Journal articles on the topic 'Screen print dopant sources'

To see the other types of publications on this topic, follow the link: Screen print dopant sources.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 21 journal articles for your research on the topic 'Screen print dopant sources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Drabczyk, Kazimierz, Edyta Wróbel, Grazyna Kulesza-Matlak, Wojciech Filipowski, Krzysztof Waczynski, and Marek Lipinski. "Comparison of diffused layer prepared using liquid dopant solutions and pastes for solar cell with screen printed electrodes." Microelectronics International 33, no. 3 (August 1, 2016): 167–71. http://dx.doi.org/10.1108/mi-03-2016-0031.

Full text
Abstract:
Purpose The purpose of this study is comparison of the diffusion processes performed using the commercial available dopant paste made by Filmtronics and the original prepared liquid dopant solution. To decrease prices of industrially produced silicon-based solar cells, the new low-cost production processes are necessary. The main components of most popular silicon solar cells are with diffused emitter layer, passivation, anti-reflective layers and metal electrodes. This type of cells is prepared usually using phosphorus oxychloride diffusion source and metal pastes for screen printing. The diffusion process in diffusion furnace with quartz tube is slow, complicated and requires expensive equipment. The alternative for this technology is very fast in-line processing using the belt furnaces as an equipment. This approach requires different dopant sources. Design/methodology/approach In this work, the diffusion processes were made for two different types of dopant sources. The first one was the commercial available dopant paste from Filmtronics and the second one was the original prepared liquid dopant solution. The investigation was focused on dopant sources fabrication and diffusion processes. The doping solution was made in two stages. In the first stage, a base solution (without dopants) was made: dropwise deionized (DI) water and ethyl alcohol were added to a solution consisting of tetraethoxysilane (TEOS) and 99.8 per cent ethyl alcohol. Next, to the base solution, orthophosphoric acid dissolved in ethyl alcohol was added. Findings Diffused emitter layers with sheet resistance around 60 Ω/sq were produced on solar grade monocrystalline silicon wafers using two types of dopant sources. Originality/value In this work, the diffusion processes were made for two different types of dopant sources. The first one was the commercial available dopant paste from Filmtronics and the second one was the original prepared liquid dopant solution.
APA, Harvard, Vancouver, ISO, and other styles
2

Wille, Wolfgang, Ralph Rothemund, Gerald Meinhardt, and Wolfgang Jantsch. "Implementation of Highly Resistive Emitter Solar Cells in a Production Environment using an Inline Doping System." Solid State Phenomena 178-179 (August 2011): 441–45. http://dx.doi.org/10.4028/www.scientific.net/ssp.178-179.441.

Full text
Abstract:
Instead of selective emitter technology we investigate an alternative way to optimize contact formation and increased blue responsivity of highly resistive emitter solar cells using screen print technology for the deposition of the frontside metallization grid. We show with the aid of an inline doping/diffusion set-up at Blue Chip Energy that tuning the emitter doping profile is an alternative way to reduce the effect of Auger recombination in the spectral range from 300 nm to 600 nm. By properly choosing the process conditions we were able to minimize the detrimental effect of the low surface concentration of the dopant on the contact resistance. Due to improved blue light responsivity a significant gain in short circuit current Jsc was achieved. This and a reduced reverse saturation current I00E yielded a higher open circuit voltage VOC and an increase of cell efficiency from 17.6 %-avg to more than 17.9 %-avg.
APA, Harvard, Vancouver, ISO, and other styles
3

Tenopir, Carol, Elina Late, Sanna Talja, and Lisa Christian. "Changes in Scholarly Reading in Finland Over a Decade: Influences of E-Journals and Social Media." Libri 69, no. 3 (September 25, 2019): 169–87. http://dx.doi.org/10.1515/libri-2018-0120.

Full text
Abstract:
Abstract Nationwide surveys of researchers in Finland in 2007 and 2016 distributed with the assistance of FinELib, the Finnish national consortium, show that researchers use a growing range of sources to find and access scholarly articles and that some reading patterns are changing. The percentage of articles found by searching and browsing are decreasing, while researchers are using more social ways to locate articles. Research social networking sites are rated as important to their work. They read more on-screen, although still print some material out for final reading. Reading patterns for books are different, as researchers still rely more on printed books than e-books, in spite of an increase in e-book collections through their libraries. This study shows a continuous process of incremental change, enabled by changes in scholarly publishing, social networking, and library collection decisions. More changes can be expected, as researchers adopt systems and patterns that fit with their work patterns and make the finding, locating, and reading of scholarly materials easier. Libraries must both lead and adapt to these new reading patterns by providing links and access to a variety of journal services and by maintaining a balance of print and e-book collections.
APA, Harvard, Vancouver, ISO, and other styles
4

Carter, Christina E. "Undergraduate Science Students are Uncertain of How to Find Facts in E-books Compared to Print Books." Evidence Based Library and Information Practice 6, no. 2 (June 24, 2011): 48. http://dx.doi.org/10.18438/b8hk89.

Full text
Abstract:
Objective – To observe and compare the strategies that undergraduate science students use to perform information retrieval tasks in e-books and in print books. Design – Qualitative analysis, employing a “prompted think-aloud” methodology and thematic analysis. Setting – Taylor Library (serving the Faculty of Science), University of Western Ontario, London, Ontario, Canada. Subjects – Twenty undergraduate science students (11 females, 9 males) who had completed at least two years of study in Faculty of Science programs at the University of Western Ontario. Methods – Participants for the study were recruited through informational posters in Taylor Library, science departments, and in undergraduate science classes. Participants were assigned fact-finding tasks in e-book and print versions of eight health, computer science, and engineering textbooks and handbooks available in the Taylor Library. Book titles and tasks are included in a table in the study. Each student completed four tasks using e-books and four tasks using print books. Half of the participants performed tasks in print books first, and half began with tasks in e-books. Print books were “pre-selected” for each participant. The e-books were all from the same platform: Electronic Book Library. Participants were provided with a laptop computer to access the e-book versions, and a list of questions or facts to locate within each book. Following the methodology of Cotton & Gresty (2006), one researcher prompted students to verbalize actions while performing assigned tasks. A second researcher captured audio and video of the laptop screen as students individually conducted their e-book searches. A third researcher took notes on each session. An exit survey was given to each participant, asking about previous use, knowledge, and attitudes towards e-books. Thematic analysis was then used to examine the collected data. Main Results – Researchers identified four major themes from the data with regard to use of print versus e-books: linear/non-linear strategies; tangible/intangible aspects of books; met/unmet expectations; and transferable/non-transferable behaviours. Researchers found that participants tended to search print books in a linear fashion, whereas they approached e-books non-linearly. Physicality and familiarity with print books helped participants more readily find answers, compared to e-books, where students tried less successfully to mimic techniques used in print books to locate requested information. Participants used indexes in print books, versus e-books where they did not quickly identify the e-books as having them. The students expected that the e-books would behave as other web-based/online sources or search engines would (such as Google books), and commented that they did not. Transferable actions between print and e-books included developing and using keywords for searching. Conclusion – The authors of this study found that student participants did not know how to navigate the e-books presented to them compared with their print counterparts. There was a lack of awareness on the part of participants about e-books in general: the students were unaware that e-books were available through the library catalogue; they did not know that e-books have indexes as print books do; and did not know the differences among platforms offered by the library. All of these facts point to the importance of user education. The authors note the importance of testing of e-book platforms by students, faculty, and librarians prior to committing to purchase particular platforms. The authors note that more research is needed on user interaction with e-books, how e-books are used to assimilate information, and how groups other than undergraduates search e-books.
APA, Harvard, Vancouver, ISO, and other styles
5

Lewis, Suzanne. "E-Book Discovery and Use Behaviour is Complex." Evidence Based Library and Information Practice 3, no. 2 (June 17, 2008): 38. http://dx.doi.org/10.18438/b8d040.

Full text
Abstract:
A review of: Rowland, Ian, David Nicholas, Hamid R. Jamali, and Paul Huntington. “What do Faculty and Students Really Think about E-books?” Aslib Proceedings: New Information Perspectives; 59.6 (2007): 489-511. Objective – To assess academic users’ awareness, perceptions and levels of use of e-books. Also to discover the purposes for which e-books were used and identify the most effective library marketing strategies for e-books. Design – Survey. Setting – University College London (UCL). Subjects – 1,818 UCL staff and students. Methods – In November 2006, staff and students of UCL were asked to participate in an online survey, administered using SurveyMonkey software. The survey ran November 1-18, 2006. Survey results were analysed using Software Package for Social Sciences (SPSS). Main Results – The response rate to the survey was at least 6.7%. A total of 1,818 completed surveys were received from approximately 27,000 potential respondents, although it is not known whether all e-mails announcing the survey were successfully delivered. No statistically significant differences were found between the demographic profile of the survey sample and the profile of the total UCL population. Data regarding e-book usage were collected from the sub-group of respondents who were existing e-book users, and data regarding use of print collections and book discovery were collected from all respondents. Forty-four per cent of respondents had used e-books, with age a good predictor of usage. However additional data analysis revealed complex demographic interactions underlying e-book usage, making broad generalisations too simplistic. Of existing e-book users, 61% sourced e-books independently of the UCL library. Deeper analysis showed that men were more “library independent” than women and doctoral students were more so than other students and staff. Forty-eight per cent of existing e-book users preferred reading from a screen rather than paper, with men more likely to read from a screen than women, and undergraduates more likely to do so than other groups. Responses to questions about the purpose of reading showed that existing e-book users consulted e-books primarily for work and study, and tended to obtain these from libraries. They were less likely to use e-books for leisure, but if they did so, were likely to obtain them from non-library sources. E-books were compared to traditional print across a range of factors and scored very favourably for ease of copying, currency, space requirements, 24/7 accessibility, convenience and ease of navigation. However e-books scored poorly compared to print for ease of reading, ease of marking a place and ease of annotation. Regarding use of library print titles, data from all respondents indicated that women (42%) were more likely to be regular users of print than men (35%). Print book discovery behaviour is complex, and age, gender and subject area all influenced book discovery preferences. Analysis of data regarding satisfaction with UCL’s current provision of print library books showed that 41% rated this service as “excellent” or “good,” but further analysis by gender, age and subject area revealed pockets of low satisfaction which warrant further attention. Students were much more aware of e-book availability through the UCL library than academic and research staff, with differences in awareness also displayed between different faculties. The library’s Web site and catalogue were the main channels for e-book awareness, with respondents themselves suggesting the library Web site and e-mail user guides as the most effective e-book awareness mechanisms. Conclusion – This study reveals a significant level of interest in and use of e-books in one academic community, but with differences determined by age, gender, academic sub-group and subject area. It builds on the findings of previous studies of e-book usage and indicates key areas for further study. These include whether real-life information behaviour correlates with the self-reporting of respondents, and the intersection of gender and self-reported information behaviour. This information, plus the patterns of book discovery behaviour emerging from this study, will be of interest to publishers, booksellers and libraries.
APA, Harvard, Vancouver, ISO, and other styles
6

Young, Jackie. "A study of print and computer-based reading to measure and compare rates of comprehension and retention." New Library World 115, no. 7/8 (July 8, 2014): 376–93. http://dx.doi.org/10.1108/nlw-05-2014-0051.

Full text
Abstract:
Purpose – This paper aims to observe, measure and record comparative cognitive processes in print and online to explain the differences, if any, in the readers’ information-gathering processes and their subsequent comprehension and retention of information. It also examined the strategies that readers adopt that differ from print when reading online. Standardized reading comprehension scores were also collected. The results indicated that the participants demonstrated functional equivalency in both media, but they had a preference for print. The linear individualistic mentality learned through print gave the study group participants the skills to successfully navigate through the dense web of information that constitutes the Internet. Story presentation and hierarchy, key elements of the print design process, are less evident or absent online. As a consequence, as previous research has demonstrated, online readers are more poorly informed than print readers – but not in this case. The research from this study demonstrates that when the authors of the print media are those who also control the integrity of online content, print and Web readers are equally well-informed. Design/methodology/approach – Coded texts from The Guardian Newspaper, The Economist and The New Yorker were used in a media lab to measure the study group’s ability to read and retrieve information from the publications’ print and Web editions. They were scored on how well they retrieved the core information in the articles from both media. Focus-group sessions probed for information about reading in print and online at the end of the reading sessions. This gave valuable insight into the coping strategies that the participants used when engaging with online texts. There were two sessions, each of three hours, and the participants were university students. Findings – The study results show that the group participants were functionally equivalent in both print and online reading. However, they had a profound distrust for online content in general, which they found to be inaccurate and unstable. Web sites, they conclude, never achieve “fixity”. When reading online, the study group scrolls through the text to retrieve facts and then goes to a print source to verify the accuracy of the content. They do not engage with the content online as they do with print. While acknowledging that the publications in the study were reputable and of a high quality, the group still found scrolling through the Web sites tedious. The printed page was to the study group, a cultural object. Research limitations/implications – This was a small study with 11 participants in a controlled environment on two evenings, each lasting three hours. While the readings were intense, the researchers saw no evidence of fatigue. The group were very vocal during the focus-group sessions and gave valuable insights into the reading process. The stories were exactly the same in both media, were well-written and edited. Typographic cues that give the reader priorities when engaging with the texts were transferred from the print to the online editions. HTML texts to this group are an impediment to the reading process, and the amount of texts require too much time to read. A larger study with a more diverse readership reading more general news is required to verify the findings. This is being planned. As one from the study group stated “I grew up with print but younger people do not have the benefits of print”. Practical implications – Typography provides a language with visual form and through that form, conveys the meaning of a text. The print reader decodes what she reads on the printed page, allowing her to quickly absorb and parse large amount of text, discarding redundant content. The question now becomes which print-reading operations are being transferred to the process of extracting relevant facts. Five centuries of continuous improvement of print communications have yet to be successfully transferred to the Internet. The visual aspects of print, the color advertisement, the photograph and elements that aided the print reader’s navigation are an intrusion on the Web. A new form of navigation, one that is more elegant and intuitive than the present, is required. Social implications – The social implications of reading are a fundamental characteristic of any society. The codex provided the model for the book, the newspaper and the magazine. These became and still are trusted sources of information. When the study group gets a Twitter or Facebook prompt on a breaking news story, they check a trusted broadcasting source for confirmation of its accuracy. If the findings of this study are confirmed in subsequent research studies on the process of reading online, it will have profound implications for the industry. Publishing to be successful requires the reader to engage with and respond to a message. There is strong evidence that this is not the case with what the advertising industry would consider an important core audience, the Internet “reader”. Originality/value – As a newspaper and magazine designer and teacher, the author been increasingly concerned with the transfer of information from the printed page to the computer screen. Many studies have been conducted on aspects of reading and designing for online reading. They are very often inaccurate and as such inconclusive. Reading is complex and measuring it difficult. The author conducted this study as both a designer and from an academic perspective. It is hoped that it encourages a robust debate.
APA, Harvard, Vancouver, ISO, and other styles
7

Hamilton, B. "Comparison of the different electronic versions of the Encyclopaedia Britannica: a usability study." Electronic Library 21, no. 6 (December 1, 2003): 546–54. http://dx.doi.org/10.1108/02640470310509108.

Full text
Abstract:
Over the years, Encyclopaedia Britannica has undergone a number of revisions and has been provided in a number of formats other than print. The different electronic formats include a CD‐ROM version, a subscription online version, a free online version that was recently changed to a subscription version, and a DVD‐ROM version. The purpose of this study was to evaluate the usability and effectiveness of the different electronic versions of the Encyclopaedia Britannica. The objectives of this study were to find out if one of the electronic versions of the Encyclopaedia Britannica is easier to use than the others, to see if the users are satisfied with the information that they retrieved from each version, and to see if the users retrieve the same information from each version. Over one third (six) of 15 participants thought that britannica.com was the easiest to use. The main reason mentioned was the set‐up of the initial results screen. Most of the participants felt that all of the databases answered the searches sufficiently and nine participants felt that britannica.com answered the searches the best. The main reason mentioned was the variety of information sources provided on the search results page (Encyclopaedia Britannica articles, magazine articles, Web sites, and books). Seven of the participants were satisfied with using all of the databases.
APA, Harvard, Vancouver, ISO, and other styles
8

Usherwood, Bob, and Margaret Usherwood. "Culture wars, libraries and the BBC." Library Management 42, no. 4/5 (January 21, 2021): 291–301. http://dx.doi.org/10.1108/lm-12-2020-0175.

Full text
Abstract:
PurposePublic libraries and public service broadcasters are threatened by political developments in the UK and USA. They are targets in a divisive culture war waged by ideological organisations that disseminate misleading and false information about social and political matters on line, on screen and in print. The purpose of this paper is to alert information professionals to this issue and suggests that, although they should not engage in this war, they must be prepared to use their professional expertise to identify and correct unreliable material. Further, they should cooperate with other true information organisations to expose the fallacious sources that endanger democracy.Design/methodology/approachThe authors analysed material from academic texts and papers, professional journals, serious contemporary journalism, political manifestoes, Internet blogs and items from the BBC sound archive to illustrate the history, size and nature of the problem and to suggest how it might be dealt with. This documentary analysis was based on the belief that information professionals are not the only people examining and concerned about this issue. It therefore included material from a wide range of other disciplines, including psychology, medicine and politics.FindingsThere is evidence that populist movements from the political right dislike information organisations and have historically, through misinformation and misrepresentation, persuaded working class citizens that they are being exploited by an elite. Public libraries and the BBC are highly trusted organisations, but much of the British public goes to sources it trusts least, such as tabloid newspapers, for information on politics and society. Librarians and BBC broadcasters demonstrated their value during the COVID-19 pandemic, but they need to engage with other professional groups to fully understand what is happening and counteract the threats it presents to our democracy.Originality/valueThe paper deals with a significant current issue that needs to be considered urgently by practitioners, academics and policy makers. It includes practical examples and suggestions demonstrating how information workers have and can help their users identify and use trusted and accurate information sources and perhaps be made aware of editorial bias.
APA, Harvard, Vancouver, ISO, and other styles
9

Cukier, Wendy, Samantha Jackson, Mohamed A. Elmi, Erin Roach, and Darren Cyr. "Representing women? Leadership roles and women in Canadian broadcast news." Gender in Management: An International Journal 31, no. 5/6 (July 4, 2016): 374–95. http://dx.doi.org/10.1108/gm-04-2015-0035.

Full text
Abstract:
Purpose The purpose of this paper is to examine the representation of women in Canadian broadcast news coverage, exploring the notion of substantive representation as it relates to gender, leadership and framing. Design/methodology/approach Using computer-aided text analysis software, the authors analyzed the frequency of women appearing in on-air roles, the way in which they are framed, as well as technical and expressive details, such as how they are featured. In total, the authors analyzed representation of 2,031 individuals in the four suppertime local news broadcasts from 6 p.m. to 7 p.m. Framed in an ecological model of complex social change, this paper focuses on understanding how women are presented in Canadian broadcast media. Findings This study finds that women are under-represented in Canadian broadcast media. Furthermore, it finds that women are less likely to be framed as leaders or experts and are less likely to hold news host or anchor positions. For all major news broadcasters analyzed, women are less likely to be portrayed positively or in leadership/expert positions and are more often represented as victims. They are less likely to appear on screen and are more likely to be referred to off-screen, paraphrased and cited rather than speaking for themselves. Research limitations/implications By framing this study in an (critical) ecological, this study moved beyond required descriptive benchmarking to examine the degree of substantive representation of women. However, the sample of the study is only a snapshot of Canada’s largest city, and, therefore, more research involving further a comparative analysis of cities, a variety of print sources and online media outlets is needed. Future research might include more qualitative analysis of the representation, the type of representation and the factors affecting levels of representation. For example, such research might explore the practices in broadcast organizations, the way in which stories are framed and how guests selected. Also of interest is the relationship between women’s representation at the decision-making table, as an input, and the representation of women in on-air roles, as an outcome. Practical implications The implications of this article are important for understanding the complex factors affecting female leadership across sectors, particularly, the Canadian broadcast industry, the barriers they face and the strategies that may lead to their advancement. Originality/value This study moved beyond descriptive benchmarking to examine the degree of substantive representation of women by coding the frames, roles and means of quotation experienced by women on broadcast news.
APA, Harvard, Vancouver, ISO, and other styles
10

Goertzen, Melissa. "Longitudinal Analysis of Undergraduate E-book Use Finds that Knowledge of Local Communities Drives Format Selection and Collection Development Activities." Evidence Based Library and Information Practice 12, no. 1 (March 15, 2017): 112. http://dx.doi.org/10.18438/b8bw5q.

Full text
Abstract:
A Review of: Hobbs, K., & Klare, D. (2016). Are we there yet?: A longitudinal look at e-books through students’ eyes. Journal of Electronic Resources Librarianship, 28(1), 9-24. http://dx.doi.org/10.1080/1941126X.2016.1130451 Abstract Objective – To determine undergraduate students’ opinions of, use of, and facility with e-books. Design – A qualitative study that incorporated annual interview and usability sessions over a period of four years. The protocol was informed by interview techniques used in prior studies at Wesleyan University. To supplement the body of qualitative data, the 2014 Measuring Information Service Outcomes (MISO) survey was distributed; the researchers built five campus-specific e-book questions into the survey. Setting – A small university in the Northeastern United States of America. Subjects – 28 undergraduate students (7 per year) who attended summer session between the years of 2011-2014 recruited for interview and usability sessions; 700 full-time undergraduate students recruited for the 2014 MISO survey. Methods – The method was designed by a library consortium in the Northeastern United States of America. The study itself was conducted by two librarians based at the single university. To recruit students for interview and usability sessions, librarians sent invitations via email to a random list of students enrolled in the university’s summer sessions. Recruitment for the 2014 MISO survey was also conducted via email; the survey was sent to a stratified, random sample of undergraduate students in February 2014. Interview sessions were structured around five open-ended questions that examined students’ familiarity with e-books and whether the format supports academic work. These sessions were followed by the students’ evaluation of specific book titles available on MyiLibrary and ebrary, platforms accessible to all libraries in the CTW Consortium. Participants were asked to locate e-books on given topics, answer two research questions using preselected e-books, explain their research process using the above mentioned platforms, and comment on the overall usability experience. Instead of taking notes during interview and usability sessions, the researchers recorded interviews and captured screen activity. Following sessions, they watched recordings, took notes independently, and compared notes to ensure salient points were captured. Due to concerns that a small pool of interview and usability candidates might not capture the overall attitude of students towards e-books, the researchers distributed the 2014 MISO survey between the third and fourth interview years. Five additional campus-specific e-book questions were included. The final response rate was 33%. Main Results – The results of the interviews, usability studies, and MISO survey suggest that although students use print and electronic formats for complementary functions, 86% would still select print if they had to choose between the formats. Findings indicate that e-books promote discovery and convenient access to information, but print supports established and successful study habits, such as adding sticky notes to pages or creating annotations in margins. With that being said, most students do not attempt to locate one specific format over another. Rather, their two central concerns are that content is relevant to search terms and the full-text is readily available. Study findings also suggest that students approach content through the lens of a particular assignment. Regardless of format, they want to get in, locate specific information, and move on to the next source. Also, students want all sources – regardless of format – readily at hand and arranged in personal organization systems. PDF files were the preferred electronic format because they best support this research behaviour; content can be arranged in filing systems on personal devices or printed when necessary. Because of these research habits, digital rights management (DRM) restrictions created extreme frustration and were said to impede work. In some cases, students created workarounds for the purpose of accessing information in a usable form. This included visiting file sharing sites like Pirate Bay in order to locate DRM free content. Findings demonstrated a significant increase in student e-book use over the course of four years. However, this trend did not correspond to increased levels of sophistication in e-book use or facility with build-in functions on e-book platforms. The researchers discovered that students create workarounds instead of seeking out menu options that save time in the long run. This behaviour was consistent across the study group regardless of individual levels of experience working with e-books. Students commented that additional features slow down work rather than creating efficiency. For instance, when keyboard shortcuts used to copy and paste text did not function, students preferred to type out a passage rather than spend time searching for copy functions available on the e-book platform. Conclusion – Academic e-books continue to evolve in a fluid and dynamic environment. While the researchers saw improvements over the course of four years (e.g., fewer DRM restrictions) access barriers remain, such as required authentication to access platform content. They also identified areas where training sessions lead by librarians could demonstrate how e-books support student research and learning activities. The researchers also found that user experiences are local in nature and specific to campus cultures and expectations. They concluded that knowledge of local user communities should drive book format selection. Whenever possible, libraries should provide access to multiple formats to support a variety of learning needs and research behaviours.
APA, Harvard, Vancouver, ISO, and other styles
11

Bench, Harmony, and Simon Ellis. "IJSD Volume 8 2017 Solo/Screen: Full Issue." International Journal of Screendance 8 (June 7, 2017). http://dx.doi.org/10.18061/ijsd.v8i0.5892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lobo, Velita Sibon, and K. Shivshankar Bhat. "An Analysis of Indian Entertainment Industry – Past, Present, and Future." International Journal of Management, Technology, and Social Sciences, September 16, 2021, 88–99. http://dx.doi.org/10.47992/ijmts.2581.6012.0155.

Full text
Abstract:
Purpose: The entertainment industry (casually known as Show Business) is included in the tertiary sector of the economy and embraces fields so theater, films, fine arts, dance, music, television, radio, media, sports, cultural events, etc. This industry is continuously evolving with innovations and ideas for the industry. It is developing dynamically in terms of revenue and volumes employing creative and technical people. It witnessed explosive growth during post liberalization that led to internationalization and expansion of the market. This study explores the evolution, growth, threats, challenges, future trends, and impact of FDI on the Indian entertainment industry. This study uncovers the impact of internationalization and its potential for providing employment. Methodology: This study is based on secondary data including Google, online journals, reports, and news articles. Findings: Initially, the entertainment started with storytelling, a way to pass on their culture, traditions, values, and history. The introduction of television brought a big change in entertainment and now online entertainment is on-trend and this way the method of delivering entertainment has expanded progressively. The Indian government has increased the percent of FDI’s and many international collaborations have helped the Indian entertainment industry to grow nationally and internationally There is a lot of employment opportunity in the entertainment industry from the people who work on screen and behind the screen. But due to the pandemic, few classes of workers in the industry are suffering but others are surviving in the online platforms. Television has retained its position as the largest entertainment segment, while digital media overtook the print entertainment sector, and online gaming overtook a filmed entertainment segment. In the future, the online form of entertainment will overpower and the OTT platform will boom. Research limitations/implications: Very few sources are available for references, few concepts are not highlighted and most of the information is outdated hence the collection of relevant information was a challenge. Originality/value: This paper brings to focus the imperative of due consideration by the Government and other regulating bodies to adopt some incentive measures to boost the Indian entertainment industry, being a sunrise industry, and also try to work on the personal and financial safety and stability of all the stakeholders of the entertainment industry, especially during abnormalities like the present pandemic-. Paper type: This industry analysis is an exploratory study.
APA, Harvard, Vancouver, ISO, and other styles
13

Mallan, Kerry Margaret, and Annette Patterson. "Present and Active: Digital Publishing in a Post-print Age." M/C Journal 11, no. 4 (June 24, 2008). http://dx.doi.org/10.5204/mcj.40.

Full text
Abstract:
At one point in Victor Hugo’s novel, The Hunchback of Notre Dame, the archdeacon, Claude Frollo, looked up from a book on his table to the edifice of the gothic cathedral, visible from his canon’s cell in the cloister of Notre Dame: “Alas!” he said, “this will kill that” (146). Frollo’s lament, that the book would destroy the edifice, captures the medieval cleric’s anxiety about the way in which Gutenberg’s print technology would become the new universal means for recording and communicating humanity’s ideas and artistic expression, replacing the grand monuments of architecture, human engineering, and craftsmanship. For Hugo, architecture was “the great handwriting of humankind” (149). The cathedral as the material outcome of human technology was being replaced by the first great machine—the printing press. At this point in the third millennium, some people undoubtedly have similar anxieties to Frollo: is it now the book’s turn to be destroyed by yet another great machine? The inclusion of “post print” in our title is not intended to sound the death knell of the book. Rather, we contend that despite the enduring value of print, digital publishing is “present and active” and is changing the way in which research, particularly in the humanities, is being undertaken. Our approach has three related parts. First, we consider how digital technologies are changing the way in which content is constructed, customised, modified, disseminated, and accessed within a global, distributed network. This section argues that the transition from print to electronic or digital publishing means both losses and gains, particularly with respect to shifts in our approaches to textuality, information, and innovative publishing. Second, we discuss the Children’s Literature Digital Resources (CLDR) project, with which we are involved. This case study of a digitising initiative opens out the transformative possibilities and challenges of digital publishing and e-scholarship for research communities. Third, we reflect on technology’s capacity to bring about major changes in the light of the theoretical and practical issues that have arisen from our discussion. I. Digitising in a “post-print age” We are living in an era that is commonly referred to as “the late age of print” (see Kho) or the “post-print age” (see Gunkel). According to Aarseth, we have reached a point whereby nearly all of our public and personal media have become more or less digital (37). As Kho notes, web newspapers are not only becoming increasingly more popular, but they are also making rather than losing money, and paper-based newspapers are finding it difficult to recruit new readers from the younger generations (37). Not only can such online-only publications update format, content, and structure more economically than print-based publications, but their wide distribution network, speed, and flexibility attract advertising revenue. Hype and hyperbole aside, publishers are not so much discarding their legacy of print, but recognising the folly of not embracing innovative technologies that can add value by presenting information in ways that satisfy users’ needs for content to-go or for edutainment. As Kho notes: “no longer able to satisfy customer demand by producing print-only products, or even by enabling online access to semi-static content, established publishers are embracing new models for publishing, web-style” (42). Advocates of online publishing contend that the major benefits of online publishing over print technology are that it is faster, more economical, and more interactive. However, as Hovav and Gray caution, “e-publishing also involves risks, hidden costs, and trade-offs” (79). The specific focus for these authors is e-journal publishing and they contend that while cost reduction is in editing, production and distribution, if the journal is not open access, then costs relating to storage and bandwith will be transferred to the user. If we put economics aside for the moment, the transition from print to electronic text (e-text), especially with electronic literary works, brings additional considerations, particularly in their ability to make available different reading strategies to print, such as “animation, rollovers, screen design, navigation strategies, and so on” (Hayles 38). Transition from print to e-text In his book, Writing Space, David Bolter follows Victor Hugo’s lead, but does not ask if print technology will be destroyed. Rather, he argues that “the idea and ideal of the book will change: print will no longer define the organization and presentation of knowledge, as it has for the past five centuries” (2). As Hayles noted above, one significant indicator of this change, which is a consequence of the shift from analogue to digital, is the addition of graphical, audio, visual, sonic, and kinetic elements to the written word. A significant consequence of this transition is the reinvention of the book in a networked environment. Unlike the printed book, the networked book is not bound by space and time. Rather, it is an evolving entity within an ecology of readers, authors, and texts. The Web 2.0 platform has enabled more experimentation with blending of digital technology and traditional writing, particularly in the use of blogs, which have spawned blogwriting and the wikinovel. Siva Vaidhyanathan’s The Googlization of Everything: How One Company is Disrupting Culture, Commerce and Community … and Why We Should Worry is a wikinovel or blog book that was produced over a series of weeks with contributions from other bloggers (see: http://www.sivacracy.net/). Penguin Books, in collaboration with a media company, “Six Stories to Start,” have developed six stories—“We Tell Stories,” which involve different forms of interactivity from users through blog entries, Twitter text messages, an interactive google map, and other features. For example, the story titled “Fairy Tales” allows users to customise the story using their own choice of names for characters and descriptions of character traits. Each story is loosely based on a classic story and links take users to synopses of these original stories and their authors and to online purchase of the texts through the Penguin Books sales website. These examples of digital stories are a small part of the digital environment, which exploits computer and online technologies’ capacity to be interactive and immersive. As Janet Murray notes, the interactive qualities of digital environments are characterised by their procedural and participatory abilities, while their immersive qualities are characterised by their spatial and encyclopedic dimensions (71–89). These immersive and interactive qualities highlight different ways of reading texts, which entail different embodied and cognitive functions from those that reading print texts requires. As Hayles argues: the advent of electronic textuality presents us with an unparalleled opportunity to reformulate fundamental ideas about texts and, in the process, to see print as well as electronic texts with fresh eyes (89–90). The transition to e-text also highlights how digitality is changing all aspects of everyday life both inside and outside the academy. Online teaching and e-research Another aspect of the commercial arm of publishing that is impacting on academe and other organisations is the digitising and indexing of print content for niche distribution. Kho offers the example of the Mark Logic Corporation, which uses its XML content platform to repurpose content, create new content, and distribute this content through multiple portals. As the promotional website video for Mark Logic explains, academics can use this service to customise their own textbooks for students by including only articles and book chapters that are relevant to their subject. These are then organised, bound, and distributed by Mark Logic for sale to students at a cost that is generally cheaper than most textbooks. A further example of how print and digital materials can form an integrated, customised source for teachers and students is eFictions (Trimmer, Jennings, & Patterson). eFictions was one of the first print and online short story anthologies that teachers of literature could customise to their own needs. Produced as both a print text collection and a website, eFictions offers popular short stories in English by well-known traditional and contemporary writers from the US, Australia, New Zealand, UK, and Europe, with summaries, notes on literary features, author biographies, and, in one instance, a YouTube movie of the story. In using the eFictions website, teachers can build a customised anthology of traditional and innovative stories to suit their teaching preferences. These examples provide useful indicators of how content is constructed, customised, modified, disseminated, and accessed within a distributed network. However, the question remains as to how to measure their impact and outcomes within teaching and learning communities. As Harley suggests in her study on the use and users of digital resources in the humanities and social sciences, several factors warrant attention, such as personal teaching style, philosophy, and specific disciplinary requirements. However, in terms of understanding the benefits of digital resources for teaching and learning, Harley notes that few providers in her sample had developed any plans to evaluate use and users in a systematic way. In addition to the problems raised in Harley’s study, another relates to how researchers can be supported to take full advantage of digital technologies for e-research. The transformation brought about by information and communication technologies extends and broadens the impact of research, by making its outputs more discoverable and usable by other researchers, and its benefits more available to industry, governments, and the wider community. Traditional repositories of knowledge and information, such as libraries, are juggling the space demands of books and computer hardware alongside increasing reader demand for anywhere, anytime, anyplace access to information. Researchers’ expectations about online access to journals, eprints, bibliographic data, and the views of others through wikis, blogs, and associated social and information networking sites such as YouTube compete with the traditional expectations of the institutions that fund libraries for paper-based archives and book repositories. While university libraries are finding it increasingly difficult to purchase all hardcover books relevant to numerous and varied disciplines, a significant proportion of their budgets goes towards digital repositories (e.g., STORS), indexes, and other resources, such as full-text electronic specialised and multidisciplinary journal databases (e.g., Project Muse and Proquest); electronic serials; e-books; and specialised information sources through fast (online) document delivery services. An area that is becoming increasingly significant for those working in the humanities is the digitising of historical and cultural texts. II. Bringing back the dead: The CLDR project The CLDR project is led by researchers and librarians at the Queensland University of Technology, in collaboration with Deakin University, University of Sydney, and members of the AustLit team at The University of Queensland. The CLDR project is a “Research Community” of the electronic bibliographic database AustLit: The Australian Literature Resource, which is working towards the goal of providing a complete bibliographic record of the nation’s literature. AustLit offers users with a single entry point to enhanced scholarly resources on Australian writers, their works, and other aspects of Australian literary culture and activities. AustLit and its Research Communities are supported by grants from the Australian Research Council and financial and in-kind contributions from a consortium of Australian universities, and by other external funding sources such as the National Collaborative Research Infrastructure Strategy. Like other more extensive digitisation projects, such as Project Gutenberg and the Rosetta Project, the CLDR project aims to provide a centralised access point for digital surrogates of early published works of Australian children’s literature, with access pathways to existing resources. The first stage of the CLDR project is to provide access to digitised, full-text, out-of-copyright Australian children’s literature from European settlement to 1945, with selected digitised critical works relevant to the field. Texts comprise a range of genres, including poetry, drama, and narrative for young readers and picture books, songs, and rhymes for infants. Currently, a selection of 75 e-texts and digital scans of original texts from Project Gutenberg and Internet Archive have been linked to the Children’s Literature Research Community. By the end of 2009, the CLDR will have digitised approximately 1000 literary texts and a significant number of critical works. Stage II and subsequent development will involve digitisation of selected texts from 1945 onwards. A precursor to the CLDR project has been undertaken by Deakin University in collaboration with the State Library of Victoria, whereby a digital bibliographic index comprising Victorian School Readers has been completed with plans for full-text digital surrogates of a selection of these texts. These texts provide valuable insights into citizenship, identity, and values formation from the 1930s onwards. At the time of writing, the CLDR is at an early stage of development. An extensive survey of out-of-copyright texts has been completed and the digitisation of these resources is about to commence. The project plans to make rich content searchable, allowing scholars from children’s literature studies and education to benefit from the many advantages of online scholarship. What digital publishing and associated digital archives, electronic texts, hypermedia, and so forth foreground is the fact that writers, readers, publishers, programmers, designers, critics, booksellers, teachers, and copyright laws operate within a context that is highly mediated by technology. In his article on large-scale digitisation projects carried out by Cornell and University of Michigan with the Making of America collection of 19th-century American serials and monographs, Hirtle notes that when special collections’ materials are available via the Web, with appropriate metadata and software, then they can “increase use of the material, contribute to new forms of research, and attract new users to the material” (44). Furthermore, Hirtle contends that despite the poor ergonomics associated with most electronic displays and e-book readers, “people will, when given the opportunity, consult an electronic text over the print original” (46). If this preference is universally accurate, especially for researchers and students, then it follows that not only will the preference for electronic surrogates of original material increase, but preference for other kinds of electronic texts will also increase. It is with this preference for electronic resources in mind that we approached the field of children’s literature in Australia and asked questions about how future generations of researchers would prefer to work. If electronic texts become the reference of choice for primary as well as secondary sources, then it seems sensible to assume that researchers would prefer to sit at the end of the keyboard than to travel considerable distances at considerable cost to access paper-based print texts in distant libraries and archives. We considered the best means for providing access to digitised primary and secondary, full text material, and digital pathways to existing online resources, particularly an extensive indexing and bibliographic database. Prior to the commencement of the CLDR project, AustLit had already indexed an extensive number of children’s literature. Challenges and dilemmas The CLDR project, even in its early stages of development, has encountered a number of challenges and dilemmas that centre on access, copyright, economic capital, and practical aspects of digitisation, and sustainability. These issues have relevance for digital publishing and e-research. A decision is yet to be made as to whether the digital texts in CLDR will be available on open or closed/tolled access. The preference is for open access. As Hayles argues, copyright is more than a legal basis for intellectual property, as it also entails ideas about authorship, creativity, and the work as an “immaterial mental construct” that goes “beyond the paper, binding, or ink” (144). Seeking copyright permission is therefore only part of the issue. Determining how the item will be accessed is a further matter, particularly as future technologies may impact upon how a digital item is used. In the case of e-journals, the issue of copyright payment structures are evolving towards a collective licensing system, pay-per-view, and other combinations of print and electronic subscription (see Hovav and Gray). For research purposes, digitisation of items for CLDR is not simply a scan and deliver process. Rather it is one that needs to ensure that the best quality is provided and that the item is both accessible and usable by researchers, and sustainable for future researchers. Sustainability is an important consideration and provides a challenge for institutions that host projects such as CLDR. Therefore, items need to be scanned to a high quality and this requires an expensive scanner and personnel costs. Files need to be in a variety of formats for preservation purposes and so that they may be manipulated to be useable in different technologies (for example, Archival Tiff, Tiff, Jpeg, PDF, HTML). Hovav and Gray warn that when technology becomes obsolete, then content becomes unreadable unless backward integration is maintained. The CLDR items will be annotatable given AustLit’s NeAt funded project: Aus-e-Lit. The Aus-e-Lit project will extend and enhance the existing AustLit web portal with data integration and search services, empirical reporting services, collaborative annotation services, and compound object authoring, editing, and publishing services. For users to be able to get the most out of a digital item, it needs to be searchable, either through double keying or OCR (optimal character recognition). The value of CLDR’s contribution The value of the CLDR project lies in its goal to provide a comprehensive, searchable body of texts (fictional and critical) to researchers across the humanities and social sciences. Other projects seem to be intent on putting up as many items as possible to be considered as a first resort for online texts. CLDR is more specific and is not interested in simply generating a presence on the Web. Rather, it is research driven both in its design and implementation, and in its focussed outcomes of assisting academics and students primarily in their e-research endeavours. To this end, we have concentrated on the following: an extensive survey of appropriate texts; best models for file location, distribution, and use; and high standards of digitising protocols. These issues that relate to data storage, digitisation, collections, management, and end-users of data are aligned with the “Development of an Australian Research Data Strategy” outlined in An Australian e-Research Strategy and Implementation Framework (2006). CLDR is not designed to simply replicate resources, as it has a distinct focus, audience, and research potential. In addition, it looks at resources that may be forgotten or are no longer available in reproduction by current publishing companies. Thus, the aim of CLDR is to preserve both the time and a period of Australian history and literary culture. It will also provide users with an accessible repository of rare and early texts written for children. III. Future directions It is now commonplace to recognize that the Web’s role as information provider has changed over the past decade. New forms of “collective intelligence” or “distributed cognition” (Oblinger and Lombardi) are emerging within and outside formal research communities. Technology’s capacity to initiate major cultural, social, educational, economic, political and commercial shifts has conditioned us to expect the “next big thing.” We have learnt to adapt swiftly to the many challenges that online technologies have presented, and we have reaped the benefits. As the examples in this discussion have highlighted, the changes in online publishing and digitisation have provided many material, network, pedagogical, and research possibilities: we teach online units providing students with access to e-journals, e-books, and customized archives of digitised materials; we communicate via various online technologies; we attend virtual conferences; and we participate in e-research through a global, digital network. In other words, technology is deeply engrained in our everyday lives. In returning to Frollo’s concern that the book would destroy architecture, Umberto Eco offers a placatory note: “in the history of culture it has never happened that something has simply killed something else. Something has profoundly changed something else” (n. pag.). Eco’s point has relevance to our discussion of digital publishing. The transition from print to digital necessitates a profound change that impacts on the ways we read, write, and research. As we have illustrated with our case study of the CLDR project, the move to creating digitised texts of print literature needs to be considered within a dynamic network of multiple causalities, emergent technological processes, and complex negotiations through which digital texts are created, stored, disseminated, and used. Technological changes in just the past five years have, in many ways, created an expectation in the minds of people that the future is no longer some distant time from the present. Rather, as our title suggests, the future is both present and active. References Aarseth, Espen. “How we became Postdigital: From Cyberstudies to Game Studies.” Critical Cyber-culture Studies. Ed. David Silver and Adrienne Massanari. New York: New York UP, 2006. 37–46. An Australian e-Research Strategy and Implementation Framework: Final Report of the e-Research Coordinating Committee. Commonwealth of Australia, 2006. Bolter, Jay David. Writing Space: The Computer, Hypertext, and the History of Writing. Hillsdale, NJ: Erlbaum, 1991. Eco, Umberto. “The Future of the Book.” 1994. 3 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Gunkel, David. J. “What's the Matter with Books?” Configurations 11.3 (2003): 277–303. Harley, Diane. “Use and Users of Digital Resources: A Focus on Undergraduate Education in the Humanities and Social Sciences.” Research and Occasional Papers Series. Berkeley: University of California. Centre for Studies in Higher Education. 12 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Hayles, N. Katherine. My Mother was a Computer: Digital Subjects and Literary Texts. Chicago: U of Chicago P, 2005. Hirtle, Peter B. “The Impact of Digitization on Special Collections in Libraries.” Libraries & Culture 37.1 (2002): 42–52. Hovav, Anat and Paul Gray. “Managing Academic E-journals.” Communications of the ACM 47.4 (2004): 79–82. Hugo, Victor. The Hunchback of Notre Dame (Notre-Dame de Paris). Ware, Hertfordshire: Wordsworth editions, 1993. Kho, Nancy D. “The Medium Gets the Message: Post-Print Publishing Models.” EContent 30.6 (2007): 42–48. Oblinger, Diana and Marilyn Lombardi. “Common Knowledge: Openness in Higher Education.” Opening up Education: The Collective Advancement of Education Through Open Technology, Open Content and Open Knowledge. Ed. Toru Liyoshi and M. S. Vijay Kumar. Cambridge, MA: MIT Press, 2007. 389–400. Murray, Janet H. Hamlet on the Holodeck: The Future of Narrative in Cyberspace. Cambridge, MA: MIT Press, 2001. Trimmer, Joseph F., Wade Jennings, and Annette Patterson. eFictions. New York: Harcourt, 2001.
APA, Harvard, Vancouver, ISO, and other styles
14

Hill, Benjamin Mako. "Revealing Errors." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2703.

Full text
Abstract:
Introduction In The World Is Not a Desktop, Marc Weisner, the principal scientist and manager of the computer science laboratory at Xerox PARC, stated that, “a good tool is an invisible tool.” Weisner cited eyeglasses as an ideal technology because with spectacles, he argued, “you look at the world, not the eyeglasses.” Although Weisner’s work at PARC played an important role in the creation of the field of “ubiquitous computing”, his ideal is widespread in many areas of technology design. Through repetition, and by design, technologies blend into our lives. While technologies, and communications technologies in particular, have a powerful mediating impact, many of the most pervasive effects are taken for granted by most users. When technology works smoothly, its nature and effects are invisible. But technologies do not always work smoothly. A tiny fracture or a smudge on a lens renders glasses quite visible to the wearer. The Microsoft Windows “Blue Screen of Death” on subway in Seoul (Photo credit Wikimedia Commons). Anyone who has seen a famous “Blue Screen of Death”—the iconic signal of a Microsoft Windows crash—on a public screen or terminal knows how errors can thrust the technical details of previously invisible systems into view. Nobody knows that their ATM runs Windows until the system crashes. Of course, the operating system chosen for a sign or bank machine has important implications for its users. Windows, or an alternative operating system, creates affordances and imposes limitations. Faced with a crashed ATM, a consumer might ask herself if, with its rampant viruses and security holes, she should really trust an ATM running Windows? Technologies make previously impossible actions possible and many actions easier. In the process, they frame and constrain possible actions. They mediate. Communication technologies allow users to communicate in new ways but constrain communication in the process. In a very fundamental way, communication technologies define what their users can say, to whom they say it, and how they can say it—and what, to whom, and how they cannot. Humanities scholars understand the power, importance, and limitations of technology and technological mediation. Weisner hypothesised that, “to understand invisibility the humanities and social sciences are especially valuable, because they specialise in exposing the otherwise invisible.” However, technology activists, like those at the Free Software Foundation (FSF) and the Electronic Frontier Foundation (EFF), understand this power of technology as well. Largely constituted by technical members, both organisations, like humanists studying technology, have struggled to communicate their messages to a less-technical public. Before one can argue for the importance of individual control over who owns technology, as both FSF and EFF do, an audience must first appreciate the power and effect that their technology and its designers have. To understand the power that technology has on its users, users must first see the technology in question. Most users do not. Errors are under-appreciated and under-utilised in their ability to reveal technology around us. By painting a picture of how certain technologies facilitate certain mistakes, one can better show how technology mediates. By revealing errors, scholars and activists can reveal previously invisible technologies and their effects more generally. Errors can reveal technology—and its power and can do so in ways that users of technologies confront daily and understand intimately. The Misprinted Word Catalysed by Elizabeth Eisenstein, the last 35 years of print history scholarship provides both a richly described example of technological change and an analysis of its effects. Unemphasised in discussions of the revolutionary social, economic, and political impact of printing technologies is the fact that, especially in the early days of a major technological change, the artifacts of print are often quite similar to those produced by a new printing technology’s predecessors. From a reader’s purely material perspective, books are books; the press that created the book is invisible or irrelevant. Yet, while the specifics of print technologies are often hidden, they are often exposed by errors. While the shift from a scribal to print culture revolutionised culture, politics, and economics in early modern Europe, it was near-invisible to early readers (Eisenstein). Early printed books were the same books printed in the same way; the early press was conceived as a “mechanical scriptorium.” Shown below, Gutenberg’s black-letter Gothic typeface closely reproduced a scribal hand. Of course, handwriting and type were easily distinguishable; errors and irregularities were inherent in relatively unsteady human hands. Side-by-side comparisons of the hand-copied Malmesbury Bible (left) and the black letter typeface in the Gutenberg Bible (right) (Photo credits Wikimedia Commons & Wikimedia Commons). Printing, of course, introduced its own errors. As pages were produced en masse from a single block of type, so were mistakes. While a scribe would re-read and correct errors as they transcribed a second copy, no printing press would. More revealingly, print opened the door to whole new categories of errors. For example, printers setting type might confuse an inverted n with a u—and many did. Of course, no scribe made this mistake. An inverted u is only confused with an n due to the technological possibility of letter flipping in movable type. As print moved from Monotype and Linotype machines, to computerised typesetting, and eventually to desktop publishing, an accidentally flipped u retreated back into the realm of impossibility (Mergenthaler, Swank). Most readers do not know how their books are printed. The output of letterpresses, Monotypes, and laser printers are carefully designed to produce near-uniform output. To the degree that they succeed, the technologies themselves, and the specific nature of the mediation, becomes invisible to readers. But each technology is revealed in errors like the upside-down u, the output of a mispoured slug of Monotype, or streaks of toner from a laser printer. Changes in printing technologies after the press have also had profound effects. The creation of hot-metal Monotype and Linotype, for example, affected decisions to print and reprint and changed how and when it is done. New mass printing technologies allowed for the printing of works that, for economic reasons, would not have been published before. While personal computers, desktop publishing software, and laser printers make publishing accessible in new ways, it also places real limits on what can be printed. Print runs of a single copy—unheard of before the invention of the type-writer—are commonplace. But computers, like Linotypes, render certain formatting and presentation difficult and impossible. Errors provide a space where the particulars of printing make technologies visible in their products. An inverted u exposes a human typesetter, a letterpress, and a hasty error in judgment. Encoding errors and botched smart quotation marks—a ? in place of a “—are only possible with a computer. Streaks of toner are only produced by malfunctioning laser printers. Dust can reveal the photocopied provenance of a document. Few readers reflect on the power or importance of the particulars of the technologies that produced their books. In part, this is because the technologies are so hidden behind their products. Through errors, these technologies and the power they have on the “what” and “how” of printing are exposed. For scholars and activists attempting to expose exactly this, errors are an under-exploited opportunity. Typing Mistyping While errors have a profound effect on media consumption, their effect is equally important, and perhaps more strongly felt, when they occur during media creation. Like all mediating technologies, input technologies make it easier or more difficult to create certain messages. It is, for example, much easier to write a letter with a keyboard than it is to type a picture. It is much more difficult to write in languages with frequent use of accents on an English language keyboard than it is on a European keyboard. But while input systems like keyboards have a powerful effect on the nature of the messages they produce, they are invisible to recipients of messages. Except when the messages contains errors. Typists are much more likely to confuse letters in close proximity on a keyboard than people writing by hand or setting type. As keyboard layouts switch between countries and languages, new errors appear. The following is from a personal email: hez, if there’s not a subversion server handz, can i at least have the root password for one of our machines? I read through the instructions for setting one up and i think i could do it. [emphasis added] The email was quickly typed and, in two places, confuses the character y with z. Separated by five characters on QWERTY keyboards, these two letters are not easily mistaken or mistyped. However, their positions are swapped on German and English keyboards. In fact, the author was an American typing in a Viennese Internet cafe. The source of his repeated error was his false expectations—his familiarity with one keyboard layout in the context of another. The error revealed the context, both keyboard layouts, and his dependence on a particular keyboard. With the error, the keyboard, previously invisible, was exposed as an inter-mediator with its own particularities and effects. This effect does not change in mobile devices where new input methods have introduced powerful new ways of communicating. SMS messages on mobile phones are constrained in length to 160 characters. The result has been new styles of communication using SMS that some have gone so far as to call a new language or dialect called TXTSPK (Thurlow). Yet while they are obvious to social scientists, the profound effects of text message technologies on communication is unfelt by most users who simply see the messages themselves. More visible is the fact that input from a phone keypad has opened the door to errors which reveal input technology and its effects. In the standard method of SMS input, users press or hold buttons to cycle through the letters associated with numbers on a numeric keyboard (e.g., 2 represents A, B, and C; to produce a single C, a user presses 2 three times). This system makes it easy to confuse characters based on a shared association with a single number. Tegic’s popular T9 software allows users to type in words by pressing the number associated with each letter of each word in quick succession. T9 uses a database to pick the most likely word that maps to that sequence of numbers. While the system allows for quick input of words and phrases on a phone keypad, it also allows for the creation of new types of errors. A user trying to type me might accidentally write of because both words are mapped to the combination of 6 and 3 and because of is a more common word in English. T9 might confuse snow and pony while no human, and no other input method, would. Users composing SMS’s are constrained by its technology and its design. The fact that text messages must be short and the difficult nature of phone-based input methods has led to unique and highly constrained forms of communication like TXTSPK (Sutherland). Yet, while the influence of these input technologies is profound, users are rarely aware of it. Errors provide a situation where the particularities of a technology become visible and an opportunity for users to connect with scholars exposing the effect of technology and activists arguing for increased user control. Google News Denuded As technologies become more complex, they often become more mysterious to their users. While not invisible, users know little about the way that complex technologies work both because they become accustomed to them and because the technological specifics are hidden inside companies, behind web interfaces, within compiled software, and in “black boxes” (Latour). Errors can help reveal these technologies and expose their nature and effects. One such system, Google’s News, aggregates news stories and is designed to make it easy to read multiple stories on the same topic. The system works with “topic clusters” that attempt to group articles covering the same news event. The more items in a news cluster (especially from popular sources) and the closer together they appear in time, the higher confidence Google’s algorithms have in the “importance” of a story and the higher the likelihood that the cluster of stories will be listed on the Google News page. While the decision to include or remove individual sources is made by humans, the act of clustering is left to Google’s software. Because computers cannot “understand” the text of the articles being aggregated, clustering happens less intelligently. We know that clustering is primarily based on comparison of shared text and keywords—especially proper nouns. This process is aided by the widespread use of wire services like the Associated Press and Reuters which provide article text used, at least in part, by large numbers of news sources. Google has been reticent to divulge the implementation details of its clustering engine but users have been able to deduce the description above, and much more, by watching how Google News works and, more importantly, how it fails. For example, we know that Google News looks for shared text and keywords because text that deviates heavily from other articles is not “clustered” appropriately—even if it is extremely similar semantically. In this vein, blogger Philipp Lenssen gives advice to news sites who want to stand out in Google News: Of course, stories don’t have to be exactly the same to be matched—but if they are too different, they’ll also not appear in the same group. If you want to stand out in Google News search results, make your article be original, or else you’ll be collapsed into a cluster where you may or may not appear on the first results page. While a human editor has no trouble understanding that an article using different terms (and different, but equally appropriate, proper nouns) is discussing the same issue, the software behind Google News is more fragile. As a result, Google News fails to connect linked stories that no human editor would miss. A section of a screenshot of Google News clustering aggregation showcasing what appears to be an error. But just as importantly, Google News can connect stories that most human editors will not. Google News’s clustering of two stories by Al Jazeera on how “Iran offers to share nuclear technology,” and by the Guardian on how “Iran threatens to hide nuclear program,” seem at first glance to be a mistake. Hiding and sharing are diametrically opposed and mutually exclusive. But while it is true that most human editors would not cluster these stories, it is less clear that it is, in fact, an error. Investigation shows that the two articles are about the release of a single statement by the government of Iran on the same day. The spin is significant enough, and significantly different, that it could be argued that the aggregation of those stories was incorrect—or not. The error reveals details about the way that Google News works and about its limitations. It reminds readers of Google News of the technological nature of their news’ meditation and gives them a taste of the type of selection—and mis-selection—that goes on out of view. Users of Google News might be prompted to compare the system to other, more human methods. Ultimately it can remind them of the power that Google News (and humans in similar roles) have over our understanding of news and the world around us. These are all familiar arguments to social scientists of technology and echo the arguments of technology activists. By focusing on similar errors, both groups can connect to users less used to thinking in these terms. Conclusion Reflecting on the role of the humanities in a world of increasingly invisible technology for the blog, “Humanities, Arts, Science and Technology Advanced Collaboratory,” Duke English professor Cathy Davidson writes: When technology is accepted, when it becomes invisible, [humanists] really need to be paying attention. This is one reason why the humanities are more important than ever. Analysis—qualitative, deep, interpretive analysis—of social relations, social conditions, in a historical and philosophical perspective is what we do so well. The more technology is part of our lives, the less we think about it, the more we need rigorous humanistic thinking that reminds us that our behaviours are not natural but social, cultural, economic, and with consequences for us all. Davidson concisely points out the strength and importance of the humanities in evaluating technology. She is correct; users of technologies do not frequently analyse the social relations, conditions, and effects of the technology they use. Activists at the EFF and FSF argue that this lack of critical perspective leads to exploitation of users (Stallman). But users, and the technology they use, are only susceptible to this type of analysis when they understand the applicability of these analyses to their technologies. Davidson leaves open the more fundamental question: How will humanists first reveal technology so that they can reveal its effects? Scholars and activists must do more than contextualise and describe technology. They must first render invisible technologies visible. As the revealing nature of errors in printing systems, input systems, and “black box” software systems like Google News show, errors represent a point where invisible technology is already visible to users. As such, these errors, and countless others like them, can be treated as the tip of an iceberg. They represent an important opportunity for humanists and activists to further expose technologies and the beginning of a process that aims to reveal much more. References Davidson, Cathy. “When Technology Is Invisible, Humanists Better Get Busy.” HASTAC. (2007). 1 September 2007 http://www.hastac.org/node/779>. Eisenstein, Elisabeth L. The Printing Press as an Agent of Change: Communications and Cultural Transformations in Early-Modern Europe. Cambridge, UK: Cambridge University Press, 1979. Latour, Bruno. Pandora’s Hope: Essays on the Reality of Science Studies. Harvard UP, 1999. Lenssen, Philipp. “How Google News Indexes.” Google Blogscoped. 2006. 1 September 2007 http://blogoscoped.com/archive/2006-07-28-n49.html>. Mergenthaler, Ottmar. The Biography of Ottmar Mergenthaler, Inventor of the Linotype. New ed. New Castle, Deleware: Oak Knoll Books, 1989. Monotype: A Journal of Composing Room Efficiency. Philadelphia: Lanston Monotype Machine Co, 1913. Stallman, Richard M. Free Software, Free Society: Selected Essays of Richard M. Stallman. Boston, Massachusetts: Free Software Foundation, 2002. Sutherland, John. “Cn u txt?” Guardian Unlimited. London, UK. 2002. Swank, Alvin Garfield, and United Typothetae America. Linotype Mechanism. Chicago, Illinois: Dept. of Education, United Typothetae America, 1926. Thurlow, C. “Generation Txt? The Sociolinguistics of Young People’s Text-Messaging.” Discourse Analysis Online 1.1 (2003). Weiser, Marc. “The World Is Not a Desktop.” ACM Interactions. 1.1 (1994): 7-8. Citation reference for this article MLA Style Hill, Benjamin Mako. "Revealing Errors." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/01-hill.php>. APA Style Hill, B. (Oct. 2007) "Revealing Errors," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/01-hill.php>.
APA, Harvard, Vancouver, ISO, and other styles
15

Bruns, Axel. "The Knowledge Adventure." M/C Journal 3, no. 5 (October 1, 2000). http://dx.doi.org/10.5204/mcj.1873.

Full text
Abstract:
In his recent re-evaluation of McLuhanite theories for the information age, Digital McLuhan, Paul Levinson makes what at first glance appears to be a curious statement: he says that on the Web "the common denominator ... is the written word, as it is and has been with all things having to do with computers -- and will likely continue to be until such time, if ever, that the spoken word replaces the written as the vehicle of computer commands" (38). This, however, seems to directly contradict what any Web user has been able to experience for several years now: Web content has increasingly come to rely on graphics, at first still, now also often animated, and continues to include more and more audiovisual elements of various kinds. We don't even have to look at the current (and, hopefully, passing) phase of interminable Shockwave splash pages, which users have to endure while they wait to be transferred to the 'real' content of a site: even on as print-focussed a page as the one you're currently reading, you'll see graphical buttons to the left and at the bottom, for example. Other sites far surpass this for graphical content: it is hard to imagine what the official Olympics site or that of EXPO 2000 would look like in text-only versions. The drive towards more and more graphics has long been, well, visible. Already in 1997 (at a time when 33.6k modems were considered fast) Marshall considered the Internet to have entered its "graphic stage, a transitional media form that has made surfing the net feel like flipping through a glossy magazine or the interlinkages of a multimedia game or encyclopedia CD-ROMs"; to him this stage "relies on a construction that is textual and graphically enhanced through software overlays ... and highlighted by sample images, sound bites and occasionally short, moving images" (51). This historicised view mirrors a distinction made around the same time by Lovink, who divided users into "IBM-PC-modernists" still running text-based interfaces, and those enjoying the "Apple-Windows 95-postmodernism" of their graphical user interfaces (Lovink and Winkler 15). In the age of GUIs, in fact, 'text' in itself does not really exist on screen any more: everything from textual to graphical information consists of individual pixels in the same way, which is precisely what makes Levinson's initial statement appear so anachronistic. The move from 'text' to 'graphics and text' could thus be seen as a sign of the overall shift from the industrial to the information age -- a view not without precedent, since the transition from modernist to postmodernist times is similarly contemporaneous with the rise of graphic design as a form of communication as well as art. Beyond such broad strokes, we can also identify some of the finer details presented by the current state of graphics on the Web, however. Marshall's 'graphic stage', after all, was a 'transitional' one, and by now it seems that we might have passed it already, entering into a new aesthetic paradigm which appears to have borrowed many of its approaches from the realm of computer games: the new Web vision is shiny, colourful, animated, and increasingly also accompanied by sound effects. This is no surprise since the mass acceptance of personal computers themselves was largely driven by their use as a source of entertainment. Gaming and computers are inseparably interconnected, and the development of home computers' graphical capabilities in particular has long been driven almost exclusively by players' needs for better, faster, more realistic graphics. Of course, the way we interact with computers also owes a significant debt to games. Engagement in a dialogue with the machine, in which the computer displays both our own actions and its responses, representing us and itself simultaneously on screen, is the predominant mode of computing, and such a mode of engagement (dissolving the barriers between human mind and machinic computation) can now also be found in our interaction with the Web. Here, too, individual knowledge blends with the information available on the network as we immerse ourselves in hypertextual connectivity. As Talbott writes, "clearly, a generation raised on Adventure and video games -- where every door conceals a treasure or a monster worth pursuing in frenetic style -- has its own way of appreciating the hypertext interface" (13); not only has the Web taken on the aesthetics of computer gaming, then, but using the Web itself exhibits aspects of participation in a global 'knowledge game'. Talbott means to criticise this when he writes that thus "the doctrines of endless Enlightenment and Progress become the compelling subtext of a universal video game few can resist playing" (196), but however we may choose to evaluate this game, the observation itself is sound. One possible reason for taking a critical view of this development is that computer and video games rarely present more than the appearance of participation; while players may have a feeling of control over features of the game, the game itself usually remains entirely unaffected and ready for a restart at any moment. Web users might similarly feel empowered by the wealth of information to which they have gained access online, without actually making use of that information to form new knowledge for themselves. This is a matter for the individual user, however; where they have a true interest in the information they seek, we can have every confidence that they will process it to their advantage, too. Beyond this, the skills of information seeking learnt from Web use might also have overall benefits for users, as a kind of 'mind-eye coordination' similar to the 'hand-eye coordination' benefits often attributed to the playing of action games. The ability to figure out unknown problems, the desire to understand and gain control of a situation, which they can learn from computer games, is likely to help them better understand the complexity and interconnectedness of anything they might learn: "it could ... well be true that the cross-linking inherent in hypertext encourages people to see the connections among different aspects of the world so that they will get less fragmented knowledge" (Nielsen 190). The increasingly graphical nature of Web content could appear to work against this, however: "extensions of traditional hyperTEXT systems to encompass hyperMEDIA introduces [sic] a new dimension. ... The picture that 'speaks a thousand words' may say a thousand different words to different viewers. Pictures or graphics lend themselves much more than does text to multiple interpretations", as McAleese claims (12-13) -- but perhaps this overrates significantly the ability of text to anchor down meaning to any one point. Rather, it is questionable whether text and images really are that different from one another -- viewed from a historical perspective, certainly, opinions are divided, it seems: "the medieval church feared the power of the visual image because of the way it appeared to licence the imagination and the consideration of alternatives. Obversely, contemporary cultural critics fear that the abandonment of the written word in favour of graphics is stifling critical and creative powers" (Moody 60) -- take, for example, the commonly held view that movies made from novels limit the reader's imagination to the particular portrayal of events chosen for the film. In fact, there are good reasons to believe that both text and images (especially when they are increasingly easy to manipulate by digital means, thus losing once and for all their claim to photographic 'realism') can 'say a thousand different words to different viewers' -- indeed, traditional photography has also been described as 'writing with light'. As Levinson notes, therefore, "once the photograph is converted to a digital format, it is as amenable to manipulation, as divorced from the reality it purports to represent, as the words which appear on the same screen. On that score, the Internet's co-option of photography -- the rendering of the formerly analogue image as its content -- is at least as profound as the Internet's promotion of written communication" (43), and this, then, may perhaps begin to provide a resolution to his overall preference for writing as the predominant Internet communication form, as quoted above: online writing now includes in almost equal measure 'print' text and graphical images, both of which are of course graphically rendered on screen by the computer anyway; they combine into a new form of writing not unlike ancient hieroglyphics. On the Web, writing has come full circle: from the iconographic representations of the earliest civilisations through their simplification and solidification into the various alphabets back to a new online iconography. This also demonstrates the strong Western bias of this technology, of course: had computers emerged from Chinese or Japanese culture, for example -- where alphabets in the literal sense don't exist -- chances are they would never have existed in a text-only form. Now that we have passed the alphabetic stage to re-enter an era of iconography, then, it remains to be seen how this change along with our overall "'immersion' in hypertext will affect the way that we mentally structure our world. Linear argumentation is more a consequence of alphabetic writing than of printed books and it remains to be seen if hypertext presentation will significantly erode this predominant convention for mentally ordering our world" (McKnight et al. 41). Perhaps the computer game experience (where a blending of text and graphics had begun some time before the Web) can provide some early pointers already, then. The game-like nature of information search and usage online might help to undermine some of the more heavily encrusted structures of information dissemination that are still dominant: "we are promised, on the information 'library' side, less of the dogmatic and more of the ludic, less of the canonical and more of the festive. Fewer arguments from authority, through more juxtaposition of authorities" (Debray 146). This is also supported by the fact that there usually exists no one central authority, no one central site, in any field of information covered by the Web, but that there rather is a multiplicity of sources and viewpoints with varying claims to 'authority' and 'objectivity'; rather than rely on authorities to determine what is accepted knowledge, Web users must, and do, distil their own knowledge from the information they find in their searches. Kumon and Aizu's notion that from the industrial-age "wealth game" we have now moved into the "wisdom game" (320) sums up this view. However, for all the ludic exuberance of this game, we should also be concerned that, as in any game, we are also likely to see winners and losers. Those unaware of the rules of the game, and people who are prevented from playing for personal or socioeconomic reasons (the increased use of graphics will make it much more difficult for certain disabled readers to use the Web, for example) must not be left out of it. In gaming terminology, perhaps the formation of teams including such disadvantaged people is the answer? References Debray, Régis. "The Book as Symbolic Object." The Future of the Book. Ed. Geoffrey Nunberg. Berkeley: U of California P, 1996. 139-51. Kumon, Shumpei, and Izumi Aizu. "Co-Emulation: The Case for a Global Hypernetwork Society." Global Networks: Computers and International Communication. Ed. Linda M. Harasim. Cambridge, Mass.: MIT P, 1994. 311-26. Levinson, Paul. Digital McLuhan: A Guide to the Information Millennium. London: Routledge, 1999. Lovink, Geert, and Hartmut Winkler. "The Computer: Medium or Calculating Machine." Convergence 3.2 (1997): 10-18. Marshall, P. David. "The Commodity and the Internet: Interactivity and the Generation of Audience Commodity." Media International Australia 83 (Feb. 1997): 51-62. McAleese, Ray. "Navigation and Browsing in Hypertext." Hypertext: Theory into Practice. Ed. Ray McAleese. Oxford: Intellect, 1993. 5- 38. McKnight, Cliff, Andrew Dillon, and John Richardson. Hypertext in Context. Cambridge: Cambridge UP, 1991. Moody, Nickianne. "Interacting with the Divine Comedy." Fractal Dreams: New Media in Social Context. Ed. Jon Dovey. London: Lawrence and Wishart, 1996. 59-77. Nielsen, Jakob. Hypertext and Hypermedia. Boston: Academic P, 1990. Talbott, Stephen L. The Future Does Not Compute: Transcending the Machines in Our Midst. Sebastopol, Calif.: O'Reilly and Associates, 1995. Citation reference for this article MLA style: Axel Bruns. "The Knowledge Adventure: Game Aesthetics and Web Hieroglyphics." M/C: A Journal of Media and Culture 3.5 (2000). [your date of access] <http://www.api-network.com/mc/0010/adventure.php>. Chicago style: Axel Bruns, "The Knowledge Adventure: Game Aesthetics and Web Hieroglyphics," M/C: A Journal of Media and Culture 3, no. 5 (2000), <http://www.api-network.com/mc/0010/adventure.php> ([your date of access]). APA style: AxeM/C: A Journal of Media and Culture l Bruns. (2000) The knowledge adventure: game aesthetics and Web hieroglyphics. 3(5). <http://www.api-network.com/mc/0010/adventure.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
16

Walker, Ruth. "Double Quote Unquote: Scholarly Attribution as (a) Speculative Play in the Remix Academy." M/C Journal 16, no. 4 (August 12, 2013). http://dx.doi.org/10.5204/mcj.689.

Full text
Abstract:
Many years ago, while studying in Paris as a novice postgraduate, I was invited to accompany a friend to a seminar with Jacques Derrida. I leapt at the chance even though I was only just learning French. Although I tried hard to follow the discussion, the extent of my participation was probably signing the attendance sheet. Afterwards, caught up on the edges of a small crowd of acolytes in the foyer as we waited out a sudden rainstorm, Derrida turned to me and charmingly complimented me on my forethought in predicting rain, pointing to my umbrella. Flustered, I garbled something in broken French about how I never forgot my umbrella, how desolated I was that he had mislaid his, and would he perhaps desire mine? After a small silence, where he and the other students side-eyed me warily, he declined. For years I dined on this story of meeting a celebrity academic, cheerfully re-enacting my linguistic ineptitude. Nearly a decade later I was taken aback when I overheard a lecturer in philosophy at the University of Sydney re-telling my encounter as a witty anecdote, where an early career academic teased Derrida with a masterful quip, quoting back to him his own attention to someone else’s quote. It turned out that Spurs, one of Derrida’s more obscure early essays, employs an extended riff on an inexplicable citation found in inverted commas in the margins of Nietzsche’s papers: “J’ai oublié mon parapluie” (“I have forgotten my umbrella”). My clumsy response to a polite enquiry was recast in a process of Chinese whispers in my academic community as a snappy spur-of-the-moment witticism. This re-telling didn’t just selectively edit my encounter, but remixed it with a meta-narrative that I had myself referenced, albeit unknowingly. My ongoing interest in the more playful breaches of scholarly conventions of quotation and attribution can be traced back to this incident, where my own presentation of an academic self was appropriated and remixed from fumbler to quipster. I’ve also been struck throughout my teaching career by the seeming disconnect between the stringent academic rules for referencing and citation and the everyday strategies of appropriation that are inherent to popular remix culture. I’m taking the opportunity in this paper to reflect on the practice of scholarly quotation itself, before examining some recent creative provocations to the academic ‘author’ situated inventively at the crossroad between scholarly convention and remix culture. Early in his own teaching career at Oxford University Lewis Carroll, wrote to his younger siblings describing the importance of maintaining his dignity as a new tutor. He outlines the distance his college was at pains to maintain between teachers and their students: “otherwise, you know, they are not humble enough”. Carroll playfully describes the set-up of a tutor sitting at his desk, behind closed doors and without access to today’s communication technologies, relying on a series of college ‘scouts’ to convey information down corridors and staircases to the confused student waiting for instruction below. The lectures, according to Carroll, went something like this: Tutor: What is twice three?Scout: What’s a rice-tree?Sub-scout: When is ice free?Sub-sub-scout: What’s a nice fee??Student (timidly): Half a guinea.Sub-sub-scout: Can’t forge any!Sub-scout: Ho for jinny!Scout: Don’t be a ninny!Tutor (looking offended, tries another question): Divide a hundred by twelve.Scout: Provide wonderful bells!Sub-scout: Go ride under it yourself!Sub-sub-scout: Deride the dunderhead elf!Pupil (surprised): What do you mean?Sub-sub-scout: Doings between!Sub-scout: Blue is the screen!Scout: Soup tureen! And so the lecture proceeds… Carroll’s parody of academic miscommunication and misquoting was reproduced by Pierre Bourdieu at the opening of the book Academic Discourse to illustrate the failures of pedagogical practice in higher education in the mid 1960s, when he found scholarly language relied on codes that were “destined to dazzle rather than to enlighten” (3). Bourdieu et al found that students struggled to reproduce appropriately scholarly discourse and were constrained to write in a badly understood and poorly mastered language, finding reassurance in what he called a ‘rhetoric of despair’: “through a kind of incantatory or sacrificial rite, they try to call up and reinstate the tropes, schemas or words which to them distinguish professorial language” (4). The result was bad writing that karaoke-ed a pseudo academic discourse, accompanied by a habit of thoughtlessly patching together other peoples’ words and phrases. Such sloppy quoting activities of course invite the scholarly taboo of plagiarism or its extreme opposite, hypercitation. Elsewhere, Jacques Derrida developed an important theory of citationality and language, but it is intriguing to note his own considerable unease with conventional acknowledgement practices, of quoting and being quoted: I would like to spare you the tedium, the waste of time, and the subservience that always accompany the classic pedagogical procedures of forging links, referring back to past premises or arguments, justifying one’s own trajectory, method, system, and more or less skilful transitions, re-establishing continuity, and so on. These are but some of the imperatives of classical pedagogy with which, to be sure, one can never break once and for all. Yet, if you were to submit to them rigorously, they would very soon reduce you to silence, tautology and tiresome repetition. (The Ear of the Other, 3) This weariness with a procedural hyper-focus on referencing conventions underlines Derrida’s disquiet with the self-protecting, self-promoting and self-justifying practices that bolster pedagogical tradition and yet inhibit real scholarly work, and risk silencing the authorial voice. Today, remix offers new life to quoting. Media theorist Lev Manovich resisted the notion that the practice of ‘quotation’ was the historical precedent for remixing, aligning it instead to the authorship practice of music ‘sampling’ made possible by new electronic and digital technology. Eduardo Navas agrees that sampling is the key element that makes the act of remixing possible, but links its principles not just to music but to the preoccupation with reading and writing as an extended cultural practice beyond textual writing onto all forms of media (8). A crucial point for Navas is that while remix appropriates and reworks its source material, it relies on the practice of citation to work properly: too close to the original means the remix risks being dismissed as derivative, but at the same time the remixer can’t rely on a source always being known or recognised (7). In other words, the conceptual strategies of remix must rely on some form of referencing or citation of the ideas it sources. It is inarguable that advances in digital technologies have expanded the capacity of scholars to search, cut/copy & paste, collate and link to their research sources. New theoretical and methodological frameworks are being developed to take account of these changing conditions of academic work. For instance, Annette Markham proposes a ‘remix methodology’ for qualitative enquiry, arguing that remix is a powerful tool for thinking about an interpretive and adaptive research practice that takes account of the complexity of contemporary cultural contexts. In a similar vein Cheré Harden Blair has used remix as a theoretical framework to grapple with the issue of plagiarism in the postmodern classroom. If, following Roland Barthes, all writing is “a tissue of quotations drawn from innumerable centers of culture” (146), and if all writing is therefore rewriting, then punishing students for plagiarism becomes problematic. Blair argues that since scholarly writing has become a mosaic of digital and textual productions, then teaching must follow suit, especially since teaching, as a dynamic, shifting and intertextual enterprise, is more suited to the digital revolution than traditional, fixed writing (175). She proposes that teachers provide a space in which remixing, appropriation, patch-writing and even piracy could be allowable, even useful and productive: “a space in which the line is blurry not because students are ignorant of what is right or appropriate, or because digital text somehow contains inherent temptations to plagiarise, but because digital media has, in fact, blurred the line” (183). The clashes between remix and scholarly rules of attribution are directly addressed by the pedagogical provocations of conceptual poet Kenneth Goldsmith, who has developed a program of ‘uncreative writing’ at the University of Pennsylvania, where, among other plagiaristic tasks, he forces students to transcribe whole passages from books, or to download essays from online paper mills and defend them as their own, marking down students who show a ‘shred of originality’. In his own writing and performances, which depend almost exclusively on strategies of appropriation, plagiarism and recontextualisation of often banal sources like traffic reports, Goldsmith says that he is working to de-familiarise normative structures of language. For Goldsmith, reframing language into another context allows it to become new again, so that “we don’t need the new sentence, the old sentence re-framed is good enough”. Goldsmith argues for the role of the contemporary academic and creative writer as an intelligent agent in the management of masses of information. He describes his changing perception of his own work: “I used to be an artist, then I became a poet; then a writer. Now when asked, I simply refer to myself as a word processor” (Perloff 147). For him, what is of interest to the twenty-first century is not so much the quote that ‘rips’ or tears words out of their original context, but finding ways to make new ‘wholes’ out of the accumulations, filterings and remixing of existing words and sentences. Another extraordinary example of the blurring of lines between text, author and the discursive peculiarities of digital media can be found in Jonathan Lethem’s essay ‘An Ecstasy of Influence: A Plagiarism’, which first appeared in Harpers Magazine in 2007. While this essay is about the topic of plagiarism, it is itself plagiarized, composed of quotes that have been woven seamlessly together into a composite whole. Although Lethem provides a key at the end with a list of his sources, he has removed in-text citations and quotation marks, even while directly discussing the practices of mis-quotation and mis-attribution throughout the essay itself. Towards the end of the essay can be found the paragraph: Any text is woven entirely with citations, references, echoes, cultural languages, which cut across it through and through in a vast stereophony. The citations that go to make up a text are anonymous, untraceable, and yet already read; they are quotations without inverted commas. The kernel, the soul — let us go further and say the substance, the bulk, the actual and valuable material of all human utterances — is plagiarism. …By necessity, by proclivity, and by delight, we all quote. Neurological study has lately shown that memory, imagination, and consciousness itself is stitched, quilted, pastiched. If we cut-and-paste ourselves, might we not forgive it of our artworks? (68) Overall, Lethem’s self-reflexive pro-plagiarism essay reminds the reader not only of how ideas in literature have been continuously recycled, quoted, appropriated and remixed, but of how open-source cultures are vital for the creation of new works. Lethem (re)produces rather than authors a body of text that is haunted by ever present/absent quotation marks and references. Zara Dinnen suggests that Lethem’s essay, like almost all contemporary texts produced on a computer, is a provocation to once again re-theorise the notion of the author, as not a rigid point of origin but instead “a relay of alternative and composite modes of production” (212), extending Manovich’s notion of the role of author in the digital age of being perhaps closest to that of a DJ. But Lethem’s essay, however surprising and masterfully intertextual, was produced and disseminated as a linear ‘static’ text. On the other hand, Mark Amerika’s remixthebook project first started out as a series of theoretical performances on his Professor VJ blog and was then extended into a multitrack composition of “applied remixology” that features sampled phrases and ideas from a range of artistic, literary, musical, theoretical and philosophical sources. Wanting his project to be received not as a book but as a hybridised publication and performance art project that appears in both print and digital forms, remixthebook was simultaneously published in a prestigious university press and a website that works as an online hub and teaching tool to test out the theories. In this way, Amerika expands the concept of writing to include multimedia forms composed for both networked environments and also experiments with what he terms “creative risk management” where the artist, also a scholar and a teacher, is “willing to drop all intellectual pretence and turn his theoretical agenda into (a) speculative play” (xi). He explains his process halfway through the print book: Other times we who create innovative works of remix artare fully self-conscious of the rival lineagewe spring forth fromand knowingly take on other remixological styles just to seewhat happens when we move insideother writers’ bodies (of work)This is when remixologically inhabitingthe spirit of another writer’s stylistic tendenciesor at least the subconsciously imagined writerly gesturesthat illuminate his or her live spontaneous performancefeels more like an embodied praxis In some ways this all seems so obvious to me:I mean what is a writer anyway buta simultaneous and continuous fusion ofremixologically inhabited bodies of work? (109) Amerika mashes up the jargon of academic writing with avant-pop forms of digital rhetoric in order to “move inside other writers’ bodies (of work)” in order to test out his theoretical agenda in an “embodied praxis” at the same time that he shakes up the way that contemporary scholarship itself is performed. The remixthebook project inevitably recalls one of the great early-twentieth century plays with scholarly quotation, Walter Benjamin’s The Arcades Project. Instead of avoiding conventional quoting, footnoting and referencing, these are the very fabric of Benjamin’s sprawling project, composed entirely of quotes drawn from nineteenth century philosophy and literature. This early scholarly ‘remixing’ project has been described as bewildering and oppressive, but which others still find relevant and inspirational. Marjorie Perloff, for instance, finds the ‘passages’ in Benjamin’s arcades have “become the digital passages we take through websites and YouTube videos, navigating our way from one Google link to another and over the bridges provided by our favourite search engines and web pages" (49). For Benjamin, the process of collecting quotes was addictive. Hannah Arendt describes his habit of carrying little black notebooks in which "he tirelessly entered in the form of quotations what daily living and reading netted him in the way of 'pearls' and 'coral'. On occasion he read from them aloud, showed them around like items from a choice and precious collection" (45). A similar practice of everyday hypercitation can be found in the contemporary Australian performance artist Danielle Freakley’s project, The Quote Generator. For what was intended in 2006 to be a three year project, but which is still ongoing, Freakley takes the delirious pleasure of finding and fitting the perfect quote to fit an occasion to an extreme. Unlike Benjamin, Freakley didn’t collect and collate quotes, she then relied on them to navigate her way through her daily interactions. As The Quote Generator, Freakley spoke only in quotations drawn from film, literature and popular culture, immediately following each quote with its correct in-text reference, familiar to academic writers as the ‘author/date’ citation system. The awkwardness and seeming artificiality of even short exchanges with someone who responds only in quotes might be bewildering enough, but the inclusion of the citation after the quote maddeningly interrupts and, at the same time, adds another metalevel to a conversation where even the simple platitude ‘thank you’ might be followed by an attribution to ‘Deep Throat 1972’. Longer exchanges become increasingly overwhelming, as Freakley’s piling of quote on quote, and sometimes repeating quotes, demands an attentive listener, as is evident in a 2008 interview with Andrew Denton on the ABC’s Enough Rope: Andrew Denton’s Enough Rope (2008) Denton: So, you’ve been doing this for three years??Freakley: Yes, Optus 1991Denton: How do people respond to you speaking in such an unnatural way?Freakley: It changes, David Bowie 1991. On the streets AKA Breakdance 1984, most people that I know think that I am crazy, Billy Thorpe 1972, a nigger like me is going insane, Cyprus Hill 1979, making as much sense as a Japanese instruction manual, Red Dwarf 1993. Video documentation of Freakley’s encounters with unsuspecting members of the public reveal how frustrating the inclusion of ‘spoken’ references can be, let alone how taken aback people are on realising they never get Freakley’s own words, but are instead receiving layers of quotations. The frustration can quickly turn hostile (Denton at one point tells Freakley to “shut up”) or can prove contaminatory, as people attempt to match or one-up her quotes (see Cook's interview 8). Apparently, when Freakley continued her commitment to the performance at a Perth Centerlink, the staff sent her to a psychiatrist and she was diagnosed with an obsessive-compulsive disorder, then prescribed medication (Schwartzkoff 4). While Benjamin's The Arcades Project invites the reader to scroll through its pages as a kind of textual flaneur, Freakley herself becomes a walking and talking word processor, extending the possibilities of Amerika’s “embodied praxis” in an inescapable remix of other people’s words and phrases. At the beginning of the project, Freakley organised a card collection of quotes categorised into possible conversation topics, and devised a ‘harness’ for easy access. Image: Danielle Freakley’s The Quote Generator harness Eventually, however, Freakley was able to rely on her own memory of an astounding number of quotations, becoming a “near mechanical vessel” (Gottlieb 2009), or, according to her own manifesto, a “regurgitation library to live by”: The Quote Generator reads, and researches as it speaks. The Quote Generator is both the reader and composer/editor. The Quote Generator is not an actor spouting lines on a stage. The Quote Generator assimilates others lines into everyday social life … The Quote Generator, tries to find its own voice, an understanding through throbbing collations of others, constantly gluttonously referencing. Much academic writing quotes/references ravenously. New things cannot be said without constant referral, acknowledgement to what has been already, the intricate detective work in the barking of the academic dog. By her unrelenting appropriation and regurgitating of quotations, Freakley uses sampling as a technique for an extended performance that draws attention to the remixology of everyday life. By replacing conversation with a hyper-insistence on quotes and their simultaneous citation, she draws attention to the artificiality and inescapability of the ‘codes’ that make up not just ordinary conversations, but also conventional academic discourse, what she calls the “barking of the academic dog”. Freakley’s performance has pushed the scholarly conventions of quoting and referencing to their furthest extreme, in what has been described by Daine Singer as a kind of “endurance art” that relies, in large part, on an antagonistic relationship to its audience. In his now legendary 1969 “Double Session” seminar, Derrida, too, experimented with the pedagogical performance of the (re)producing author, teasing his earnest academic audience. It is reported that the seminar began in a dimly lit room lined with blackboards covered with quotations that Derrida, for a while, simply “pointed to in silence” (177). In this seminar, Derrida put into play notions that can be understood to inform remix practices just as much as they do deconstruction: the author, originality, mimesis, imitation, representation and reference. Scholarly conventions, perhaps particularly the quotation practices that insist on the circulation of rigid codes of attribution, and are defended by increasingly out-of-date understandings of contemporary research, writing and teaching practices, are ripe to be played with. Remix offers an expanded discursive framework to do this in creative and entertaining ways. References Amerika, Mark. remixthebook. Minneapolis: University of Minnesota Press, 2011. 29 July 2013 http://www.remixthebook.com/. Arendt, Hannah. “Walter Benjamin: 1892-1940.” In Illuminations. New York, NY: Shocken, 1969: 1-55. Barthes, Roland. “The Death of the Author.” Image Music Text. Trans Stephen Heath. New York: Hill and Wang, 1977: 142-148. Benjamin, Walter. The Arcades Project. Ed. Rolf Tiedemann, trans. Howard Eiland & Kevin McLaughlin. Cambridge, MA: Harvard University Press, 1999. Blaire, Cheré Harden. “Panic and Plagiarism: Authorship and Academic Dishonesty in a Remix Culture.” Media Tropes 2.1 (2009): 159-192. Bourdieu, Pierre, Jean-Claude Passeron, and Monique de Saint Martin. Academic Discourse: Linguistic Misunderstanding and Professorial Power. Trans. Richard Teese. Stanford California: Stanford University Press, 1965. Carroll, Lewis (Charles Dodgson). “Letter to Henrietta and Edwin Dodgson 31 Jan 1855”. 15 July 2013 http://en.wikiquote.org/wiki/Letters_of_Lewis_Carroll. Cook, Richard. “Don’t Quote Me on That.” Time Out Sydney (2008): 8. http://rgcooke.wordpress.com/2008/02/13/interview-danielle-freakley.Denton, Andrew. “Interview: The Quote Generator.” Enough Rope. 29 Feb. 2008. ABC TV. 15 July 2013 http://www.youtube.com/watch?v=AsrGvwXsenE. Derrida, Jacques. Spurs, Nietzsche’s Styles. Trans. Barbara Harlow. London: University of Chicago Press, 1978. Derrida, Jacques. The Ear of the Other: Otobiography, Text, Transference. Trans Peggy Kampf. New York: Shocken Books, 1985. Derrida, Jacques. “The Double Session”. Dissemination. Trans Alan Bass, Chicago, University of Chicago Press, 1981. Dinnen, Zara. "In the Mix: The Potential Convergence of Literature and New Media in Jonathan Letham's 'The Ecstasy of Influence'". Journal of Narrative Theory 42.2 (2012). Freakley, Danielle. The Quote Generator. 2006 to present. 10 July 2013 http://www.thequotegenerator.com/. Goldsmith, Kenneth. Uncreative Writing. New York: University of Colombia Press 2011. Gottlieb, Benjamin. "You Shall Worship No Other Artist God." Art & Culture (2009). 15 July 2013 http://www.artandculture.com/feature/999. Lethem, Jonathan. “The Ecstasy of Influence: A Plagiarism.” Harper’s Magazine, Feb. 2007: 59-71. http://harpers.org/archive/2007/02/the-ecstasy-of-influence/. Manovich, Lev. "What Comes after Remix?" 2007. 15 July 2013 http://manovich.net/LNM/index.html. Markham, Annette. “Remix Methodology.” 2013. 9 July 2013 http://www.markham.internetinquiry.org/category/remix/.Morris, Simon (dir.). Sucking on Words: Kenneth Goldsmith. 2007. http://www.ubu.com/film/goldsmith_sucking.html.Navas, Eduardo. Remix Theory: The Aesthetics of Sampling. New York: Springer Wein, 2012. Perloff, Marjorie. Unoriginal Genius: Poetry by Other Means in the New Century. Chicago: University of Chicago Press, 2010. Schwartzkoff, Louise. “Art Forms Spring into Life at Prima Vera.” Sydney Morning Herald 19 Sep. 2008: Entertainment, 4. http://www.smh.com.au/news/entertainment/arts/art-forms-spring-into-life-at-primavera/2008/09/18/1221331045404.html.Singer, Daine (cur.). “Pains in the Artists: Endurance and Suffering.” Blindside Exhibition. 2007. 2 June 2013 http://www.blindside.org.au/2007/pains-in-the-artists.shtml.
APA, Harvard, Vancouver, ISO, and other styles
17

Piper, Melanie. "Blood on Boylston: Digital Memory and the Dramatisation of Recent History in Patriots Day." M/C Journal 20, no. 5 (October 13, 2017). http://dx.doi.org/10.5204/mcj.1288.

Full text
Abstract:
IntroductionWhen I saw Patriots Day (Berg 2016) at my local multiplex, a family entered the theatre and sat a few rows in front of me. They had a child with them, a boy who was perhaps nine or ten years old. Upon seeing the kid, I had a physical reaction. Not quite a knee-jerk, but more of an uneasy gut punch. ‘Don't you know what this movie is about?’ I wanted to ask his parents; ‘I’ve seen Jeff Bauman’s bones, and that is not something a child should see.’ I had lived through the 2013 Boston Marathon bombing and subsequent manhunt, and the memories were vivid in my mind as I waited for the movie to start, to re-present the memory on screen. Admittedly, I had lived through it from the other side of the world, watching through the mediated windows of the computer, smartphone, and television screen. Nevertheless, I remembered it in blood-soaked colour detail, brought to me by online photo galleries, social media updates, the failed amateur sleuths of Reddit, and constant cable news updates, breaking news even when the events had temporarily stalled. Alison Landsberg has coined the term “prosthetic memory” to describe how historical events are re-created and imbued with an affective experience through cinema and other sites of mass cultural mediation, allowing those who did not experience the past to form a personal connection to and subjective memory of history (2). For the boy in the cinema, Patriots Day would most likely be his first encounter with and memory of the Boston Marathon bombing. But how does prosthetic memory apply to audience members like me, who had lived through the Boston bombing from a great distance, with personalised memories mediated by the first-person perspective of social media? Does the ease of dissemination of information, particularly eyewitness photographs and videos, create possibilities for a prosthetic experience of the present? Does the online mediation of historical events of the present translate to screen dramatisations? These questions become particularly pertinent when the first-release audience of a film has recent, living memories of the real events depicted on screen.The time between when an event occurs and when it is brought to cinemas in a true-events adaptation is decreasing. Rebecca A. Sheehan argues that the cultural value of instant information has given rise to a trend in the contemporary biopic and historical film that sees our mediated world turned into a temporal "paradox in which the present is figured as both historical and ongoing" (36). Since 2005, Sheehan writes, biographical films that depict the lives of still-living public figures or in other ways comment on the ongoing history of the present have become increasingly frequent. Sheehan cites films such as The Social Network (Fincher 2010), The Queen (Frears 2006), W. (Stone 2008), and Game Change (Roach 2012) as examples of this growing biopic trend (35-36). In addition to the instantaneous remediation of public figures in the contemporary biopic, similarly there is a stable of contemporary historical films based on the true stories of ordinary people involved in extraordinary recent events. Films such as The Impossible (Bayona 2012), World Trade Center (Stone 2006), United 93 (Greengrass 2006), and Deepwater Horizon (Berg 2016) bring the death and destruction of real-world natural disasters or terrorist attacks to a sanitised but experiential cinematic event. The sensitive nature of some of the events in question often see the films labelled “too soon” and exploitative of recent tragedy. Films such as these typically do not have known public figures as their protagonists, but they arise from a similar climate of the demands of televisual and online mediation that Sheehan describes in the “instant biopics” of her study (36). Given this rise of brief temporal space between real events and their dramatisations, in this essay, I examine Patriots Day in light of the role digital experience plays in both its dramatisation and how the film's initial audience may remember the event. As Patriots Day replicates a kind of prosthetic memory of the present, it uses the first-instance digital mediation of the event to form prosthetic memories for future viewers. Through Patriots Day, I seek to gesture toward the possibilities of first-person digital mediation of major news events in shaping dramatisations of the recent past.Digital Memories of the Boston Marathon BombingTo examine the ways the Boston Marathon bombing circulated in online space, I look at the link- and image-based online discussion platform Reddit as an example of engagement with and recirculation of the event, particularly as a form of engagement defined by photographs and videos. Because the Boston Marathon is a televised and widely-reported event, professional videographers and photographers were present at the marathon’s finish line at the time of the first explosion. Thus, the first bomb and its immediate aftermath were captured in news footage and still images. The graphic nature of some of these images depicting the violence of the scene saw traditional print and television outlets cropping or otherwise editing the photographs to make them appropriate for mass broadcast (Hughney). Some online outlets, however, showed these pictures in their unedited form, often accompanied by warnings that required readers to scroll further down the page or click through the warning to see the photographs. These distinctive capabilities of the online environment allowed individuals to choose whether to view the image, while still allowing the uncensored image to circulate and be reposted elsewhere, such as on Reddit. In addition to photos and videos shot by professionals at the finish line, witnesses armed with smart phone cameras and access to social media posted their views of the aftermath to social media like Twitter, enabling the collation of both amateur and professionally shot photographs of the scene by online news aggregators such as Buzzfeed (Broderick). The Reddit community is seen as an essential part of the Boston Bombing story for the way some of its users participated in a form of ‘crowd-sourced’ investigation that resulted in the false identification of suspects (see: Nhan et al.; Tapia et al.; Potts and Harrison). There is another aspect to Reddit’s role in the circulation and mediation of the story, however, as online venues became a go-to source for news on the unfolding event, where information was delivered faster and with greater accuracy than the often-sensationalised television news coverage (Starbird et al. 347). In addition to its role in providing information that is a part of Reddit’s culture that “value[s] evidence of some kind” to support discussion (Potts and Harrison 144), Reddit played a number of roles in the sense-making process that social media can often facilitate during crisis situations (Heverin and Zach). Through its division into “subreddits,” the individual communities and discussion areas that make up the platform, Reddit accommodates an incredibly diverse range of topics and interests. Different areas of Reddit were able to play different roles in the process of sharing information and acting in a community sense-making capacity in the aftermath of the bombing. Among the subreddits involved in attempting to make sense of the event were those that served as appropriate places for posting image galleries of both professional and amateur photographs and videos, drawn from a variety of online sources. Users of subreddits such as /r/WTF and /r/MorbidReality, for example, posted galleries of “NSFL” (Not Safe For Life) images of the bombing and its aftermath (see: touhou_hijack, titan059, f00d4tehg0dz). Additionally, the /r/Boston subreddit issued calls for anyone with photographs or videos related to the attack to upload them to the thread, as well as providing an e-mail address to submit them to the FBI (RichardHerold). The /r/FindBostonBombers subreddit became a hub for analysis of the photographs. The subreddit's investigatory work was picked up by other online and traditional media outlets (including the New York Post cover photo which misidentified two suspects), bringing wider attention to Reddit’s unfolding coverage of the bombing (Potts and Harrison 148). Landsberg’s theory of prosthetic memory, and her application of it, largely relates to mass culture’s role in “the production and dissemination of memories that have no direct connection to a person’s lived past” (20). The possibilities for news events to be recorded and disseminated by smart phones and social media, however, help to create a deeper sense of affective engagement with a distant present, creating prosthetic memories out of the mediated first-hand experiences of others. The graphic nature of the photos and videos of the Boston bombing collected by and shared on sites like Reddit, the ongoing nature of the event (which, from detonation to the capture of Dzokhar Tsarnaev, spanned five days), and the participatory activity of scouring photographs for clues to the identity of the bombers all lend a sense of ongoing, experiential engagement with first-person, audiovisual mediations of the event. These prosthetic memories of the present are, as Landsberg writes of those created from dramatisations or re-creations of the past, transferable, able to belong to those who have no “natural” claim to them (18) with an experiential element that personalises history for those who do not directly experience it (33). If widely disseminated first-person mediations of events like the Boston bombing can be thought of as a prosthetic experience of present history, how will they play a part in the prosthetic memories of the future? How will those who did not live through the Boston bombing, either as a personal experience or a digitally mediated one, incorporate this digital memory into their own experience of its cinematic re-creation? To address this question, I turn to consider Patriots Day. Of particular note is the bombing sequence’s resemblance to digital mediations of the event as a marker of a plausible docudramatic resemblance to reality.The Docudramatic Re-Presentation of Digital MemoryAs a cinematic representation of recent history, Patriots Day sits at a somewhat uncomfortable intersection of fact and fiction, of docudrama and popcorn action movie, more so than an instant history film typically would. Composite characters or entirely invented characters and narratives that play out against the backdrop of real events are nothing out of the ordinary in the historical film. However, Patriots Day's use of real material and that of pure invention coincides, frequently in stark contrast. The film's protagonist, Boston Police Sergeant Tommy Saunders (played by Mark Wahlberg) is a fictional character, the improbable hero of the story who is present at every step of the attack and the manhunt. He is there on Boylston Street when the bombs go off. He is there with the FBI, helping to identify the suspects with knowledge of Boylston Street security cameras that borders on a supernatural power. He is there at the Watertown shootout among exploding cars and one-liner quips. When Dzokhar Tsarnaev is finally located, he is, of course, first on the scene. Tommy Saunders, as embodied by Wahlberg, trades on all the connotations of both the stereotypical Boston Southie and the action hero that are embedded in Wahlberg’s star persona. As a result, Patriots Day often seems to be a depiction of an alternate universe where Mark Wahlberg in a cop uniform almost single-handedly caught a terrorist. The improbability of Saunders as a character in a true-events drama, though, is thoroughly couched in the docudramatic material of historical depiction. Steven N. Lipkin argues that docudrama is a mode of representation that performs a re-creation of memory to persuade us that it is representing the real (1). By conjuring the memory of an event into being in ways that seem plausible and anchored to the evidence of actuality—such as integrating archival footage or an indexical resemblance to the actual event or an actual person—the representational, cinematic, or fictionalised elements of docudrama are imbued with a sense of the reality they claim to represent (Lipkin 3). Patriots Day uses real visual material throughout the film. The integration of evidence is particularly notable in the bombing sequence, which combines archival footage of the 2013 race, surveillance footage of the Tsarnaev brothers approaching the finish line, and a dramatic re-creation that visually resembles the original to such an extent that its integration with archival footage is almost seamless (Landler). The conclusion of the film draws on this evidential connection to the real as well, in the way that docudrama is momentarily suspended to become documentary, as interviews with some of the real people who are depicted as characters in the film close out the story. In addition to its direct use of the actual, Patriots Day's re-creation of the bombing itself bears an indexical resemblance to the event as seen by those who were not there and relies on memories of the bombing's initial mediation to vouch for the dramatisation's accuracy. In the moments before the bombing's re-creation, actual footage of the Tsarnaevs's route down Boylston Street plays, a low ominous tone of the score building over the silent security footage. The fictional Saunders’s fictional wife (Michelle Monaghan) has come to the finish line to bring him a knee brace, and she passes Tamerlan Tsarnaev as she leaves. This shot directly crosses a visual resemblance to the actual (Themo Melikidze playing Tsarnaev, resembling the bomber through physicality and costuming) with the fictional structuring device of the film in the form of Tommy Saunders. Next, in a long shot, we see Tsarnaev bump into a man wearing a grey raglan shirt. The man turns to look at Tsarnaev. From the costuming, it is evident that this man who is not otherwise named is intended to represent Jeff Bauman, the subject of an iconic photograph from the bombing. In the photo, Bauman is shown being taken from the scene in a wheelchair with both legs amputated from below the knee by the blast (another cinematic dramatisation of the Boston bombing, Stronger, based on Bauman’s memoir of the same name, will be released in 2017). In addition to the visual signifier of Bauman from the memorable photograph, reports circulated that Bauman's ability to describe Tsarnaev to the FBI in the immediate aftermath of the bombing was instrumental in identifying the suspects (Hartmann). Here, this digital memory is re-created in a brief but recognisable moment: this is the before picture of Jeff Bauman, this is the moment of identification that was widely circulated and talked about, a memory of that one piece of good news that helped satisfy public curiosity about the status of the iconic Man in the Wheelchair.When the bombs detonate, we are brought into the smoke and ash, closer access than the original mediation afforded by the videographers at the finish line. After the first bomb detonates, the camera follows Saunders as he walks toward the smoke cloud. As the second bomb explodes, we go inside the scene. The sequence cuts from actual security camera footage that captured the blast, to a first-person perspective of the explosion, the resulting fire and smoke, and a shot that resembles the point of view of footage captured on a smart phone. The frame shakes wildly, giving the viewer disorienting flashes of the victims, a sense of the chaos without seeing anything in lasting, specific detail, before the frame tips sideways onto the pavement, stained with blood and littered with debris. Coupled with this is a soundscape that resembles both the subjective experience of a bombing victim and what their smart phone video has captured. There is the rumble of the explosion and muffled sounds of debris hidden under the noise of shockwaves of air hitting a microphone, fading into an electronic whine and tinnitus ring. A later shot shows the frame obscured by smoke, slowly clearing to give us a high angle view of the aftermath, resembling photographs taken from a window overlooking the scene on Boylston Street (see: touhou_hijack). Archival footage of first responders and points of view resembling a running cell phone camera that captures flashes of blood and open wounds combine with shots of the actors playing characters (both fictional and based on real people) that were established at the beginning of the film. There is once again a merging of the re-created and the actual, bound together by a sense of memory that encourages the viewer to take the former as plausible, based on its resemblance to the latter.When Saunders runs for the second bombing site further down the street, he looks down at two bodies on the ground. Framed in close-up, the bloodless, empty expression and bright blue shirt of Krystle Campbell are recognisable. We can ignore the inaccuracies of this element of the digital memory amidst the chaos of the sequence. Campbell died in the first bombing, not the second. The body of a woman in a black shirt is between the camera's position on the re-created Boylston Street and the actor standing in for Campbell, the opposite of how Campbell and her friend Karen Rand lay beside each other in photographs of the bombing aftermath. The police officer who takes Krystle's pulse on film and shakes her head at Wahlberg's character is a brunette, not the blonde in the widely-circulated picture of a first responder at the actual bombing. The most visceral portion of the image is there, though, re-created almost exactly as it appeared at its first point of mediation: the lifeless eyes and gaping mouth, the bright blue t-shirt. The memory of the event is conjured into being, and the cinematic image resembles the most salient elements of the memory enough for the cinematic image to be a plausible re-creation. The cinematic frame is positioned at a lower level to the original still, as though we are on the ground beside her, bringing the viewer even closer to the event, even as the frame crops out her injuries as scene photographs did not, granting a semblance of respectful distance from the real death. This re-creation of Krystle Campbell’s death is a brief flash in the sequence, but a powerful moment of recognition for those who remember its original mediation. The result is a sequence that shows the graphic violence of the actuality it represents in a series of images that invite its viewer to expand the sequence with their memory of the event the way most of them experienced it: on other screens, at the site of its first instance of digital mediation.ConclusionThrough its use of cinematography that resembles actual photographic evidence of the Boston Marathon bombing or imbues the re-creation with a sense of a first-person, digitally mediated account of the event, Patriots Day draws on its audience's digital memory of recent history to claim accuracy in its fictionalisation. Not everyone who sees Patriots Day may be as familiar with the wealth of eyewitness photographs and images of the Boston Marathon bombing as those who may have experienced and followed the events in online venues such as Reddit. Nonetheless, the fact of this material's existence shapes the event's dramatisation as the filmmakers attempt to imbue the dramatisation with a sense of accuracy and fidelity to the event. The influence of digital memory on the film’s representation of the event gestures toward the possibilities for how online engagement with major news events may play a role in their dramatisation moving forward. Events that have had eyewitness visual accounts distributed online, such as the 2015 Bataclan massacre, the 2016 Pulse nightclub shooting, the 2017 Manchester Arena bombing and Westminster Bridge attack, or the 2016 police shooting of Philando Castile that was streamed on Facebook live, may become the subject of future dramatisations of recent history. The dramatic renderings of contemporary history films will undoubtedly be shaped by the recent memory of their online mediations to appeal to a sense of accuracy in the viewer's memory. As recent history films continue, digital memories of the present will help make the prosthetic memories of the future. ReferencesBroderick, Ryan. “Photos from the Scene of the Boston Marathon Explosion (Extremely Graphic).” Buzzfeed News, 16 Apr. 2013. 2 Aug. 2017 <https://www.buzzfeed.com/ryanhatesthis/first-photos-from-the-scene-of-the-boston-marathon-explosion?utm_term=.fw38Byjq1#.peNXWPe8G>.f00d4tehg0dz. “Collection of Photos from the Boston Marathon Bombing (NSFW) (NSFL-Gore).” Reddit, 16 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/WTF/comments/1cfhg4/collection_of_photos_from_the_boston_marathon/>.Hartmann, Margaret. “Bombing Victim in Iconic Photo Was Key to Identifying Boston Suspects.” New York Magazine, 18 Apr. 2013. 8 Aug. 2017 <http://nymag.com/daily/intelligencer/2013/04/bombing-victim-identified-suspects.html>.Heverin, Thomas, and Lisl Zach. “Use of Microblogging for Collective Sense-Making during Violent Crises: A Study of Three Campus Shootings.” Journal of the American Society for Information Science and Technology 63.1 (2012): 34-47. Hughney, Christine. “News Media Weigh Use of Photos of Carnage.” New York Times, 17 Apr. 2013. 2 Aug. 2017 <http://www.nytimes.com/2013/04/18/business/media/news-media-weigh-use-of-photos-of-carnage.html>.Landler, Edward. “Recreating the Boston Marathon Bombing in Patriots Day.” Cinemontage, 21 Dec. 2016. 8 Aug. 2017 <http://cinemontage.org/2016/12/recreating-boston-marathon-bombing-patriots-day/>.Landsberg, Alison. Prosthetic Memory: The Transformation of American Remembrance in the Age of Mass Culture. New York: Columbia U P, 2004. Lipkin, Steven N. Docudrama Performs the Past: Arenas of Argument in Films Based on True Stories. Newcastle upon Tyne: Cambridge Scholars, 2011. Nhan, Johnny, Laura Huey, and Ryan Broll. “Digilantism: An Analysis of Crowdsourcing and the Boston Marathon Bombing.” British Journal of Criminology 57 (2017): 341-361. Patriots Day. Dir. Peter Berg. CBS Films, 2016.Potts, Liza, and Angela Harrison. “Interfaces as Rhetorical Constructions. Reddit and 4chan during the Boston Marathon Bombings.” Proceedings of the 31st ACM International Conference on Design of Communication. Greenville, North Carolina, September-October 2013. 143-150. RichardHerold. “2013 Boston Marathon Attacks: Please Upload Any Photos in Relation to the Attacks That You Have.” Reddit, 15 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/boston/comments/1cf5wp/2013_boston_marathon_attacks_please_upload_any/>.Sheehan, Rebecca A. “Facebooking the Present: The Biopic and Cultural Instantaneity.” The Biopic in Contemporary Film Culture. Eds. Tom Brown and Bélen Vidal. New York: Routledge, 2014. 35-51. Starbird, Kate, Jim Maddock, Mania Orand, Peg Achterman, and Robert M. Mason. “Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing.” iConference 2014 Proceedings. Berlin, March 2014. 654-662. Tapia, Andrea H., Nicolas LaLone, and Hyun-Woo Kim. “Run Amok: Group Crowd Participation in Identifying the Bomb and Bomber from the Boston Marathon Bombing.” Proceedings of the 11th International ISCRAM Conference. Eds. S.R. Hiltz, M.S. Pfaff, L. Plotnick, and P.C. Shih. University Park, Pennsylvania, May 2014. 265-274. titan059. “Pics from Boston Bombing NSFL.” Reddit, 15 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/WTF/comments/1cf0po/pics_from_boston_bombing_nsfl/>.touhou_hijack. “Krystle Campbell Died Screaming. This Sequence of Photos Shows Her Final Moments.” Reddit, 18 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/MorbidReality/comments/1cktrx/krystle_campbell_died_screaming_this_sequence_of/>.
APA, Harvard, Vancouver, ISO, and other styles
18

Fredericks, Bronwyn, and Abraham Bradfield. "Revealing and Revelling in the Floods on Country: Memory Poles within Toonooba." M/C Journal 23, no. 4 (August 12, 2020). http://dx.doi.org/10.5204/mcj.1650.

Full text
Abstract:
In 2013, the Capricornia Arts Mob (CAM), an Indigenous collective of artists situated in Rockhampton, central Queensland, Australia, successfully tendered for one of three public art projects that were grouped under the title Flood Markers (Roberts; Roberts and Mackay; Robinson and Mackay). Commissioned as part of the Queensland Government's Community Development and Engagement Initiative, Flood Markers aims to increase awareness of Rockhampton’s history, with particular focus on the Fitzroy River and the phenomena of flooding. Honouring Land Connections is CAM’s contribution to the project and consists of several “memory poles” that stand alongside the Fitzroy River in Toonooba Park. Rockhampton lies on Dharumbal Country with Toonooba being the Dharumbal name for the Fitzroy River and the inspiration for the work due to its cultural significance to the Aboriginal people of that region. The name Toonooba, as well as other images and icons including boomerangs, spears, nets, water lily, and frogs, amongst others, are carved, burnt, painted and embedded into the large ironbark poles. These stand with the river on one side and the colonial infrastructure of Rockhampton on the other (see fig. 1, 2 and 3).Figure 1 Figure 2Figure 3Within this article, we discuss Honouring Land Connections as having two main functions which contribute to its significance as Indigenous cultural expression and identity affirmation. Firstly, the memory poles (as well as the process of sourcing materials and producing the final product) are a manifestation of Country and a representation of its stories and lived memories. Honouring Land Connections provides a means for Aboriginal people to revel in Country and maintain connections to a vital component of their being as Indigenous. Secondly, by revealing Indigenous stories, experiences, and memories, Honouring Land Connections emphasises Indigenous voices and perspectives within a place dominated by Eurocentric outlooks and knowledges. Toonooba provides the backdrop on which the complexities of cultural and identity formation within settler-colonial spaces are highlighted whilst revelling in continuous Indigenous presence.Flood Markers as ArtArtists throughout the world have used flood markers as a means of visual expression through which to explore and reveal local histories, events, environments, and socio-cultural understandings of the relationships between persons, places, and the phenomena of flooding. Geertz describes art as a social text embedded within wider socio-cultural systems; providing insight into cultural, social, political, economic, gendered, religious, ethnic, environmental, and biographical contexts. Flood markers are not merely metric tools used for measuring the height of a river, but rather serve as culture artefacts or indexes (Gell Art and Agency; Gell "Technology of Enchantment") that are products and producers of socio-culture contexts and the memories and experiences embedded within them. Through different methods, mediums, and images, artists have created experiential and intellectual spaces where those who encounter their work are encouraged to engage their surroundings in thought provoking and often-new ways.In some cases, flood markers have brought attention to the “character and natural history” of a particular place, where artists such as Louise Lavarack have sought to provoke consciousness of the movement of water across flood plains (Lavarack). In other works, flood markers have served as memorials to individuals such as Gilbert White whose daughter honoured his life and research through installing a glass spire at Boulder Creek, Colorado in 2011 (White). Tragedies such as Hurricane Katrina in New Orleans in 2005 have also been commemorated through flood markers. Artist Christopher Saucedo carved 1,836 waves into a freestanding granite block; each wave representing a life lost (University of New Orleans). The weight of the granite symbolises the endurance and resilience of those who faced, and will continue to face, similar forces of nature. The Pillar of Courage erected in 2011 in Ipswich, Queensland, similarly contains the words “resilience, community, strength, heroes, caring and unity” with each word printed on six separate sections of the pillar, representing the six major floods that have hit the region (Chudleigh).Whilst these flood markers provide valuable insights into local histories, specific to each environmental and socio-cultural context, works such as the Pillar of Courage fail to address Indigenous relationships to Country. By framing flooding as a “natural disaster” to be overcome, rather than an expression of Country to be listened to and understood, Euro and human-centric perspectives are prioritised over Indigenous ways of knowing and being. Indigenous knowledges however encourages a reorientation of Eurocentric responses and relationships to Country, and in doing so challenge compartmentalised views of “nature” where flooding is separated from land and Country (Ingold Perception; Seton and Bradley; Singer). Honouring Land Connections symbolises the voice and eternal presence of Toonooba and counters presentations of flooding that depict it as historian Heather Goodall (36) once saw “as unusual events of disorder in which the river leaves its proper place with catastrophic results.”Country To understand flooding from Indigenous perspectives it is first necessary to discuss Country and apprehend what it means for Indigenous peoples. Country refers to the physical, cosmological, geographical, relational, and emotional setting upon which Indigenous identities and connections to place and kin are embedded. Far from a passive geographic location upon which interactions take place, Country is an active and responsive agent that shapes and contextualises social interactions between and amongst all living beings. Bob Morgan writes of how “Country is more than issues of land and geography; it is about spirituality and identity, knowing who we are and who we are connected to; and it helps us understand how all living things are connected.” Country is also an epistemological frame that is filled with knowledge that may be known and familiarised whilst being knowledge itself (Langton "Sacred"; Rose Dingo; Yunupingu).Central to understanding Country is the fact that it refers to a living being’s spiritual homeland which is the ontological place where relationships are formed and maintained (Yunupingu). As Country nurtures and provides the necessities for survival and prosperity, Indigenous people (but also non-Indigenous populations) have moral obligations to care for Country as kin (Rose Nourishing Terrains). Country is epistemic, relational, and ontological and refers to both physical locations as well as modes of “being” (Heidegger), meaning it is carried from place to place as an embodiment within a person’s consciousness. Sally Morgan (263) describes how “our country is alive, and no matter where we go, our country never leaves us.” Country therefore is fluid and mobile for it is ontologically inseparable to one’s personhood, reflected through phrases such as “I am country” (B. Morgan 204).Country is in continuous dialogue with its surroundings and provides the setting upon which human and non-human beings; topographical features such as mountains and rivers; ancestral beings and spirits such as the Rainbow Snake; and ecological phenomena such as winds, tides, and floods, interact and mutually inform each other’s existence (Rose Nourishing Terrains). For Aboriginal people, understanding Country requires “deep listening” (Atkinson; Ungunmerr), a responsive awareness that moves beyond monological and human-centric understandings of the world and calls for deeper understandings of the mutual and co-dependant relationships that exist within it. The awareness of such mutuality has been discussed through terms such as “kincentrism” (Salmón), “meshworks” (Ingold Lines), “webs of connection” (Hokari), “nesting” (Malpas), and “native science” (Cajete). Such concepts are ways of theorising “place” as relational, physical, and mental locations made up of numerous smaller interactions, each of which contribute to the identity and meaning of place. Whilst each individual agent or object retains its own autonomy, such autonomy is dependent on its wider relation to others, meaning that place is a location where “objectivity, subjectivity and inter-subjectivity converge” (Malpas 35) and where the very essence of place is revealed.Flooding as DialogueWhen positioned within Indigenous frameworks, flooding is both an agent and expression of Toonooba and Country. For the phenomenon to occur however, numerous elements come into play such as the fall of rain; the layout of the surrounding terrain; human interference through built weirs and dams; and the actions and intervention of ancestral beings and spirits. Furthermore, flooding has a direct impact on Country and all life within it. This is highlighted by Dharumbal Elder Uncle Billy Mann (Fitzroy Basin Association "Billy Mann") who speaks of the importance of flooding in bringing water to inland lagoons which provide food sources for Dharumbal people, especially at times when the water in Toonooba is low. Such lagoons remain important places for fishing, hunting, recreational activities, and cultural practices but are reliant on the flow of water caused by the flowing, and at times flooding river, which Uncle Mann describes as the “lifeblood” of Dharumbal people and Country (Fitzroy Basin Association "Billy Mann"). Through her research in the Murray-Darling region of New South Wales, Weir writes of how flooding sustains life though cycles that contribute to ecological balance, providing nourishment and food sources for all beings (see also Cullen and Cullen 98). Water’s movement across land provokes the movement of animals such as mice and lizards, providing food for snakes. Frogs emerge from dry clay plains, finding newly made waterholes. Small aquatic organisms flourish and provide food sources for birds. Golden and silver perch spawn, and receding waters promote germination and growth. Aboriginal artist Ron Hurley depicts a similar cycle in a screen-print titled Waterlily–Darambal Totem. In this work Hurley shows floodwaters washing away old water lily roots that have been cooked in ant bed ovens as part of Dharumbal ceremonies (UQ Anthropology Museum). The cooking of the water lily exposes new seeds, which rains carry to nearby creeks and lagoons. The seeds take root and provide food sources for the following year. Cooking water lily during Dharumbal ceremonies contributes to securing and maintaining a sustainable food source as well as being part of Dharumbal cultural practice. Culture, ecological management, and everyday activity are mutually connected, along with being revealed and revelled in. Aboriginal Elder and ranger Uncle Fred Conway explains how Country teaches Aboriginal people to live in balance with their surroundings (Fitzroy Basin Association "Fred Conway"). As Country is in constant communication, numerous signifiers can be observed on land and waterscapes, indicating the most productive and sustainable time to pursue certain actions, source particular foods, or move to particular locations. The best time for fishing in central Queensland for example is when Wattles are in bloom, indicating a time when fish are “fatter and sweeter” (Fitzroy Basin Association "Fred Conway"). In this case, the Wattle is 1) autonomous, having its own life cycle; 2) mutually dependant, coming into being because of seasonal weather patterns; and 3) an agent of Country that teaches those with awareness how to respond and benefit from its lessons.Dialogue with Country As Country is sentient and responsive, it is vital that a person remains contextually aware of their actions on and towards their surroundings. Indigenous peoples seek familiarity with Country but also ensure that they themselves are known and familiarised by it (Rose Dingo). In a practice likened to “baptism”, Langton ("Earth") describes how Aboriginal Elders in Cape York pour water over the head of newcomers as a way of introducing them to Country, and ensuring that Country knows those who walk upon it. These introductions are done out of respect for Country and are a way of protecting outsiders from the potentially harmful powers of ancestral beings. Toussaint et al. similarly note how during mortuary rites, parents of the deceased take water from rivers and spit it back into the land, symbolising the spirit’s return to Country.Dharumbal man Robin Hatfield demonstrates the importance of not interfering with the dialogue of Country through recalling being told as a child not to disturb Barraru or green frogs. Memmott (78) writes that frogs share a relationship with the rain and flooding caused by Munda-gadda, the Rainbow Snake. Uncle Dougie Hatfield explains the significance of Munda-gadda to his Country stating how “our Aboriginal culture tells us that all the waterways, lagoons, creeks, rivers etc. and many landforms were created by and still are protected by the Moonda-Ngutta, what white people call the Rainbow Snake” (Memmott 79).In the case of Robin Hatfield, to interfere with Barraru’s “business” is to threaten its dialogue with Munda-gadda and in turn the dialogue of Country in form of rain. In addition to disrupting the relational balance between the frog and Munda-gadda, such actions potentially have far-reaching social and cosmological consequences. The rain’s disruption affects the flood plains, which has direct consequences for local flora and transportation and germination of water lily seeds; fauna, affecting the spawning of fish and their movement into lagoons; and ancestral beings such as Munda-gadda who continue to reside within Toonooba.Honouring Land Connections provided artists with a means to enter their own dialogue with Country and explore, discuss, engage, negotiate, and affirm aspects of their indigeneity. The artists wanted the artwork to remain organic to demonstrate honour and respect for Dharumbal connections with Country (Roberts). This meant that materials were sourced from the surrounding Country and the poles placed in a wave-like pattern resembling Munda-gadda. Alongside the designs and symbols painted and carved into the poles, fish skins, birds, nests, and frogs are embalmed within cavities that are cut into the wood, acting as windows that allow viewers to witness components of Country that are often overlooked (see fig. 4). Country therefore is an equal participant within the artwork’s creation and continuing memories and stories. More than a representation of Country, Honouring Land Connections is a literal manifestation of it.Figure 4Opening Dialogue with Non-Indigenous AustraliaHonouring Land Connections is an artistic and cultural expression that revels in Indigenous understandings of place. The installation however remains positioned within a contested “hybrid” setting that is informed by both Indigenous and settler-colonial outlooks (Bhabha). The installation for example is separated from the other two artworks of Flood Markers that explore Rockhampton’s colonial and industrial history. Whilst these are positioned within a landscaped area, Honouring Land Connections is placed where the grass is dying, seating is lacking, and is situated next to a dilapidated coast guard building. It is a location that is as quickly left behind as it is encountered. Its separation from the other two works is further emphasised through its depiction in the project brief as a representation of Rockhampton’s pre-colonial history. Presenting it in such a way has the effect of bookending Aboriginal culture in relation to European settlement, suggesting that its themes belong to a time past rather than an immediate present. Almost as if it is a revelation in and of itself. Within settler-colonial settings, place is heavily politicised and often contested. In what can be seen as an ongoing form of colonialism, Eurocentric epistemologies and understandings of place continue to dominate public thought, rhetoric, and action in ways that legitimise White positionality whilst questioning and/or subjugating other ways of knowing, being, and doing (K. Martin; Moreton-Robinson; Wolfe). This turns places such as Toonooba into agonistic locations of contrasting and competing interests (Bradfield). For many Aboriginal peoples, the memories and emotions attached to a particular place can render it as either comfortable and culturally safe, or as unsafe, unsuitable, unwelcoming, and exclusionary (Fredericks). Honouring Land Connections is one way of publicly asserting and recognising Toonooba as a culturally safe, welcoming, and deeply meaningful place for Indigenous peoples. Whilst the themes explored in Honouring Land Connections are not overtly political, its presence on colonised/invaded land unsettles Eurocentric falsities and colonial amnesia (B. Martin) of an uncontested place and history in which Indigenous voices and knowledges are silenced. The artwork is a physical reminder that encourages awareness—particularly for non-Indigenous populations—of Indigenous voices that are continuously demanding recognition of Aboriginal place within Country. Similar to the boomerangs carved into the poles representing flooding as a natural expression of Country that will return (see fig. 5), Indigenous peoples continue to demand that the wider non-Indigenous population acknowledge, respect, and morally responded to Aboriginal cultures and knowledges.Figure 5Conclusion Far from a historic account of the past, the artists of CAM have created an artwork that promotes awareness of an immediate and emerging Indigenous presence on Country. It creates a space that is welcoming to Indigenous people, allowing them to engage with and affirm aspects of their living histories and cultural identities. Through sharing stories and providing “windows” into Aboriginal culture, Country, and lived experiences (which like the frogs of Toonooba are so often overlooked), the memory poles invite and welcome an open dialogue with non-Indigenous Australians where all may consider their shared presence and mutual dependence on each other and their surroundings.The memory poles are mediatory agents that stand on Country, revealing and bearing witness to the survival, resistance, tenacity, and continuity of Aboriginal peoples within the Rockhampton region and along Toonooba. Honouring Land Connections is not simply a means of reclaiming the river as an Indigenous space, for reclamation signifies something regained after it has been lost. What the memory poles signify is something eternally present, i.e. Toonooba is and forever will be embedded in Aboriginal Country in which we all, Indigenous and non-Indigenous, human and non-human, share. The memory poles serve as lasting reminders of whose Country Rockhampton is on and describes the life ways of that Country, including times of flood. Through celebrating and revelling in the presence of Country, the artists of CAM are revealing the deep connection they have to Country to the wider non-Indigenous community.ReferencesAtkinson, Judy. Trauma Trails, Recreating Song Lines: The Transgenerational Effects of Trauma in Indigenous Australia. Spinifex Press, 2002.Bhabha, Homi, K. The Location of Culture. Taylor and Francis, 2012.Bradfield, Abraham. "Decolonizing the Intercultural: A Call for Decolonizing Consciousness in Settler-Colonial Australia." Religions 10.8 (2019): 469.Cajete, Gregory. Native Science: Natural Laws of Interdependence. 1st ed. Clear Light Publishers, 2000.Chudleigh, Jane. "Flood Memorial Called 'Pillar of Courage' Unveiled in Goodna to Mark the Anniversary of the Natural Disaster." The Courier Mail 2012. 16 Jan. 2020 <http://www.couriermail.com.au/questnews/flood-memorial-called-pillar-of-courage-unveiled-in-goodna-to-mark-the-anniversary-of-the-natural-disaster/news-story/575b1a8c44cdd6863da72d64f9e96f2d>.Cullen, Peter, and Vicky Cullen. This Land, Our Water: Water Challenges for the 21st Century. ATF P, 2011.Fitzroy Basin Association. "Carnarvon Gorge with Fred Conway." 8 Dec. 2010 <https://www.youtube.com/watch?v=RbOP60JOfYo>.———. "The Fitzroy River with Billy Mann." 8 Dec. 2019 <https://www.youtube.com/watch?v=00ELbpIUa_Y>.Fredericks, Bronwyn. "Understanding and Living Respectfully within Indigenous Places." Indigenous Places: World Indigenous Nations Higher Education Consortium Journal 4 (2008): 43-49.Geertz, Clifford. "Art as a Cultural System." MLN 91.6 (1976): 1473-99.Gell, Alfred. Art and Agency: An Anthropological Theory. Clarendon P, 1998.———. "The Technology of Enchantment and the Enchantment of Technology." Anthropology, Art, and Aesthetics, eds. J. Coote and A. Shelton. Clarendon P, 1992. 40-63.Goodall, Heather. "The River Runs Backwards." Words for Country: Landscape & Language in Australia, eds. Tim Bonyhady and Tom Griffiths. U of New South Wales P, 2002. 30-51.Heidegger, Martin. Being and Time. 1st English ed. SCM P, 1962.Hokari, Minoru. Gurindji Journey: A Japanese Historian in the Outback. U of New South Wales P, 2011.Ingold, Tim. Lines: A Brief History. Routledge, 2007.———. The Perception of the Environment: Essays on Livelihood, Dwelling & Skill. Routledge, 2000.Langton, Marcia. "Earth, Wind, Fire and Water: The Social and Spiritual Construction of Water in Aboriginal Societies." Social Archaeology of Australian Indigenous Societies, eds. Bruno David et al. Aboriginal Studies P, 2006. 139-60.———. "The Edge of the Sacred, the Edge of Death: Sensual Inscriptions." Inscribed Landscapes: Marking and Making Place, eds. Bruno David and M. Wilson. U of Hawaii P, 2002. 253-69.Lavarack, Louise. "Threshold." 17 Jan. 2019 <http://www.louiselavarack.com.au/>.Malpas, Jeff. Place and Experience: A Philosophical Topography. Cambridge UP, 1999.Martin, Brian. "Immaterial Land." Carnal Knowledge: Towards a 'New Materialism' through the Arts, eds. E. Barret and B. Bolt. Tauris, 2013. 185-04.Martin, Karen Lillian. Please Knock before You Enter: Aboriginal Regulation of Outsiders and the Implications for Researchers. Post Pressed, 2008.Memmott, Paul. "Research Report 10: Aboriginal Social History and Land Affiliation in the Rockhampton-Shoalwater Bay Region." Commonwealth Commission of Inquiry, Shoalwater Bay Capricornia Coast, Queensland: Research Reports, ed. John T. Woodward. A.G.P.S., 1994. 1-107.Moreton-Robinson, Aileen. The White Possessive: Property, Power, and Indigenous Sovereignty. U of Minnesota P, 2015.Morgan, Bob. "Country – a Journey to Cultural and Spiritual Healing." Heartsick for Country: Stories of Love, Spirit and Creation, eds. S. Morgan et al. Freemantle P, 2008: 201-20.Roberts, Alice. "Flood Markers Unveiled on Fitzroy." ABC News 5 Mar. 2014. 10 Mar. 2014 <https://www.abc.net.au/local/photos/2014/03/05/3957151.htm>.Roberts, Alice, and Jacquie Mackay. "Flood Artworks Revealed on Fitzroy Riverbank." ABC Capricornia 29 Oct. 2013. 5 Jan. 20104 <http://www.abc.net.au/local/stories/2013/10/29/3879048.htm?site=capricornia>.Robinson, Paul, and Jacquie Mackay. "Artwork Portray Flood Impact." ABC Capricornia 29 Oct. 2013. 5 Jan. 2014 <http://www.abc.net.au/lnews/2013-10-29/artworks-portray-flood-impact/5051856>.Rose, Deborah Bird. Dingo Makes Us Human: Life and Land in an Aboriginal Australian Culture. Cambridge UP, 1992.———. Nourishing Terrains: Australian Aboriginal Views of Landscape and Wilderness. Australian Heritage Commission, 1996.Salmón, Enrique. "Kincentric Ecology: Indigenous Perceptions of the Human-Nature Relationship." Ecological Applications 10.5 (2000): 1327-32.Seton, Kathryn A., and John J. Bradley. "'When You Have No Law You Are Nothing': Cane Toads, Social Consequences and Management Issues." The Asia Pacific Journal of Anthropology 5.3 (2004): 205-25.Singer, Peter. Practical Ethics. 3rd ed. Cambridge UP, 2011.Toussaint, Sandy, et al. "Water Ways in Aboriginal Australia: An Interconnected Analysis." Anthropological Forum 15.1 (2005): 61-74.Ungunmerr, Miriam-Rose. "To Be Listened To in Her Teaching: Dadirri: Inner Deep Listening and Quiet Still Awareness." EarthSong Journal: Perspectives in Ecology, Spirituality and Education 3.4 (2017): 14-15.University of New Orleans. "Fine Arts at the University of New Orleans: Christopher Saucedo." 31 Aug. 2013 <http://finearts.uno.edu/christophersaucedofaculty.html>.UQ Anthropology Museum. "UQ Anthropology Museum: Online Catalogue." 6 Dec. 2019 <https://catalogue.anthropologymuseum.uq.edu.au/item/26030>.Weir, Jessica. Murray River Country: An Ecological Dialogue with Traditional Owners. Aboriginal Studies Press, 2009.White, Mary Bayard. "Boulder Creek Flood Level Marker Projects." WEAD: Women Eco Artists Dialog. 15 Jan. 2020 <https://directory.weadartists.org/colorado-marking-floods>.Wolfe, Patrick. "Settler Colonialism and the Elimination of the Native." Journal of Genocide Research 8.4 (2006): 387-409.Yunupingu, Galarrwuy. Our Land Is Our Life: Land Rights – Past, Present and Future. University of Queensland Press, 1997.
APA, Harvard, Vancouver, ISO, and other styles
19

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
20

Ware, Ianto. "Andrew Keen Vs the Emos: Youth, Publishing, and Transliteracy." M/C Journal 11, no. 4 (July 1, 2008). http://dx.doi.org/10.5204/mcj.41.

Full text
Abstract:
This article is a comparison of two remarkably different takes on a single subject, namely the shifting meaning of the word ‘publishing’ brought about by the changes in literacy habits related to Web 2.0. One the one hand, we have Andrew Keen’s much lambasted 2007 book The Cult of the Amateur, which is essentially an attempt to defend traditional gatekeeper models of cultural production by denigrating online, user-generated content. The second is Spin journalist Andy Greenwald’s Nothing Feels Good, focusing on the Emo subculture of the early 2000s and its reliance on Web 2.0 as an integral medium for communication and the accumulation of subcultural capital. What I want to suggest in this article is that these two books, with their contrasting readings of Web 2.0, both tell us something specific about what the word “publishing” means and how it is currently undergoing a significant change brought about by a radical adaptation of literacy practices. What I think both books also do is give us an insight into how those changes are being interpreted, to be rejected on the one hand and applauded on the other. Both books have their faults. Keen’s work can fairly easily be passed off as a sort of cantankerous reminiscence for the legitimacy of an earlier era of publishing, and Greenwald’s Emos have, like all teen subcultures, changed somewhat. Yet what both books portray is an attempt to digest how Web 2.0 has altered perceptions of what constitutes legitimate speaking positions and how that is reflected in the literacy practices that shape the relationships among authors, readers, and the channels through which they interact. Their primary difference is a disparity in the value they place on Web 2.0’s amplification of the Internet’s use as a social and communicative medium. Greenwald embraces it as the facilitator of an open-access dialogue, whereas Keen sees it as a direct threat to other, more traditional, gatekeeper genres. Accordingly, Keen begins his book with a lament that Web 2.0’s “democratization” of media is “undermining truth, souring civic discourse and belittling expertise, experience, and talent … it is threatening the very future of our cultural institutions” (15). He continues, Today’s editors, technicians, and cultural gatekeepers—the experts across an array of fields—are necessary to help us to sift through what’s important and what’s not, what is credible from what is unreliable, what is worth spending our time on as opposed to the white noise that can be safely ignored. (45) As examples of the “white noise,” he lists some of the core features of Web 2.0—blogs, MySpace, YouTube and Facebook. The notable similarity between all of these is that their content is user generated and, accordingly, comes from the position of the personal, rather than from a gatekeeper. In terms of their readership, this presents a fundamental shift in an understanding of authenticated speaking positions, one which Keen suggests underwrites reliability by removing the presence of certifiable expertise. He looks at Web 2.0 and sees a mass of low grade, personal content overwhelming traditional benchmarks of quality and accountability. His definition of “publishing” is essentially one in which a few, carefully groomed producers express work seen as relevant to the wider community. The relationship between reader and writer is primarily one sided, mediated by a gatekeeper and rests on the assumption by all involved that the producer has the legitimacy to speak to a large, and largely silent, readership. Greenwald, by contrast, looks at the same genres and comes to a remarkably different and far more positive conclusion. He focuses heavily on the lively message boards of the social networking site Makeoutclub, the shift to a long tail marketing style by key Emo record labels such as Vagrant and Drive-Thru Records and, in particular, the widespread use of LiveJournal (www.livejournal.com) by suburban, Emo fixated teenagers. Of this he writes: The language is inflated, coded as ‘adult’ and ‘poetic’, which often translates into affected, stilted and forced. But if one can accept that, there’s a sweet vulnerability to it. The world of LiveJournal is an enclosed circuit where everyone has agreed to check their cynicism at the sign on screen; it’s a pulsing, swoony realm of inflated emotions, expectations and dialogue. (287) He specifically notes that one cannot read mediums like LiveJournal in the same style as their more traditional counterparts. There is a necessity to adopt a reading style conducive to a dialogue devoid of conventional quality controls. It is also, he notes, a heavily interconnected, inherently social medium: LiveJournals represent the truest and easiest realization of the essential teenage (and artistic) tenet of the importance of a ‘room of one’s own’, and yet the framework of the website is enough to make each individual room interconnected into a mosaic of richly felt lives. (288) Where Keen sees Web 2.0 as a shift way from established cultural forums, Greenwald sees it as an interconnected conversation. His definition of publishing is more fluid, founded on a belief not in the authenticity of a single, validated voice but on the legitimacy of interaction and communication entirely devoid of any gatekeepers. Central to understanding the difference between Greenwald and Keen is the issue or whether or not we accept the legitimacy of personal voices and how we evaluate the kind of reading practices involved in interpreting them. In this respect, Greenwald’s reference to “a room of one’s own” is telling. When Virginia Woolf wrote A Room of One’s Own in 1929, Web 2.0 wasn’t even a consideration, but her work dealt with a similar subject matter, detailing the key role the novel genre played in legitimising women’s voices precisely because it was “young enough to be soft in [their] hands” (74). What would eventually emerge from Woolf’s work was the field of feminist literary criticism, which hit its stride in the mid-eighties. In terms of its understanding of the power relations inherent to cultural production, particularly as they relate to gatekeeping, it’s a rich academic tradition notably lacking in the writing on Web 2.0. For example, Celia Lury’s essay “Reading the Self,” written more than ten years before the popularisation of the internet, looks specifically at the way in which authoritative speaking positions gain their legitimacy not just through the words on the page but through the entire relationships among author, genre, channels of distribution, and readership. She argues that, “to write is to enter into a relationship with a community of readers, and various forms of writing are seen to involve and imply, at any particular time, various forms of relationship” (102). She continues, so far as text is clearly written/read within a particular genre, it can be seen to rest upon a more or less specific set of social relations. It also means that ‘textual relations’—that is, formal techniques, reading strategies and so on—are not held separate from ‘non-textual relations’—such as methods of cultural production and modes of distribution—and that the latter can be seen to help construct ‘literary value.’ (102) The implication is that an appropriation of legitimised speaking positions isn’t done purely by overthrowing or contesting an established system of ‘quality’ but by developing a unique relationship between author, genre, and readership. Textual and non-textual practices blur together to create literary environments and cultural space. The term “publishing” is at the heart of these relationships, describing the literacies required to interpret particular voices and forms of communication. Yet, as Lury writes, literacy habits can vary. Participation in dialogue-driven, user-generated mediums is utterly different from conventional, gatekeeper-driven ones, yet the two can easily co-exist. For instance, reading last year’s Man Booker prize-winner doesn’t stop one from reading, or even writing, blogs. One can enact numerous literacy practices, move between discourses and inhabit varied relationships between genre, reader, and writer. However, with the rise of Web 2.0 a whole range of literacies that used to be defined as “private sphere” or “everyday literacies,” everything from personal conversations and correspondence to book clubs and fanzines, have become far, far more public. In the past these dialogue-based channels of communication have never been in a position where they could be defined as “publishing.” Web 2.0 changes that, moving previously private sphere communication into online public space in a very obvious way. Keen dismisses this shift as a wall of white noise, but Greenwald does something equally interesting. To a large extent, his positive treatment of Web 2.0’s “affected, stilted and forced” user-generated content is validated by his focus on a “Youth” subculture, namely Emo. Indeed, he heavily links the impact of youthful subcultural practices with the internet, writing that Teenage life has always been about self-creation, and its inflated emotions and high stakes have always existed in a grossly accelerated bubble of hypertime. The internet is the most teenage of media because it too exists in this hypertime of limitless limited moments and constant reinvention. If emo is the soundtrack to hypertime, then the web is its greatest vehicle, the secret tunnel out of the locked bedroom and dead-eyed judgmental scenes of youth. (277) In this light, we accept the voices of his Emo subjects because, underneath their low-quality writing, they produce a “sweet vulnerability” and a “dialogue,” which provides them with a “secret tunnel” out of the loneliness of their bedrooms or unsupportive geographical communities. It’s a theme that hints at the degree to which discussions of Web 2.0 are often heavily connected to arguments about generationalism, framed by the field of youth studies and accordingly end up being mined for what Tara Brabazon calls “spectacular youth subcultures” (23). We see some core examples of this in some of the quasi-academic writing on the subject of “Youth.” For example, in his 2005 book XYZ: The New Rules of Generational Warfare, Michael Grose declares Generation Y as “post-literate”: Like their baby boomer parents and generation X before them, generation Ys get their information from a range of sources that include the written and spoken word. Magazines and books are in, but visual communication is more important for this cohort than their parents. They live in a globalised, visual world where images rather than words are universal communication media. The Internet has heightened the use of symbols as a direct communicator. (95) Given the Internet is overwhelmingly a textual medium, it’s hard to tell exactly what Grose’s point is other than to express his confusion over new literacy practices. In a similar vein and in a similar style, Rebecca Huntley writes in her book The World According to Y, In the Y world, a mobile phone is not merely a phone. It is, as described by demographer Bernard Salt, “a personal accessory, a personal communications device and a personal entertainment centre.” It’s a device for work and play, flirtation and sex, friendship and family. For Yers, their phone symbolizes freedom and flexibility. More than that, your mobile phone symbolizes you. (16) Like Keen, Grose and Huntley are trying to understand a shift in publishing and media that has produced new literacy practices. Unlike Keen, Grose and Huntley pin the change on young people and, like Greenwald, they turn a series of new literacy practices into something akin to what Dick Hebdige called “conspicuous consumption” (103). It’s a term he linked to his definition of bricolage as the production of “implicitly coherent, though explicitly bewildering, systems of connection between things which perfectly equip their users to ‘think’ their own world” (103). Thus, young people are differentiated from the rest of the population by their supposedly unique consumption of “symbols” and mobile phones, into which they read their own cryptic meanings and develop their own generational language. Greenwald shows this methodology in action, with the Emo use of things like LiveJournal, Makeoutclub and other bastions of Web 2.0 joining their record collections, ubiquitous sweeping fringes and penchant for accessorised outfits as part of the conspicuous consumption inherent to understandings of youth subculture. The same theme is reflected in Michel de Certeau’s term “tactics” or, more common amongst those studying Web 2.0, Henry Jenkins’s notion of “poaching”. The idea is that people, specifically young people, appropriate particular forms of cultural literacy to redefine themselves and add a sense of value to their voices. De Certeau’s definition of tactics, as a method of resistance “which cannot count on a ‘proper’ (a spatial or institutional localization), nor thus on a borderline distinguishing the other as a visible totality” (489), is a prime example of how Web 2.0 is being understood. Young people, Emo or not, engage in a consumption of the Internet, poaching the tools of production to redefine the value of their voices in a style completely acceptable to the neo-Marxist, Birmingham school understanding of youth and subculture as a combination producing a sense of resistance. It’s a narrative highly compatible within the fields of cultural and media studies, which, despite major shifts brought about by people like Ken Gelder, Sarah Thornton, Keith Kahn-Harris and the aforementioned Tara Brabazon, still look heavily for patterns of politicised consumption. The problem, as I think Keen inadvertently suggests, is that the Internet isn’t just about young people and their habits as consumers. It’s about what the word “publishing” actually means and how we think about the interaction among writers, readers, and the avenues through which they interact. The idea that we can pass off the redefinition of literacy practices brought about by Web 2.0 as a subcultural youth phenomena is an easy way of bypassing wider cultural shifts onto a token demographic. It presents Web 2.0 as an issue of “Youth” resisting the hegemony of traditional gatekeepers, which is effectively what Greenwald does. Yet such an approach has a very short shelf life. It’s a little like claiming the telephone or the television set were “youth genres.” The uptake of new technologies will inadvertently impact differently on those who grew up with them as compared to those who grew up without them. Yet ultimately changes in literacy habits are much larger than a generationalist framework can really express, particularly given the first generation of “digital natives” are now in their thirties. There’s a lot of things wrong with Andrew Keen’s book but one thing he does do well is ground the debate about Web 2.0 back to issues of legitimate speaking positions and publishing. That said, he also significantly simplifies those issues when he claims the problem is purely about the decline of traditional gatekeeper models. Responding to Keen’s criticism of him, Creative Commons founder Lawrence Lessig writes, I think it is a great thing when amateurs create, even if the thing they create is not as great as what the professional creates. I want my kids to write. But that doesn’t mean that I’ll stop reading Hemingway and read only what they write. What Keen misses is the value to a culture that comes from developing the capacity to create—independent of the quality created. That doesn’t mean we should not criticize works created badly (such as, for example, Keen’s book…). But it does mean you’re missing the point if you simply compare the average blog to the NY times (Lessig). What Lessig expresses here is the different, but not mutually exclusive, literacy practices involved in the word “publishing.” Publishing a blog is very different to publishing a newspaper and the way readers react to both will change as they move in and out the differing discursive spaces each occupies. In a recent collaborative paper by Sue Thomas, Chris Joseph, Jess Laccetti, Bruce Mason, Simon Mills, Simon Perril, and Kate Pullinger, they describe this capacity to move across different reading and writing styles as “transliteracy.” They define the term as “the ability to read, write and interact across a range of platforms, tools and media from signing and orality through handwriting, print, TV, radio and film, to digital social networks” (Thomas et al.). It’s a term that perfectly describes the capacity to move fluidly across discursive environments. Here we return to Greenwald’s use of a framework of youth and subculture. While I have criticised the Birminghamesque fixation on a homogeneous “Youth” demographic enacting resistance through conspicuous consumption, there is good reason to use existing subculture studies methodology as a means of understanding how transliteracies play out in everyday life. David Chaney remarks, the idea of subculture is redundant because the type of investment that the notion of subculture labelled is becoming more general, and therefore the varieties of modes of symbolization and involvement are more common in everyday life. (37) I think the increasing commonality of subcultural practices in everyday life actually makes the idea more relevant, not less. It does, however, make it much harder to pin things on “spectacular youth subcultures.” Yet the focus on “everyday life” is important here, shifting our understanding of “subculture” to the types of literacies played out within localised, personal networks and experiences. As de Certeau has argued, the practice of everyday life is an issue of “a way of thinking invested in a way of acting, an art of combination which cannot be dissociated from an art of using” (Certeau 486). This is as true for our literacy practices as anything else. Whether we choose to label those practices subcultural or not, our ability to interpret, take part in and react to different communicative forums is clearly fundamental to our understanding of the world around us, regardless of our age. Sarah Thornton suggests a useful alternate definition of subculture when she talks about subcultural capital: Subcultural capital is the linchpin of an alternative hierarchy in which the aces of age, gender, sexuality and race are all employed in order to keep the determinations of class, income and occupation at bay (105). This is an understanding that avoids easy narratives of young people and their consumption of Web 2.0 by recognising the complexity with which people’s literacy habits, in the cultural sense, connect to their active participation in the production of meaning. Subcultural capital implies that the framework through which individuals read, interpret, and shift between discursive environments, personalising and building links across the strata of cultural production, is acted out at the local and personal level, rather than purely through the relationship between a producing gatekeeper and a passive, consuming readership. If we recognise the ability for readers to connect multiple mediums, to shift between reading and writing practices, and to seamlessly interpret and digest markedly different assumptions about legitimate speaking voices across genres, our understanding of what it means to “publish” ceases to be an issue of generationalism or conventional mediums being washed away by the digital era. The issue we see in both Keen and Greenwald is an attempt to digest the way Web 2.0 has forced the concept of “publishing” to take on a multiplicity of meanings, played out by individual readers, and imbued with their own unique and interwoven textual and cultural literacy habits. It’s not only Emos who publish livejournals, and it’s incredibly naive to assume gatekeepers have ever really held a monopoly on all aspects of cultural production. What the rise of Web 2.0 has done is simply to bring everyday, private sphere dialogue driven literacies into the public sphere in a very obvious way. The kind of discourses once passed off as resistant youth subcultures are now being shown as common place. Keen is right to suggest that this will continue to impact, sometimes negatively, on traditional gatekeepers. Yet the change is inevitable. As our reading and writing practices alter around new genres, our understandings of what constitutes legitimate fields of publishing will also change. References Brabazon, Tara. From Revolution to Revelation. Aldershot: Ashgate, 2005. de Certeau, Michel. “Practice of Every Day Life.” Cultural Theory and Popular Culture. Ed. John Story. London: Prentice Hall, 1998. 483–94. Chaney, David. “Fragmented Culture and Subcultures.” After Subculture. Ed. Andy Bennett and Keith Kahn-Harris. Houndsmill: Palgrave McMillian, 2004. 36–48. Greenwald, Andy. Nothing Feels Good: Punk Rock, Teenagers and Emo. New York: St Martin’s Griffin, 2003. Grose, Michael. XYZ: The New Rules of Generational Warfare. Sydney: Random House, 2005. Hebdige, Dick. Subculture: The Meaning of Style. London: Methuen and Co Ltd, 1979. Huntley, Rebecca. The World According to Y. Crows Nest: Allen and Unwin, 2006. Keen, Andrew. The Cult of the Amateur. London: Nicholas Brealey Publishing, 2007. Lessig, Lawrence. “Keen’s ‘The Cult of the Amateur’: BRILLIANT!” Lessig May 31, 2007. Aug. 19 2008 ‹http://www.lessig.org/blog/2007/05/keens_the_cult_of_the_amateur.html>. Lury, Celia. “Reading the Self: Autobiography, Gender and the Institution of the Literary.” Off-Centre: Feminism and Cultural Studies. Ed. Sarah. Franklin, Celia Lury, and Jackie Stacey. Hammersmith: HarperCollinsAcademic, 1991. 97–108. Thomas, Sue, Chris Joseph, Jess Laccetti, Bruce Mason, Simon Mills, Simon Perril, and Kate Pullinger. “Transliteracy: Crossing Divides.” First Monday 12.12. (2007). Apr. 1 2008 ‹http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2060/1908>. Thornton, Sarah. Club Cultures: Music, Media and Subcultural Capital. Oxford: Polity Press, 1995. Woolf, Virginia. A Room of One’s Own. Frogmore: Triad/Panther Press, 1977.
APA, Harvard, Vancouver, ISO, and other styles
21

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography