Academic literature on the topic 'Petroleum industry and trade – military aspects – history'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Petroleum industry and trade – military aspects – history.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Petroleum industry and trade – military aspects – history"

1

Hilson, Mary. "Labour Politics in a Naval Dockyard: The Case of Karlskrona, Sweden c. 1880–1925." International Review of Social History 46, no. 3 (November 26, 2001): 341–69. http://dx.doi.org/10.1017/s0020859001000232.

Full text
Abstract:
Naval dockyards have been largely neglected by labour historians, a surprising omission given their importance as industrial workplaces with a distinct culture of labour and labour relations. This article considers labour politics in Karlskrona dockyard, Sweden, in the light of a growing body of research on work and labour relations in the British and other European dockyards. Evidence from Karlskrona suggests that, rather than being repressed by military discipline or bought off by generous state benefits, the dockyard workforce drew on aspects of its unique relationship with the national state to improve working conditions. Particular attention is given to the role of the dockyard trade union in creating a sense of workforce identity as state employees. This is in contrast to the British dockyards where unionism was founded on the rigid division of labour in the shipbuilding industry.
APA, Harvard, Vancouver, ISO, and other styles
2

Еldin, Мikhail А. "The Paradigm of the Byzantine Economic Order-Taxis: Historical and Philosophical Dimension." Economic History 16, no. 3 (November 30, 2019): 229–40. http://dx.doi.org/10.15507/2409-630x.050.016.202003.229-240.

Full text
Abstract:
Introduction. The article deals with one of the key issues of the Eurasian economic order related to the Byzantine Empire, which lasted for more than a thousand years (395–1453) and experienced periods of growth and decline, in which military expansion was replaced by crises and internal upheavals. The Byzantine state has always been under pressure from outside, but it has learned to survive among rivals and enemies. The Power of Byzantium in many respects ahead of its era, was not only the largest feudal entity of the Middle Ages, but also along with this centralized state, which had a powerful system of administrative management, which played an important role in regulating of the economic order. Materials and Methods. Current methodological approaches based on the principle of spiritual understanding of the modern world picture, as well as the degree of theoretical elaboration at the present stage of development of society the problem of forming the mentality of a particular nation, studying cultural phenomena in a historical context contribute, we believe, the disclosure of the “conceptual entity” the Byzantine heritage. Results. The analysis of sources and materials that consider various aspects of scientific works of Byzantine taxonomists on the economic structure. The characteristic features of the economic policy of the Byzantine Empire are revealed and the conclusion about the significance of the Byzantine experience for regulating the economic order in modern States is substantiated. Discussion and Conclusion. The Byzantine state, which actively intervened in the regulation of the economy, received a relatively stable economic order, which allowed it not only to maintain its well-being throughout the centuries of the Empire’s history, but also to cope with crisis situations. The variety of forms of farming in early Byzantium was reflected in the effective interaction of commodity production developed in cities and the economic system of rural settlements. The flourishing of trade and industry were mainly characteristic of coastal cities, whose economic expansion only slightly affected the agricultural sector of the Empire, while there was a partial taxonometrization of the economy. Despite short periods of weakening trade priorities of Byzantium, we can not talk about the economic disaster of the Empire, because it had at its disposal the economic reserves of the provinces. The state has repeatedly experienced shocks accompanied by crises, but has maintained sufficient viability, subsequently reviving and returning to its previous positions.
APA, Harvard, Vancouver, ISO, and other styles
3

Drymalovska, Khrystyna, and Ksyeniya Sinyelnikova. "DEVELOPMENT OF THE AGRICULTURAL SECTOR OF UKRAINE UNDER MARTIAL LAW." Market Infrastructure, no. 78 (2024). http://dx.doi.org/10.32782/infrastruct78-1.

Full text
Abstract:
This scientific work is devoted to the analysis and assessment of the impact of the military conflict on the development of the agro-industrial complex of Ukraine. In the conditions of martial law, which developed in a certain period of the country's history, the agro-industrial sector became a sphere of special interest and an important aspect problem for the state. The work considered the impact of the military conflict on agriculture, the food industry, trade and the economy in general. The study includes an analysis of changes in the production of agricultural products, the supply of food to the domestic market and exports. The impact of the war on investments in the agricultural sector and structural changes in the industry is also considered. The work analyzes how state and industry strategies are aimed at ensuring the stability and development of the agro-industrial complex in the conditions of a military conflict. Special attention is paid to state agricultural support programs and mechanisms for regulating the price situation for food products. The scientific work highlights the results of research and analysis of the state of affairs in the field of agro-industrial complex, which are relevant for determining the strategic directions of development in the conditions of a military conflict. This work serves as a source of information for specialists, researchers and decision-makers who are engaged in the analysis and development of the agro-industrial sector of Ukraine in the unstable conditions of martial law. Strategies to ensure food security under martial law require a comprehensive approach, including crop diversification, the development of efficient storage and transportation systems, and support for small farmers. Opportunities for the development of the agricultural sector under martial law include modernization of technologies, diversification of production, and active investment. The best way to ensure the support and development of Ukraine's agricultural sector in the context of military operations is a systematic approach that takes into account all aspects of production, social security and sustainable development of the industry.
APA, Harvard, Vancouver, ISO, and other styles
4

King, Emerald L., and Denise N. Rall. "Re-imagining the Empire of Japan through Japanese Schoolboy Uniforms." M/C Journal 18, no. 6 (March 7, 2016). http://dx.doi.org/10.5204/mcj.1041.

Full text
Abstract:
Introduction“From every kind of man obedience I expect; I’m the Emperor of Japan.” (“Miyasama,” from Gilbert and Sullivan’s musical The Mikado, 1885)This commentary is facilitated by—surprisingly resilient—oriental stereotypes of an imagined Japan (think of Oscar Wilde’s assertion, in 1889, that Japan was a European invention). During the Victorian era, in Britain, there was a craze for all things oriental, particularly ceramics and “there was a craze for all things Japanese and no middle class drawing room was without its Japanese fan or teapot.“ (V&A Victorian). These pastoral depictions of the ‘oriental life’ included the figures of men and women in oriental garb, with fans, stilt shoes, kimono-like robes, and appropriate headdresses, engaging in garden-based activities, especially tea ceremony variations (Landow). In fact, tea itself, and the idea of a ceremony of serving it, had taken up a central role, even an obsession in middle- and upper-class Victorian life. Similarly, landscapes with wild seas, rugged rocks and stunted pines, wizened monks, pagodas and temples, and particular fauna and flora (cranes and other birds flying through clouds of peonies, cherry blossoms and chrysanthemums) were very popular motifs (see Martin and Koda). Rather than authenticity, these designs heightened the Western-based romantic stereotypes associated with a stylised form of Japanese life, conducted sedately under rule of the Japanese Imperial Court. In reality, prior to the Meiji period (1868–1912), the Emperor was largely removed from everyday concerns, residing as an isolated, holy figure in Kyoto, the traditional capital of Japan. Japan was instead ruled from Edo (modern day Tokyo) led by the Shogun and his generals, according to a strict Confucian influenced code (see Keene). In Japan, as elsewhere, the presence of feudal-style governance includes policies that determine much of everyday life, including restrictions on clothing (Rall 169). The Samurai code was no different, and included a series of protocols that restricted rank, movement, behaviour, and clothing. As Vincent has noted in the case of the ‘lace tax’ in Great Britain, these restrictions were designed to punish those who seek to penetrate the upper classes through their costume (28-30). In Japan, pre-Meiji sumptuary laws, for example, restricted the use of gold, and prohibited the use of a certain shade of red by merchant classes (V&A Kimono).Therefore, in the governance of pre-globalised societies, the importance of clothing and textile is evident; as Jones and Stallybrass comment: We need to understand the antimatedness of clothes, their ability to “pick up” subjects, to mould and shape them both physically and socially—to constitute subjects through their power as material memories […] Clothing is a worn world: a world of social relations put upon the wearer’s body. (2-3, emphasis added)The significant re-imagining of Japanese cultural and national identities are explored here through the cataclysmic impact of Western ideologies on Japanese cultural traditions. There are many ways to examine how indigenous cultures respond to European, British, or American (hereafter Western) influences, particularly in times of conflict (Wilk). Western ideology arrived in Japan after a long period of isolation (during which time Japan’s only contact was with Dutch traders) through the threat of military hostility and war. It is after this outside threat was realised that Japan’s adoption of military and industrial practices begins. The re-imagining of their national identity took many forms, and the inclusion of a Western-style military costuming as a schoolboy uniform became a highly visible indicator of Japan’s mission to protect its sovereign integrity. A brief history of Japan’s rise from a collection of isolated feudal states to a unified military power, in not only the Asian Pacific region but globally, demonstrates the speed at which they adopted the Western mode of warfare. Gunboats on Japan’s ShorelinesJapan was forcefully opened to the West in the 1850s by America under threat of First Name Perry’s ‘gunboat diplomacy’ (Hillsborough 7-8). Following this, Japan underwent a rapid period of modernisation, and an upsurge in nationalism and military expansion that was driven by a desire to catch up to the European powers present in the Pacific. Noted by Ian Ferguson in Civilization: The West and the Rest, Unsure, the Japanese decided […] to copy everything […] Japanese institutions were refashioned on Western models. The army drilled like Germans; the navy sailed like Britons. An American-style system of state elementary and middle schools was also introduced. (221, emphasis added)This was nothing short of a wide-scale reorganisation of Japan’s entire social structure and governance. Under the Emperor Meiji, who wrested power from the Shogunate and reclaimed it for the Imperial head, Japan steamed into an industrial revolution, achieving in a matter of years what had taken Europe over a century.Japan quickly became a major player-elect on the world stage. However, as an island nation, Japan lacked the essentials of both coal and iron with which to fashion not only industrial machinery but also military equipment, the machinery of war. In 1875 Japan forced Korea to open itself to foreign (read: Japanese) trade. In the same treaty, Korea was recognised as a sovereign nation, separate from Qing China (Tucker 1461). The necessity for raw materials then led to the Sino-Japanese War (1894–95), a conflict between Japan and China that marked the emergence of Japan as a major world power. The Korean Peninsula had long been China’s most important client state, but its strategic location adjacent to the Japanese archipelago, and its natural resources of coal and iron, attracted Japan’s interest. Later, the Russo-Japanese War (1904–05), allowed a victorious Japan to force Russia to abandon its expansionist policy in the Far East, becoming the first Asian power in modern times to defeat a European power. The Russo-Japanese War developed out of the rivalry between Russia and Japan for dominance in Korea and Manchuria, again in the struggle for natural resources (Tucker 1534-46).Japan’s victories, together with the county’s drive for resources, meant that Japan could now determine its role within the Asia-Pacific sphere of influence. As Japan’s military, and their adoption of Westernised combat, proved effective in maintaining national integrity, other social institutions also looked to the West (Ferguson 221). In an ironic twist—while Victorian and Continental fashion was busy adopting the exotic, oriental look (Martin and Koda)—the kimono, along with other essentials of Japanese fashions, were rapidly altered (both literally and figuratively) to suit new, warlike ideology. It should be noted that kimono literally means ‘things that you wear’ and which, prior to exposure to Western fashions, signified all worn clothing (Dalby 65-119). “Wearing Things” in Westernised JapanAs Japan modernised during the late 1800s the kimono was positioned as symbolising barbaric, pre-modern, ‘oriental’ Japan. Indeed, on 17 January 1887 the Meiji Empress issued a memorandum on the subject of women’s clothing in Japan: “She [the Empress] believed that western clothes were in fact closer to the dress of women in ancient Japan than the kimonos currently worn and urged that they be adopted as the standard clothes of the reign” (Keene 404). The resemblance between Western skirts and blouses and the simple skirt and separate top that had been worn in ancient times by a people descended from the sun goddess, Amaterasu wo mikami, was used to give authority and cultural authenticity to Japan’s modernisation projects. The Imperial Court, with its newly ennobled European style aristocrats, exchanged kimono silks for Victorian finery, and samurai armour for military pomp and splendour (Figure 1).Figure 1: The Meiji Emperor, Empress and Crown Prince resplendent in European fashions on an outing to Asukayama Park. Illustration: Toyohara Chikanobu, circa 1890.It is argued here that the function of a uniform is to prepare the body for service. Maids and butlers, nurses and courtesans, doctors, policemen, and soldiers are all distinguished by their garb. Prudence Black states: “as a technology, uniforms shape and code the body so they become a unit that belongs to a collective whole” (93). The requirement to discipline bodies through clothing, particularly through uniforms, is well documented (see Craik, Peoples, and Foucault). The need to distinguish enemies from allies on the battlefield requires adherence to a set of defined protocols, as referenced in military fashion compendiums (see Molloy). While the postcolonial adoption of Western-based clothing reflects a new form of subservience (Rall, Kuechler and Miller), in Japan, the indigenous garments were clearly designed in the interests of ideological allegiance. To understand the Japanese sartorial traditions, the kimono itself must be read as providing a strong disciplinary element. The traditional garment is designed to represent an upright and unbending column—where two meters of under bindings are used to discipline the body into shape are then topped with a further four meters of a stiffened silk obi wrapped around the waist and lower chest. To dress formally in such a garment requires helpers (see Dalby). The kimono both constructs and confines the women who wear it, and presses them into their roles as dutiful, upper-class daughters (see Craik). From the 1890s through to the 1930s, when Japan again enters a period of militarism, the myth of the kimono again changes as it is integrated into the build-up towards World War II.Decades later, when Japan re-established itself as a global economic power in the 1970s and 1980s, the kimono was re-authenticated as Japan’s ‘traditional’ garment. This time it was not the myth of a people descended from solar deities that was on display, but that of samurai strength and propriety for men, alongside an exaggerated femininity for women, invoking a powerful vision of Japanese sartorial tradition. This reworking of the kimono was only possible as the garment was already contained within the framework of Confucian family duty. However, in the lead up to World War II, Japanese military advancement demanded of its people soldiers that could win European-style wars. The quickest solution was to copy the military acumen and strategies of global warfare, and the costumes of the soldiery and seamen of Europe, including Great Britain (Ferguson). It was also acknowledged that soldiers were ‘made not born’ so the Japanese educational system was re-vamped to emulate those of its military rivals (McVeigh). It was in the uptake of schoolboy uniforms that this re-imagining of Japanese imperial strength took place.The Japanese Schoolboy UniformCentral to their rapid modernisation, Japan adopted a constitutional system of education that borrowed from American and French models (Tipton 68-69). The government viewed education as a “primary means of developing a sense of nation,” and at its core, was the imperial authorities’ obsession with defining “Japan and Japaneseness” (Tipton 68-69). Numerous reforms eventually saw, after an abolition of fees, nearly 100% attendance by both boys and girls, despite a lingering mind-set that educating women was “a waste of time” (Tipton 68-69). A boys’ uniform based on the French and Prussian military uniforms of the 1860s and 1870s respectively (Kinsella 217), was adopted in 1879 (McVeigh 47). This jacket, initially with Prussian cape and cap, consists of a square body, standing mandarin style collar and a buttoned front. It was through these education reforms, as visually symbolised by the adoption of military style school uniforms, that citizen making, education, and military training became interrelated aspects of Meiji modernisation (Kinsella 217). Known as the gakuran (gaku: to study; ran: meaning both orchid, and a pun on Horanda, meaning Holland, the only Western country with trading relations in pre-Meiji Japan), these jackets were a symbol of education, indicating European knowledge, power and influence and came to reflect all things European in Meiji Japan. By adopting these jackets two objectives were realised:through the magical power of imitation, Japan would, by adopting the clothing of the West, naturally rise in military power; and boys were uniformed to become not only educated as quasi-Europeans, but as fighting soldiers and sons (suns) of the nation.The gakuran jacket was first popularised by state-run schools, however, in the century and a half that the garment has been in use it has come to symbolise young Japanese masculinity as showcased in campus films, anime, manga, computer games, and as fashion is the preeminent garment for boybands and Japanese hipsters.While the gakuran is central to the rise of global militarism in Japan (McVeigh 51-53), the jacket would go on to form the basis of the Sun Yat Sen and Mao Suits as symbols of revolutionary China (see McVeigh). Supposedly, Sun Yat Sen saw the schoolboy jacket in Japan as a utilitarian garment and adopted it with a turn down collar (Cumming et al.). For Sun Yat Sen, the gakuran was the perfect mix of civilian (school boy) and military (the garment’s Prussian heritage) allowing him to walk a middle path between the demands of both. Furthermore, the garment allowed Sun to navigate between Western style suits and old-fashioned Qing dynasty styles (Gerth 116); one was associated with the imperialism of the National Products Movement, while the other represented the corruption of the old dynasty. In this way, the gakuran was further politicised from a national (Japanese) symbol to a global one. While military uniforms have always been political garments, in the late 1800s and early 1900s, as the world was rocked by revolutions and war, civilian clothing also became a means of expressing political ideals (McVeigh 48-49). Note that Mahatma Ghandi’s clothing choices also evolved from wholly Western styles to traditional and emphasised domestic products (Gerth 116).Mao adopted this style circa 1927, further defining the style when he came to power by adding elements from the trousers, tunics, and black cotton shoes worn by peasants. The suit was further codified during the 1960s, reaching its height in the Cultural Revolution. While the gakuran has always been a scholarly black (see Figure 2), subtle differences in the colour palette differentiated the Chinese population—peasants and workers donned indigo blue Mao jackets, while the People’s Liberation Army Soldiers donned khaki green. This limited colour scheme somewhat paradoxically ensured that subtle hierarchical differences were maintained even whilst advocating egalitarian ideals (Davis 522). Both the Sun Yat Sen suit and the Mao jacket represented the rejection of bourgeois (Western) norms that objectified the female form in favour of a uniform society. Neo-Maoism and Mao fever of the early 1990s saw the Mao suit emerge again as a desirable piece of iconic/ironic youth fashion. Figure 2: An example of Gakuran uniform next to the girl’s equivalent on display at Ichikawa Gakuen School (Japan). Photo: Emerald King, 2015.There is a clear and vital link between the influence of the Prussian style Japanese schoolboy uniform on the later creation of the Mao jacket—that of the uniform as an integral piece of worn propaganda (Atkins).For Japan, the rapid deployment of new military and industrial technologies, as well as a sartorial need to present her leaders as modern (read: Western) demanded the adoption of European-style uniforms. The Imperial family had always been removed from Samurai battlefields, so the adoption of Western military costume allowed Japan’s rulers to present a uniform face to other global powers. When Japan found itself in conflict in the Asia Pacific Region, without an organised military, the first requirement was to completely reorganise their system of warfare from a feudal base and to train up national servicemen. Within an American-style compulsory education system, the European-based curriculum included training in mathematics, engineering and military history, as young Britons had for generations begun their education in Greek and Latin, with the study of Ancient Greek and Roman wars (Bantock). It is only in the classroom that ideological change on a mass scale can take place (Reference Please), a lesson not missed by later leaders such as Mao Zedong.ConclusionIn the 1880s, the Japanese leaders established their position in global politics by adopting clothing and practices from the West (Europeans, Britons, and Americans) in order to quickly re-shape their country’s educational system and military establishment. The prevailing military costume from foreign cultures not only disciplined their adopted European bodies, they enforced a new regime through dress (Rall 157-174). For boys, the gakuran symbolised the unity of education and militarism as central to Japanese masculinity. Wearing a uniform, as many authors suggest, furthers compliance (Craik, Nagasawa Kaiser and Hutton, and McVeigh). As conscription became a part of Japanese reality in World War II, the schoolboys just swapped their military-inspired school uniforms for genuine military garments.Re-imagining a Japanese schoolboy uniform from a European military costume might suit ideological purposes (Atkins), but there is more. The gakuran, as a uniform based on a close, but not fitted jacket, was the product of a process of advanced industrialisation in the garment-making industry also taking place in the 1800s:Between 1810 and 1830, technical calibrations invented by tailors working at the very highest level of the craft [in Britain] eventually made it possible for hundreds of suits to be cut up and made in advance [...] and the ready-to-wear idea was put into practice for men’s clothes […] originally for uniforms for the War of 1812. (Hollander 31) In this way, industrialisation became a means to mass production, which furthered militarisation, “the uniform is thus the clothing of the modern disciplinary society” (Black 102). There is a perfect resonance between Japan’s appetite for a modern military and their rise to an industrialised society, and their conquests in Asia Pacific supplied the necessary material resources that made such a rapid deployment possible. The Japanese schoolboy uniform was an integral part of the process of both industrialisation and militarisation, which instilled in the wearer a social role required by modern Japanese society in its rise for global power. Garments are never just clothing, but offer a “world of social relations put upon the wearer’s body” (Jones and Stallybrass 3-4).Today, both the Japanese kimono and the Japanese schoolboy uniform continue to interact with, and interrogate, global fashions as contemporary designers continue to call on the tropes of ‘military chic’ (Tonchi) and Japanese-inspired clothing (Kawamura). References Atkins, Jaqueline. Wearing Propaganda: Textiles on the Home Front in Japan, Britain, and the United States. Princeton: Yale UP, 2005.Bantock, Geoffrey Herman. Culture, Industrialisation and Education. London: Routledge & K. Paul, 1968.Black, Prudence. “The Discipline of Appearance: Military Style and Australian Flight Hostess Uniforms 1930–1964.” Fashion & War in Popular Culture. Ed. Denise N. Rall. Bristol: Intellect/U Chicago P, 2014. 91-106.Craik, Jenifer. Uniforms Exposed: From Conformity to Transgression. Oxford: Berg, 2005.Cumming, Valerie, Cecil Williet Cunnington, and Phillis Emily Cunnington. “Mao Style.” The Dictionary of Fashion History. Eds. Valerie Cumming, Cecil Williet Cunnington, and Phillis Emily Cunnington. Oxford: Berg, 2010.Dalby, Liza, ed. Kimono: Fashioning Culture. London: Vintage, 2001.Davis, Edward L., ed. Encyclopaedia of Contemporary Chinese Culture. London: Routledge, 2005.Dees, Jan. Taisho Kimono: Speaking of Past and Present. Milan: Skira, 2009.Ferguson, N. Civilization: The West and the Rest. London: Penguin, 2011.Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. London: Penguin, 1997. Gerth, Karl. China Made: Consumer Culture and the Creation of the Nation, Cambridge: East Asian Harvard Monograph 224, 2003.Gilbert, W.S., and Arthur Sullivan. The Mikado or, The Town of Titipu. 1885. 16 Nov. 2015 ‹http://math.boisestate.edu/gas/mikado/mk_lib.pdf›. Hillsborough, Romulus. Samurai Revolution: The Dawn of Modern Japan Seen through the Eyes of the Shogun's Last Samurai. Vermont: Tuttle, 2014.Jones, Anne R., and Peter Stallybrass, Renaissance Clothing and the Materials of Memory. Cambridge: Cambridge UP, 2000.Keene, Donald. Emperor of Japan: Meiji and His World, 1852-1912. New York: Columbia UP, 2002.King, Emerald L. “Schoolboys and Kimono Ladies.” Presentation to the Un-Thinking Asian Migrations Conference, University of Otago, Dunedin, New Zealand, 24-26 Aug. 2014. Kinsella, Sharon. “What’s Behind the Fetishism of Japanese School Uniforms?” Fashion Theory 6.2 (2002): 215-37. Kuechler, Susanne, and Daniel Miller, eds. Clothing as Material Culture. Oxford: Berg, 2005.Landow, George P. “Liberty and the Evolution of the Liberty Style.” 22 Aug. 2010. ‹http://www.victorianweb.org/art/design/liberty/lstyle.html›.Martin, Richard, and Harold Koda. Orientalism: Vision of the East in Western Dress. New York: Metropolitan Museum of Art, 1994.McVeigh, Brian J. Wearing Ideology: State, Schooling, and Self-Presentation in Japan. Oxford: Berg, 2000.Molloy, John. Military Fashion: A Comparative History of the Uniforms of the Great Armies from the 17th Century to the First World War. New York: Putnam, 1972.Peoples, Sharon. “Embodying the Military: Uniforms.” Critical Studies in Men’s Fashion 1.1 (2014): 7-21.Rall, Denise N. “Costume & Conquest: A Proximity Framework for Post-War Impacts on Clothing and Textile Art.” Fashion & War in Popular Culture, ed. Denise N. Rall. Bristol: Intellect/U Chicago P, 2014. 157-74. Tipton, Elise K. Modern Japan: A Social and Political History. 3rd ed. London: Routledge, 2016.Tucker, Spencer C., ed. A Global Chronology of Conflict: From the Ancient World to the Modern Middle East. Santa Barbara, CA: ABC-CLIO, 2013.V&A Kimono. Victoria and Albert Museum. “A History of the Kimono.” 2004. 2 Oct. 2015 ‹http://www.vam.ac.uk/content/articles/h/a-history-of-the-kimono/›.V&A Victorian. Victoria and Albert Museum. “The Victorian Vision of China and Japan.” 10 Nov. 2015 ‹http://www.vam.ac.uk/content/articles/t/the-victorian-vision-of-china-and-japan/›.Vincent, Susan J. The Anatomy of Fashion: Dressing the Body from the Renaissance to Today. Berg: Oxford, 2009.Wilde, Oscar. “The Decay of Lying.” 1889. In Intentions New York: Berentano’s 1905. 16 Nov. 2015 ‹http://virgil.org/dswo/courses/novel/wilde-lying.pdf›. Wilk, Richard. “Consumer Goods as a Dialogue about Development.” Cultural History 7 (1990) 79-100.
APA, Harvard, Vancouver, ISO, and other styles
5

Caluya, Gilbert. "The Architectural Nervous System." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2689.

Full text
Abstract:
If the home is traditionally considered to be a space of safety associated with the warm and cosy feeling of the familial hearth, it is also continuously portrayed as a space under threat from the outside from which we must secure ourselves and our families. Securing the home entails a series of material, discursive and performative strategies, a host of precautionary measures aimed at regulating and ultimately producing security. When I was eleven my family returned home from the local fruit markets to find our house had been ransacked. Clothes were strewn across the floor, electrical appliances were missing and my parents’ collection of jewellery – wedding rings and heirlooms – had been stolen. Few things remained untouched and the very thought of someone else’s hands going through our personal belongings made our home feel tainted. My parents were understandably distraught. As Filipino immigrants to Australia the heirlooms were not only expensive assets from both sides of my family, but also signifiers of our homeland. Added to their despair was the fact that this was our first house – we had rented prior to that. During the police interviews, we discovered that our area, Sydney’s Western suburbs, was considered ‘high-risk’ and we were advised to install security. In their panic my parents began securing their home. Grills were installed on every window. Each external wooden door was reinforced by a metal security door. Movement detectors were installed at the front of the house, which were set to blind intruders with floodlights. Even if an intruder could enter the back through a window a metal grill security door was waiting between the backroom and the kitchen to stop them from getting to our bedrooms. In short, through a series of transformations our house was made into a residential fortress. Yet home security had its own dangers. A series of rules and regulations were drilled into me ‘in case of an emergency’: know where your keys are in case of a fire so that you can get out; remember the phone numbers for an emergency and the work numbers of your parents; never let a stranger into the house; and if you need to speak to a stranger only open the inside door but leave the security screen locked. Thus, for my Filipino-migrant family in the 1990s, a whole series of defensive behaviours and preventative strategies were produced and disseminated inside and around the home to regulate security risks. Such “local knowledges” were used to reinforce the architectural manifestations of security at the same time that they were a response to the invasion of security systems into our house that created a new set of potential dangers. This article highlights “the interplay of material and symbolic geographies of home” (Blunt and Varley 4), focusing on the relation between urban fears circulating around and within the home and the spatial practices used to negotiate such fears. In exploring home security systems it extends the exemplary analysis of home technologies already begun in Lynn Spigel’s reading of the ‘smart home’ (381-408). In a similar vein, David Morley’s analysis of mediated domesticity shows how communications technology has reconfigured the inside and outside to the extent that television actually challenges the physical boundary that “protects the privacy and solidarity of the home from the flux and threat of the outside world” (87). Television here serves as a passage in which the threat of the outside is reframed as news or entertainment for family viewing. I take this as a point of departure to consider the ways that this mediated fear unfolds in the technology of our homes. Following Brian Massumi, I read the home as “a node in a circulatory network of many dimensions (each corresponding to a technology of transmission)” (85). For Massumi, the home is an event-space at the crossroads of media technologies and political technologies. “In spite of the locks on the door, the event-space of the home must be seen as one characterized by a very loose regime of passage” (85). The ‘locked door’ is not only a boundary marker that defines the inside from the outside but another technology that leads us outside the home into other domains of inquiry: the proliferation of security technologies and the mundane, fearful intimacies of the home. In this context, we should heed Iris Marion Young’s injunction to feminist critics that the home does provide some positives including a sense of privacy and the space to build relationships and identities. Yet, as Colomina argues, the traditional domestic ideal “can only be produced by engaging the home in combat” (20). If, as Colomina’s comment suggests, ontological security is at least partially dependent on physical security, then this article explores the ontological effects of our home security systems. Houses at War: Targeting the Family As Beatriz Colomina reminds us, in times of war we leave our homelands to do battle on the front line, but battle lines are also being drawn in our homes. Drawing inspiration from Virilio’s claim that contemporary war takes place without fighting, Colomina’s article ‘Domesticity at War’ contemplates the domestic interior as a “battlefield” (15). The house, she writes, is “a mechanism within a war where the differences between defense [sic] and attack have become blurred” (17). According to the Home Security Precautions, New South Wales, October 1999 report conducted by the Australian Bureau of Statistics, 47% of NSW dwellings were ‘secure’ (meaning that they either had a burglar alarm, or all entry points were secured or they were inside a security block) while only 9% of NSW households had no home security devices present (Smith 3). In a similar report for Western Australia conducted in October 2004, an estimated 71% of WA households had window security of some sort (screens, locks or shutters) while 67% had deadlocks on at least one external door (4). An estimated 27% had a security alarm installed while almost half (49%) had sensor lights (Hubbard 4-5). This growing sense of insecurity means big business for those selling security products and services. By the end of June 1999, there were 1,714 businesses in Australia’s security services industry generating $1,395 million of income during 1998-99 financial year (McLennan 3; see also Macken). This survey did not include locksmith services or the companies dealing with alarm manufacturing, wholesaling or installing. While Colomina’s article focuses on the “war with weather” and the attempts to control environmental conditions inside the home through what she calls “counterdomesticity” (20), her conceptualisation of the house as a “military weapon” (17) provides a useful tool for thinking the relation between the home, architecture and security. Conceiving of the house as a military weapon might seem like a stretch, but we should recall that the rhetoric of war has already leaked into the everyday. One hears of the ‘war on drugs’ and the ‘war on crime’ in the media. ‘War’ is the everyday condition of our urban jungles (see also Diken and Lausten) and in order to survive, let alone feel secure, one must be able to defend one’s family and home. Take, for example, Signal Security’s website. One finds a panel on the left-hand side of the screen to all webpages devoted to “Residential Products”. Two circular images are used in the panel with one photograph overlapping the other. In the top circle, a white nuclear family (stereotypical mum, dad and two kids), dressed in pristine white clothing bare their white teeth to the internet surfer. Underneath this photo is another photograph in which an arm clad in a black leather jacket emerges through a smashed window. In the foreground a black-gloved hand manipulates a lock, while a black balaclava masks an unrecognisable face through the broken glass. The effect of their proximity produces a violent juxtaposition in which the burglar visually intrudes on the family’s domestic bliss. The panel stages a struggle between white and black, good and bad, family and individual, security and insecurity, recognisability and unidentifiability. It thus codifies the loving, knowable family as the domestic space of security against the selfish, unidentifiable intruder (presumed not to have a family) as the primary reason for insecurity in the family home – and no doubt to inspire the consumption of security products. Advertisements of security products thus articulate the family home as a fragile innocence constantly vulnerable from the outside. From a feminist perspective, this image of the family goes against the findings of the National Homicide Monitoring Program, which shows that 57% of the women killed in Australia between 2004 and 2005 were killed by an intimate partner while 17% were killed by a family member (Mouzos and Houliaras 20). If, on the one hand, the family home is targeted by criminals, on the other, it has emerged as a primary site for security advertising eager to exploit the growing sense of insecurity – the family as a target market. The military concepts of ‘target’ and ‘targeting’ have shifted into the benign discourse of strategic advertising. As Dora Epstein writes, “We arm our buildings to arm ourselves from the intrusion of a public fluidity, and thus our buildings, our architectures of fortification, send a very clear message: ‘avoid this place or protect yourself’” (1997: 139). Epstein’s reference to ‘architectures of fortification’ reminds us that the desire to create security through the built environment has a long history. Nan Ellin has argued that fear’s physical manifestation can be found in the formation of towns from antiquity to the Renaissance. In this sense, towns and cities are always already a response to the fear of foreign invaders (Ellin 13; see also Diken and Lausten 291). This fear of the outsider is most obviously manifested in the creation of physical walls. Yet fortification is also an effect of spatial allusions produced by the configuration of space, as exemplified in Fiske, Hodge and Turner’s semiotic reading of a suburban Australian display home without a fence. While the lack of a fence might suggest openness, they suggest that the manicured lawn is flat so “that eyes can pass easily over it – and smooth – so that feet will not presume to” (30). Since the front garden is best viewed from the street it is clearly a message for the outside, but it also signifies “private property” (30). Space is both organised and lived, in such a way that it becomes a medium of communication to passers-by and would-be intruders. What emerges in this semiotic reading is a way of thinking about space as defensible, as organised in a way that space can begin to defend itself. The Problematic of Defensible Space The incorporation of military architecture into civil architecture is most evident in home security. By security I mean the material systems (from locks to electronic alarms) and precautionary practices (locking the door) used to protect spaces, both of which are enabled by a way of imagining space in terms of risk and vulnerability. I read Oscar Newman’s 1972 Defensible Space as outlining the problematic of spatial security. Indeed, it was around that period that the problematic of crime prevention through urban design received increasing attention in Western architectural discourse (see Jeffery). Newman’s book examines how spaces can be used to reinforce human control over residential environments, producing what he calls ‘defensible space.’ In Newman’s definition, defensible space is a model for residential environments which inhibits crime by creating the physical expression of a social fabric that defends itself. All the different elements which combine to make a defensible space have a common goal – an environment in which latent territoriality and sense of community in the inhabitants can be translated into responsibility for ensuring a safe, productive, and well-maintained living space (3). Through clever design space begins to defend itself. I read Newman’s book as presenting the contemporary problematic of spatialised security: how to structure space so as to increase control; how to organise architecture so as to foster territorialism; how to encourage territorial control through amplifying surveillance. The production of defensible space entails moving away from what he calls the ‘compositional approach’ to architecture, which sees buildings as separate from their environments, and the ‘organic approach’ to architecture, in which the building and its grounds are organically interrelated (Newman 60). In this approach Newman proposes a number of changes to space: firstly, spaces need to be multiplied (one no longer has a simple public/private binary, but also semi-private and semi-public spaces); secondly, these spaces must be hierarchised (moving from public to semi-public to semi-private to private); thirdly, within this hierarchy spaces can also be striated using symbolic or material boundaries between the different types of spaces. Furthermore, spaces must be designed to increase surveillance: use smaller corridors serving smaller sets of families (69-71); incorporate amenities in “defined zones of influence” (70); use L-shaped buildings as opposed to rectangles (84); use windows on the sides of buildings to reveal the fire escape from outside (90). As he puts it, the subdivision of housing projects into “small, recognisable and comprehensible-at-a-glance enclaves is a further contributor to improving the visual surveillance mechanism” (1000). Finally, Newman lays out the principle of spatial juxtaposition: consider the building/street interface (positioning of doors and windows to maximise surveillance); consider building/building interface (e.g. build residential apartments next to ‘safer’ commercial, industrial, institutional and entertainment facilities) (109-12). In short, Newman’s book effectively redefines residential space in terms of territorial zones of control. Such zones of influence are the products of the interaction between architectural forms and environment, which are not reducible to the intent of the architect (68). Thus, in attempting to respond to the exigencies of the moment – the problem of urban crime, the cost of housing – Newman maps out residential space in what Foucault might have called a ‘micro-physics of power’. During the mid-1970s through to the 1980s a number of publications aimed at the average householder are printed in the UK and Australia. Apart from trade publishing (Bunting), The UK Design Council released two small publications (Barty, White and Burall; Design Council) while in Australia the Department of Housing and Construction released a home safety publication, which contained a small section on security, and the Australian Institute of Criminology published a small volume entitled Designing out Crime: Crime prevention through environmental design (Geason and Wilson). While Newman emphasised the responsibility of architects and urban planners, in these publications the general concerns of defensible space are relocated in the ‘average homeowner’. Citing crime statistics on burglary and vandalism, these publications incite their readers to take action, turning the homeowner into a citizen-soldier. The householder, whether he likes it or not, is already in a struggle. The urban jungle must be understood in terms of “the principles of warfare” (Bunting 7), in which everyday homes become bodies needing protection through suitable architectural armour. Through a series of maps and drawings and statistics, the average residential home is transformed into a series of points of vulnerability. Home space is re-inscribed as a series of points of entry/access and lines of sight. Simultaneously, through lists of ‘dos and don’ts’ a set of precautionary behaviours is inculcated into the readers. Principles of security begin codifying the home space, disciplining the spatial practices of the intimate, regulating the access and mobility of the family and guests. The Architectural Nervous System Nowadays we see a wild, almost excessive, proliferation of security products available to the ‘security conscious homeowner’. We are no longer simply dealing with security devices designed to block – such as locks, bolts and fasteners. The electronic revolution has aided the production of security devices that are increasingly more specialised and more difficult to manipulate, which paradoxically makes it more difficult for the security consumer to understand. Detection systems now include continuous wiring, knock-out bars, vibration detectors, breaking glass detectors, pressure mats, underground pressure detectors and fibre optic signalling. Audible alarm systems have been upgraded to wire-free intruder alarms, visual alarms, telephone warning devices, access control and closed circuit television and are supported by uninterruptible power supplies and control panels (see Chartered Institution of Building Service Engineers 19-39). The whole house is literally re-routed as a series of relays in an electronic grid. If the house as a security risk is defined in terms of points of vulnerability, alarm systems take these points as potential points of contact. Relays running through floors, doors and windows can be triggered by pressure, sound or dislocation. We see a proliferation of sensors: switching sensors, infra-red sensors, ultrasonic sensors, microwave radar sensors, microwave fence sensors and microphonic sensors (see Walker). The increasing diversification of security products attests to the sheer scale of these architectural/engineering changes to our everyday architecture. In our fear of crime we have produced increasingly more complex security products for the home, thus complexifying the spaces we somehow inherently feel should be ‘simple’. I suggest that whereas previous devices merely reinforced certain architectural or engineering aspects of the home, contemporary security products actually constitute the home as a feeling, architectural body capable of being affected. This recalls notions of a sensuous architecture and bodily metaphors within architectural discourse (see Thomsen; Puglini). It is not simply our fears that lead us to secure our homes through technology, but through our fears we come to invest our housing architecture with a nervous system capable of fearing for itself. Our eyes and ears become detection systems while our screams are echoed in building alarms. Body organs are deterritorialised from the human body and reterritorialised on contemporary residential architecture, while our senses are extended through modern security technologies. The vulnerable body of the family home has become a feeling body conscious of its own vulnerability. It is less about the physical expression of fear, as Nan Ellin has put it, than about how building materialities become capable of fearing for themselves. What we have now are residential houses that are capable of being more fully mobilised in this urban war. Family homes become bodies that scan the darkness for the slightest movements, bodies that scream at the slightest possibility of danger. They are bodies that whisper to each other: a house can recognise an intrusion and relay a warning to a security station, informing security personnel without the occupants of that house knowing. They are the newly produced victims of an urban war. Our homes are the event-spaces in which mediated fear unfolds into an architectural nervous system. If media plug our homes into one set of relations between ideologies, representations and fear, then the architectural nervous system plugs that back into a different set of relations between capital, fear and the electronic grid. The home is less an endpoint of broadcast media than a node in an electronic network, a larger nervous system that encompasses the globe. It is a network that plugs architectural nervous systems into city electronic grids into mediated subjectivities into military technologies and back again, allowing fear to be disseminated and extended, replayed and spliced into the most banal aspects of our domestic lives. References Barty, Euan, David White, and Paul Burall. Safety and Security in the Home. London: The Design Council, 1980. Blunt, Alison, and Ann Varley. “Introduction: Geographies of Home.” Cultural Geographies 11.1 (2004): 3-6. Bunting, James. The Protection of Property against Crime. Folkestone: Bailey Brothers & Sinfen, 1975. Chartered Institution of Building Service Engineers. Security Engineering. London: CIBSE, 1991. Colomina, Beatriz. “Domesticity at War.” Assemblage 16 (1991): 14-41. Department of Housing and Construction. Safety in and around the Home. Canberra: Australian Government Publishing Service, 1981. Design Council. The Design Centre Guide to Domestic Safety and Security. London: Design Council, 1976. Diken, Bülent, and Carsten Bagge Lausten. “Zones of Indistinction: Security and Terror, and Bare Life.” Space and Culture 5.3 (2002): 290-307. Ellin, Nan. “Shelter from the Storm or Form Follows Fear and Vice Versa.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Epstein, Dora. “Abject Terror: A Story of Fear, Sex, and Architecture.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Fiske, John, Bob Hodge, and Graeme Turner. Myths of Oz: Reading Australian Popular Culture. Sydney: Allen & Unwin, 1987. Geason, Susan, and Paul Wilson. Designing Out Crime: Crime Prevention through Environmental Design. Canberra: Australian Institute of Criminology, 1989. Hubbard, Alan. Home Safety and Security, Western Australia. Canberra: Australian Bureau of Statistics, 2005. Jeffery, C. Ray. Crime Prevention through Environmental Design. Beverley Hills: Sage, 1971. Macken, Julie. “Why Aren’t We Happier?” Australian Financial Review 26 Nov. 1999: 26. Mallory, Keith, and Arvid Ottar. Architecture of Aggression: A History of Military Architecture in North West Europe, 1900-1945. Hampshire: Architectural Press, 1973. Massumi, Brian. Parables of the Virtual: Movement, Affect, Sensation. Durham: Duke University Press, 2002. McLennan, W. Security Services, Australia, 1998-99. Canberra: Australian Bureau of Statistics, 2000. Morley, David. Home Territories: Media, Mobility and Identity. London and New York: Routledge, 2000. Mouzos, Jenny, and Tina Houliaras. Homicide in Australia: 2004-05 National Homicide Monitoring Program (NHMP) Annual Report. Research and Public Policy Series 72. Canberra: Australian Institute of Criminology, 2006. Newman, Oscar. Defensible Space: Crime Prevention through Urban Design. New York: Collier, 1973. Puglini, Luigi. HyperArchitecture: Space in the Electronic Age. Basel: Bikhäuser, 1999. Signal Security. 13 January 2007 http://www.signalsecurity.com.au/securitysystems.htm>. Smith, Geoff. Home Security Precautions, New South Wales, October 1999. Canberra: Australian Bureau of Statistics, 2000. Spigel, Lynn. Welcome to the Dreamhouse: Popular Media and Postwar Suburbs. Durham and London: Duke University Press, 2001. Thomsen, Christian W. Sensuous Architecture: The Art of Erotic Building. Munich and New York: Prestel, 1998. Walker, Philip. Electronic Security Systems: Better Ways to Crime Prevention. London: Butterworths, 1983. Young, Iris Marion. “House and Home: Feminist Variations on a Theme.” Feminist Interpretations of Martin Heidegger. Eds. Nancy J. Holland and Patricia Huntington. University Park, Pennsylvania: Pennsylvania State UP, 2001. Citation reference for this article MLA Style Caluya, Gilbert. "The Architectural Nervous System: Home, Fear, Insecurity." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/05-caluya.php>. APA Style Caluya, G. (Aug. 2007) "The Architectural Nervous System: Home, Fear, Insecurity," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/05-caluya.php>.
APA, Harvard, Vancouver, ISO, and other styles
6

Rizzo, Sergio. "'Show Me the Money!'." M/C Journal 7, no. 1 (January 1, 2004). http://dx.doi.org/10.5204/mcj.2324.

Full text
Abstract:
Precious metals are to mercantile capitalism what paper is to industrial capitalism and what plastic and electronics are to post-industrial capitalism—which is to say, the different materials and their specific textual forms become the dominant, if not always preferred, means of transferring and storing value or wealth in their respective capitalist phases. As a distinct “text,” what separates the precious metals from the materials that follow them is that they are seen as “natural money.” In Capital, for example, Karl Marx endorses Galiani’s view that “although gold and silver are not by Nature money, money is by Nature gold and silver”(92-3). Common enough even among contemporary economists, this view relies upon a conception of “Nature” and money that paper began to unsettle and that the new forms of plastic and electronic money altogether erase. Thus Marshall McLuhan early on proclaimed that the new electronic technologies put “the very concept of money [ . . . ] in jeopardy . . .” (138-9). Even if this is in part true—and I think it is—how does one explain the current proliferation of money thanks to plastic cards and electronic money? Georg Simmel, in his monumental The Philosophy of Money, provides one possible answer. Discussing the war between Spain and the Netherlands, Simmel generalizes “ . . . and one might say paradoxically that, the more it is really money in its essential significance, the less need there is for it to be money in a material sense”(171). Plastic and electronic technologies, far from threatening the “very concept of money,” have worked to free the “essential significance” of money from its previous material forms. Certain forms of money may indeed be in jeopardy but, precisely because of this, the concept of money is all the more necessary to the ideological harmony of post-industrial capitalism. It would even be going too far to say that the new plastic and electronic forms of exchange threaten the aura of money. Instead, it is more advantageous to see these differing materials and their textual forms as representing competing mythologies. As a starting point, consider the de a ocho reales (pieces-of-eight) often referred to as the Spanish or pillar dollar. Minted from silver that came from the Spanish Empire’s silver mines in the New World, it represents the peak of mercantile capitalism. On its obverse side is the image of two worlds between two columns, representing the Pillars of Hercules. Winding around the columns is a banner with the inscription “plus ultra” (more beyond). On one level, this promise was frighteningly true—estimates range from a staggering 145,000 to 165,000 tons of silver extracted from the New World by Europeans (Weatherford 100). And yet, the promise of infinite wealth is belied, ultimately, by the finite nature of the material being used to fashion this text. In contrast, consider the inscription found on the first coin minted in 1787 by the newly established United States of America. The one-cent copper coin bears the motto “Fugio MIND YOUR BUSINESS” and shows the sun above a sundial. The references to time (fugio or I fly) are clearly indebted to the axiom “time is money”, which comes from a founding father of the new nation, Benjamin Franklin, who, perhaps more than any other, lived out and popularized its revolutionary ideology. “Mind your business” is equally Franklinesque and equally expressive of the spirit necessary for the emergence of industrial capitalism. Nonetheless, the coin’s advice, like the Spanish dollar’s promise, contains its own instability. The relatively congenial warning that wasting your time will cost you money is undercut by the pugnacious double entendre contained in “mind your business”, which can also mean stay out of other people’s affairs. The double meaning of “mind your business” encapsulates a rationalist utopia of individual citizens who serve the common good simply by tending to their own gardens or minding their own businesses. In less than seventy-five years, America’s Civil War violently exposed the internal contradictions of such an aspiration. Switching the motto of the Spanish silver dollar with that of the American copper penny results in a jarring confusion that illustrates the ideological divide between mercantile and industrial capital that the two coins represent. The Spanish dollar promises infinite wealth based upon trade, an individual’s appetite for “more,” and access to scarce commodities (gold and silver). The American penny promises endless work based upon production, self-interest, and access to cheap commodities, such as copper. This American work ethic fueled a pathological amassing of wealth that is similar to and yet distinct from the mercantile period preceding it. The differences and similarities are like those that Marx finds between the miser and the capitalist: “This boundless greed after riches, this passionate chase after exchange-value, is common to the capitalist and the miser; but while the miser is merely a capitalist gone mad, the capitalist is a rational miser”(151). Adapting Marx’s comparison, then, it would be more accurate to say the mercantile capitalist is an unfinished capitalist, distracted from his purpose by the maddening allure of the miser’s horde. While the industrial capitalist, on the other hand, may be the truer capitalist, he is still a miser, albeit a rational one. If capitalists are going to realize their full potential as “rational misers” the history of America shows they can only achieve this with a medium of exchange that is cheaper, more accessible, and more disposable than copper or any other metal. Through paper currency, America not only financed its revolution, making it the first nation in the history of the world to do so, it also financed its westward expansion, the North’s victory in the Civil War, and it unleashed the productive capacities necessary for an industrial revolution that would surpass its European rivals. The design found on America’s modern one-dollar bill—which except for minor changes has remained the same since 1935—reveals a textual indeterminacy, like that found in the Spanish dollar and America’s revolutionary copper penny. The first aspect of its indeterminacy is in the nature of all paper currencies. Their cheap materials, relatively easy production, and fiat value make them attractive to counterfeiters as well as governments. To a degree unmatched by coins, paper money’s text is driven by anxieties over counterfeiting. For example, the signatures of the U.S. Treasurer and Secretary of the Treasury on the front of America’s paper currency are motivated in part by this anxiety. But the signing of an official’s name holds a deeper significance, one that separates paper currency from metal. Paper currency seems to call for a signature the way metal coins call for heads in profile. Metal coins, even when machine made, still evoke the artisan and his mode of production—circumscribed, organic, and coherent. The very real artisanship that goes into paper currency is lost in a surreal sea of printed signs—open, fragmented, and dreamlike. The signature, although mechanically reproduced, leaves the trace of a human hand and the individual to which it belongs. In a world where exchange value is created by artificial means that are essentially limitless, the signature is a reassuring reminder of human limits and authority. A different sort of tension is on the back of the dollar bill. Here the front and back of the Great Seal of the United States are on either side of a “ONE” in large letters at the center of the rectangular design. The contraries contained in the Great Seal—war and peace represented by the olive branch and arrows the eagle holds in its talons and the material and the spiritual aspects of life represented by the unfinished pyramid and the eye of the Deity that shines above it—draw the viewer into a web of triangular sight lines. The back of the Seal encircles an apparent triangle formed by the pyramid and the eye above it. The encircled triangle in the Seal’s front is subtler. It is made by the number thirteen which appears in the thirteen stars above the eagle’s head and the thirteen olive leaves and arrows held in the eagle’s talons. This triangular symmetry is reinforced by the four numeral 1s with “one” written across them that appear one in each corner of the bill’s design. These 1s create bisecting diagonal sight lines that connect with and pass through the “ONE” at the center of the rectangle, thereby cutting the rectangle into four symmetrical triangles. At the very least, all this (in)visible triangular symmetry could be called overdetermined—an excessive attempt to impress order on a chaotic world and to naturalize the text’s claim as “legal tender.” If, as Simmel maintains, “all money is credit” (Ingham 24), then by one line of reasoning, it would be easy for credit cards to acknowledge this truth. Instead, like the other monetary forms we have examined, their texts work to obfuscate the social character of exchange value and naturalize or mythologize their authority. Like paper money’s connection to the printing press, credit cards are also connected to a revolutionary technology, the petroleum industry. It is fitting that credit cards are made of plastic, a by-product of oil refineries, since they originated in the 1930s as a convenience to drivers provided by the major oil companies. Even as different businesses extended the use of credit cards, they have retained their early association with the world of travel and the pleasures of mobility—both physical and social. With the company’s origin in the travel business, the American Express credit card is uniquely positioned to exploit the pleasures of mobility, and the history of its credit card designs helps to illustrate some of the ideological shifting required of post-industrial capitalism. As Jack Weatherford points out in his History of Money, American Express made effective use of a card class system. Starting in 1958 with their purple card, the color of royalty, they sought to attract consumers with a feeling of exclusivity. Some years later, they switched to the famous green card, the color of American money. In 1966, they added the distinction of the gold card for elite members. As the numbers of gold card members swelled, they sought further distinctions, such as the black card that was quickly replaced by the platinum card (229). A striking aspect of these textual permutations, given the focus of this paper, is the credit company’s reliance on the security of older monetary forms, such as precious metals and American paper currency, to attract consumers. Now that credit cards rule supreme, it is hard to recall consumers’ earlier antipathy towards them. In 1971, after credit cards were well established, one study found that almost one-third of the families interviewed thought it was “bad business to use credit cards,” and even among credit card users, nearly one-fifth felt it was “bad” (Moore and Russell 78). In contrast, the design of the latest card by American Express, its blue card, boldly proclaims the apotheosis of credit—a blue hologram suspended in transparent plastic. Here is the ultimate medium: a transparency that promises to take its possessor at the speed of light into the depths of hyperspace. Beneath these specific historical texts, lies a deeper and more general ontological association between plastic and movement, which Roland Barthes uncovers in his ruminations upon the substance in Mythologies. In its protean ability to imitate life, plastic is “less a thing than the trace of a movement”(97). And Barthes maintains our new plastic mobility revolutionizes our relationship to life itself. The finite character of metal and paper for storing and transferring wealth were always more or less apparent. Precious metals were limited by the natural laws of scarcity—first come, first served. Paper promised a world of infinite wealth, but it always threatened to hyperinflate, collapsing into worthless piles. Sometimes implicitly or sometimes explicitly, paper still relied on nature’s scarcity in order to justify its claim to value. Plastic needs no such justification. As Barthes puts it, with plastic, “the hierarchy of substances is abolished: a single one replaces them all: the whole world can be plasticized . . .”(99). In a plastic world, there are no limits on what or how much we can produce. And in such a world, only an abstract and infinite medium of exchange, such as credit, can promise to return our alienated labor to us through the plasticized commodities it purchases. Works Cited Barthes, Roland. Mythologies. Trans. Anette Lavers. New York: Farrar, Straus and Giroux, 1990. Ingham, Geoffry. “’Babylonian Madness’: On the Historical and Sociological Origins of Money.” What Is Money? Ed. John Smithin. London: Routledge, 2000. 16-41. Marx, Karl. Capital Volume One. Ed. Frederick Engels. New York: International, 1987. McLuhan, Marshall. Understanding Media: The Extensions of Man. Cambridge, Mass.: MIT Press, 1995. Moore, Carl H. and Alvin E. Russell. Money: Its Origin, Development and Modern Use. Jefferson, NC: McFarland, 1987. Simmel, Georg. The Philosophy of Money. Ed. David Frisby. Trans. Tom Bottomore and David Frisby. New York: Routledge, 1990. Weatherford, Jack. The History of Money. New York: Crown, 1997. Citation reference for this article MLA Style Rizzo, Sergio. "'Show Me the Money!'" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0401/09-rizzo.php>. APA Style Rizzo, S. (2004, Jan 12). 'Show Me the Money!'. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0401/09-rizzo.php>
APA, Harvard, Vancouver, ISO, and other styles
7

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Petroleum industry and trade – military aspects – history"

1

Schult, Linden E. S. "Short Term Strategies for Long Term Power: The Rise and Potential Fall of Hugo Chávez." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/24.

Full text
Abstract:
This thesis explores the route to power of Venezuela's President Hugo Chávez and the methods by which he has remained in power throughout his presidency. Also, it explores the potential for Chávez to lose power, given the current economic and political situation in Venezuela. The importance of the oil industry, Chávez's suppression of the opposition and control of the media, and constitutional changes and reforms are all discussed as keys to Chávez's continuance in power.
APA, Harvard, Vancouver, ISO, and other styles
2

Sparks, Stephen. "'Stink, maar uit die verkeerde rigting' : pollution, politics and petroleum refining in South Africa, 1948-1960." Thesis, 2004. http://hdl.handle.net/10413/4340.

Full text
Abstract:
This dissertation analyses the history of the politics of pollution and petroleum refining in South Africa during the first decade of Apartheid, focusing on the country's first two oil refineries, both of which were built by multinational oil companies in Durban in the 1950s and 60s. It traces the origins of the development of environmental regulation in relation to oil refinery pollution. The dissertation outlines the development of a sense of disillusionment caused by the persistence of pollution problems associated with petroleum refining in the face of failed attempts at technological and expert interventions. The study identifies the existence of a civic culture amongst Bluff residents founded on ratepayer and landowner identities, through which they were able to exercise considerable purchase on the local State. Ultimately, the story of how two petroleum refineries ended up in the midst of residential communities in south Durban's represents a reiteration of the importance of race to the development of local urban landscapes during Apartheid.
Thesis (M.A.)-University of KwaZulu-Natal, Durban, 2004
APA, Harvard, Vancouver, ISO, and other styles
3

Stoop, Bennie. "Aspects of pricing structure for South African fuels." Thesis, 2012. http://hdl.handle.net/10210/7180.

Full text
Abstract:
M.Phil.
This research aims to establish and evaluate the main factors that influence the fuel industry in South Africa. The South African fuel industry, is influenced by different business, economical and logistical factors, which all contribute to a changing fuel environment as well as a changing fuel prices that vary on a monthly basis, as calculated by the Department of Mineral and Energy Affairs(DMEA). These factors including crude oil procurement, petroleum industry, synthetic fuel industry and geographical locations, are fundamentally important, and explained in more detail in the chapters to follow. Oil as main supply source to the fuel industry, plays a vital role to South Africa as industrial developing country. The crude oil imported from the eastern countries is refined into petroleum and alternative fuels, necessary to the economy. The oil price thus influences the petroleum price, which in turn influences the cost of food and accessories. This research will for this reason also focus on aspects such as the actual importation of crude oil, petroleum price structure, price zones, synfuels and alternative fuels, and the affect these aspects have on the fuel industry.
APA, Harvard, Vancouver, ISO, and other styles
4

Genova, Ann. "Oil and nationalism in Nigeria, 1970-1980." Thesis, 2007. http://hdl.handle.net/2152/3479.

Full text
Abstract:
In July 1979, Nigeria's federal military government declared a 100% takeover of select operations belonging to the London-based oil company, British Petroleum (BP). The takeover of BP marked the takeover of Nigeria's most lucrative industry that had been controlled by foreign investors. Within the secondary literature a more elaborate version of this event is offered by scholars, declaring it nationalization with little agreement over why this "Giant of West Africa" nationalization BP. Some mention South Africa, others Southern Rhodesia (present-day Zimbabwe); some mention oil, while others solely discuss UK diplomacy. Why the discrepancy over the reason for nationalization? This project sets out to explain not only why Nigeria nationalized BP in 1979, but also how the nationalization fits into the broad theoretical discussions on nationalism, economic policy, foreign relations, and nationalization. It challenges the popular narrative of why Nigeria nationalized BP and substantially revises it. The argument is put forward that the nationalization of BP hinged almost entirely on the notion of economic nationalism and that the nationalization fit into an established trend of takeovers aimed at foreign companies. The federal military government simply used southern Africa --discussed as the sole reason for nationalization within the secondary Literature-- as a way to bolster international support. This project also project uses the nationalization as a looking-glass into Nigeria and its oil industry during the 1970s. Also, this project addresses the impact the nationalization had on Nigerian society. With regard to nationalism, Nigeria represents an excellent case for understanding the existence and application of economic nationalism, which functions not only as a subject of study much like ethnic nationalism or civic nationalism, but also as a new perspective on the relationship between the various expressions of nationalism and economic policy.
APA, Harvard, Vancouver, ISO, and other styles
5

Opuamah, Abiye. "Narrating social decay: satire and ecology in Ayo Akinfe's Fuelling the Delta Fires." Thesis, 2017. https://hdl.handle.net/10539/25727.

Full text
Abstract:
A research report submitted to the Faculty of Humanities, University of the Witwatersrand in partial fulfilment of the requirements for the degree of Master of Arts, 2017
This research report conducts a critical examination of Ayo Akinfe’s Fuelling the Delta Fires by paying attention to the writer’s use of satire to highlight social problems such as corruption, deception and exploitation in Nigeria. The focus is on how Akinfe’s novel represents exploitation, waste, and excess that have become normative in a country on the brink of collapse. The work also seeks to identify and critique how Akinfe employs satire to interrogate the syndrome of the ‘big-man’ in Nigeria, showing how their actions contribute to social decay and violence. The research will also examine issues of ecology in the Niger Delta. Ecology has often been construed as a Western ideology that has little resonance within the framework of the African novel. However, this work, tries to show that as the scholarship on ecological humanities has evolved over the years, African alternatives which take account of the unique challenges of the continent have also being developed. Akinfe draws from these proposed models of ecology to focus attention on the ecological issues that are a direct outcome of the exploration of oil in the Niger Delta and by so doing, brings attention to the transgressions of government and multinational corporations who go to great lengths to extract oil in the region. Applying ecocritical examples suggested by scholars like Anthony Vital, Byron Caminero-Santangelo and others, the research report demonstrates how literature has been used as a medium to expose greed that facilitates ecological degradations and how the culture of consumerism affect the daily lives of the inhabitants of the Niger Delta.
XL2018
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Petroleum industry and trade – military aspects – history"

1

Czeschin, Robert W. Oil & war: A special investment report on petroleum and the history of armed conflict among nations. Baltimore, MD (824 E. Baltimore St., Baltimore 21202): Agora, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vigni, Benito Li. Le guerre del petrolio: Strategie, potere, nuovo ordine mondiale. Roma: Editori riuniti, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goralski, Robert. Oil & war: How the deadly struggle for fuel in WWII meant victory or defeat. New York: Morrow, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Qinggong. Zhan zheng yu neng yuan: WAR AND ENERGY. 8th ed. Beijing Shi: Jie fang jun chu ban she, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eichholtz, Dietrich. Krieg um Ol: Ein Erdolimperium als deutsches Kriegsziel (1938-1943). [Leipzig]: Leipziger Universitatsverlag, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chomat, Pierre. L'empire des énergivores menace la planète. Paris: Lettres du monde, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Martin, Thierry. Les États-Unis, le pétrole et la guerre: Comment comprendre les événements du 11 septembre 2001? Paris: G. de Bouillon, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Daniel, Yergin, ed. The Prize: The epic quest for oil, money and power. [U.K.]: Invision for BBC, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chomat, Pierre. Oil addiction: The world in peril. Boca Raton, Fla., USA: Universal Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yergin, Daniel. Naft, pūl, qudrat. 8th ed. [Tehran]: Ravābiṭ-i ʻUmūmī-i Shirkat-i Millī-i Naft-i Īrān, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography