscapes (Appadurai, 1996). Dilemmas of technical capacity By the end of 2002, contact between them was perfunctory. Pete was active in community networking projects in East London and 'Pico Peering' (http://picopeer.net/wiki/). In conjunction with a local housing association, he installing a wireless backbone for community access. The projects of the late 1990s - virtual spaces for artists, on-line communities, direct action hacktivism, collaborating on open source projects - seemed less important, although he did still work on them. Connection to a vibrant, ethnically complicated and crowded inner city seemed more interesting than either the relative abstraction of code or the predictability of commercial Internet. 'Carving out mobile space is good', Pete often said, 'but reclaiming public space is better' (Gerritzen & Lovink, 2002, 93). Roger, meanwhile, had embraced broadband connectivity, not caring that it mostly seemed to be used for pornography and music downloads. It was fast, popular, and becoming the norm in Europe and USA (Warwick, 2003). Like others, he thought 'never enough Internet capacity can be provided to the velocity-hungry on-line masses' (Lovink, 2003, 370). The dilemma of bandwidth forks from a deeper ambivalence about technical capacities and their role in futurity. On the one hand, technical capacity promises to overcome existing limitations. On the other hand, limitations only become relevant when they function as sites of differentiation or problematic zones open to diverse technical and non-technical solutions. All kinds of contestation, production, representation, identification and regulation cluster around these sites. The problem for cultural analysts of technology is articulating how certain sites of differentiation attract significations, technical innovations, objects/gadgets, infrastructures, regulatory apparatus, commercial-legal conflicts, feelings and concerns. The work of articulation involves disembedding these sites and extracting the relations of communication between affects that flow through them. Connectivity and collectivity Roger is having an affair. He met Erica at a wireless LAN trade exhibition held in the Olympia Exhibition Hall during late May 2003 (http://www.wlanevent.com/home/default.asp). Hewlett Packard-Compaq, Toshiba and Fujitsui had stands, some of the telcos and network operators were there too. Lining the back alleys, generic hardware and software manufacturers displayed their gadgets and ran their software demos on laptops. 'Directors' and 'sales executives' eagerly explained their products and handed out their sometimes less-than-glossy information sheets. At the centre, Intel occupied a large glass-walled stand lavishly kitted out with plasma screens on the walls, free laptops and wi-fi hotspots, pseudo-Japanese rock garden, comfortable seating in 'breakout cubicles' and well-groomed product managers and sales managers. Their Centrino™ wireless ready processors and corporate wifi solutions were featured in TV advertisements playing on large plasma screens. These advertisements dazzled Roger. They showed a broadband world without cables, without complicated configuration tasks, and without the clutter and hassle of wire infrastructures. They meant freedom from points of attachment, network connections, dongles and plugs. Like many others, he thought to himself 'wireless networking is the best thing to happen to the Internet since the browser' (Boutin, 2003). He met Erica when he went to ask if he could have an Intel showbag full of promotional material. With Erica, a telecommunications marketing director responsible for a wireless broadband roll-out in hotels, airports, pubs, cafés and train stations throughout the UK, he ended up going to the exhibition café to talk about wireless security issues. That afternoon, together they managed to squeeze into the most popular seminar at the exhibition, 'The Typical Wireless Hacker and W-LAN Security.' Andrew Barry writes, 'rapid technical change may sometimes have to occur in order to anticipate and stifle invention by others' (Barry, 2001, 213). Sometimes, we could add, rapid technical change may occur in order to anticipate and stifle the very presence of others. Remarkably many images of wireless connectivity involve empty spaces (e.g. Toshiba ads, Intel Centrino™ ads), just as so many car ads show empty roads. What is affectively at stake in these figurations of network infrastructure? What encounter or unwanted intimacy needs to be controlled here? Conversely, what space is there to imagine other connectivities, ones that do not rest on the promise of unobstructed private access to everything everywhere? Can we treat connectivity as something that opens relations between people, that lifts the ban on others being present? What sustains relationships: what does not yet exist The affair has brought Pete and Roger's relationship to a crisis point. Pete complains that the trust and intimacy between them is defunct. He argues that in Roger’s affair with Erica, he firewalls public culture in favour of a narrow understanding of the public as consumers of bandwidth. Even though Roger is increasing connectivity through wireless networking, it is not with the purpose of augmenting public space. Indeed, Roger is working with Erica to filter public spaces through a corporate, proprietary platform. If wired infrastructure has been successfully transformed into an interlocking matrix of proprietary relations, the task is now 'full spectrum' coverage of the spaces available to wireless infrastructures. For his part, Roger no longer regards technology itself as the basis of their mutual attachment. He now sees the technology as a given, and as something on which new kinds of freedom and mobility could rely. Wireless infrastructures promise to unleash people from the wires and cables that trap them at their screens. It will bring connectivity to other places - departure lounge, hotel lobby, Starbucks, beside the pool or in the garden, throughout the campus, etc. It allows them to work and be entertained in places they've never tried before. They leave the consultation in conflict. There is no obvious solution to their problem. Pete sees techno-utopian visions of freedom dying front of his eyes (Lessing, 2003), and is dealing with that by trying to move lower into the infrastructure. From his perspective, the technology is not a given but something whose conjunctions with other objects, activities, groups, figures and spaces cannot be left to chance. Roger too regrets the death of techno-utopian visions, but rejects the expectation that he should bail out the activist communities by giving public access to infrastructure. We can fall in love with a technology imagining that we create a relationship on a blank canvas. None of us have a clean attachment to technological media or infrastructures. Earlier relationships, other media, other practices and politics indelibly stain and sustain present ones. They often repeat older imaginings of connectivity and collectivity. The problem of the infrastructural-political centres on how to identify the object of attachment or identification. ''Incorporation into collectivities which determines our individuality involves affective imitation - dynamic movements of emotional identification and appropriation.” (Gatens & Lloyd, 1999, 77). Not so long ago, it may have been possible to imagine infrastructure as part of the fabric of collective reciprocity (along with housing, health, justice and education). Individuality as a citizen, spectator, commuter, traveller, resident, consumer, worker, student, child or immigrant was underpinned by infrastructural access. In many places, infrastructure no longer looks like a space of reciprocity, a space without negativity. Hence, attachment to infrastructure, the indispensable condition for a politics of infrastructure becomes contested. The link we might want to add to infrastructural imaginings concerns the very possibility of the infrastructural-political. Contestation of the collective mode of existence of infrastructure, this tenuous and still fragile fibre, is a promising development. Works Cited Appadurai, Arjun, Modernity at large: cultural dimensions of globalization, University of Minnesota Press, Minneapolis, 1996 Balibar, Etienne Spinoza and politics London, Verso, 1998. Barry, Andrew Political Machines. Governing Technological Society, Continuum Press, London & New York, 2001 Boutin, Paul 'Wi-Fi for Dummies. You want a home wireless network, but you're afraid it won't work. Here's how to do it right', <http://slate.msn.com/id/2084046/>, accessed June 9, 2003 Gatens, Moira & Lloyd, Genevieve Collective Imaginings. Spinoza, past and present Routledge, London & New York 1999 Gerritzen, Mieke & Lovink, Geert, Mobile Minded, BIS Publishers, Amsterdam, 2002 Haraway, Donna J. 1997 Modest_Witness@Second_Millennium. FemaleMan©_Meets_OncoMouse™ Feminism and Technoscience, (Routledge, New York & London). Lovink, Geert, 'Hi-Low: The Bandwidth Dilemma, Or Internet Stagnation after Dotcom Mania' Dark Fiber. Tracking Critical Internet Culture, MIT Press, 2003 Orbach, Susie, The Impossibility of Sex, Penguin Books, 2000 Links http://picopeer.net/wiki/ http://slate.msn.com/id/2084046/ http://www.wlanevent.com/home/default.asp Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Mackenzie, Adrian. "The Infrastructural-Political" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/05-infrastructural.php>. APA Style Mackenzie, A. (2003, Aug 26). The Infrastructural-Political. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/05-infrastructural.php>
APA, Harvard, Vancouver, ISO, and other styles
40

Hackett, Lisa J., and Jo Coghlan. "Conjuring Up a King." M/C Journal 26, no. 5 (October 2, 2023). http://dx.doi.org/10.5204/mcj.2986.

Full text
Abstract:
Introduction The coronation of King Charles III was steeped in the tradition of magic and ritual that has characterised English, and later British, coronations. The very idea of a coronation leverages belief in divinity; however, the coronation of Charles III occurred in a very different social environment than those of monarchs a millennium ago. Today, belief in the divine right of Kings is dramatically reduced. In this context, magic can also be thought of as a stage performance that relies on a tacit understanding between audience and actor, where disbelief is suspended in order to achieve the effect. This paper will examine the use of ritual and magic in the coronation ceremony. It will discuss how the British royal family has positioned its image in relation to the concept of magic and how social changes have brought the very idea of monarchy into question. One way to think about magic, according to Leddington (253), is that it has “long had an uneasy relationship with two thoroughly disreputable worlds: the world of the supposedly supernatural – the world of psychics, mediums and other charlatans – and the world of the con – the world of cheats, hustlers and swindlers”. While it may be that a magician aims to fool the audience, the act also requires audiences to willingly suspend disbelief. Once the audience suspends disbelief in the theatrical event, they enter the realm of fantasy. The “willingness of the audience to play along and indulge in the fantasy” means magic is not just about performances of fiction, but it is about illusion (Leddington 256). Magic is also grounded in its social practices: the occult, sorcery, and witchcraft, particularly when linked to the Medieval Euro-American witch-hunts of the fifteenth to seventeenth century (Ginzburg). Religion scorned magic as a threat to the idea that only God had “sovereignty over the unseen” (Benussi). By the nineteenth and early twentieth centuries, intellectuals like Karl Marx, Sigmund Freud, and Max Weber argued that “increases in literacy, better living conditions, and growing acquaintance with modern science, would make people gradually forget their consolatory but false beliefs in spirits, gods, witches, and magical forces” (Casanova). Recent booms in Wicca and neopaganism show that modernity has not dismissed supernatural inquiry. Today, ‘occulture’ – “an eclectic milieu mixing esotericism, pop culture, and urban mysticism” – is treated as a “valuable resource to address existential predicaments, foster resilience in the face of the negative, expand their cognitive resources, work on their spiritual selves, explore fantasy and creativity, and generally improve their relationship with the world” (Benussi). Indeed, Durkheim’s judgement of magic as a quintessentially personal spiritual endeavour has some resonance. It also helps to explain why societies are still able to suspend belief and accept the ‘illusion’ that King Charles III is appointed by God. And this is what happened on 6 May 2023 when millions of people looked on, and as with all magic mirrors, saw what they wanted to see. Some saw a … victory for the visibility of older women, as if we did not recently bury a 96-year-old queen, and happiness at last. Others saw a victory for diversity, as people of colour and non-Christian faiths, and women, were allowed to perform homage — and near the front, too, close to the god. (Gold 2023) ‘We must not let in daylight upon magic’ In 1867, English essayist Walter Bagehot (1826-1877) wrote “above all things our royalty is to be reverenced, and if you begin to poke about it, you cannot reverence it … . Its mystery is its life. We must not let in daylight upon magic” (cited in Ratcliffe). Perhaps, one may argue sardonically, somebody forgot to tell Prince Harry. In the 2022 six-part Netflix special Harry and Meghan, it was reported that Prince Harry and his wife Meghan have “shone not just daylight but a blinding floodlight on the private affairs of the royal family” (Holden). Queen Elizabeth II had already learnt the lesson of not letting the light in. In June 1969, BBC1 and ITV in Britain aired a documentary titled Royal Family, which was watched by 38 million viewers in the UK and an estimated 350 million globally. The documentary was developed by William Heseltine, the Queen’s press secretary, and John Brabourne, who was the son-in-law of Lord Mountbatten, to show the daily life of the royal family. The recent show The Crown also shows the role of Prince Phillip in its development. The 110-minute documentary covered one year of the royal’s private lives. Queen Elizabeth was shown the documentary before it aired. The following dialogue amongst the royals in The Crown (episode 3, season 4 ‘Bubbikins’) posits one reason for its production. It’s a documentary film … . It means, um ... no acting. No artifice. Just the real thing. Like one of those wildlife films. Yes, except this time, we are the endangered species. Yes, exactly. It will follow all of us in our daily lives to prove to everyone out there what we in here already know. What’s that? Well, how hard we all work. And what good value we represent. How much we deserve the taxpayer’s money. So, we’ll all have to get used to cameras being here all the time? Not all the time. They will follow us on and off over the next few months. So, all of you are on your best behaviour. As filming begins, Queen Elizabeth says of the camera lights, “it’s jolly powerful that light, isn’t it?” In 1977 Queen Elizabeth banned the documentary from being shown in Britain. The full-length version is currently available on YouTube. Released at a time of social change in Britain, the film focusses on tradition, duty, and family life, revealing a very conservative royal family largely out of step with modern Britain. Perhaps Queen Elizabeth II realised too much ‘light’ had been let in. Historian David Cannadine argues that, during most of the nineteenth century, the British monarchy was struggling to maintain its image and status, and as the population was becoming better educated, royal ritual would soon be exposed as nothing more than primitive magic, a hollow sham ... the pageantry centred on the monarchy was conspicuous for its ineptitude rather than for its grandeur. (Cannadine, "Context" 102) By the 1980s, Cannadine goes on to posit, despite the increased level of education there remained a “liking for the secular magic of monarchy” (Cannadine, "Context" 102). This could be found in the way the monarchy had ‘reinvented’ their rituals – coronations, weddings, openings of parliament, and so on – in the late Victorian era and through to the Second World War. By the time of Queen Elizabeth’s coronation in 1953, aided by television, “the British persuaded themselves that they were good at ceremonial because they always had been” (Cannadine, "Context" 108). However, Queen Elizabeth II’s coronation was very much an example of the curating of illusion precisely because it was televised. Initially, there was opposition to the televising of the coronation from both within the royal family and within the parliament, with television considered the “same as the gutter press” and only likely to show the “coronation blunders” experienced by her father (Hardman 123). Queen Elizabeth II appointed her husband Prince Phillip as Chair of the Coronation Committee. The Queen was opposed to the coronation being televised; the Prince was in favour of it, wanting to open the “most significant royal ceremony to the common man using the new technology of the day” (Morton 134). The Prince argued that opening the coronation to the people via television was the “simplest and surest way of maintaining the monarchy” and that the “light should be let in on the magic” (Morton 135). Queen Elizabeth II considered the coronation a “profound and sacred moment in history, when an ordinary mortal is transformed into a potent symbol in accordance with centuries-old tradition” (Morton 125). For the Queen, the cameras would be too revealing and remind audiences that she was in fact mortal. The press celebrated the idea to televise the coronation, arguing the people should not be “denied the climax of a wonderful and magnificent occasion in British history” (Morton 135). The only compromise was that the cameras could film the ceremony “but would avert their gaze during the Anointing and Holy Communion” (Hardman 123). Today, royal events are extensively planned, from the clothing of the monarch (Hackett and Coghlan) to managing the death of the monarch (Knight). Royal tours are also extensively planned, with elaborate visits designed to show off “royal symbols, vividly and vitally” (Cannadine 115). As such, their public appearances became more akin to “theatrical shows” (Reed 4). History of the ‘Magicalisation’ of Coronations British coronations originated as a “Christian compromise with earlier pagan rites of royal investiture” and in time it would become a “Protestant compromise with Britain’s Catholic past, while also referencing Britain’s growing role as an imperial power” (Young). The first English coronation was at Bath Abbey where the Archbishop of Canterbury crowned King Edgar in 973. When Edward the Confessor came to the throne in 1043, he commissioned the construction of Westminster Abbey on the site of a Benedictine monk church. The first documented coronation to take place at Westminster Abbey was for William the Conqueror in 1066 (Brain). Coronations were considered “essential to convince England’s kings that they held their authority from God” (Young). Following William the Conqueror’s coronation cementing Westminster Abbey’s status as the site for all subsequent coronation ceremonies, Henry III (1207-1272) realised the need for the Abbey to be a religious site that reflects the ceremonial status of that which authorises the monarch’s authority from God. It was under the influence of Henry III that it was rebuilt in a Gothic style, creating the high altar and imposing design that we see today (Brain). As such, this “newly designed setting was now not only a place of religious devotion and worship but also a theatre in which to display the power of kingship in the heart of Westminster, a place where governance, religion and power were all so closely intertwined” (Brain). The ‘magicalisation’ of the coronation rite intensified in the reign of Edward I (Young), with the inclusion of the Stone of Destiny, which is an ancient symbol of Scotland’s monarchy, used for centuries in the inauguration of Scottish kings. In 1296, King Edward I of England seized the stone from the Scots and had it built into a new throne at Westminster. From then on, it was used in the coronation ceremonies of British monarchs. On Christmas Day 1950, four Scottish students removed the stone from Westminster Abbey in London. It turned up three months later, 500 miles away at the high altar of Arbroath Abbey. In 1996, the stone was officially returned to Scotland. The stone will only leave Scotland again for a coronation in Westminster Abbey (Edinburgh Castle). The Stone is believed to be of pre-Christian origin and there is evidence to suggest that it was used in the investitures of pagan kings; thus, modern coronations are largely a muddle of the pre-Christian, the sacred, and the secular in a single ceremony (Young). But the “sheer colour, grandeur, and pageantry of Elizabeth II’s coronation in 1953 was such a contrast with the drabness of post-war Britain that it indelibly marked the memories of those who watched it on television—Britain’s equivalent of the moon landings” (Young). It remains to be seen whether King Charles III’s coronation will have the same impact on Britain given its post-Brexit period of economic recession, political instability, and social division. The coronation channels “the fascination, the magic, the continuity, the stability that comes from a monarchy with a dynasty that has been playing this role for centuries, [and] a lot of people find comfort in that” (Gullien quoted in Stockman). However, the world of King Charles III's coronation is much different from that of his mother’s, where there was arguably a more willing audience. The world that Queen Elizabeth II was crowned in was much more sympathetic to the notion of monarchy. Britain, and much of the Commonwealth, was still reeling from the Second World War and willing to accept the fantasy of the 1953 coronation of the 25-year-old newly married princess. By comparison today, support for the monarchy is relatively low. The shift away from the monarchy has been evident since at least 1992, the annus horribilis (Pimlott 7), with much of its basis in the perceived antics of the monarch’s children, and with the ambivalence towards the fire at Windsor Castle that year demonstrating the mood of the public. Pimlott argues “it was no longer fashionable to be in favour of the Monarchy, or indeed to have much good to say about it”, and with this “a last taboo had been shed” (Pimlott 7). The net favourability score of the royal family in the UK sat at +41 just after the death of Queen Elizabeth II. Six months later, this had fallen to +30 (Humphrys). In their polling of adults in the UK, YouGov found that 46% of Britons were likely “to watch King Charles’ coronation and/or take part in celebrations surrounding it”, with younger demographics less likely to participate (YouGov, "How Likely"). The reported £100m cost of the coronation during a cost of living crisis drew controversy, with 51% of the population believing the government should not pay for it, and again the younger generations being more likely to believe that it should not be funded (YouGov, "Do You Think"). Denis Altman (17) reminds us that, traditionally, monarchs claimed their authority directly from God as the “divine right of kings”, which gave monarchs the power to stave off challenges. This somewhat magical legitimacy, however, sits uneasily with modern ideas of democracy. Nevertheless, modern monarchs still call upon this magical legitimacy when their role and relevance are questioned, as the late 1990s proved it to be for the Windsors. With the royal family now subject to a level of public scrutiny that they had not been subjected to in over a century, the coronation of King Charles III would occur in a very different socio-political climate than that of his mother. The use of ritual and magic, and a willing audience, would be needed if King Charles III’s reign was to be accepted as legitimate, never mind popular. As the American conservative commentator Helen Andrews wrote, “all legitimacy is essentially magic” (cited in Cusack). Recognising the need to continue to ensure its legitimacy and relevance, the British royal family have always recognised that mass public consumption of royal births and weddings, and even deaths and funerals are central to them retaining their “mystique” (Altman 30). The fact that 750 million people watched the fairytale wedding of Charles and Diana in 1981, that two billion people watched Diana’s funeral on television in 1997, and a similar number watched the wedding of William and Catherine, suggests that in life and death the royals are at least celebrities, and for some watchers have taken on a larger socio-cultural meaning. Being seen, as Queen Elizabeth II said, in order to be believed, opens the door to how the royals are viewed and understood in modern life. Visibility and performance, argues Laura Clancy (63), is important to the relevance and authority of royalty. Visibility comes from images reproduced on currency and tea towels, but it also comes from being visible in public life, ideally contributing to the betterment of social life for the nation. Here the issue of ‘the magic’ of being blessed by God becomes problematic. For modern monarchs such as Queen Elizabeth II, her power arguably rested on her public status as a symbol of national stability. This, however, requires her to be seen doing so, therefore being visible in the public sphere. However, if royals are given their authority from God as a mystical authority of the divine right of kings, then why do they seek public legitimacy? More so, if ordained by God, royals are not ‘ordinary’ and do not live an ordinary life, so being too visible or too ordinary means the monarchy risks losing its “mystic” and they are “unmasked” (Clancy 65). Therefore, modern royals, including King Charles III, must tightly “stage-manage” being visible and being invisible to protect the magic of the monarch (Clancy 65). For the alternative narrative is easy to be found. As one commentator for the Irish Times put it, “having a queen as head of state is like having a pirate or a mermaid or Ewok as head of state” (Freyne). In this depiction, a monarch is a work of fiction having no real basis. The anointing of the British monarch by necessity taps into the same narrative devices that can be found throughout fiction. The only difference is that this is real life and there is no guarantee of a happily ever after. The act of magic evident in the anointing of the monarch is played out in ‘Smoke and Mirrors’, episode 5 of the first season of the television series The Crown. The episode opens with King George VI asking a young Princess Elizabeth to help him practice his anointing ceremony. Complete with a much improved, though still evident stutter, he says to the young Princess pretending to be the Archbishop: You have to anoint me, otherwise, I can’t ... be King. Do you understand? When the holy oil touches me, I am tr... I am transformed. Brought into direct contact with the divine. For ... forever changed. Bound to God. It is the most important part of the entire ceremony. The episode closes with the coronation of Queen Elizabeth II. Watching the ceremony on television is the Duke of Windsor, the former King Edward VIII, who was not invited to the coronation. To an audience of his friends and his wife Wallis Simpson, he orates: Oils and oaths. Orbs and sceptres. Symbol upon symbol. An unfathomable web of arcane mystery and liturgy. Blurring so many lines no clergyman or historian or lawyer could ever untangle any of it – It's crazy – On the contrary. It's perfectly sane. Who wants transparency when you can have magic? Who wants prose when you can have poetry? Pull away the veil and what are you left with? An ordinary young woman of modest ability and little imagination. But wrap her up like this, anoint her with oil, and hey, presto, what do you have? A goddess. By the time of Elizabeth II’s coronation in 1953, television would demand to show the coronation, and after Elizabeth’s initial reluctance was allowed to televise most of the event. Again, the issue of visibility and invisibility emerges. If the future Queen was blessed by God, why did the public need to see the event? Prime Minister Winston Churchill argued that television should be banned from the coronation because the “religious and spiritual aspects should not be presented as if they were theatrical performance” (Clancy 67). Clancy goes on to argue that the need for television was misunderstood by Churchill: royal spectacle equated with royal power, and the “monarchy is performance and representation” (Clancy 67). But Churchill countered that the “risks” of television was to weaken the “magic of the monarch” (Clancy 67). King Charles III’s Coronation: ‘An ageing debutante about to become a god’ Walter Bagehot also wrote, “when there is a select committee on the Queen … the charm of royalty will be gone”. When asking readers to think about who should pay for King Charles III’s coronation, The Guardian reminded readers that the monarchy rests not on mantras and vapours, but on a solid financial foundation that has been deliberately shielded from parliamentary accountability … . No doubt King Charles III hopes that his coronation will have an enormous impact on the prestige of the monarchy – and secure his legitimacy. But it is the state that will foot the bill for its antique flummery. (The Guardian) Legitimacy it has been said is “essentially magic” (Cusack). The flummery that delivers royal legitimacy – coronations – has been referred to as “a magic hat ceremony” as well as “medieval”, “anachronistic”, and “outdated” (Young). If King Charles III lacks the legitimacy of his subjects, then where is the magic? The highly coordinated, extravagant succession of King Charles III has been planned for over half a century. The reliance on a singular monarch has ensured that this has been a necessity. This also begs the question: why is it so necessary? A monarch whose place was assured surely is in no need of such trappings. Andrew Cusack’s royalist view of the proclamation of the new King reveals much about the reliance on ritual to create magic. His description of the Accession Council at St James’s Palace on 10 September 2022 reveals the rituals that accompany such rarefied events: reading the Accession Proclamation, the monarch swearing their oath and signing various decrees, and the declaration to the public from the balcony of the palace. For the first time, the general public was allowed behind the veil through the lens of television cameras and the more modern online streaming; essential, perhaps, as the proclamation from the balcony was read to an empty street, which had been closed off as a security measure. Yet, for those privileged members of the Privy Council who were able to attend, standing there in a solemn crowd of many hundreds, responding to Garter’s reading of the proclamation with a hearty and united shout of “God save the King!” echoing down the streets of London, it was difficult not to feel the supernatural and preternatural magic of the monarchy. (Cusack) Regardless, the footage of the event reveals a highly rehearsed affair, all against a backdrop of carefully curated colour, music, and costume. Costumes need to be “magnificent” because they “help to will the spell into being” (Gold). This was not the only proclamation ceremony. Variations were executed across the Commonwealth and other realms. In Australia, the Governor-General made a declaration flanked by troops. “A coronation creates a god out of a man: it is magic” (Gold). But for King Charles III, his lack of confidence in the magic spell was obvious at breakfast time. As the congregation spooled into Westminster Abbey, with actors at the front – kings tend to like actors, as they have the same job – the head of the anti-monarchist pressure group Republic, Graham Smith, was arrested near Trafalgar Square with five other republican leaders (Gold). The BBC cut away from the remaining Trafalgar Square protestors as the royal cavalcade passed them by, meaning “screen[s] were erected in front of the protest, as if our eyes — and the king’s — were too delicate to be allowed to see it” (Gold). The Duke of York was booed as he left Buckingham Palace, but that too was not reported on (Ward). This was followed by “the pomp: the fantastical costumes, the militarism, the uneasy horses” (Gold). Yet, the king looked both scared and thrilled: an ageing debutante about to become a god [as he was] poked and prodded, dressed and undressed, and sacred objects were placed on and near him by a succession of holy men who looked like they would fight to the death for the opportunity. (Gold) King Charles III’s first remarks at the beginning of coronation were “I come not to be served, but to serve” (New York Times), a narrative largely employed to dispel the next two hours of well-dressed courtiers and clergy attending to all manner of trinkets and singing all matter of hymns. After being anointed with holy oil and presented with some of the crown jewels, King Charles was officially crowned by the Archbishop of Canterbury placing the St Edward’s Crown upon his head. The 360-year-old crown is the centrepiece of the Crown Jewels. It stands just over 30 centimetres tall and weighs over two kilograms (Howard). In the literal crowning moment, Charles was seated on the 700-year-old Coronation Chair, believed to be the oldest piece of furniture in Europe still being used for its original purpose and holding two golden scepters as the glittering St. Edward’s Crown, made for King Charles II in 1661, was placed on his head. It is the only time he will ever wear it. (New York Times) The Indigenous Australian journalist Stan Grant perhaps best sums up the coronation and its need to sanctify via magic the legitimacy of the monarchy. He argues that taking the coronation seriously only risks becoming complicit in this antediluvian ritual. A 74-year-old man will finally inherit the crown of a faded empire. His own family is not united, let alone his country. Charles will still reign over 15 nations, among them St Lucia, Tuvalu, Grenada, Canada and, of course, steadfast Australia. The “republican” Prime Minister Anthony Albanese will be among those pledging his allegiance. To seal it all, the new King will be anointed with holy oil. This man is apparently a gift from God. Conclusion Magic is central to the construction of the coronation ceremony of British monarchs, a tradition that stretches back over a millennium. Magic relies upon an implicit understanding between the actors and the audience; the audience knows what they are seeing is a trick, but nonetheless want to be convinced otherwise. It is for the actors to present the trick seamlessly for the audience to enjoy. The coronation relies upon the elevation of a singular person above all other citizens and the established ritual is designed to make the seemingly impossible occur. For centuries, British coronations occurred behind closed doors, with the magic performed in front of a select crowd of peers and notables. The introduction of broadcasting technology, first film, then radio and television, transformed the coronation ceremony and threatened to expose the magic ritual for the trick it is. The stage management of the latest coronation reveals that these concerns were held by the producers, with camera footage carefully shot so as to exclude any counter-narrative from being broadcast. However, technology has evolved since the previous coronation in 1953, and these undesired images still made their way into various media, letting the daylight in and disrupting the magic. It remains to be seen what effect, if any, this will have on the long-term reign of Charles III. References Altman, Dennis. God Save the Queen: The Strange Persistence of Monarchies. Melbourne: Scribe, 2021. Benussi, Matteo. "Magic." The Open Encyclopedia of Anthropology. Ed. Felix Stein. Cambridge 2019. Brain, Jessica. "The History of the Coronation." Historic UK, 2023. Cannadine, David. "The Context, Performance and Meaning of Ritual: The British Monarchy and the 'Invention of Tradition', c. 1820–1977." The Invention of Tradition. Eds. Eric Hobsbawm and T.O. Ranger. Canto ed. Cambridge: Cambridge UP, 1992. 101-64. ———. Ornamentalism: How the British Saw Their Empire. Oxford: Oxford UP, 2002. Casanova, José. Public Religions in the Modern World. U of Chicago P, 2011. Clancy, Laura. Running the Family Firm: How the Monarchy Manages Its Image and Our Money. Manchester: Manchester UP, 2021. Cusack, Andrew. "Magic at St James's Palace." Quadrant 66.10 (2022): 14-16. Edinburgh Castle. "The Stone of Destiny." Edinburgh Castle, 2023. Ginzburg, Carlo. Ecstasies: Deciphering the Witches' Sabbath. U of Chicago P, 2004. Gold, Tanya. "The Coronation Was an Act of Magic for a Country Scared the Spell Might Break." Politico 6 May 2023. Grant, Stan. "When the Queen Died, I Felt Betrayed by a Nation. For King Charles's Coronation, I Feel Something Quite Different." ABC News 6 May 2023. The Guardian. "The Guardian View on Royal Finances: Time to Let the Daylight In: Editorial." The Guardian 6 Apr. 2023. Hackett, Lisa J., and Jo Coghlan. "A Life in Uniform: How the Queen’s Clothing Signifies Her Role and Status." See and Be Seen. 2022. Hardman, Robert. Queen of Our Times: The Life of Queen Elizabeth II. Simon and Schuster, 2022. Holden, Michael, and Hanna Rantala. "Britain's Bruised Royals Stay Silent as Prince Harry Lets 'Light in on Magic'." Reuters 10 Jan. 2023. Howard, Jacqueline. "King Charles Has Been Crowned at His 'Slimmed-Down' Coronation Ceremony. These Were the Key Moments." ABC News 7 May 2023. Humphrys, John. "First the Coronation… But What Then?" YouGov 14 Apr. 2023. Knight, Sam. "'London Bridge Is Down': The Secret Plan for the Days after the Queen’s Death." The Guardian 2017. Leddington, Jason. "The Experience of Magic." The Journal of Aesthetics and Art Criticism 74.3 (2016): 253-64. "Smoke and Mirrors." The Crown. Dir. Philip Martin. Netflix, 2016. "Bubbikins." The Crown. Dir. Benjamin Caron. Netflix, 2019. Morton, Andrew. The Queen. Michael O'Mara, 2022. New York Times. "Missed the Coronation? Here’s What Happened, from the Crown to the Crowds." New York Times 2023. Pimlott, Ben. "Jubilee and the Idea of Royalty." Historian 76 (2002): 6-15. Ratcliffe, Susan, ed. Oxford Essential Quotations. 4th ed. Oxford: Oxford UP, 2016. Reed, Charles, Andrew Thompson, and John Mackenzie. Royal Tourists, Colonial Subjects and the Making of a British World, 1860–1911. Oxford: Manchester UP, 2016. Stockman, Farah. "We Are Obsessed with Royalty." Editorial. The New York Times 10 Mar. 2021: A22(L). Ward, Victoria. "Prince Andrew Booed by Parts of Coronation Crowd." The Telegraph 6 May 2023. YouGov. "Do You Think the Coronation of King Charles Should or Should Not Be Funded by the Government?" 18 Apr. 2023. ———. "How Likely Are You to Watch King Charles’ Coronation and/or Take Part in Celebrations Surrounding It?" 13 Apr. 2023. Young, Francis. "The Ancient Royal Magic of the Coronation." First Things: Journal of Religion and Public Life 5 May 2023.
APA, Harvard, Vancouver, ISO, and other styles
41

Binns, Daniel. "No Free Tickets." M/C Journal 25, no. 2 (April 25, 2022). http://dx.doi.org/10.5204/mcj.2882.

Full text
Abstract:
Introduction 2021 was the year that NFTs got big—not just in value but also in terms of the cultural consciousness. When digital artist Beeple sold the portfolio of his 5,000 daily images at Christie’s for US$69 million, the art world was left intrigued, confused, and outraged in equal measure. Depending on who you asked, non-fungible tokens (NFTs) seemed to be either a quick cash-grab or the future of the art market (Bowden and Jones; Smee). Following the Beeple sale, articles started to appear indicating that the film industry was abuzz for NFTs. Independent filmmaker Kevin Smith was quick to announce that he planned to release his horror film Killroy Was Here as an NFT (Alexander); in September 2021 the James Bond film No Time to Die also unveiled a series of collectibles to coincide with the film’s much-delayed theatrical release (Natalee); the distribution and collectible platforms Vuele, NFT Studios, and Mogul Productions all emerged, and the industry rumour mill suggests more start-ups are en route (CurrencyWorks; NFT Studios; NewsBTC). Blockchain disciples say that the technology will solve all the problems of the Internet (Tewari; Norton; European Business Review); critics say it will only perpetuate existing accessibility and equality issues (Davis and Flatow; Klein). Those more circumspect will doubtless sit back until the dust settles, waiting to see what parts of so-called web3 will be genuinely integrated into the architecture of the Internet. Pamela Hutchinson puts it neatly in terms of the arts sector: “the NFT may revolutionise the art market, film funding and distribution. Or it might be an ecological disaster and a financial bubble, in which few actual movies change hands, and fraudsters get rich from other people’s intellectual property” (Hutchinson). There is an uptick in the literature around NFTs and blockchain (see Quiniou; Gayvoronskaya & Meinel); however, the technology remains unregulated and unstandardised (Yeung 212-14; Dimitropoulos 112-13). Similarly, the sheer amount of funding being put into fundamental technical, data, and security-related issues speaks volumes to the nascency of the space (Ossinger; Livni; Gayvoronskaya & Meinel 52-6). Put very briefly, NFTs are part of a given blockchain system; think of them, like cryptocurrency coins, as “units of value” within that system (Roose). NFTs were initially rolled out on Ethereum, though several other blockchains have now implemented their own NFT frameworks. NFTs are usually not the artwork itself, but rather a unique, un-copyable (hence, non-fungible) piece of code that is attached, linked, or connected to another digital file, be that an image, video, text, or something else entirely. NFTs are often referred to as a digital artwork’s “certificate of authenticity” (Roose). At the time of writing, it remains to be seen how widely blockchain and NFT technology will be implemented across the entertainment industries. However, this article aims to outline the current state of implementation in the film trade specifically, and to attempt to sort true potential from the hype. Beginning with an overview of the core issues around blockchain and NFTs as they apply to film properties and adjacent products, current implementations of the technology are outlined, before finishing with a hesitant glimpse into the potential future applications. The Issues and Conversation At the core of current conversations around blockchain are three topics: intellectual property and ownership, concentrations of power and control, and environmental impact. To this I would like to add a consideration of social capital, which I begin with briefly here. Both the film industry and “crypto” — if we take the latter to encompass the various facets of so-called ‘web3’ — are engines of social capital. In the case of cinema, its products are commodified and passed through a model that begins with exclusivity (theatrical release) before progressing to mass availability (home media, streaming). The cinematic object, i.e., an individual copy of a film, is, by virtue of its origins as a mass product of the twentieth century, fungible. The film is captured, copied, stored, distributed, and shared. The film-industrial model has always relied on social phenomena, word of mouth, critical discourse, and latterly on buzz across digital social media platforms. This is perhaps as distinct from fine art, where — at least for dealers — the content of the piece does not necessarily matter so much as verification of ownership and provenance. Similarly, web3, with its decentralised and often-anonymised processes, relies on a kind of social activity, or at least a recorded interaction wherein the chain is stamped and each iteration is updated across the system. Even without the current hype, web3 still relies a great deal on discourse, sharing, and community, particularly as it flattens the existing hierarchies of the Internet that linger from Web 2.0. In terms of NFTs, blockchain systems attach scarcity and uniqueness to digital objects. For now, that scarcity and uniqueness is resulting in financial value, though as Jonathan Beller argues the notion of value could — or perhaps should — be reconsidered as blockchain technology, and especially cryptocurrencies, evolve (Beller 217). Regardless, NFT advocates maintain that this is the future of all online activity. To questions of copyright, the structures of blockchain do permit some level of certainty around where a given piece of intellectual property emerged. This is particularly useful where there are transnational differences in recognition of copyright law, such as in France, for instance (Quiniou 112-13). The Berne Convention stipulates that “the subsistence of copyright does not rest on the compliance with formal requirements: rights will exist if the work meets the requirements for protection set out by national law and treaties” (Guadamuz 1373). However, there are still no legal structures underpinning even the most transparent of transactions, when an originator goes out of their way to transfer rights to the buyer of the accompanying NFT. The minimum requirement — even courtesy — for the assignment of rights is the identification of the work itself; as Guadamuz notes, this is tricky for NFTs as they are written in code (1374). The blockchain’s openness and transparency are its key benefits, but until the code can explicitly include (or concretely and permanently reference) the ‘content’ of an NFT, its utility as a system of ownership is questionable. Decentralisation, too, is raised consistently as a key positive characteristic of blockchain technology. Despite the energy required for this decentralisation (addressed shortly), it is true that, at least in its base code, blockchain is a technology with no centralised source of truth or verification. Instead, such verification is performed by every node on the chain. On the surface, for the film industry, this might mean modes of financing, rights management, and distribution chains that are not beholden to multinational media conglomerates, streamers like Netflix, niche intermediaries, or legacy studios. The result here would be a flattening of the terrain: breaking down studio and corporate gatekeeping in favour of a more democratised creative landscape. Creators and creative teams would work peer-to-peer, paying, contracting, servicing, and distribution via the blockchain, with iron-clad, publicly accessible tracking of transactions and ownership. The alternative, though, is that the same imbalances persist, just in a different form: this is outlined in the next section. As Hunter Vaughan writes, the film industry’s environmental impact has long been under-examined. Its practices are diverse, distributed, and hard to quantify. Cinematic images, Vaughan writes, “do not come from nothing, and they do not vanish into the air: they have always been generated by the earth and sun, by fossil fuels and chemical reactions, and our enjoyment of them has material consequences” (3). We believe that by watching a “green” film like Avatar we are doing good, but it implicates us in the dirty secret, an issue of “ignorance and of voluntary psychosis” where “we do not see who we are harming or how these practices are affecting the environment, and we routinely agree to accept the virtual as real” (5). Beyond questions of implication and eco-material conceptualisation, however, there are stark facts. In the 1920s, the Kodak Park Plant in New York drew 12 million gallons of water from Lake Ontario each day to produce film stock. As the twentieth century came to a close, this amount — for a single film plant — had grown to 35-53 million gallons per day. The waste water was perfunctorily “cleaned” and then dumped into surrounding rivers (72-3). This was just one plant, and one part of the filmmaking process. With the shift to digital, this cost might now be calculated in the extraction of precious metals used to make contemporary cameras, computers, or storage devices. Regardless, extrapolate outwards to a global film industry and one quickly realises the impact is almost beyond comprehension. Considering — let alone calculating — the carbon footprint of blockchain requires outlining some fundamentals of the technology. The two primary architectures of blockchain are Proof of Work (PoW) and Proof of Stake (PoS), both of which denote methods of adding and verifying new blocks to a chain. PoW was the first model, employed by Bitcoin and the first iteration of Ethereum. In a PoW model, each new block has a specific cryptographic hash. To confirm the new block, crypto miners use their systems to generate a target hash that is less than or equal to that of the block. The systems process these calculations quickly, as the goal is to be “the first miner with the target hash because that miner is the one who can update the blockchain and receive crypto rewards” (Daly). The race for block confirmation necessitates huge amounts of processing power to make these quick calculations. The PoS model differs in that miners are replaced by validators (or staking services where participants pool validation power). Rather than investing in computer power, validators invest in the blockchain’s coins, staking those coins (tokens) in a smart contract (think of this contract like a bank account or vault). When a new block is proposed, an algorithm chooses a validator based on the size of their stake; if the block is verified, the validator receives further cryptocurrency as a reward (Castor). Given the ubiquity and exponential growth of blockchain technology and its users, an accurate quantification of its carbon footprint is difficult. For some precedent, though, one might consider the impact of the Bitcoin blockchain, which runs on a PoW model. As the New York Times so succinctly puts it: “the process of creating Bitcoin to spend or trade consumes around 91 terawatt-hours of electricity annually, more than is used by Finland, a nation of about 5.5 million” (Huang, O’Neill and Tabuchi). The current Ethereum system (at time of writing), where the majority of NFT transactions take place, also runs on PoW, and it is estimated that a single Ethereum transaction is equivalent to nearly nine days of power consumption by an average US household (Digiconomist). Ethereum always intended to operate on a PoS system, and the transition to this new model is currently underway (Castor). Proof of Stake transactions use significantly less energy — the new Ethereum will supposedly be approximately 2,000 times more energy efficient (Beekhuizen). However, newer systems such as Solana have been explicit about their efficiency goals, stating that a single Solana transaction uses less energy (1,837 Joules, to be precise) than keeping an LED light on for one hour (36,000 J); one Ethereum transaction, for comparison, uses over 692 million J (Solana). In addition to energy usage, however, there is also the question of e-waste as a result of mining and general blockchain operations which, at the time of writing, for Bitcoin sits at around 32 kilotons per year, around the same as the consumer IT wastage of the Netherlands (de Vries and Stoll). How the growth in NFT awareness and adoption amplifies this impact remains to be seen, but depending on which blockchain they use, they may be wasting energy and resources by design. If using a PoW model, the more valuable the cryptocurrency used to make the purchase, the more energy (“gas”) required to authenticate the purchase across the chain. Images abound online of jerry-rigged crypto data centres of varying quality (see also efficiency and safety). With each NFT minted, sold, or traded, these centres draw — and thus waste, for gas — more and more energy. With increased public attention and scrutiny, cryptocurrencies are slowly realising that things could be better. As sustainable alternatives become more desirable and mainstream, it is safe to predict that many NFT marketplaces may migrate to Cardano, Solana, or other more efficient blockchain bases. For now, though, this article considers the existing implementations of NFTs and blockchain technology within the film industry. Current Implementations The current applications of NFTs in film centre around financing and distribution. In terms of the former, NFTs are saleable items that can raise capital for production, distribution, or marketing. As previously mentioned, director Kevin Smith launched Jay & Silent Bob’s Crypto Studio in order to finish and release Killroy Was Here. Smith released over 600 limited edition tokens, including one of the film itself (Moore). In October 2021, renowned Hong Kong director Wong Kar-wai sold an NFT with unreleased footage from his film In the Mood for Love at Sotheby’s for US$550,000 (Raybaud). Quentin Tarantino entered the arena in January 2022, auctioning uncut scenes from his 1994 film Pulp Fiction, despite the threat of legal action from the film’s original distributor Miramax (Dailey). In Australia, an early adopter of the technology is director Michael Beets, who works in virtual production and immersive experiences. His immersive 14-minute VR film Nezunoban (2020) was split into seven different chapters, and each chapter was sold as an NFT. Beets also works with artists to develop entry tickets that are their own piece of generative art; with these tickets and the chapters selling for hundreds of dollars at a time, Beets seems to have achieved the impossible: turning a profit on a short film (Fletcher). Another Australian writer-producer, Samuel Wilson, now based in Canada, suggests that the technology does encourage filmmakers to think differently about what they create: At the moment, I’m making NFTs from extra footage of my feature film Miles Away, which will be released early next year. In one way, it’s like a new age of behind-the-scenes/bonus features. I have 14 hours of DV tapes that I’m cutting into a short film which I will then sell in chapters over the coming months. One chapter will feature the dashing KJ Apa (Songbird, Riverdale) without his shirt on. So, hopefully that can turn some heads. (Wilson, in Fletcher) In addition to individual directors, a number of startup companies are also seeking to get in on the action. One of these is Vuele, which is best understood as a blockchain-based streaming service: an NFT Netflix, if you like. In addition to films themselves, the service will offer extra content as NFTs, including “behind the scenes content, bonus features, exclusive Q&As, and memorabilia” (CurrencyWorks). Vuele’s launch title is Zero Contact, directed by Rick Dugdale and starring Anthony Hopkins. The film is marketed as “the World’s First NFT Feature Film” (as at the time of writing, though, both Vuele and its flagship film have yet to launch). Also launching is NFT Studios, a blockchain-based production company that distributes the executive producer role to those buying into the project. NFT Studios is a decentralised administrative organisation (DAO), guided by tech experts, producers, and film industry intermediaries. NFT Studios is launching with A Wing and a Prayer, a biopic of aeronaut Brian Milton (NFT Studios), and will announce their full slate across festivals in 2022. In Australia, Culture Vault states that its aim is to demystify crypto and champion Australian artists’ rights and access to the space. Co-founder and CEO Michelle Grey is well aware of the aforementioned current social capital of NFTs, but is also acutely aware of the space’s opacity and the ubiquity of often machine-generated tat. “The early NFT space was in its infancy, there was a lot of crap around, but don’t forget there’s a lot of garbage in the traditional art world too,” she says (cited in Miller). Grey and her company effectively act like art dealers; intermediaries between the tech and art worlds. These new companies claim to be adhering to the principles of web3, often selling themselves as collectives, DAOs, or distributed administrative systems. But the entrenched tendencies of the film industry — particularly the persistent Hollywood system — are not so easily broken down. Vuele is a joint venture between CurrencyWorks and Enderby Entertainment. The former is a financial technology company setting up blockchain systems for businesses, including the establishment of branded digital currencies such as the controversial FreedomCoin (Memoria); the latter, Enderby, is a production company founded by Canadian film producer (and former investor relations expert in the oil and uranium sectors) Rick Dugdale (Wiesner). Similarly, NFT Studios is partnered with consulting and marketing agencies and blockchain venture capitalists (NFT Investments PLC). Depending on how charitable or cynical one is feeling, these start-ups are either helpful intermediaries to facilitate legacy media moving into NFT technology, or the first bricks in the capitalist wall to bar access for entry to other players. The Future Is… Buffering Marketplaces like Mintable, OpenSea, and Rarible do indeed make the minting and selling of NFTs fairly straightforward — if you’ve ever listed an item for sale on eBay or Facebook, you can probably mint an NFT. Despite this, the current major barrier for average punters to the NFT space remains technical knowledge. The principles of blockchain remain fairly opaque — even this author, who has been on a deep dive for this article, remains sceptical that widespread adoption across multiple applications and industries is feasible. Even so, as Rennie notes, “the unknown is not what blockchain technology is, or even what it is for (there are countless ‘use cases’), but how it structures the actions of those who use it” (235). At the time of writing, a great many commentators and a small handful of scholars are speculating about the role of the metaverse in the creative space. If the endgame of the metaverse is realised, i.e., a virtual, interactive space where users can interact, trade, and consume entertainment, the role of creators, dealers, distributors, and other brokers and players will be up-ended, and have to re-settle once again. Film industry practitioners might look to the games space to see what the road might look like, but then again, in an industry that is — at its best — somewhat resistant to change, this may simply be a fad that blows over. Blockchain’s current employment as a get-rich-quick mechanism for the algorithmic literati and as a computational extension of existing power structures suggests nothing more than another techno-bubble primed to burst (Patrickson 591-2; Klein). Despite the aspirational commentary surrounding distributed administrative systems and organisations, the current implementations are restricted, for now, to startups like NFT Studios. In terms of cinema, it does remain to be seen whether the deployment of NFTs will move beyond a kind of “Netflix with tchotchkes” model, or a variant of crowdfunding with perks. Once Vuele and NFT Studios launch properly, we may have a sense of how this all will play out, particularly alongside less corporate-driven, more artistically-minded initiatives like that of Michael Beets and Culture Vault. It is possible, too, that blockchain technology may streamline the mechanics of the industry in terms of automating or simplifying parts of the production process, particularly around contracts, financing, licensing. This would obviously remove some of the associated labour and fees, but would also de-couple long-established parts and personnel of the industry — would Hollywood and similar industrial-entertainment complexes let this happen? As with any of the many revolutions that have threatened to kill or resurrect the (allegedly) long-suffering cinematic object, we just have to wait, and watch. References Alexander, Bryan. “Kevin Smith Reveals Why He’s Auctioning Off New His Film ‘Killroy Was Here’ as an NFT.” USA TODAY, 15 Apr. 2021. <https://www.usatoday.com/story/entertainment/movies/2021/04/15/kevin-smith-auctioning-new-film-nft-killroy-here/7244602002/>. Beekhuizen, Carl. “Ethereum’s Energy Usage Will Soon Decrease by ~99.95%.” Ethereum Foundation Blog, 18 May 2021. <https://blog.ethereum.org/2021/05/18/country-power-no-more/>. Beller, Jonathan. “Economic Media: Crypto and the Myth of Total Liquidity.” Australian Humanities Review 66 (2020): 215-225. Beller, Jonathan. The Cinematic Mode of Production: Attention Economy and the Society of the Spectacle. Hanover, NH: Dartmouth College P, 2006. Bowden, James, and Edward Thomas Jones. “NFTs Are Much Bigger than an Art Fad – Here’s How They Could Change the World.” The Conversation, 26 Apr. 2021. <http://theconversation.com/nfts-are-much-bigger-than-an-art-fad-heres-how-they-could-change-the-world-159563>. Cardano. “Cardano, Ouroboros.” 14 Feb. 2022 <https://cardano.org/ouroboros/>. Castor, Amy. “Why Ethereum Is Switching to Proof of Stake and How It Will Work.” MIT Technology Review, 4 Mar. 2022. <https://www.technologyreview.com/2022/03/04/1046636/ethereum-blockchain-proof-of-stake/>. CurrencyWorks. “Vuele - CurrencyWorks™.” 3 Feb. 2022 <https://currencyworks.io/project/vuele/>. Dailey, Natasha. “Quentin Tarantino Will Sell His ‘Pulp Fiction’ NFTs This Month despite a Lawsuit from the Film’s Producer Miramax.” Business Insider, 5 Jan. 2022. <https://www.businessinsider.com.au/quentin-tarantino-to-sell-pulp-fiction-nft-despite-miramax-lawsuit-2022-1>. Daly, Lyle. “What Is Proof of Work (PoW) in Crypto?” The Motley Fool, 27 Sep. 2021. <https://www.fool.com/investing/stock-market/market-sectors/financials/cryptocurrency-stocks/proof-of-work/>. Davis, Kathleen, and Ira Flatow. “Will Blockchain Really Change the Way the Internet Runs?” Science Friday, 23 July 2021. <https://www.sciencefriday.com/segments/blockchain-internet/>. De Vries, Alex, and Christian Stoll. “Bitcoin’s Growing E-Waste Problem.” Resources, Conservation & Recycling 175 (2021): 1-11. Dimitropoulos, Georgios. “Global Currencies and Domestic Regulation: Embedding through Enabling?” In Regulating Blockchain: Techno-Social and Legal Challenges. Eds. Philipp Hacker et al. Oxford: Oxford UP, 2019. 112–139. Edelman, Gilad. “What Is Web3, Anyway?” Wired, Nov. 2021. <https://www.wired.com/story/web3-gavin-wood-interview/>. European Business Review. “Future of Blockchain: How Will It Revolutionize the World in 2022 & Beyond!” The European Business Review, 1 Nov. 2021. <https://www.europeanbusinessreview.com/future-of-blockchain-how-will-it-revolutionize-the-world-in-2022-beyond/>. Fletcher, James. “How I Learned to Stop Worrying and Love the NFT!” FilmInk, 2 Oct. 2021. <https://www.filmink.com.au/how-i-learned-to-stop-worrying-and-love-the-nft/>. Gayvoronskaya, Tatiana, and Christoph Meinel. Blockchain: Hype or Innovation. Cham: Springer. Guadamuz, Andres. “The Treachery of Images: Non-Fungible Tokens and Copyright.” Journal of Intellectual Property Law & Practice 16.12 (2021): 1367–1385. Huang, Jon, Claire O’Neill, and Hiroko Tabuchi. “Bitcoin Uses More Electricity than Many Countries. How Is That Possible?” The New York Times, 3 Sep. 2021. <http://www.nytimes.com/interactive/2021/09/03/climate/bitcoin-carbon-footprint-electricity.html>. Hutchinson, Pamela. “Believe the Hype? What NFTs Mean for Film.” BFI, 22 July 2021. <https://www.bfi.org.uk/sight-and-sound/features/nfts-non-fungible-tokens-blockchain-film-funding-revolution-hype>. Klein, Ezra. “A Viral Case against Crypto, Explored.” The Ezra Klein Show, n.d. 7 Apr. 2022 <https://www.nytimes.com/2022/04/05/opinion/ezra-klein-podcast-dan-olson.html>. Livni, Ephrat. “Venture Capital Funding for Crypto Companies Is Surging.” The New York Times, 1 Dec. 2021. <https://www.nytimes.com/2021/12/01/business/dealbook/crypto-venture-capital.html>. Memoria, Francisco. “Popular Firearms Marketplace GunBroker to Launch ‘FreedomCoin’ Stablecoin.” CryptoGlobe, 30 Jan. 2019. <https://www.cryptoglobe.com/latest/2019/01/popular-firearm-marketplace-gunbroker-to-launch-freedomcoin-stablecoin/>. Miller, Nick. “Australian Start-Up Aims to Make the Weird World of NFT Art ‘Less Crap’.” Sydney Morning Herald, 19 Jan. 2022. <https://www.smh.com.au/culture/art-and-design/australian-startup-aims-to-make-the-weird-world-of-nft-art-less-crap-20220119-p59pev.html>. Moore, Kevin. “Kevin Smith Drops an NFT Project Packed with Utility.” One37pm, 27 Apr. 2021. <https://www.one37pm.com/nft/art/kevin-smith-jay-and-silent-bob-nft-killroy-was-here>. Nano. “Press Kit.” 14 Feb. 2022 <https://content.nano.org/Nano-Press-Kit.pdf>. Natalee. “James Bond No Time to Die VeVe NFTs Launch.” NFT Culture, 22 Sep. 2021. <https://www.nftculture.com/nft-marketplaces/4147/>. NewsBTC. “Mogul Productions to Conduct the First Ever Blockchain-Based Voting for Film Financing.” NewsBTC, 22 July 2021. <https://www.newsbtc.com/news/company/mogul-productions-to-conduct-the-first-ever-blockchain-based-voting-for-film-financing/>. NFT Investments PLC. “Approach.” 21 Jan. 2022 <https://www.nftinvest.pro/approach>. NFT Studios. “Projects.” 9 Feb. 2022 <https://nftstudios.dev/projects>. Norton, Robert. “NFTs Have Changed the Art of the Possible.” Wired UK, 14 Feb. 2022. <https://www.wired.co.uk/article/nft-art-world>. Ossinger, Joanna. “Crypto World Hits $3 Trillion Market Cap as Ether, Bitcoin Gain.” Bloomberg.com, 8 Nov. 2021. <https://www.bloomberg.com/news/articles/2021-11-08/crypto-world-hits-3-trillion-market-cap-as-ether-bitcoin-gain>. Patrickson, Bronwin. “What Do Blockchain Technologies Imply for Digital Creative Industries?” Creativity and Innovation Management 30.3 (2021): 585–595. Quiniou, Matthieu. Blockchain: The Advent of Disintermediation, New York: John Wiley, 2019. Raybaud, Sebastien. “First Asian Film NFT Sold, Wong Kar-Wai’s ‘In the Mood for Love’ Fetches US$550k in Sotheby’s Evening Sale, Auctions News.” TheValue.Com, 10 Oct. 2021. <https://en.thevalue.com/articles/sothebys-auction-wong-kar-wai-in-the-mood-for-love-nft>. Rennie, Ellie. “The Challenges of Distributed Administrative Systems.” Australian Humanities Review 66 (2020): 233-239. Roose, Kevin. “What are NFTs?” The New York Times, 18 Mar. 2022. <https://www.nytimes.com/interactive/2022/03/18/technology/nft-guide.html>. Smee, Sebastian. “Will NFTs Transform the Art World? Are They Even Art?” Washington Post, 18 Dec. 2021. <https://www.washingtonpost.com/arts-entertainment/2021/12/18/nft-art-faq/>. Solana. “Solana’s Energy Use Report: November 2021.” Solana, 24 Nov. 2021. <https://solana.com/news/solana-energy-usage-report-november-2021>. Tewari, Hitesh. “Four Ways Blockchain Could Make the Internet Safer, Fairer and More Creative.” The Conversation, 12 July 2019. <http://theconversation.com/four-ways-blockchain-could-make-the-internet-safer-fairer-and-more-creative-118706>. Vaughan, Hunter. Hollywood’s Dirtiest Secret: The Hidden Environmental Costs of the Movies. New York: Columbia UP, 2019. Vision and Value. “CurrencyWorks (CWRK): Under-the-Radar, Crypto-Agnostic, Blockchain Pick-and-Shovel Play.” Seeking Alpha, 1 Dec. 2021. <https://seekingalpha.com/article/4472715-currencyworks-under-the-radar-crypto-agnostic-blockchain-pick-and-shovel-play>. Wiesner, Darren. “Exclusive – BC Producer – Rick Dugdale Becomes a Heavyweight.” Hollywood North Magazine, 29 Aug. 2017. <https://hnmag.ca/interview/exclusive-bc-producer-rick-dugdale-becomes-a-heavyweight/>. Yeung, Karen. “Regulation by Blockchain: The Emerging Battle for Supremacy between the Code of Law and Code as Law.” The Modern Law Review 82.2 (2019): 207–239.
APA, Harvard, Vancouver, ISO, and other styles
42

Hunter, John C. "Organic Interfaces; or, How Human Beings Augment Their Digital Devices." M/C Journal 16, no. 6 (November 7, 2013). http://dx.doi.org/10.5204/mcj.743.

Full text
Abstract:
In many ways, computers are becoming invisible and will continue to do so. When we reach into our pockets and pull out our cell phones to find a place to eat or message a friend on Facebook, we are no longer consciously aware that we are interacting with a user experience that has been consciously designed for our computer or device screen—but we are.— Andy Pratt and Jason Nunes, Interactive Design In theory, cell phones and other information and communication technologies (ICTs) are just a means for us to interact with people, businesses, and data sources. They have interfaces and, in a larger sense, are interfaces between their users and the networked world. Every day, people spend more time using them to perform more different tasks and find them more indispensable (Smith). As the epigraph above suggests, however, their omnipresence makes them practically invisible and has all but erased any feelings of awe or mystery that their power once generated. There is both a historical and functional dimension to this situation. In the historical advance of technology, it is part of what Kevin Kelly calls the “technium,” the ever-more complex interactions between advancing technology, our cognitive processes, and the cultural forces in which they are enmeshed; ICTs are measurably getting more powerful as time goes on and are, in this sense, worthy of our admiration (Kelly 11-17). In the functional dimension, on the other hand, many scholars and designers have observed how hard it is to hold on to this feeling of enchantment in our digital devices (Nye 185-226; McCarthy and Wright 192-97). As one study of human-computer interfaces observes “when people let the enchanting object [ICTs] do the emotional work of experience for them . . . what could be enchanting interactivity becomes a paradoxically detached interpassivity” (McCarthy et al. 377). ICTs can be ever more powerful, then, but this power will not necessarily be appreciated by their users. This paper analyzes recent narrative representations of ICT use in spy thrillers, with a particular focus on the canon of James Bond films (a sub-genre with a long-standing and overt fascination with advanced technology, especially ICTs), in order to explore how the banality of ICT technology has become the inescapable accompaniment of its power (Willis; Britton 99-123; 195-219). Among many possible recent examples: recall how Bond uses his ordinary cell phone camera to reveal the membership of the sinister Quantum group at an opera performance in Quantum of Solace; how world-wide video surveillance is depicted as inescapable (and amoral) in The Bourne Legacy; and how the anonymous protagonist of Roman Polanski’s Ghost Writer discovers the vital piece of top secret information that explains the entire film—by searching for it on his laptop via Google. In each of these cases, ICTs are represented as both incredibly powerful and tediously quotidian. More precisely, in each case human users are represented as interfaces between ICTs and their stored knowledge, rather than the reverse. Beginning with an account of how the naturalization of ICTs has changed the perceived relations between technology and its users, this essay argues that the promotional rhetoric of human empowerment and augmentation surrounding ICTs is opposed by a persistent cinematic theme of human subordination to technological needs. The question it seeks to open is why—why do the mainstream cinematic narratives of our culture depict the ICTs that enhance our capacities to know and communicate as something that diminishes rather than augments us? One answer (which can only be provisionally sketched here) is the loss of pleasure. It does not matter whether or not technology augments our capacities if it cannot sustain the fantasy of pleasure and/or enhancement at the same time. Without this fantasy, ICTs are represented as usurping position as the knowing subject and users, in turn, become the media connecting them– even when that user is James Bond. The Rhetoric of Augmentation Until the past five years or so, the technologization of the human mind was almost always represented in popular culture as a threat to humanity—whether it be Ira Levin’s robotic Stepford Wives as the debased expression of male wish-fulfillment (Levin), or Jonathan Demme’s brainwashed assassins with computer chip implants in his remake of The Manchurian Candidate. When Captain Picard, the leader and moral centre of the television series Star Trek: The Next Generation, is taken over by the Borg (an alien machine race that seeks to absorb other species into its technologized collective mind) in an episode from 1990, it is described as “assimilation” rather than an augmentation. The Borg version of Picard says to his former comrades that “we only wish to raise quality of life, for all species,” and it is a chilling, completely unemotional threat to the survival of our species (“Best of Both Worlds”). By 2012, on the other hand, the very same imagery is being used to sell smart phones by celebrating the technological enhancements that allegedly make us better human beings. In Verizon’s Droid DNA phone promotions, the product is depicted as an artificial heart for its user, one that enhances memory, “neural speed,” and “predictive intelligence” (thanks to Google Now). The tagline for the Verizon ad claims that “It’s not an upgrade to your phone; it’s an upgrade to yourself”, echoing Borg-Picard’s threat but this time as an aspirational promise (“Verizon Commercial”). The same technologization of the mind that was anathema just a few years ago, is now presented as both a desirable consumer goal and a professional necessity—the final close-up of the Verizon artificial heart shows that this 21st century cyborg has to be at his job in 26 minutes; the omnipresence of work in a networked world is here literally taken to heart. There is, notably, no promise of pleasure or liberation anywhere in this advertisement. We are meant to desire this product very much, but solely because it allows us to do more and better work. Not coincidentally, the period that witnessed this inversion in popular culture also saw an exponential increase in the quantity and variety of digitally networked devices in our lives (“Mobile Cellular”) and the emergence of serious cultural, scientific, and philosophical movements exploring the idea of “enhanced” human beings, whether through digital tool use, biomedical prostheses, drugs, or genetic modifications (Buchanan; Savulescu and Bostrom; “Humanity +”). As the material boundaries of the “human” have become more permeable and malleable, and as the technologies that make this possible become everyday objects, our resistance to this possibility has receded. The discourse of the transhuman and extropian is now firmly established as a philosophical possibility (Lilley). Personal augmentation with the promise of pleasure is still, of course, very much present in the presentation of ICTs. Launching the iPad 2 in 2011, the late Steve Jobs described his new product as a “magical and revolutionary device” with an “incredible magical user interface on a much larger canvas with more resources” and gushing that “it's technology married with liberal arts, married with the humanities, that yields us the result that makes our hearts sing” (“Apple Special Event”). This is the rhetoric of augmentation through technology and, as in the Verizon ad, it is very careful to position the consumer/user at the centre of the experience. The technology is described as wonderful not just in itself, but also precisely because it gives users “a larger canvas” with which to create. Likewise, the lifelogging movement (which encourages people to use small cameras to record every event of daily life) is at great pains to stress that “you, not your desktop’s hard drive, are the hub of your digital belongings” (Bell and Gemmell 10). But do users experience life with these devices as augmented? Is either the Verizon work cyborg or the iPad user’s singing heart representative of how these devices make us feel? It depends upon the context in which the question is asked. Extensive survey data on cell phone use shows that we are more attached than ever to our phones, that they allow us to be “productive” in otherwise dead times (such as while waiting in queues), and that only a minority of users worry about the negative effects of being “permanently connected” (Smith 9-10). Representations of technological augmentation in 21st century popular cinema, however, offer a very different perspective. Even in James Bond films, which (since Goldfinger in 1964) have been enraptured with technological devices as augmentations for its protagonists and as lures for audiences, digital devices have (in the three most recent films) lost their magic and become banal in the same way as they have in the lives of audience members (Nitins 2010; Nitins 2011; “List of James Bond Gadgets”). Rather than focusing on technological empowerment, the post 2006 Bond films emphasize (1) that ICTs “know” things and that human agents are just the media that connect them together; and (2) that the reciprocal nature of networked ICTs means that we are always visible when we use them; like Verizon phone users, our on-screen heroes have to learn that the same technology that empowers them simultaneously empowers others to know and/or control them. Using examples from the James Bond franchise, the remainder of this paper discusses the simultaneous disenchantment and power of ICT technology in the films as a representative sample of the cultural status of ICTs as a whole. “We don’t go in for that sort of thing any more...” From Goldfinger until the end of Pierce Brosnan’s tenure in 2002, technological devices were an important part of the audience’s pleasure in a Bond film (Willis; Nitins 2011). James Bond’s jetpack in Thunderball, to give one of many examples, is a quasi-magical aid for the hero with literary precursors going back to Aeneas’s golden bough; it is utterly enchanting and, equally importantly, fun. In the most recent Bond film, Skyfall, however, Q, the character who has historically made Bond’s technology, reappears after a two-film hiatus, but in the guise of a computer nerd who openly disdains the pleasures and possibilities of technological augmentation. When Bond complains about receiving only a gun and a radio from him, Q replies: “What did you expect? An exploding pen? We don’t really go in for that sort of thing any more.” Technology is henceforth to be banal and invisible albeit (as the film’s computer hacker villain Silva demonstrates) still incredibly powerful. The film’s pleasures must come from elsewhere. The post-credit sequence in Casino Royale, which involves the pursuit and eventual death of a terrorist bomb-maker, perfectly embodies the diminished importance of human agents as bearers of knowledge. It is bracketed at the beginning by the bomber looking at a text message while under surveillance by Bond and a colleague and at the end by Bond looking at the same message after having killed him. Significantly, the camera angle and setup of both shots make it impossible to distinguish between Bond’s hand and the bomber’s as they see the same piece of information on the same phone. The ideological, legal, racial, and other differences between the two men are erased in pursuit of the data (the name “Ellipsis” and a phone number) that they both covet. As digitally-transmitted data, it is there for anyone, completely unaffected by the moral or legal value attached to its users. Cell phones in these films are, in many ways, better sources of information than their owners—after killing a phone’s owner, his or her network traces can show exactly where s/he has been and to whom s/he has been talking, and this is how Bond proceeds. The bomber’s phone contacts lead Bond to the Bahamas, to the next villain in the chain, whom Bond kills and from whom he obtains another cell phone, which allows the next narrative location to be established (Miami Airport) and the next villain to be located (by calling his cell phone in a crowded room and seeing who answers) (Demetrios). There are no conventional interrogations needed here, because it is the digital devices that are the locus of knowledge rather than people. Even Bond’s lover Vesper Lynd sends her most important message to him (the name and cell phone number of the film’s arch villain) in a posthumous text, rather than in an actual conversation. Cell phones do not enable communication between people; people connect the important information that cell phones hold together. The second manifestation of the disenchantment of ICT technology is the disempowering omnipresence of surveillance. Bond and his colleague are noticed by the bomber when the colleague touches his supposedly invisible communication earpiece. With the audience’s point of view conflated with that of the secret agent, the technology of concealment becomes precisely what reveals the secret agent’s identity in the midst of a chaotic scene in which staying anonymous should be the easiest thing in the world; other villains identify Bond by the same means in a hotel hallway later in the film. While chasing the bomber, Bond is recorded by a surveillance camera in the act of killing him on the grounds of a foreign embassy. The secret agent is, as a result, made into an object of knowledge for the international media, prompting M (Bond’s boss) to exclaim that their political masters “don’t care what we do, they care what we get photographed doing.” Bond is henceforth part of the mediascape, so well known as a spy that he refuses to use the alias that MI6 provides for his climactic encounter with the main villain LeChiffre on the grounds that any well-connected master criminal will know who he is anyway. This can, of course, go both ways: Bond uses the omnipresence of surveillance to find another of his targets by using the security cameras of a casino. This one image contains many layers of reference—Bond the character has found his man; he has also found an iconic image from his own cultural past (the Aston Martin DB V car that is the only clearly delineated object in the frame) that he cannot understand as such because Casino Royale is a “reboot” and he has only just become 007. But the audience knows what it means and can insert this incarnation of James Bond in its historical sequence and enjoy the allusion to a past of which Bond is oblivious. The point is that surveillance is omnipresent, anonymity is impossible, and we are always being watched and interpreted by someone. This is true in the film’s narrative and also in the cultural/historical contexts in which the Bond films operate. It may be better to be the watcher rather than the watched, but we are always already both. By the end of the film, Bond is literally being framed by technological devices and becomes the organic connection between different pieces of technology. The literal centrality of the human agent in these images is not, in this disenchanted landscape, an indication of his importance. The cell phones to which Bond listens in these images connect him (and us) to the past, the back story or context provided by his masters that permits the audience to understand the complex plot that is unfolding before them. The devices at which he looks represent the future, the next situation or person that he must contain. He does not fully understand what is happening, but he is not there to understand – he is there to join the information held in the various devices together, which (in this film) usually means to kill someone. The third image in this sequence is from the final scene of the film, and the assault rifle marks this end—the chain of cell phone messages (direct and indirect) that has driven Casino Royale from its outset has been stopped. The narrative stops with it. Bond’s centrality amid these ICTS and their messages is simultaneously what allows him to complete his mission and what subjects him to their needs. This kind of technological power can be so banal precisely because it has been stripped of pleasure and of any kind of mystique. The conclusion of Skyfall reinforces this by inverting all of the norms that Bond films have created about their climaxes: instead of the technologically-empowered villain’s lair being destroyed, it is Bond’s childhood home that is blown up. Rather than beating the computer hacker at his own game, Bond kills him with a knife in a medieval Scottish church. It could hardly be less hi-tech if it tried, which is precisely the point. What the Bond franchise and the other films mentioned above have shown us, is that we do not rely on ICTs for enchantment any more because they are so powerfully connected to the everyday reality of work and to the loss of privacy that our digital devices exact as the price of their use. The advertising materials that sell them to us have to rely on the rhetoric of augmentation, but these films are signs that we do not experience them as empowering devices any more. The deeper irony is that (for once) the ICT consumer products being advertised to us today really do what their promotional materials claim: they are faster, more powerful, and more widely applicable in our lives than ever before. Without the user fantasy of augmentation, however, this truth has very little power to move us. We depict ourselves as the medium, and it is our digital devices that bear the message.References“Apple Special Event. March 2, 2011.” Apple Events. 21 Sep. 2013 ‹http://events.apple.com.edgesuite.net/1103pijanbdvaaj/event/index.html›. Bell, Gordon, and Jim Gemmell. Total Recall: How the E-Memory Revolution Will Change Everything. New York: Dutton, 2009.“The Best of Both Worlds: Part Two.” Star Trek: The Next Generation. Dir. Cliff Bole. Paramount, 2013. The Bourne Legacy. Dir. Tony Gilroy. Universal Pictures, 2012. Britton, Wesley. Beyond Bond: Spies in Fiction and Film. Westport, CT: Praeger, 2005. Buchanan, Allen. Beyond Humanity: The Ethics of Biomedical Enhancement. Uehiro Series in Practical Ethics. New York: Oxford University Press, 2011. Casino Royale. Dir. Martin Campbell. Columbia Pictures, 2006. “Data’s Day.” Star Trek: The Next Generation. Dir. Robert Wiemer. Burbank, CA: Paramount, 2013. The Ghost Writer. Dir. Roman Polanski. R.P. Productions/France 2 Cinéma, 2010. “Humanity +”. 25 Aug. 2013 ‹http://humanityplus.org›. Kelly, Kevin. What Technology Wants. New York: Viking, 2010. Levin, Ira. The Stepford Wives. Introd. Peter Straub. New York: William Morrow, 2002. Lilley, Stephen. Transhumanism and Society: The Social Debate over Human Enhancement. New York: Springer, 2013. “List of James Bond Gadgets.” Wikipedia. 11 Nov. 2013 ‹http://en.wikipedia.org/wiki/List_of_James_Bond_gadgets›. The Manchurian Candidate. Dir. Jonathan Demme. Paramount, 2004. McCarthy, John, and Peter Wright. Technology as Experience. Cambridge, Mass.: MIT Press, 2004. McCarthy, John, et al. “The Experience of Enchantment in Human–Computer Interaction.” Journal of Personal and Ubiquitous Computing 10 (2006): 369-78. “Mobile Cellular Subscriptions (per 100 People).” The World Bank. 25 March 2013 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›. Nitins, Tanya L. “A Boy and His Toys: Technology and Gadgetry in the James Bond Films.” James Bond in World and Popular Culture: The Films Are Not Enough. Eds. Rob Weiner, B. Lynn Whitfield, and Jack Becker. Newcastle upon Tyne: Cambridge Scholars Publishing, 2010. 445-58. ———. Selling James Bond: Product Placement in the James Bond Films. Newcastle upon Tyne: Cambridge Scholars Publishing, 2011. Nye, David E. Technology Matters—Questions to Live With. Cambridge, MA: MIT Press, 2006. Pratt, Andy, and Jason Nunes Interactive Design: An Introduction to the Theory and Application of User-Centered Design. Beverly, MA: Rockport, 2012. Quantum of Solace. Dir: Marc Foster, Eon Productions, 2008. DVD. Savulescu, Julian, and Nick Bostrom, eds. Human Enhancement. Oxford: Oxford University Press, 2009. Skyfall. Dir. Sam Mendes. Eon Productions, 2012. Smith, Aaron. The Best and Worst of Mobile Connectivity. Pew Internet & American Life Project. Pew Research Center. 25 Aug. 2013 ‹http://pewinternet.org/Reports/2012/Best-Worst-Mobile.aspx›. Thunderball. Dir. Terence Young. Eon Productions, 1965. “Verizon Commercial – Droid DNA ‘Hyper Intelligence’.” 11 April 2013 ‹http://www.youtube.com/watch?v=IYIAaBOb5Bo›. Willis, Martin. “Hard-Wear: The Millenium, Technology, and Brosnan’s Bond.” The James Bond Phenomenon: A Critical Reader. Ed. Christoph Linder. Manchester: Manchester University Press, 2001. 151-65.
APA, Harvard, Vancouver, ISO, and other styles
43

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
44

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
45

Hackett, Lisa J., and Jo Coghlan. "Why <em>Monopoly</em> Monopolises Popular Culture Board Games." M/C Journal 26, no. 2 (April 26, 2023). http://dx.doi.org/10.5204/mcj.2956.

Full text
Abstract:
Introduction Since the early 2000s, and especially since the onset of COVID-19 and long periods of lockdown, board games have seen a revival in popularity. The increasing popularity of board games are part of what Julie Lennett, a toy industry analyst at NPD Group, describes as the “nesting trend”: families have more access to entertainment at home and are eschewing expensive nights out (cited in Birkner 7). While on-demand television is a significant factor in this trend, for Moriaty and Kay (6), who wouldn’t “welcome [the] chance to turn away from their screens” to seek the “warmth and connection you get from playing games with live human family and friends?” For others, playing board games can simply be about nostalgia. Board games have a long history not specific to one period, geography, or culture. Likely board games were developed to do two things – teach and entertain. This remains the case today. Historically, miniature versions of battles or hunts were played out in what we might recognise today as a board game. Trade, war, and science impacted on their development, as did the printing press, which allowed for the standardisation of rules. Chess had many variations prior to the fifteenth century. Similarly, the Industrial Revolution allowed for the mass production of board games, boosting their popularity across nations, class, and age (Walker 13). Today, regardless of or because of our digital lives, we are in a “board game renaissance” (Booth 1). Still played on rainy days, weekends, and holidays, we now also play board games in dedicated game board cafés like the Haunted Game Café in America, the Snakes and Lattes in Canada, or the Mind Café in Singapore. In the board game café Draughts in the UK, customers pay £5 to select and play one of 800 board games, including classics like Monopoly and Cluedo. These cafes are important as they are “helping manufacturers to understand the kind of games that appeal to the larger section of players” (Atrizton). COVID-19 caused board game sales to increase. The global market was predicted to increase by US$1 billion in 2021, compared to 2020 (Jarvis). Total sales of board games in Australia are expected to reach AU$86 million in 2023, an almost 10 per cent increase from the preceding year (Statista "Board Games – Australia"). The emergence of Kickstarter, a global crowdfunding platform which funds new board games, is filling the gap in the contemporary board game market, with board games generating 20 per cent of the total funding raised (Carter). Board games are predicted to continue to grow, with the global market revenue record at US$19 billion dollars in 2022, a figure that is expected to rise to US$40 billion within 6 years (Atrizton). If the current turn towards board games represents a desire to escape from the digital world, the Internet is also contributing to the renaissance. Ex-Star Trek actor Wil Wheaton hosts the popular Web series TableTop, in which each episode explains a board game that is then played, usually with celebrities. The Internet also provides “communities” in which fans can share their enthusiasm, be it as geek culture or cult fandom (Booth 2). Booth provides an eloquent explanation, however, for the allure of face-to-face board games: “they remind us of our face-to-face past, and recall a type of pre-digital luddism where we can circle around the ‘campfire’ of the game board” (Booth 1-2). What makes a board game successful is harder to define. Phillip Orbanes, an American game designer and former vice-president of research and development at Parker Brothers, has attempted to elucidate the factors that make a good board game: “make the rules simple and unambiguous … don’t frustrate the casual player … establish a rhythm … focus on what’s happening off the board … give ‘em chances to come from behind … [and] provide outlets for latent talents” (Orbanes 52-55). Orbanes also says it is important to understand that what “happens off the board is just as important to the experience as the physical game itself” (Orbanes 51). Tristan Donovan contends that there are four broad stages of modern board games, beginning with the folk era when games had no fixed author, their rules were mutable, and local communities adapted the game to suit their sensibilities. Chess is an example of this, with the game only receiving the fixed rules we know today when tournaments and organisations saw the need for a singular set of rules. Mass production of games was the second stage, marking “the single biggest shift in board game history – a total flip in how people understood, experienced and played board games. Games were no long[er] malleable objects owned by the commons, but products created usually in the pursuit of profit” (Donovan 267). An even more recent development in game boards was the introduction of mass produced plastics, which reduced the cost of board game construction and allowed for a wider range of games to be produced. This was particularly evident in the post-war period. Games today are often thought of as global, which allows gamers to discover games from other regions and cultures, such as Catan (Klaus Teuber, 1995), a German game that may not have enjoyed its immense success if it were not for the Internet. Board game players are broadly categorised into two classes: the casual gamer and the hobby or serious gamer (Rogerson and Gibbs). The most popular game from the mass production era is Monopoly, the focus of this article. The History of Monopoly Monopoly was designed and patented by American Elizabeth Magie (1866-1948) in 1902, and was originally called The Landlord’s Game. The game was based on the anti-monopoly taxation principles of Henry George (1839-1897), who argued that people should own 100 per cent of what they make and the land should belong to everyone. Land ownership, considered George, only benefitted land owners, and forces working people to pay exorbitant rent. Magie’s original version of the game was designed to demonstrate how rents enrich property owners and impoverish tenants. Renters in Australia’s property market today may recognise this side of ruthless capitalism. In 1959 Fidel Castro thought Monopoly “sufficiently redolent of capitalism” that he “ordered the ­destruction of every Monopoly set in Cuba” (McManus). Magie, however, was not credited with being the original inventor of Monopoly: rather, this credit was given to Charles Darrow. In 2014, the book The Monopolist: Obsession, Fury, and the Scandal behind the World's Favorite Board Game by Mary Pilon re-established Magie as the inventor of Monopoly, with her role and identity unearthed by American Ralph Anspach (1926-2022), an Adam Smith economist, Polish-German refugee, and anti-Vietnam protestor. According to Pilon, Magie, a suffragette and progressive economic and political thinker, was a Georgist advocate, particularly of his anti-monopolist policies, and it was this that informed her game’s narrative. An unmarried daughter of Scottish immigrants, she was a Washington homeowner, familiar with the grid-like street structure of the national capital. Magie left school at 13 to help support her family who were adversely impacted upon by the Panic of 1873, which saw economic collapse because of falling silver prices, railroad speculation, and property losses. She worked as a stenographer and teacher of Georgist single tax theory. Seeking a broader platform for her economic ideas, and with the growing popularity of board games in middle class homes, in 1904 Magie secured a patent for The Landlord’s Game, at a time when women only held 1 per cent of US patents (Pilon). The original game included deeds and play money and required players to earn wages via labour and pay taxes. The board provided a circular path (as opposed to the common linear path) in which players circled through rental properties and railroads, and could acquire food, with natural reserves (oil, coal, farms, and forests) unable to be monopolised. However, she created two sets of rules – the monopoly rules familiar to today’s players, and anti-monopoly rules in which tensions over human greed and altruism could be played out by participants. Magie started her own New York firm to manufacture and distribute the game, continued the struggle for women’s equality, and raged against wealthy monopolists of the day such as Andrew Carnegie (Pilon). By the late 1920, the game, mostly referred to as the ‘monopoly’ game, was popular, but many who played the game were playing handmade versions, likely unaware of the original Landlord’s Game. In 1931, mass-produced versions of the game, now titled Finance, began to appear, with some changes, including the ability to purchase properties, along with rule books. Occurring at the same time as the emergence of fixed-price goods in large department stores, the game, which now included chance cards, continued to be popular. It was Charles Darrow who sold Monopoly to Parker Brothers, even if he did not invent it. Darrow was introduced to one of the variants of the game and became obsessed with the game, which now featured the Community Chest and Free Parking, but his version did not have a set of rules. An unemployed ex-serviceman with no college education, Darrow struggled to provide for his family. By 1932, America was in the grip of the Great Depression, with housing prices collapsing and squatting common in large American cities. Befriending an artist, Darrow sought to provide a more dynamic and professional version of the game and complete it with a set of rules. In 1933, Darrow marketed his version of the game, titled Mr Monopoly, and it was purchased by Parker Brothers for US$7,000 in 1935. Magie received just US $500 (Farzan). Monopoly, as it was rebranded, was initial sold for $2 a game, and Parker Brothers sold 278,000 games in the first year. In 1936, consumers purchased 1.7 million editions of the game, generating millions of dollars in profits for Parker Brothers, who prior to Monopoly were on the brink of collapse (Pilon). Mary Pilon’s The Monopolists also reveals the struggle of Ralph Anspach in the 1970s to sell his Anti-Monopoly board games, which Parker Brothers fought in the courts. Anspach’s game sought to undermine the power of capitalist monopolies, which he had witnessed directly and negatively impact on fuel prices in America in the early 1970s. Hence the aim was to produce a game with an anti-monopolist narrative grounded in the free-market thinking of Adam Smith. Players were rewarded by breaking monopoly ownerships of utilities such as railroads and energy and metal reserves. In preparing his case against Parker Brothers, Anspach “accidentally discovered the true history of the game”, which began with Magie’s Landlord’s Game. Magie herself had battled with Parker Brothers in order to be “credited as the real originator of the game” and, like Anspach, reveal how Parker Brothers had changed the anti-capitalist narrative of the game, making it the “exact opposite” of its original aims (Landlordsgame). Anspach’s court room version of his battle with Parker Brothers was published in 2000, titled Monopolygate: During a David and Goliath Battle, the Inventor of the Anti-Monopoly® Game Uncovers the Secret History of Monopoly®. Monopoly Today Monopoly is now produced by Hasbro. It is the highest selling board game of all time, with an estimated 275 million units of Monopoly sold (Lee). Fan bases are clearly large too: the official Monopoly Facebook accounts report 9.9m likes (Facebook), and 68% of American households report owning a version of Monopoly (Statista "Which"). At the end of the twentieth century it was estimated that 550 million, or one in 12 people worldwide, had played the game (Guinness World Records "Most Popular"). Today it is estimated that Monopoly has been played by more than one billion people, and the digital Monopoly version has had over 100 million downloads (Johnson). The ability to play beloved board games with a computer opponent or with other players via the Internet arguably adds to the longevity of classic board games such as Monopoly. Yet research shows that despite Monopoly being widely owned, it is often not played as much as other games in people’s homes (d'Astous and Gagnon 84). D’Astous and Gagnon found that players in their study chose Monopoly to play on average six times a year, less than half the times they played Cluedo (13 times a year) or Scrabble (15 times). As Michael Whelan points out, Magie’s original goal was to make a statement about capitalism and landlords: a single player would progress round the board building an empire, whilst the others were doomed to slowly descend into bankruptcy. It was “never meant to be fun for anyone but the winner” (Whelan). Despite Monopoly’s longevity and impressive sales record, it is perhaps paradoxical to find that it is not a particularly popular or enjoyed game. Board Game Geek, the popular board game Website, reports in 2023 that the average rating for Monopoly by over 33,000 members is just 4.4 out of 10, and is ranked the 23,834th most popular game on the site (Board Game Geek). This is mirrored in academic studies: for example, when examining Orbane’s tenets for a good board game, d’Astous and Gagnon (84) found that players' appreciation of Monopoly was generally low. Not only is appreciation low for the game itself, it is also low for player antics during the game. A 2021 survey found that Monopoly causes the most fights, with 20% of households reporting “their game nights with friends or family members are often or always disrupted by competitive or unfriendly behaviour”, leading to players or even the game itself being banned (Lemore). Clearly Orbane’s tenet that the game “generates fun” is missing here (Orbanes 52). Commentators ask why Monopoly remains the best-selling board game of all time when the game has the “astonishing ability to sow seeds of discord” (Berical). Despite the claims that playing Monopoly causes disharmony, the game does allow for player agency. Perhaps more than any other board game, Monopoly is subjected to ‘house rules’. Buzzfeed reported 15 common house rules that many people think are official rules. In 2014 the official Monopoly Facebook page posted a video claiming that “68% of Americans have never read the official game rules” and that “49% of Americans had admitted to playing with their own ‘house rules’”. A look through these rules reveals that players are often trying to restore the balance of power in the game, or in other words increase the chance that a player can win. Hasbro has embraced these rules by incorporating some of them into the official rules. By incorporating players' amendments to the game, Hasbro can keep the Monopoly relevant. In another instance, Hasbro asked fans to vote on new tokens, which led to the thimble token being replaced with a Tyrannosaurus Rex. This was reversed in 2022 when nostalgic fans lobbied for the thimble’s return. Hasbro has also been an innovator by creating special rules for individual editions: for example, the Longest Game Ever edition (2019) slows players down by using only a single dice and has an extended game board. This demonstrates that Hasbro is keen to innovate and evolve the game to meet player expectations. Innovation and responsiveness to fans is one way that Hasbro has maintained Monopoly’s position as highest-selling board game. The only place the original Monopoly rules seem to be played intact are at the official competitions. Collecting and Nostalgia The characteristics of Monopoly allow for a seemingly infinite number of permutations. The places on the board can be real or fictional, making it easily adaptable to accommodate different environments. This is a factor in Monopoly’s longevity. The number of Monopoly editions are endless, with BoardGameGeek listing over 1,300 versions of the game on its site. Monopoly editions range from collector and commemorative editions to music, television, and film versions, actor-based editions, sports club editions, editions tied to toy franchises, animal lover editions, country editions, city editions, holiday editions, car brand editions, motor bike editions, as well as editions such as Monopoly Space, editions branded to popular confectionary, Ms Monopoly, and Go Green Monopoly. Each of these contain their own unique modifications. The Go Green version includes greenhouses, dice are made from FSC-certified wood from well-managed forests, tokens are made with plant-based plastic derived from sugarcane, a renewable raw material, and players can vie to have monopolistic control over renewable energy firms, solar farms, and bike paths. Licencing agreements allows Hasbro to leverage two sets of popular culture fans and collectors simultaneously: fans of Monopoly and its different versions, and fans of the Monopoly branded collectable, such as the Elvis Collector’s edition and Breaking Bad Monopoly. Apart from licencing, what else explains the longevity of Monopoly? Fred Davis demonstrates that nostalgia is an important sociological phenomenon, allowing consumers to re-imagine the past via iconic items including toys. Generation Y, also known as Millennials or digital natives, a cohort born between 1982 and 1994 who have grown up with technology as part of their everyday lives, are particularly interested in ‘heritage-inspired’ goods (Marchegiani and Phau). These consumers enjoy the past with a critical eye, drawn by the aesthetic properties of nostalgic goods rather than a direct personal connection (Goulding 575). Popular culture items are a site of widespread collecting behaviour (Geraghty 2). Belk argues that our possessions are used to construct our social selves. Collectors are a special kind of consumer: where consumers use and discard goods as needed, collectors engage with goods as special objects to be maintained and preserved (Belk 254), which is often achieved through ritualistic behaviour (McCracken 49). This is not to say that items in a collection are removed from use entirely: often being used in the normal manner, for example, clothing collectors will wear their items, yet take care of them in the a way they see akin to conservatorship (Hackett). Collections are often on display, often using the flexibility of the Internet as showground, as is the case with Neil Scallon’s world record collection of Monopoly’s 3,554 different versions of the game (World of Monopoly). Monopoly has low barriers to entry for a collector, as many sets retail at a low price-point, yet there are a few sets which are very expensive. The most expensive Monopoly set of all time retailed for US$2 million, and the cost was mainly borne out of the luxurious materials used: “the board is made from 23 carat gold, rubies and sapphires top the chimneys of the solid gold houses and hotels and the dice have 42 full cut diamonds for spots” (Guinness World Records "Most Expensive"). Conclusion The recent resurgence in board game popularity has only served to highlight Monopoly’s longevity. Through clever marketing and leveraging of nostalgia and popular culture fandoms, Hasbro has managed to retain Monopoly’s position as the number one board game, in sales figures at least. Despite its popularity, Monopoly suffers from a reputation as a conduit for poor player behaviour, as one person triumphs at the downfall of the other players. The game dynamics punish those whom fortune did not reward. In this regard, Elizabeth Magie’s initial aim of teaching about the unfairness of capitalism can be considered a resounding success. In re-establishing her role as a feminist and inventor at the turn of the century, embraced by progressive left-wingers of the 1930s, her story as much as that of Monopoly is a valuable contribution to modern popular culture. References Atrizton. Board Games Market – Global Outlook & Forecast 2023-2028. 2023. Belk, Russell W. "Collectors and Collecting." Handbook of Material Culture. Eds. Christopher Tilley et al. London: Sage, 2006. 534-45. Berical, Matt. "Monopoly Is a Terrible Game. Quit Playing It." Fatherly 4 Mar. 2020. Birkner, Christine. "Get on Board." Adweek 3-10 Apr. 2017: 7. Board Game Geek. "Monopoly." 2023. Booth, Paul. Game Play: Paratextuality in Contemporary Board Games. Bloomsbury, 2015. Buzzfeed. "15 Monopoly Rules That Aren't Actually Rules: Settled That 'Free Parking' Debate." Buzzfeed 27 Mar. 2014. Carter, Chase. "Tabletop Games Have Made over $1.5 Billion on Kickstarter." Dicebreaker 13 Dec. 2022. D'Astous, Alain, and Karine Gagnon. "An Inquiry into the Factors That Impact on Consumer Appreciation of a Board Game." Journal of Consumer Marketing 24.2 (2007): 80-89. Davis, Fred. Yearning for Yesterday: A Sociology of Nostalgia. New York: Free Press, 1979. Donovan, Tristan. "The Four Board Game Eras: Making Sense of Board Gaming’s Past." Catalan Journal of Communication & Cultural Studies 10.2 (2018): 265-70. Facebook. "Monopoly." 1 Mar. 2023. Farzan, Antonia Noori. "The New Monopoly ‘Celebrates Women Trailblazers,’ But the Game’s Female Inventor Still Isn’t Getting Credit." Washington Post 11 Sep. 2019. Geraghty, Lincoln. Cult Collectors. Routledge, 2014. Goulding, Christina. "Romancing the Past: Heritage Visiting and the Nostalgic Consumer." Psychology and Marketing 18.6 (2001): 565-92. Guinness World Records. "Most Expensive Board Game of Monopoly." 30 Jan. 2023. ———. "Most Popular Board Game." 30 Jan. 2023. Hackett, Lisa J. "‘Biography of the Self’: Why Australian Women Wear 1950s Style Clothing." Fashion, Style and Popular Culture 9.1-2 (2022). Johnson, Angela. "13 Facts about Monopoly That Will Surprise You." Insider 27 June 2018. Landlordsgame. "Landlord's Game History, Monopoly Game History." 2021. Lee, Allen. "The 20 Highest Selling Board Games of All Time." Money Inc 11 Mar. 2023. Lemore, Chris. "Banned from Game Night: ‘Monopoly’ Leads to the Most Fights among Family, Friends." Study Finds 2021. Marchegiani, Christopher, and Ian Phau. "Personal and Historical Nostalgia—a Comparison of Common Emotions." Journal of Global Marketing 26.3 (2013): 137-46. McCracken, Grant. Culture and Consumption: New Approaches to the Symbolic Character of Consumer Goods and Activities. Bloomington: Indiana UP, 1988. McManus, James. "Do Not Collect $200." New York Times, 2015. 10. Moriarity, Joan, and Jonathan Kay. Your Move: What Board Games Teach Us about Life. Sutherland House, 2019. Orbanes, Phil. "Everything I Know about Business I Learned from Monopoly." Harvard Business Review 80.3 (2002): 51-131. Pilon, Mary. The Monopolists: Obsession, Fury, and the Scandal Behind the World's Favorite Board Game. Bloomsbury, 2015. Rogerson, Melissa J., and Martin Gibbs. "Finding Time for Tabletop: Board Game Play and Parenting." Games and Culture 13.3 (2018): 280-300. Statista. "Board Games – Australia." 25 Mar. 2023. ———. "Which of These Classic Board Games Do You Have at Home?" Statista-Survey Toys and Games 2018 (2018). Walker, Damian Gareth. A Book of Historic Board Games. Lulu.com, 2014. Whelan, Michael. "Why Does Everyone Hate Monopoly? The Secret History behind the World's Biggest Board Game." Dicebreaker 26 Aug. 2021. World of Monopoly. "Neil Scallan's World Record List of Official Monopolu Items." 2016.
APA, Harvard, Vancouver, ISO, and other styles
46

Van Luyn, Ariella. "Crocodile Hunt." M/C Journal 14, no. 3 (June 25, 2011). http://dx.doi.org/10.5204/mcj.402.

Full text
Abstract:
Saturday, 24 July 1971, Tower Mill Hotel The man jiggles the brick, gauges its weight. His stout hand, a flash of his watch dial, the sleeve rolled back, muscles on the upper arm bundled tight. His face half-erased by the dark. There’s something going on beneath the surface that Murray can’t grasp. He thinks of the three witches in Polanski’s Macbeth, huddled together on the beach, digging a circle in the sand with bare hands, unwrapping their filthy bundle. A ritual. The brick’s in the air and it’s funny but Murray expected it to spin but it doesn’t, it holds its position, arcs forward, as though someone’s taken the sky and pulled it sideways to give the impression of movement, like those chase scenes in the Punch and Judy shows you don’t see anymore. The brick hits the cement and fractures. Red dust on cops’ shined shoes. Murray feels the same sense of shock he’d felt, sitting in the sagging canvas seat at one of his film nights, recognising the witches’ bundle, a severed human arm, hacked off just before the elbow; both times looking so intently, he had no distance or defence when the realisation came. ‘What is it?’ says Lan. Murray points to the man who threw the brick but she is looking the other way, at a cop in a white riot helmet, head like a globe, swollen up as though bitten. Lan stands on Murray’s feet to see. The pig yells through a megaphone: ‘You’re occupying too much of the road. It’s illegal. Step back. Step back.’ Lan’s back is pressed against Murray’s stomach; her bum fits snugly to his groin. He resists the urge to plant his cold hands on her warm stomach, to watch her squirm. She turns her head so her mouth is next to his ear, says, ‘Don’t move.’ She sounds winded, her voice without force. He’s pinned to the ground by her feet. Again, ‘Step back. Step back.’ Next to him, Roger begins a chant. ‘Springboks,’ he yells, the rest of the crowd picking up the chant, ‘out now!’ ‘Springboks!’ ‘Out now!’ Murray looks up, sees a hand pressed against the glass in one of the hotel’s windows, quickly withdrawn. The hand belongs to a white man, for sure. It must be one of the footballers, although the gesture is out of keeping with his image of them. Too timid. He feels tired all of a sudden. But Jacobus Johannes Fouché’s voice is in his head, these men—the Springboks—represent the South African way of life, and the thought of the bastard Bjelke inviting them here. He, Roger and Lan were there the day before when the footballers pulled up outside the Tower Mill Hotel in a black and white bus. ‘Can you believe the cheek of those bastards?’ said Roger when they saw them bounding off the bus, legs the span of Murray’s two hands. A group of five Nazis had been lined up in front of the glass doors reflecting the city, all in uniform: five sets of white shirts and thin black ties, five sets of khaki pants and storm-trooper boots, each with a red sash printed with a black and white swastika tied around their left arms, just above the elbow. The Springboks strode inside, ignoring the Nazi’s salute. The protestors were shouting. An apple splattered wetly on the sidewalk. Friday, 7 April 1972, St Lucia Lan left in broad daylight. Murray didn’t know why this upset him, except that he had a vague sense that she should’ve gone in the night time, under the cover of dark. The guilty should sneak away, with bowed heads and faces averted, not boldly, as though going for an afternoon walk. Lan had pulled down half his jumpers getting the suitcase from the top of the cupboard. She left his clothes scattered across the bedroom, victims of an explosion, an excess of emotion. In the two days after Lan left, Murray scours the house looking for some clue to where she was, maybe a note to him, blown off the table in the wind, or put down and forgotten in the rush. Perhaps there was a letter from her parents, bankrupt, demanding she return to Vietnam. Or a relative had died. A cousin in the Viet Cong napalmed. He finds a packet of her tampons in the bathroom cupboard, tries to flush them down the toilet, but they keep floating back up. They bloat; the knotted strings make them look like some strange water-dwelling creature, paddling in the bowl. He pees in the shower for a while, but in the end he scoops the tampons back out again with the holder for the toilet brush. The house doesn’t yield anything, so he takes to the garden, circles the place, investigates its underbelly. The previous tenant had laid squares of green carpet underneath, off-cuts that met in jagged lines, patches of dirt visible. Murray had set up two sofas, mouldy with age, on the carpeted part, would invite his friends to sit with him there, booze, discuss the state of the world and the problem with America. Roger rings in the afternoon, says, ‘What gives? We were supposed to have lunch.’ Murray says, ‘Lan’s left me.’ He knows he will cry soon. ‘Oh Christ. I’m so sorry,’ says Roger. Murray inhales, snuffs up snot. Roger coughs into the receiver. ‘It was just out of the blue,’ says Murray. ‘Where’s she gone?’ ‘I don’t know.’ ‘She didn’t say anything?’ ‘No,’ says Murray. ‘She could be anywhere. Maybe you should call the police, put in a missing report,’ says Roger. ‘I’m not too friendly with the cops,’ says Murray, and coughs. ‘You sound a bit crook. I’ll come over,’ says Roger. ‘That’d be good,’ says Murray. Roger turns up at the house an hour later, wearing wide pants and a tight collared shirt with thick white and red stripes. He’s growing a moustache, only cuts his hair when he visits his parents. Murray says, ‘I’ll make us a cuppa.’ Roger nods, sits down at the vinyl table with his hands resting on his knees. He says, ‘Are you coming to 291 on Sunday?’ 291 St Paul’s Terrace is the Brisbane Communist Party’s headquarters. Murray says, ‘What’s on?’ ‘Billy needs someone to look after the bookshop.’ Murray gives Roger a mug of tea, sits down with his own mug between his elbows, and cradles his head in his hands so his hair falls over his wrists. After a minute, Roger says, ‘Does her family know?’ Murray makes a strange noise through his hands. ‘I don’t even know how to contact them,’ he says. ‘She wrote them letters—couldn’t afford to phone—but she’s taken everything with her. The address book. Everything.’ Murray knows nothing of the specifics of Lan’s life before she met him. She was the first Asian he’d ever spoken to. She wore wrap-around skirts that changed colour in the sun; grew her hair below the waist; sat in the front row in class and never spoke. He liked the shape of her calf as it emerged from her skirt. He saw her on the great lawn filming her reflection in a window with a Sony Portapak and knew that he wanted her more than anything. Murray seduced her by saying almost nothing and touching her as often as he could. He was worried about offending her. What reading he had done made him aware of his own ignorance, and his friend in Psych told him that when you touch a girl enough — especially around the aureole — a hormone is released that bonds them to you, makes them sad when you leave them or they leave you. In conversation, Murray would put his hand on Lan’s elbow, once on the top of her head. Lan was ready to be seduced. Murray invited her to a winter party in his backyard. They kissed next to the fire and he didn’t notice until the next morning that the rubber on the bottom of his shoe melted in the flames. She moved into his house quickly, her clothes bundled in three plastic bags. He wanted her to stay in bed with him all day, imagined he was John Lennon and she Yoko Ono. Their mattress became a soup of discarded clothes, bread crumbs, wine stains, come stains, ash and flakes of pot. He resented her when she told him that she was bored, and left him, sheets pulled aside to reveal his erection, to go to class. Lan tutored high-schoolers for a while, but they complained to their mothers that they couldn’t understand her accent. She told him her parents wanted her to come home. The next night he tidied the house, and cooked her dinner. Over the green peas and potato—Lan grated ginger over hers, mixed it with chili and soy sauce, which she travelled all the way to Chinatown on a bus to buy—Murray proposed. They were married in the botanic gardens, surrounded by Murray’s friends. The night before his father called him up and said, ‘It’s not too late to get out of it. You won’t be betraying the cause.’ Murray said, ‘You have no idea what this means to me,’ and hung up on him. Sunday, 9 April 1972, 291 St Paul’s Terrace Murray perches on the backless stool behind the counter in The People’s Bookshop. He has the sense he is on the brink of something. His body is ready for movement. When a man walks into the shop, Murray panics because Billy hadn’t shown him how to use the cash register. He says, ‘Can I help?’ anyway. ‘No,’ says the man. The man walks the length of the shelves too fast to read the titles. He stops at a display of Australiana on a tiered shelf, slides his hand down the covers on display. He pauses at Crocodile Hunt. The cover shows a drawing of a bulky crocodile, scaled body bent in an S, its jaws under the man’s thumb. He picks it up, examines it. Murray thinks it odd that he doesn’t flip it over to read the blurb. He walks around the whole room once, scanning the shelves, reaches Murray at the counter and puts the book down between them. Murray picks it up, turns it over, looking for a price. It’s stuck on the back in faded ink. He opens his mouth to tell the man how much, and finds him staring intently at the ceiling. Murray looks up too. A hairline crack runs along the surface and there are bulges in the plaster where the wooden framework’s swollen. It’s lower than Murray remembers. He thinks that if he stood on his toes he could reach it with the tips of his fingers. Murray looks down again to find the man staring at him. Caught out, Murray mutters the price, says, ‘You don’t have it in exact change, do you?’ The man nods, fumbles around in his pocket for a bit and brings out a note, which he lays at an angle along the bench top. He counts the coins in the palm of his hand. He makes a fist around the coins, brings his hand over the note and lets go. The coins fall, clinking, over the bench. One spins wildly, rolls past Murray’s arm and across the bench. Murray lets it fall. He recognises the man now; it is the act of release that triggers the memory, the fingers spread wide, the wrist bent, the black watch band. This is the man who threw the brick in the Springbok protest. Dead set. He looks up again, expecting to see the same sense of recognition in the man, but he is walking out of the shop. Murray follows him outside, leaving the door open and the money still on the counter. The man is walking right along St Paul’s Terrace. He tucks the book under his arm to cross Barry Parade, as though he might need both hands free to wave off the oncoming traffic. Murray stands on the other side of the road, unsure of what to do. When Murray came outside, he’d planned to hail the man, tell him he recognised him from the strike and was a fellow comrade. They give discounts to Communist Party members. Outside the shop, it strikes him that perhaps the man is not one of them at all. Just because he was at the march doesn’t make him a communist. Despite the unpopularity of the cause —‘It’s just fucking football,’ one of Murray’s friends had said. ‘What’s it got to do with anything?’— there had been many types there, a mixture of labour party members; unionists; people in the Radical Club and the Eureka Youth League; those not particularly attached to anyone. He remembers again the brick shattered on the ground. It hadn’t hit anyone, but was an incitement to violence. This man is dangerous. Murray is filled again with nervous energy, which leaves him both dull-witted and super-charged, as though he is a wind-up toy twisted tight and then released, unable to do anything but move in the direction he’s facing. He crosses the road about five metres behind the man, sticks to the outer edge of the pavement, head down. If he moves his eyes upwards, while still keeping his neck lowered, he can see the shoes of the man, his white socks flashing with each step. The man turns the corner into Brunswick Street. He stops at a car parked in front of the old Masonic Temple. Murray walks past fast, unsure of what to do next. The Temple’s entry is set back in the building, four steps leading up to a red door. Murray ducks inside the alcove, looks up to see the man sitting in the driver’s seat pulling out the pages of Crocodile Hunt and feeding them through the half wound-down window where they land, fanned out, on the road. When he’s finished dismembering the book, the man spreads the page-less cover across the back of the car. The crocodile, snout on the side, one eye turned outwards, stares out into the street. The man flicks the ignition and drives, the pages flying out and onto the road in his wake. Murray sits down on the steps of the guild and smokes. He isn’t exactly sure what just happened. The man must have bought the book just because he liked the picture on the front of the cover. But it’s odd though that he had bothered to spend so much just for one picture. Murray remembers how he had paced the shop and studiously examined the ceiling. He’d given the impression of someone picking out furniture for the room, working out the dimensions so some chair or table would fit. A cough. Murray looks up. The man’s standing above him, his forearm resting on the wall, elbow bent. His other arm hangs at his side, hand bunched up around a bundle of keys. ‘I wouldn’t of bothered following me, if I was you,’ the man says. ‘The police are on my side. Special branch are on my side.’ He pushes himself off the wall, stands up straight, and says, ‘Heil Hitler.’ Tuesday April 19, 1972, 291 St Paul’s Terrace Murray brings his curled fist down on the door. It opens with the force of his knock and he feels like an idiot for even bothering. The hallway’s dark. Murray runs into a filing cabinet, swears, and stands in the centre of the corridor, with his hand still on the cabinet, calling, ‘Roger! Roger!’ Murray told Roger he’d come here when he called him. Murray was walking back from uni, and on the other side of the road to his house, ready to cross, he saw there was someone standing underneath the house, looking out into the street. Murray didn’t stop. He didn’t need to. He knew it was the man from the bookshop, the Nazi. Murray kept walking until he reached the end of the street, turned the corner and then ran. Back on campus, he shut himself in a phone box and dialed Roger’s number. ‘I can’t get to my house,’ Murray said when Roger picked up. ‘Lock yourself out, did you?’ said Roger. ‘You know that Nazi? He’s back again.’ ‘I don’t get it,’ said Roger. ‘It doesn’t matter. I need to stay with you,’ said Murray. ‘You can’t. I’m going to a party meeting.’ ‘I’ll meet you there.’ ‘Ok. If you want.’ Roger hung up. Now, Roger stands framed in the doorway of the meeting room. ‘Hey Murray, shut up. I can hear you. Get in here.’ Roger switches on the hallway light and Murray walks into the meeting room. There are about seven people, sitting on hard metal chairs around a long table. Murray sits next to Roger, nods to Patsy, who has nice breasts but is married. Vince says, ‘Hi, Murray, we’re talking about the moratorium on Friday.’ ‘You should bring your pretty little Vietnamese girl,’ says Billy. ‘She’s not around anymore,’ says Roger. ‘That’s a shame,’ says Patsy. ‘Yeah,’ says Murray. ‘Helen Dashwood told me her school has banned them from wearing moratorium badges,’ says Billy. ‘Far out,’ says Patsy. ‘We should get her to speak at the rally,’ says Stella, taking notes, and then, looking up, says, ‘Can anyone smell burning?’ Murray sniffs, says ‘I’ll go look.’ They all follow him down the hall. Patsy says, behind him, ‘Is it coming from the kitchen?’ Roger says, ‘No,’ and then the windows around them shatter. Next to Murray, a filing cabinet buckles and twists like wet cardboard in the rain. A door is blown off its hinges. Murray feels a moment of great confusion, a sense that things are sliding away from him spectacularly. He’s felt this once before. He wanted Lan to sit down with him, but she said she didn’t want to be touched. He’d pulled her to him, playfully, a joke, but he was too hard and she went limp in his hands. Like she’d been expecting it. Her head hit the table in front of him with a sharp, quick crack. He didn’t understand what happened; he had never experienced violence this close. He imagined her brain as a line drawing with the different sections coloured in, like his Psych friend had once showed him, except squashed in at the bottom. She had recovered, of course, opened her eyes a second later to him gasping. He remembered saying, ‘I just want to hold you. Why do you always do this to me?’ and even to him it hadn’t made sense because he was the one doing it to her. Afterwards, Murray had felt hungry, but couldn’t think of anything that he’d wanted to eat. He sliced an apple in half, traced the star of seeds with his finger, then decided he didn’t want it. He left it, already turning brown, on the kitchen bench. Author’s Note No one was killed in the April 19 explosion, nor did the roof fall in. The bookstore, kitchen and press on the first floor of 291 took the force of the blast (Evans and Ferrier). The same night, a man called The Courier Mail (1) saying he was a member of a right wing group and had just bombed the Brisbane Communist Party Headquarters. He threatened to bomb more on Friday if members attended the anti-Vietnam war moratorium that day. He ended his conversation with ‘Heil Hitler.’ Gary Mangan, a known Nazi party member, later confessed to the bombing. He was taken to court, but the Judge ruled that the body of evidence was inadmissible, citing a legal technicality. Mangan was not charged.Ian Curr, in his article, Radical Books in Brisbane, publishes an image of the Communist party quarters in Brisbane. The image, entitled ‘After the Bomb, April 19 1972,’ shows detectives interviewing those who were in the building at the time. One man, with his back to the camera, is unidentified. I imagined this unknown man, in thongs with the long hair, to be Murray. It is in these gaps in historical knowledge that the writer of fiction is free to imagine. References “Bomb in the Valley, Then City Shots.” The Courier Mail 20 Apr. 1972: 1. Curr, Ian. Radical Books in Brisbane. 2008. 24 Jun. 2011 < http://workersbushtelegraph.com.au/2008/07/18/radical-books-in-brisbane/ >. Evans, Raymond, and Carole Ferrier. Radical Brisbane: An Unruly History. Brisbane: Vulgar Press, 2004.
APA, Harvard, Vancouver, ISO, and other styles
47

Broderick, Mick, Stuart Marshall Bender, and Tony McHugh. "Virtual Trauma: Prospects for Automediality." M/C Journal 21, no. 2 (April 25, 2018). http://dx.doi.org/10.5204/mcj.1390.

Full text
Abstract:
Unlike some current discourse on automediality, this essay eschews most of the analysis concerning the adoption or modification of avatars to deliberately enhance, extend or distort the self. Rather than the automedial enabling of alternative, virtual selves modified by playful, confronting or disarming avatars we concentrate instead on emerging efforts to present the self in hyper-realist, interactive modes. In doing so we ask, what is the relationship between traumatic forms of automediation and the affective impact on and response of the audience? We argue that, while on the one hand there are promising avenues for valuable individual and social engagements with traumatic forms of automediation, there is an overwhelming predominance of suffering as a theme in such virtual depictions, comingled with uncritically asserted promises of empathy, which are problematic as the technology assumes greater mainstream uptake.As Smith and Watson note, embodiment is always a “translation” where the body is “dematerialized” in virtual representation (“Virtually” 78). Past scholarship has analysed the capacity of immersive realms, such as Second Life or online games, to highlight how users can modify their avatars in often spectacular, non-human forms. Critics of this mode of automediality note that users can adopt virtually any persona they like (racial, religious, gendered and sexual, human, animal or hybrid, and of any age), behaving as “identity tourists” while occupying virtual space or inhabiting online communities (Nakamura). Furthermore, recent work by Jaron Lanier, a key figure from the 1980s period of early Virtual Reality (VR) technology, has also explored so-called “homuncular flexibility” which describes the capacity for humans to seemingly adapt automatically to the control mechanisms of an avatar with multiple legs, other non-human appendages, or for two users to work in tandem to control a single avatar (Won et. al.). But this article is concerned less with these single or multi-player online environments and the associated concerns over modifying interactive identities. We are principally interested in other automedial modes where the “auto” of autobiography is automated via Artificial Intelligences (AIs) to convincingly mimic human discourse as narrated life-histories.We draw from case studies promoted by the 2017 season of ABC television’s flagship science program, Catalyst, which opened with semi-regular host and biological engineer Dr Jordan Nguyen, proclaiming in earnest, almost religious fervour: “I want to do something that has long been a dream. I want to create a copy of a human. An avatar. And it will have a life of its own in virtual reality.” As the camera followed Nguyen’s rapid pacing across real space he extolled: “Virtual reality, virtual human, they push the limits of the imagination and help us explore the impossible […] I want to create a virtual copy of a person. A digital addition to the family, using technology we have now.”The troubling implications of such rhetoric were stark and the next third of the program did little to allay such techno-scientific misgivings. Directed and produced by David Symonds, with Nguyen credited as co-developer and presenter, the episode “Meet the Avatars” immediately introduced scenarios where “volunteers” entered a pop-up inner city virtual lab, to experience VR for the first time. The volunteers were shown on screen subjected to a range of experimental VR environments designed to elicit fear and/or adverse and disorienting responses such as vertigo, while the presenter and researchers from Sydney University constantly smirked and laughed at their participants’ discomfort. We can only wonder what the ethics process was for both the ABC and university researchers involved in these broadcast experiments. There is little doubt that the participant/s experienced discomfort, if not distress, and that was televised to a national audience. Presenter Nguyen was also shown misleading volunteers on their way to the VR lab, when one asked “You’re not going to chuck us out of a virtual plane are you?” to which Nguyen replied “I don't know what we’re going to do yet,” when it was next shown that they immediately underwent pre-programmed VR exposure scenarios, including a fear of falling exercise from atop a city skyscraper.The sweat-inducing and heart rate-racing exposures to virtual plank walks high above a cityscape, or seeing subjects haptically viewing spiders crawl across their outstretched virtual hands, all elicited predictable responses, showcased as carnivalesque entertainment for the viewing audience. As we will see, this kind of trivialising of a virtual environment’s capacity for immersion belies the serious use of the technology in a range of treatments for posttraumatic stress disorder (see Rizzo and Koenig; Rothbaum, Rizzo and Difede).Figure 1: Nguyen and researchers enjoying themselves as their volunteers undergo VR exposure Defining AutomedialityIn their pioneering 2008 work, Automedialität: Subjektkonstitution in Schrift, Bild und neuen Medien, Jörg Dünne and Christian Moser coined the term “automediality” to problematise the production, application and distribution of autobiographic modes across various media and genres—from literary texts to audiovisual media and from traditional expression to inter/transmedia and remediated formats. The concept of automediality was deployed to counter the conventional critical exclusion of analysis of the materiality/technology used for an autobiographical purpose (Gernalzick). Dünne and Moser proffered a concept of automediality that rejects the binary division of (a) self-expression determining the mediated form or (b) (self)subjectivity being solely produced through the mediating technology. Hence, automediality has been traditionally applied to literary constructs such as autobiography and life-writing, but is now expanding into the digital domain and other “paratextual sites” (Maguire).As Nadja Gernalzick suggests, automediality should “encourage and demand not only a systematics and taxonomy of the constitution of the self in respectively genre-specific ways, but particularly also in medium-specific ways” (227). Emma Maguire has offered a succinct working definition that builds on this requirement to signal the automedial universally, noting it operates asa way of studying auto/biographical texts (of a variety of forms) that take into account how the effects of media shape the kinds of selves that can be represented, and which understands the self not as a preexisting subject that might be distilled into story form but as an entity that is brought into being through the processes of mediation.Sidonie Smith and Julia Watson point to automediality as a methodology, and in doing so emphasize how the telling or mediation of a life actually shapes the kind of story that can be told autobiographically. They state “media cannot simply be conceptualized as ‘tools’ for presenting a preexisting, essential self […] Media technologies do not just transparently present the self. They constitute and expand it” (Smith and Watson “Virtually Me” 77).This distinction is vital for understanding how automediality might be applied to self-expression in virtual domains, including the holographic avatar dreams of Nguyen throughout Catalyst. Although addressing this distinction in relation to online websites, following P. David Marshall’s description of “the proliferation of the public self”, Maguire notes:The same integration of digital spaces and platforms into daily life that is prompting the development of new tools in autobiography studies […] has also given rise to the field of persona studies, which addresses the ways in which individuals engage in practices of self-presentation in order to form commoditised identities that circulate in affective communities.For Maguire, these automedial works operate textually “to construct the authorial self or persona”.An extension to this digital, authorial construction is apparent in the exponential uptake of screen mediated prosumer generated content, whether online or theatrical (Miller). According to Gernalzick, unlike fictional drama films, screen autobiographies more directly enable “experiential temporalities”. Based on Mary Anne Doane’s promotion of the “indexicality” of film/screen representations to connote the real, Gernalzick suggests that despite semiotic theories of the index problematising realism as an index as representation, the film medium is still commonly comprehended as the “imprint of time itself”:Film and the spectator of film are said to be in a continuous present. Because the viewer is aware, however, that the images experienced in or even as presence have been made in the past, the temporality of the so-called filmic present is always ambiguous” (230).When expressed as indexical, automedial works, the intrinsic audio-visual capacities of film and video (as media) far surpass the temporal limitations of print and writing (Gernalzick, 228). One extreme example can be found in an emergent trend of “performance crime” murder and torture videos live-streamed or broadcast after the fact using mobile phone cameras and FaceBook (Bender). In essence, the political economy of the automedial ecology is important to understand in the overall context of self expression and the governance of content exhibition, access, distribution and—where relevant—interaction.So what are the implications for automedial works that employ virtual interfaces and how does this evolving medium inform both the expressive autobiographical mode and audiences subjectivities?Case StudyThe Catalyst program described above strove to shed new light on the potential for emerging technology to capture and create virtual avatars from living participants who (self-)generate autobiographical narratives interactively. Once past the initial gee-wiz journalistic evangelism of VR, the episode turned towards host Nguyen’s stated goal—using contemporary technology to create an autonomous virtual human clone. Nguyen laments that if he could create only one such avatar, his primary choice would be that of his grandfather who died when Nguyen was two years old—a desire rendered impossible. The awkward humour of the plank walk scenario sequence soon gives way as the enthusiastic Nguyen is surprised by his family’s discomfort with the idea of digitally recreating his grandfather.Nguyen next visits a Southern California digital media lab to experience the process by which 3D virtual human avatars are created. Inside a domed array of lights and cameras, in less than one second a life-size 3D avatar is recorded via 6,000 LEDs illuminating his face in 20 different combinations, with eight cameras capturing the exposures from multiple angles, all in ultra high definition. Called the Light Stage (Debevec), it is the same technology used to create a life size, virtual holocaust survivor, Pinchas Gutter (Ziv).We see Nguyen encountering a life-size, high-resolution 2D screen version of Gutter’s avatar. Standing before a microphone, Nguyen asks a series of questions about Gutter’s wartime experiences and life in the concentration camps. The responses are naturalistic and authentic, as are the pauses between questions. The high definition 4K screen is photo-realist but much more convincing in-situ (as an artifact of the Catalyst video camera recording, in some close-ups horizontal lines of transmission appear). According to the project’s curator, David Traum, the real Pinchas Gutter was recorded in 3D as a virtual holograph. He spent 25 hours providing 1,600 responses to a broad range of questions that the curator maintained covered “a lot of what people want to say” (Catalyst).Figure 2: The Museum of Jewish Heritage in Manhattan presented an installation of New Dimensions in Testimony, featuring Pinchas Gutter and Eva SchlossIt is here that the intersection between VR and auto/biography hybridise in complex and potentially difficult ways. It is where the concept of automediality may offer insight into this rapidly emerging phenomenon of creating interactive, hyperreal versions of our selves using VR. These hyperreal VR personae can be questioned and respond in real-time, where interrogators interact either as casual conversers or determined interrogators.The impact on visitors is sobering and palpable. As Nguyen relates at the end of his session, “I just want to give him a hug”. The demonstrable capacity for this avatar to engender a high degree of empathy from its automedial testimony is clear, although as we indicate below, it could simply indicate increased levels of emotion.Regardless, an ongoing concern amongst witnesses, scholars and cultural curators of memorials and museums dedicated to preserving the history of mass violence, and its associated trauma, is that once the lived experience and testimony of survivors passes with that generation the impact of the testimony diminishes (Broderick). New media modes of preserving and promulgating such knowledge in perpetuity are certainly worthy of embracing. As Stephen Smith, the executive director of the USC Shoah Foundation suggests, the technology could extendto people who have survived cancer or catastrophic hurricanes […] from the experiences of soldiers with post-traumatic stress disorder or survivors of sexual abuse, to those of presidents or great teachers. Imagine if a slave could have told her story to her grandchildren? (Ziv)Yet questions remain as to the veracity of these recorded personae. The avatars are created according to a specific agenda and the autobiographical content controlled for explicit editorial purposes. It is unclear what and why material has been excluded. If, for example, during the recorded questioning, the virtual holocaust survivor became mute at recollecting a traumatic memory, cried or sobbed uncontrollably—all natural, understandable and authentic responses given the nature of the testimony—should these genuine and spontaneous emotions be included along with various behavioural ticks such as scratching, shifting about in the seat and other naturalistic movements, to engender a more profound realism?The generation of the photorealist, mimetic avatar—remaining as an interactive persona long after the corporeal, authorial being is gone—reinforces Baudrillard’s concept of simulacra, where a clone exists devoid of its original entity and unable to challenge its automedial discourse. And what if some unscrupulous hacker managed to corrupt and subvert Gutter’s AI so that it responded antithetically to its purpose, by denying the holocaust ever happened? The ethical dilemmas of such a paradigm were explored in the dystopian 2013 film, The Congress, where Robyn Wright plays herself (and her avatar), as an out of work actor who sells off the rights to her digital self. A movie studio exploits her screen persona in perpetuity, enabling audiences to “become” and inhabit her avatar in virtual space while she is limited in the real world from undertaking certain actions due to copyright infringement. The inability of Wright to control her mimetic avatar’s discourse or action means the assumed automedial agency of her virtual self as an immortal, interactive being remains ontologically perplexing.Figure 3: Robyn Wright undergoing a full body photogrammetry to create her VR avatar in The Congress (2013)The various virtual exposures/experiences paraded throughout Catalyst’s “Meet the Avatars” paradoxically recorded and broadcast a range of troubling emotional responses to such immersion. Many participant responses suggest great caution and sensitivity be undertaken before plunging headlong into the new gold rush mentality of virtual reality, augmented reality, and AI affordances. Catalyst depicted their program subjects often responding in discomfort and distress, with some visibly overwhelmed by their encounters and left crying. There is some irony that presenter Ngyuen was himself relying on the conventions of 2D linear television journalism throughout, adopting face-to-camera address in (unconscious) automedial style to excitedly promote the assumed socio-cultural boon such automedial VR avatars will generate.Challenging AuthenticityThere are numerous ethical considerations surrounding the potential for AIs to expand beyond automedial (self-)expression towards photorealist avatars interacting outside of their pre-recorded content. When such systems evolve it may be neigh impossible to discern on screen whether the person you are conversing with is authentic or an indistinguishable, virtual doppelganger. In the future, a variant on the Turning Test may be needed to challenge and identify such hyperreal simulacra. We may be witnessing the precursor to such a dilemma playing out in the arena of audio-only podcasts, with some public intellectuals such as Sam Harris already discussing the legal and ethical problems from technology that can create audio from typed text that convincingly replicate the actual voice of a person by sampling approximately 30 minutes of their original speech (Harris). Such audio manipulation technology will soon be available to anybody with the motivation and relatively minor level of technological ability in order to assume an identity and masquerade as automediated dialogue. However, for the moment, the ability to convincingly alter a real-time computer generated video image of a person remains at the level of scientific innovation.Also of significance is the extent to which the audience reactions to such automediated expressions are indeed empathetic or simply part of the broader range of affective responses that also include direct sympathy as well as emotions such as admiration, surprise, pity, disgust and contempt (see Plantinga). There remains much rhetorical hype surrounding VR as the “ultimate empathy machine” (Milk). Yet the current use of the term “empathy” in VR, AI and automedial forms of communication seems to be principally focused on the capacity for the user-viewer to ameliorate negatively perceived emotions and experiences, whether traumatic or phobic.When considering comments about authenticity here, it is important to be aware of the occasional slippage of technological terminology into the mainstream. For example, the psychological literature does emphasise that patients respond strongly to virtual scenarios, events, and details that appear to be “authentic” (Pertaub, Slater, and Barker). Authentic in this instance implies a resemblance to a corresponding scenario/activity in the real world. This is not simply another word for photorealism, but rather it describes for instance the experimental design of one study in which virtual (AI) audience members in a virtual seminar room designed to treat public speaking anxiety were designed to exhibit “random autonomous behaviours in real-time, such as twitches, blinks, and nods, designed to encourage the illusion of life” (Kwon, Powell and Chalmers 980). The virtual humans in this study are regarded as having greater authenticity than an earlier project on social anxiety (North, North, and Coble) which did not have much visual complexity but did incorporate researcher-triggered audio clips of audience members “laughing, making comments, encouraging the speaker to speak louder or more clearly” (Kwon, Powell, and Chalmers 980). The small movements, randomly cued rather than according to a recognisable pattern, are described by the researchers as creating a sense of authenticity in the VR environment as they seem to correspond to the sorts of random minor movements that actual human audiences in a seminar can be expected to make.Nonetheless, nobody should regard an interaction with these AIs, or the avatar of Gutter, as in any way an encounter with a real person. Rather, the characteristics above function to create a disarming effect and enable the real person-viewer to willingly suspend their disbelief and enter into a pseudo-relationship with the AI; not as if it is an actual relationship, but as if it is a simulation of an actual relationship (USC). Lucy Suchman and colleagues invoke these ideas in an analysis of a YouTube video of some apparently humiliating human interactions with the MIT created AI-robot Mertz. Their analysis contends that, while it may appear on first glance that the humans’ mocking exchange with Mertz are mean-spirited, there is clearly a playfulness and willingness to engage with a form of AI that is essentially continuous with “long-standing assumptions about communication as information processing, and in the robot’s performance evidence for the limits to the mechanical reproduction of interaction as we know it through computational processes” (Suchman, Roberts, and Hird).Thus, it will be important for future work in the area of automediated testimony to consider the extent to which audiences are willing to suspend disbelief and treat the recounted traumatic experience with appropriate gravitas. These questions deserve attention, and not the kind of hype displayed by the current iteration of techno-evangelism. Indeed, some of this resurgent hype has come under scrutiny. From the perspective of VR-based tourism, Janna Thompson has recently argued that “it will never be a substitute for encounters with the real thing” (Thompson). Alyssa K. Loh, for instance, also argues that many of the negatively themed virtual experiences—such as those that drop the viewer into a scene of domestic violence or the location of a terrorist bomb attack—function not to put you in the position of the actual victim but in the position of the general category of domestic violence victim, or bomb attack victim, thus “deindividuating trauma” (Loh).Future work in this area should consider actual audience responses and rely upon mixed-methods research approaches to audience analysis. In an era of alt.truth and Cambridge Analytics personality profiling from social media interaction, automediated communication in the virtual guise of AIs demands further study.ReferencesAnon. “New Dimensions in Testimony.” Museum of Jewish Heritage. 15 Dec. 2017. 19 Apr. 2018 <http://mjhnyc.org/exhibitions/new-dimensions-in-testimony/>.Australian Broadcasting Corporation. “Meet The Avatars.” Catalyst, 15 Aug. 2017.Baudrillard, Jean. “Simulacra and Simulations.” Jean Baudrillard: Selected Writings. Ed. Mark Poster. Stanford: Stanford UP, 1988. 166-184.Bender, Stuart Marshall. Legacies of the Degraded Image in Violent Digital Media. Basingstoke: Palgrave Macmillan, 2017.Broderick, Mick. “Topographies of Trauma, Dark Tourism and World Heritage: Hiroshima’s Genbaku Dome.” Intersections: Gender and Sexuality in Asia and the Pacific. 24 Apr. 2010. 14 Apr. 2018 <http://intersections.anu.edu.au/issue24/broderick.htm>.Debevec, Paul. “The Light Stages and Their Applications to Photoreal Digital Actors.” SIGGRAPH Asia. 2012.Doane, Mary Ann. The Emergence of Cinematic Time: Modernity, Contingency, the Archive. Cambridge: Harvard UP, 2002.Dünne, Jörg, and Christian Moser. “Allgemeine Einleitung: Automedialität”. Automedialität: Subjektkonstitution in Schrift, Bild und neuen Medien. Eds. Jörg Dünne and Christian Moser. München: Wilhelm Fink, 2008. 7-16.Harris, Sam. “Waking Up with Sam Harris #64 – Ask Me Anything.” YouTube, 16 Feb. 2017. 16 Mar. 2018 <https://www.youtube.com/watch?v=gMTuquaAC4w>.Kwon, Joung Huem, John Powell, and Alan Chalmers. “How Level of Realism Influences Anxiety in Virtual Reality Environments for a Job Interview.” International Journal of Human-Computer Studies 71.10 (2013): 978-87.Loh, Alyssa K. "I Feel You." Artforum, Nov. 2017. 10 Apr. 2018 <https://www.artforum.com/print/201709/alyssa-k-loh-on-virtual-reality-and-empathy-71781>.Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self.” Journalism 15.2 (2014): 153-170.Mathews, Karen. “Exhibit Allows Virtual ‘Interviews’ with Holocaust Survivors.” Phys.org Science X Network, 15 Dec. 2017. 18 Apr. 2018 <https://phys.org/news/2017-09-virtual-holocaust-survivors.html>.Maguire, Emma. “Home, About, Shop, Contact: Constructing an Authorial Persona via the Author Website” M/C Journal 17.9 (2014).Miller, Ken. More than Fifteen Minutes of Fame: The Evolution of Screen Performance. Unpublished PhD Thesis. Murdoch University. 2009.Milk, Chris. “Ted: How Virtual Reality Can Create the Ultimate Empathy Machine.” TED Conferences, LLC. 16 Mar. 2015. <https://www.ted.com/talks/chris_milk_how_virtual_reality_can_create_the_ultimate_empathy_machine>.Nakamura, Lisa. “Cyberrace.” Identity Technologies: Constructing the Self Online. Eds. Anna Poletti and Julie Rak. Madison, Wisconsin: U of Wisconsin P, 2014. 42-54.North, Max M., Sarah M. North, and Joseph R Coble. "Effectiveness of Virtual Environment Desensitization in the Treatment of Agoraphobia." International Journal of Virtual Reality 1.2 (1995): 25-34.Pertaub, David-Paul, Mel Slater, and Chris Barker. “An Experiment on Public Speaking Anxiety in Response to Three Different Types of Virtual Audience.” Presence: Teleoperators and Virtual Environments 11.1 (2002): 68-78.Plantinga, Carl. "Emotion and Affect." The Routledge Companion to Philosophy and Film. Eds. Paisley Livingstone and Carl Plantinga. New York: Routledge, 2009. 86-96.Rizzo, A.A., and Sebastian Koenig. “Is Clinical Virtual Reality Ready for Primetime?” Neuropsychology 31.8 (2017): 877-99.Rothbaum, Barbara O., Albert “Skip” Rizzo, and JoAnne Difede. "Virtual Reality Exposure Therapy for Combat-Related Posttraumatic Stress Disorder." Annals of the New York Academy of Sciences 1208.1 (2010): 126-32.Smith, Sidonie, and Julia Watson. Reading Autobiography: A Guide to Interpreting Life Narratives. 2nd ed. Minneapolis: U of Minnesota P, 2010.———. “Virtually Me: A Toolbox about Online Self-Presentation.” Identity Technologies: Constructing the Self Online. Eds. Anna Poletti and Julie Rak. Madison: U of Wisconsin P, 2014. 70-95.Suchman, Lucy, Celia Roberts, and Myra J. Hird. "Subject Objects." Feminist Theory 12.2 (2011): 119-45.Thompson, Janna. "Why Virtual Reality Cannot Match the Real Thing." The Conversation, 14 Mar. 2018. 10 Apr. 2018 <http://theconversation.com/why-virtual-reality-cannot-match-the-real-thing-92035>.USC. "Skip Rizzo on Medical Virtual Reality: USC Global Conference 2014." YouTube, 28 Oct. 2014. 2 Apr. 2018 <https://www.youtube.com/watch?v=PdFge2XgDa8>.Won, Andrea Stevenson, Jeremy Bailenson, Jimmy Lee, and Jaron Lanier. "Homuncular Flexibility in Virtual Reality." Journal of Computer-Mediated Communication 20.3 (2015): 241-59.Ziv, Stan. “How Technology Is Keeping Holocaust Survivor Stories Alive Forever”. Newsweek, 18 Oct. 2017. 19 Apr. 2018 <http://www.newsweek.com/2017/10/27/how-technology-keeping-holocaust-survivor-stories-alive-forever-687946.html>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography