To see the other types of publications on this topic, follow the link: Bills of exchange and promissory notes.

Journal articles on the topic 'Bills of exchange and promissory notes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 30 journal articles for your research on the topic 'Bills of exchange and promissory notes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Spanogle, John A. "United Nations: Convention on International Bills of Exchange and International Promissory Notes." International Legal Materials 28, no. 1 (January 1989): 170–211. http://dx.doi.org/10.1017/s0020782900022920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Özge Akın, MENGENLİ. "Has the ‘UN Convention on International Bills of Exchange and Promissory Notes’ Achieved Its Objective." Ankara Üniversitesi Hukuk Fakültesi Dergisi 4, no. 2 (2007): 1. http://dx.doi.org/10.1501/hukfak_0000000266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Puttevils, Jeroen. "Tweaking financial instruments: bills obligatory in sixteenth-century Antwerp." Financial History Review 22, no. 3 (December 2015): 337–61. http://dx.doi.org/10.1017/s0968565015000207.

Full text
Abstract:
This article discusses the use of private promissory notes in the sixteenth-century commercial metropolis of Antwerp. Students of financial history tend to look for first instances of financial techniques and institutions such as bills of exchange, share trading, sovereign debt and banks. However, financial innovation can also be found in the piecemeal adaptation of an older, existing technique, institution or instrument as the result of changes in the market and of demands exerted by particular groups within that economy. The outcome of this process is determined by the structure of the economy in question, its institutional arrangements and the willingness of authorities to adapt the rules.
APA, Harvard, Vancouver, ISO, and other styles
4

LAWSON, ANDREW. "Writing a Bill of Exchange: The Perils of Pearl Street, The Adventures of Harry Franco, and the Antebellum Credit System." Journal of American Studies 54, no. 4 (March 20, 2019): 645–70. http://dx.doi.org/10.1017/s0021875819000100.

Full text
Abstract:
This article examines representations of credit instruments in two popular antebellum fictions: Asa Greene's The Perils of Pearl Street and Charles Frederick Briggs's The Adventures of Harry Franco. Drawing on a range of business histories it describes the operation of promissory notes and bills of exchange in the cotton-for-credit system, focussing on the “principle of deferral” and the ways in which these instruments attempted to solve the problem of time in long-distance exchange. By establishing concrete connections between characters, times, and places, these fictions demystify the antebellum financial system, revealing an economy based on new forms of social interdependence.
APA, Harvard, Vancouver, ISO, and other styles
5

Cvetkova, Irina. "PROMISSORY NOTES’ TERMINALS AS A WAY OF GAMBLING LEGALIZATION IN RUSSIA." Administrative and Criminal Justice 2, no. 87 (June 30, 2019): 127. http://dx.doi.org/10.17770/acj.v2i87.4022.

Full text
Abstract:
With the evolving commodity-money relations the promissory note has gradually become a universal credit-settlement instrument used in business and banking practice. In the XXI century the promissory note market started to be used both for virtual transactioning and for the transactioning not directly related to the receipt of the particular monetary funds and even for the pursuit of the activities under a ban. After the gambling ban at almost the entire territory of the Russian Federation, stock exchange programmes and bill of exchange terminals started to be actively used to legalize gambling. The imperfection of the legal regulations and the court practice cannot solve the problem of such gambling prohibition forms and gambling halls under the bill of exchange guise of clubs continue their work in different regions of Russia. The paper considers the problem of organizing and conducting gambling using the bill of exchange terminals in the Russian Federation, as well as the court practice on the legality of exchange clubs bill of, the corresponding conclusions have been drawn.
APA, Harvard, Vancouver, ISO, and other styles
6

Dylag, Matthew. "The Negotiability of Promissory Notes and Bills of Exchange in the Time of Chief Justice Holt." Journal of Legal History 31, no. 2 (August 2010): 149–75. http://dx.doi.org/10.1080/01440365.2010.496931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sakurai, Eiji. "CURRENCY AND CREDIT IN MEDIEVAL JAPAN." International Journal of Asian Studies 5, no. 1 (January 2008): 53–70. http://dx.doi.org/10.1017/s1479591407000915.

Full text
Abstract:
AbstractIn contrast to the currency issued for use in ancient and early modern Japan, a feature of the currency of that country's medieval period was that the Japanese state did not mint its own coinage but rather imported the entirety of its supply of copper coins from China. An economy based on Chinese coins therefore lasted for 650 years, from the middle of the twelfth century, through the upheavals of the sixteenth century, down to the seventeenth century when the Tokugawa Bakufu once again minted coins. This article outlines the situation of currency and its specific features during this period, paying particular attention to the trend towards the use of credit, in such forms as bills of exchange and promissory notes. In addition, it points out that the medieval Japanese state had absolutely no motivation, either financially or geopolitically, to issue its own currency.
APA, Harvard, Vancouver, ISO, and other styles
8

Finn, Margot. "Debt and credit in Bath's court of requests, 1829–39." Urban History 21, no. 2 (October 1994): 211–36. http://dx.doi.org/10.1017/s0963926800011032.

Full text
Abstract:
Historians have long recognized the central role of debt and credit for producers, retailers and consumers in the later eighteenth and early nineteenth centuries. Against a background characterized by persistent shortages of specie, limited banking facilities and erratic transport mechanisms, the speculative impulse that fed the expanding economy drew sustenance from a proliferation of instruments of private credit — notably bills of exchange, promissory notes, and accommodation bills — which, together with an increase of trade credit to retailers and their customers, served to promote and intertwine the industrial, commercial and consumer revolutions. ‘At any one time any business owed and was owed many goods caught up in the process of exchange’, Julian Hoppit observes of the later decades of the eighteenth century. ‘All businessmen were creditors and all businessmen were debtors.’ As trade and manufacture increased in English towns and cities, extended chains of indebtedness multiplied the economic links both between individual producers, retailers or consumers and among these sectors of the economy. Thus in Lancashire innkeepers were the debtors of maltsters, brewers and wine merchants, but were the creditors of shopkeepers, who in turn extended webs of consumer credit to sawyers and carpenters, artisans typically indebted (in their capacity as producers) to the master builders for whom they laboured in Liverpool's shipyards. Based on personal faith rather than tangible securities, these varied forms of private credit were notoriously unstable. Broad-based financial crises fuelled by the failure of private credit became commonplace in the last three decades of the century, and persistently disrupted economic life into the Victorian period.
APA, Harvard, Vancouver, ISO, and other styles
9

Puig, Gonzalo Villalta. "The negotiability of money market securities and information and communications technology: a call for the dematerialisation of bills of exchange and promissory notes." International Journal of Technology Policy and Law 1, no. 2 (2012): 205. http://dx.doi.org/10.1504/ijtpl.2012.050214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tüzemen Atik, Ebru. "A Novelty in Turkish Commercial Life: Execution of QR-Code on Cheques." International Journal of Business and Social Research 7, no. 12 (December 21, 2017): 23. http://dx.doi.org/10.18533/ijbsr.v7i12.1079.

Full text
Abstract:
<p>Cheque is an important payment instrument in commercial life.<strong> </strong>Regulations on cheques, which have a very common application in Turkish law, are included in Articles between 780 and 823 of the Turkish Commercial Code (TCC) No. 6102 and in the Cheque Act No. 5941. Law No. 6728 dated July 15, 2016 have introduced significant changes and novelties in the regulations related to the cheques in both laws. In the preamble of the law, it has stated that these changes were the result of the necessity of introducing new regulations for the purposes of a) the speed and security requirements that cheques necessitate, b) widespread payment by cheque, c) the foundation of cheque holders' protection due to the increase in bounced cheque.</p><p>Among the most important of these changes is that the QR-Code and serial number are accepted as a compulsory form requirement for the validity of cheques. In this study, the detection of novelties related to the QR-Code application expected to give functionality to the cheques and the effects of these regulations are discussed. The QR-Code application is a convenient method to ensure the tracing of the cheques and applicability of statutory regulations on cheques.</p><p>According to the general acceptance in Turkish law, bills of exchange are bills, notes and cheques. These bills of exchange have the ability of negotiability and public security in the case of the qualification of the promissory notes or bearer cheques. Furthermore, the introduction of the QR-Code application on the one hand and the criminal arrangements envisaged in the case of bounced cheques, on the other hand, have led to reaching its final point of the security in terms of cheques.</p>Although cheques are a payment instrument by its qualification, it is also used as a credit instrument due to the possibility of arranging the postdated cheque in Turkish trade practice. Making special arrangements in order to ensure particular protection for the cheque and attractiveness of the cheque have become inevitable in this situation. The risk of bounced cheques in practice is significantly reduced with the aim of protecting the cheque holders prescribed by the amendments.
APA, Harvard, Vancouver, ISO, and other styles
11

Park, In-ho. "Comment on the Court judgment related to general Regulations-Commercial Activity of commercial law and Bills of Exchange-Promissory Notes Act and Checks Act in 2019." commercial cases review 33, no. 2 (June 30, 2020): 3–42. http://dx.doi.org/10.36894/kcca.2020.33.2.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Narullah, Aan. "Sistem Moneter Islam: Menuju Kesejahteraan Hakiki." HUNAFA: Jurnal Studia Islamika 13, no. 2 (January 3, 2017): 272. http://dx.doi.org/10.24239/jsi.v13i2.440.272-287.

Full text
Abstract:
The Studies in this article aims to look at how the efforts of the Islamic monetary system in creating the true welfare. Welfare in the conventional economic system (capitalist and socialist) contain of different meanings, when in the conventional economic system, welfare is defined only in terms of materials (material fulfillment), but in the Islamic economic system, welfare contains of broader meaning, the fulfillment of material and immaterial. As Islamic monetary strategy that prohibit sto use of interest, the Islamic monetary instrument does too. The Islamic monetary policy instrument is divided into three mazhab based on the period and the community needs at that time. The first mazhab is the instrument that introduced by mazhab iqtisoduna is Promissory Notes or Bill of Exchange kind of paper to get fresh funds. The second madzhab is the mainstream instruments mazhab that used Dues of Idle Fund is policy instrument that is charged on all assets which are idle. The third mazhab is the alternative monetary system that advocated of Syuratiq Process. It is where a policy that taken by the monetary authorities is based on discussion prior with the real sector. Which is the main characteristic of the Islamic monetary system in its policy instruments are not leaving the ideology of Islamic economics nor throw needs of economic returns for economic players, namely profit sharing. Then it is expected satisfy the human need for material and immaterial, so the true welfare can be achieved
APA, Harvard, Vancouver, ISO, and other styles
13

김상규. "The study on the revised Korean Bills ofExchange and Promissory Notes Act- focused on the research of the sentence of the law -." Korean Lawyers Association Journal 62, no. 12 (December 2013): 267–315. http://dx.doi.org/10.17007/klaj.2013.62.12.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Decker, Frank. "Bills, notes and money in early New South Wales, 1788–1822." Financial History Review 18, no. 1 (November 16, 2010): 71–90. http://dx.doi.org/10.1017/s0968565010000272.

Full text
Abstract:
This article provides a revised account of the development of financial instruments, money and banking in the early penal colony of New South Wales. It is found that private instruments monetised the economy, while the role of state debt, coin and commodities was to finally settle remaining balances. Money originated in the form of small merchant notes. These were created by the need to pay labourers and underpinned a local pound currency standard. A detailed review of colonial court cases and currency legislation reveals that the first bank was founded, contrary to colonial orders, to remove the disruptive impact of exchange rate fluctuations and to achieve a stable private note issue at par with pound sterling bills on London.
APA, Harvard, Vancouver, ISO, and other styles
15

Wulandari, Neni Sri. "A COMPARATIVE STUDY OF INDONESIAN AND MALAYSIAN MONETARY POLICY." International Journal of Business Review (The Jobs Review) 2, no. 1 (June 20, 2019): 47–56. http://dx.doi.org/10.17509/tjr.v2i1.20468.

Full text
Abstract:
Abstract. The important role of monetary policy lies in its ability to influence price stability, economic growth, employment opportunities and balance of payments. Therefore it is very important for the central bank to establish monetary policy in a country especially for two developing countries such as Indonesia and Malaysia. The purpose of this study is to determine the implementation of monetary policy in Indonesia and Malaysia. The method used is the study of literature by comparing the monetary policies of Indonesia and Malaysia. The results of this study indicate that Indonesian monetary policy is strongly influenced by interest rates while monetary policy in Malaysia is influenced by direct loans without ties through open tenders, repo transactions, auction of Bank Negara Monetary Notes (BNMN), auction of Bank Negara Interbank Bills (BNIBs) and foreign exchange (FX). The implications of this study are expected to be able to add new inclusions regarding the implementation of monetary policy in Indonesia and Malaysia.Keyword. monetary policy, comparative study, indonesia, malaysia.
APA, Harvard, Vancouver, ISO, and other styles
16

ROUSSEAU, PETER L. "A common currency: early US monetary policy and the transition to the dollar." Financial History Review 13, no. 1 (March 31, 2006): 97–122. http://dx.doi.org/10.1017/s0968565006000072.

Full text
Abstract:
The transition of the US money supply from the mixture of paper bills of credit, certificates and foreign coins that circulated at various exchange rates with the British pound sterling during the colonial period to the unified dollar standard of the early national period was rapid and had far-reaching consequences. This article documents the transition and highlights the importance of this standardisation in bringing order to the nation's finances and in facilitating the accumulation and intermediation of capital. It describes how the struggle of the colonies to maintain viable substitutes for hard money set the stage for the financial leaders of the Federalist period to settle upon the dollar, attach it to a convertible metallic base, and create a national bank that issued notes denominated in the new monetary unit. It also presents recently constructed estimates of the US money stock for 1790–1820 and relates them to measures of the nation's early modernisation.
APA, Harvard, Vancouver, ISO, and other styles
17

Zymovets, Vladyslav, and Galina Yershova. "SHORT-TERM DEBT OF THE CORPORATE SECTOR AND ITS IMPACT ON THE STABILITY OF THE FINANCIAL SYSTEM OF UKRAINE." Ekonomìka ì prognozuvannâ 2021, no. 2 (June 29, 2021): 69–84. http://dx.doi.org/10.15407/eip2021.02.069.

Full text
Abstract:
The article deals with the economic essence of accounts payable. It is determined that in the process of deformations in the structure of business capital, it acquires the characteristics of a surrogate source of business financing, which in turn creates risks for the stability of Ukraine’s financial system. The authors describe the main trends in the dynamics and structure of accounts payable and define its impact on the growth of debt burden of non-financial corporations in Ukraine at the aggregate level. A comparison of the volume and growth rates of accounts payable in Ukraine and the EU countries is made, which allows to confirm the hypothesis of the introduction of a distorted model of business financing in Ukraine’s corporate sector. The authors point out that one of the reasons for the abnormally high debt dependence in the NFC sector at the aggregate level is the replacement of equity with other current liabilities (including financial loans from associated physical and legal entities), which allowed to establish such a flexible capital structure, which can help rapidly withdraw assets abroad in the event of macro-financial destabilization or other threats of capital loss related to the insecurity of property rights and the prevalence of fiscal voluntarism in Ukraine. The authors conclude that with the overload of balance sheets with short-term debts against the background of a significant reduction in equity leads to a rapid loss of financial stability. At the same time, under the influence of restrictions on activities and other concomitant barriers to doing business due to the global coronavirus pandemic, the financial depletion of the non-financial corporations sector could lead to a wave of corporate bankruptcies. It is concluded that under the influence of narrowing business access to capital in the financial market there is a rapid increase in lending to domestic business by nonresidents, which gives grounds to conclude that in this way domestic business lends itself, using funds previously withdrawn abroad. Further development of these trends not only can be a catalyst for financial imbalances at the level of individual enterprises, but can also provoke a crisis in the foreign exchange market. The authors substantiate that one of the ways to reduce the volume of current debt obligations is to assist the government in transforming the companies’ short-term liabilities into long-term ones. This can be done by converting the companies’ current liabilities into long-term bonds on a voluntary basis using simplified procedures for registration of their issue, and by registering current liabilities to suppliers (for goods and services) as long-term promissory notes.
APA, Harvard, Vancouver, ISO, and other styles
18

Shustek, Zbyshek. "Interesting documents on the convertibility of the Soviet currency during 1924 –1937." Ukrainian Numismatic Annual, no. 1 (December 21, 2017): 165–72. http://dx.doi.org/10.31470/2616-6275-2017-1-165-172.

Full text
Abstract:
In the framework of the New Economic Policy (NEP) and the currency reform of 1922-1924 the USSR currency was introduced, which was fully convertible into gold. Actually, the reform was supposed to re-introduce the old gold currency, which was in circulation in the Russian Empire before the beginning of the WWI. New Soviet copper and silver coins had the same metrological parameters as the corresponding coins before the war. Banknotes were really convenient abroad duringr 1924-1927 years and freely exchanged for other currencies, but promised to free convertibility of banknotes for gold coins has never been implemented. The reason of that was the golden blockade of the USSR and the refusal to accept these coins in the West. For this reason, the old 10-ruble coins with the portrait of Tsar Nicholas II had to continue to be minted. However, there are also internal reasons which prevented the planned exchange rate of the gold coins. The regulatory quota for issuing government bills for 500 million gold rubles was soon exceeded twice, which triggered the development of inflation. On October 1, 1926, the free export of banknotes abroad was prohibited, and in 1928 – also free entry into the USSR. Thus, the free convertibility of the new Soviet currency was abolished, and the Soviet currency became only internal. In this article we review and analyze internal instruction, which stated quite openly that the promised guarantees on new bank notes convertible into gold is in reality only a tactical maneuver relatively to other countries. From August 1, 1926, free export of the Soviet currency was prohibited in foreign countries and in 1928 it’s import from abroad. The Soviet government at that time has made some effort to foreigners who were in the USSR and were carrying Soviet money legally, they can freely convert. At the same time, this effort can be seen as an indication of the responsibility of the Soviet authorities for those who in a very short time provided free convertibility of the Soviet currency. This is evident from the passports of Czechoslovak citizens who have been visiting the USSR for 30 years. Whether its owners are not in the USSR, they were close to Soviet entry visa with a special stamp, followed by the Czech text: "Import and transfer of Soviet currency on the territory of the USSR provided to August 1, 1926". From the results obtained to date from the old passports it is not clear how the Soviet embassy began to give these stamps in the passports. Trips in the USSR were quite rare for foreigners in the interwar period. Exchange of foreign currencies in the USSR was very unprofitable for foreigners in the second half of the 1930's. However, the amount of the money received in rubles, had a much lower purchasing power than the equivalent amount in exchange currency abroad. Accordingly, in the Polish border areas of the USSR, the Soviet currency was offered much cheaper on the black market. But modern authors have noted that any purchase of Soviet money was very risky, as black markets were well controlled by the Soviet secret services. Consequently, all these documents show that the Soviet currency was very uncertain in the interwar period.
APA, Harvard, Vancouver, ISO, and other styles
19

"United Nations Convention on International Bills of Exchange and International Promissory Notes(*)." Uniform Law Review os-16, no. 1 (January 1988): 185–273. http://dx.doi.org/10.1093/ulr/os-16.1.185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

MENGENLİ, Özge Akın. "Has the ‘UN Convention on International Bills of Exchange and Promissory Notes’ Achieved Its Objective?" Ankara Law Review, 2008, 199–212. http://dx.doi.org/10.1501/lawrev_0000000046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Draghici, Cristian. "Complaint Against the Levy of Execution and the Opposition to the Execution if Bills of Exchange and Promissory Notes." SSRN Electronic Journal, 2012. http://dx.doi.org/10.2139/ssrn.2229293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

"Convention portant loi uniforme sur les lettres de change et billets à ordre - 1930/1930 - Convention providing a Uniform Law for Bills of Exchange and Promissory Notes." Uniform Law Review os-13, no. 2 (August 1985): 512–14. http://dx.doi.org/10.1093/ulr/os-13.2.512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

"Convention portant loi uniforme sur les lettres de change et billets à ordre - 1930/1930 - Convention providing a Uniform Law for Bills of Exchange and Promissory Notes." Uniform Law Review os-17, no. 2 (August 1989): 846–47. http://dx.doi.org/10.1093/ulr/os-17.2.846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

"The Legal Basis for the Securities Market in the Republic of Kazakhstan." Review of Central and East European Law 24, no. 5-6 (1998): 451–68. http://dx.doi.org/10.1163/157303598124666851.

Full text
Abstract:
AbstractLegal support for the securities market falls within the state's activities in the person of its agencies for the purpose of enacting relevant legislation creating the necessary conditions under which securities can circulate in the most effective and appropriate manner. The state interests can thereby correspond to the needs of the public to the maximum extent, according to the objective economic laws for the development of any market-oriented society. In our case, the term "legislation" (zakonodatel'stvo) includes all the laws of the Republic of Kazakhstan, Presidential Edicts, and decrees of the Kazakhstani Government, as well as any normative legal acts enacted by the National Securities Commission and other national executive bodies within their authorities. When dealing with legal support for the securities market, we first need to specify that such a market is understood by us as a field where certain pecuniary debt obligations, rights of participation in capital and management circulate (i.e., are sold and purchased) with respect to business entities set up in specific organizational and legal forms. The aforementioned types of property rights in the securities market are certified by a special type documents called securities, or by other methods certifying property rights established by law (e.g., non-documentary securities).As they are basically a form of certain civil law relations, not all types of securities may circulate in the securities market. In particular, mortgage certificates, bills of lading, and other types of commodity instructional documents recognized by Kazakhstani law circulate in the commodity markets, including a commodity exchange. In turn, the securities market, being an element of the financial market, includes the following types:- the capital market, where stocks and bonds are sold and purchased and where other obligations circulate relating to the attraction of funds for setting up enterprises and developing business activities, as well as for solving national or local (oblast') economic, social and cultural problems; and- the money market, where short-term monetary obligations (promissory notes, bills of exchange, checks) circulate, performing the function of payment instruments by means of delayed or split (by installments) payments.In this article, we will research the issue of legal support for the capital and money markets in the Republic of Kazakhstan.
APA, Harvard, Vancouver, ISO, and other styles
25

"Convention destinée à régler certains conflits de lois en matière de lettres de change et de billets à ordre - 1930 / 1930 - Convention for the Settlement of Certain Conflicts of Laws in Connection with Bills of Exchange and Promissory Notes." Uniform Law Review, August 1988. http://dx.doi.org/10.1093/ulr/os-16.2.800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hotz, Rafael. "Considerations on Fractional Reserve Banking and Free-Banking." REVISTA PROCESOS DE MERCADO, March 19, 2021, 203–15. http://dx.doi.org/10.52195/pm.v6i2.293.

Full text
Abstract:
In this article, our goal is to examine a controversy very dear to Austrian economists: that of the legitimacy of the fractional reserve banking system, defined as a system in which the bankers keep in their vaults a quantity of money (narrowly defined) lower than the quantity of cash deposits granted to their clients. In the Austrian vision, the monetary supply, broadly defined (Mises, 1971), consists of money properly said, plus monetary substitutes (bank notes, cash deposits), plus credit-money, this one corresponding to any future right to a monetary sum (time deposits, promissory notes, pre-fixed derivatives). In a narrow sense, money supply consists in money properly said (fiat-money or commodity money). We must, however, clarify some aspects of the money supply. Monetary substitutes have their origin in the monetary certificates. Monetary certificates, in their turn, are tools utilized to confer information about the medium of exchange. For instance, precious metal coins mintage confers information about the metal’s purity and about the weight of the coin; bank notes and current account balances confer information about the amount, overseer and proprietor of the deposited money. So, money certificates can change the agents’ valuations concerning the particular good in question, even being able of independent valuation. Monetary certificates can be physically connected to the medium of exchange or separated from it. In the case of physically connected monetary certificates, we have what we normally call monetary substitutes. Monetary substitutes can, due to their nature, work as property titles to the very medium of exchange. Contemporaneously, monetary substitutes usually can be identified with cash deposits (current account balances) and paper checks, provided that the use of bank notes is increasingly rare. Having made those clarifications concerning monetary substitutes, we will, following Mises (1971, p. 135), call fiduciary media the quantity of monetary substitutes that exceeds the quantity of money properly said. However, before proceeding with our Investigation about the consequences of the legalization of the production of fake monetary substitutes (fiduciary media), we must explain what would be a fake monetary substitute and the nature of this counterfeiting. We must, therefore, start our argumentation establishing some differences about the nature of loan and deposit contracts [x].
APA, Harvard, Vancouver, ISO, and other styles
27

Kaftia, Maksym. "STRATEGIC PRIORITIES FOR REFORMING THE INTERNATIONAL MONETARY FUND AS A FUNCTIONAL INSTITUTE OF INTERNATIONAL FINANCIAL RELATIONS." Economic scope, 2020. http://dx.doi.org/10.32782/2224-6282/159-2.

Full text
Abstract:
The article is devoted to the functioning of the International Monetary Fund in the status of an international financial cooperative, which forms its credit capital through official borrowings from member countries and the issuance of promissory notes on a bilateral basis. One of the effective tools for providing financial assistance to the IMF to overcome the effects of the global economic crisis was the organization's focus on providing member countries with stand-by loans and extended financing loans. The urgent need for the International Monetary Fund to make greater progress in building an integrated and objective system of supervisory control over the functioning of the global financial system led to the expansion of the IMF's functional competencies for regular monitoring of cross-border movement of capital resources. capital movements, diagnostics of the processes of accumulation of global foreign exchange reserves and their country structure, as well as the development and implementation in regulatory practice of a reliable and objective system of global liquidity ratios, taking into account the systemic impact of global financial instability. Reforming the International Monetary Fund in the format of building a global model of the international economic order should also include the implementation of a set of measures to ensure macroeconomic stability in the world. Special attention should be paid to such areas of reforming the International Monetary Fund as strengthening the openness of its internal paperwork and significantly simplifying the bureaucratic procedures for obtaining credit resources by states. The reform of the IMF in the context of the formation of a global model of the international financial order provides as a mandatory component and redistribution of spheres of influence of member countries within the organization in accordance with their competitive status in world finance and contribution to global economic development. It is about the objective need to strengthen the competitive position for the adoption by the International Monetary Fund of management decisions of developing countries and countries with emerging markets.
APA, Harvard, Vancouver, ISO, and other styles
28

Anaya, Ananya. "Minimalist Design in the Age of Archive Fever." M/C Journal 24, no. 4 (August 24, 2021). http://dx.doi.org/10.5204/mcj.2794.

Full text
Abstract:
In a listicle on becomingminimalist.com, Joshua Becker argues that advances in personal computing have contributed to the growing popularity of the minimalist lifestyle. Becker explains that computational media can efficiently absorb physical artefacts like books, photo albums, newspapers, clocks, calendars, and more. In Nawapol Thamrongrattanarit’s Happy Old Year (2019, ฮาวทูทิ้ง ทิ้งอย่างไร..ไม่ให้เหลือเธอ) the protagonist Jean also argues that material possessions are wasteful and unnecessary in the era of cloud storage. In the film, she redesigns her old-fashioned and messy childhood home to create a minimalist home office. In decluttering their material possessions through a partial reliance on computational storage, Jean and Becker conveniently dispense with the materiality of informational infrastructures and digital archives. Informational technology’s ever-growing capacity for storage and circulation also intensify anxieties about clutter. During our online interactions, we inadvertently leave an amassing trail of metadata behind that allows algorithms to “personalise” our interfaces. Consequently, our interfaces are “cluttered” with recommendations that range from toothpaste to news, movies, clothes, and more, based on a narrow and homophilic comparison of datasets. Notably, this hypertrophic trail of digital clutter threatens to overrepresent and blur personal identities. By mindfully reducing excessive consumption and discarding wasteful possessions, our personal spaces can become tidy and coherent. On the other hand, there is little that individuals can do to control nonhuman forms of digital accumulation and the datafied archives that meticulously record and store our activities on a micro-temporal scale. In this essay, I explore archive fever as the prosthetic externalisation of memory across physical and digital spaces. Paying close attention to Sianne Ngai’s work on vernacular aesthetic categories and Susanna Paasonen’s exploration of equivocal affective sensations, I study how advocates of minimalist design seek to recuperate our fraught capacities for affective experience in the digital era. In particular, I examine how Thamrongrattanarit problematises minimalist design, prosthetic memory, and the precarious materiality of digital media in Happy Old Year and Mary Is Happy, Mary Is Happy (2013, แมรี่ อีส แฮปปี้, แมรี่ อีส แฮปปี้). Transmedial Minimalist Networks and Empty Spaces Marie Kondo famously teaches us how to segregate objects that spark joy from material possessions that can be discarded (Kondo). The KonMari method has a strong transmedial presence with Kondo’s bestselling books, her blog and online store, a Netflix series, and sticky memes that feature her talking about objects that do not spark joy. It is interesting to note the rising popularity of prescriptive minimalist lifestyle blogs that utilise podcasts, video essays, tutorials, apps, and more to guide the mindful selection of essential material possessions from waste. Personal minimalism is presented as an antidote to late capitalist clutter as self-help gurus appear across our computational devices teach us how we can curb our carbon footprints and reduce consumerist excess. Yet, as noted by Katherine Hayles, maximal networked media demands a form of hyper-attention that implicates us in multiple information streams at once. There is a tension between the overwhelming simultaneity in the viewing experience of transmedial minimalist lifestyle networks and the rhetoric of therapeutic selection espoused in their content. In their ethnographic work with minimalists, Eun Jeong Cheon and Norman Makoto Su explore how mindfully constructed empty spaces can serve as a resource for technological design (Cheon and Su). Cheon and Su note how empty spaces possess a symbolic and functional value for their respondents. Decluttered empty spaces offer a sensuous experience for minimalists in coherently representing their identity and serve as a respite from congested and busy cities. Furthermore, empty spaces transform the home into a meaningful site of reflection about people’s objects and values as minimalists actively work to reduce their ownership of physical artefacts and the space that material possessions occupy in their homes and minds: the notion of gazing upon empty spaces is not simply about reading or processing information for minimalists. Rather, gazing gives minimalists, a visual indicator of their identity, progress, and values. (Cheon and Su 10) Instead of seeking to fill and augment empty space, Cheon and Su ask what it might mean to design technology that appreciates the absence of information and the limitation of space. The Interestingness of “Total Design and Internet Plenitude” Sianne Ngai argues that in a world where we are constantly hailed as aesthetic subjects, our aesthetic experiences grow increasingly fragile and ineffectual (Ngai 2015). Ngai further contends that late capitalism makes the elite exaggeration of the autonomy of art (at auction houses, mega-exhibitions, biennales, and more) concurrently possible with the hyper-aestheticisation of everyday life. The increase in inconsequential aesthetic experiences mirrors a larger habituation to aesthetic novelty along with the loss of the traditional friction between art and the commodity form: in tandem with these seismic changes to longstanding ideas of art’s vocation, weaker aesthetic categories crop up everywhere, testifying in their very proliferation to how, in a world of “total design and Internet plenitude”, aesthetic experience while less rarefied also becomes less intense. (Ngai 21) Ngai offers us the cute, interesting, and zany as the key vernacular categories that describe aesthetic experience in “the hyper-commodified, information-saturated, and performance-driven conditions of late-capitalist culture” (1). Aesthetic experience no longer subscribes to an exceptionally single feeling but is located at the ambiguous mixture of mundane affect. Susanna Paasonen notes how Ngai’s analysis of an everyday aesthetic experience that is complex and equivocal helps explain how seemingly contradictory and irreconcilable affective tensions might in fact be mutually co-dependent with each other (Paasonen). By critiquing the broad and binary generalisations about addiction and networked technologies, Paasonen emphasises the ambivalent and fleeting nature of affective formation in the era of networked media. Significantly, Paasonen explores how ubiquitous networked infrastructures bind us in dynamic sensations of attention and distraction, control and helplessness, and boredom and interest. For Ngai, the interesting is a “low, often hard-to-register flicker of affect accompanying our recognition of minor differences from a norm” (18). There is a discord between knowledge and feeling (and cognition and perception) at the heart of the interesting. We are drawn to the interesting object after noticing something peculiar about it and yet, we are simultaneously at a loss of knowledge about the exact contents of that peculiarity. The "interesting" is embodied in the seriality of constant circulation and a temporal experience of in-betweenness and anticipation in a paradoxical era of routinised novelty. Ngai notes how in the 1960s, many minimalist conceptual artists were preoccupied with tracking the movement of objects and information by transport and communication technologies. In offering a representation of networks of circulation, “merely interesting” conceptual art disseminates information about itself and makes technologies of distribution central to its process of production. The interesting is a pervasive aesthetic judgment that also explains our affectively complex rapport with information in the context of networked technologies. Acclimatised to the repetitive tempos of internet browsing and circular refreshing, Paasonen notes we often oscillate between boredom and interest during our usage of networked media. As Ngai explains, the interesting is “a discursive aesthetic about difference in the form of information and the pathways of its movement and exchange” (1). It is then “interesting” to explore how Thamrongrattanarit tracks the circulation of information and the pathways of transmedial exchange across Twitter and cinema in Mary Is Happy, Mary Is Happy. Digital Memory in MIHMIH Mary Is Happy, Mary Is Happy is adapted from a set of 410 consecutive tweets by Twitter user @marymaloney. The film instantiates the phatic, ephemeral flow of a Twitter feed through its deadpan and episodic narrative. The titular protagonist Mary is a fickle-headed high-school senior trying to design a minimalist yearbook for her school to preserve their important memories. Yet, the sudden entry of an autocratic principal forces her to follow the school administration’s arbitrary demands and curtail her artistic instincts. Ultimately, Mary produces a thick yearbook that is filled with hagiographic information about the anonymous principal. Thamrongrattanarit offers cheeky commentary about Thailand’s authoritarian royalist democracy where the combination of sudden coups and unquestioning obedience has fostered a peculiar environment of political amnesia. Hagiographic and bureaucratic informational overload is presented as an important means to sustain this combination of veneration and paranoia. @marymaloney’s haphazard tweets are superimposed in the film as intertitles and every scene also draws inspiration from the tweet displayed in an offhand manner. We see Mary swiftly do several random and unexplained things like purchase jellyfishes, sleep through a sudden trip to Paris, rob a restaurant, and more in rapid succession. The viewer is overwhelmed because of a synchronised engagement with two different informational currents. We simultaneously read the tweet and watch the scene. The durational tension between knowing and feeling draws our attention to the friction between conceptual interpretation and sensory perception. Like the conceptual artists of the 1960s, Thamrongrattanarit also shows “information in the act of being circulated” (Ngai 157). Throughout the film, we see Mary and her best friend Suri walk along emptied railway tracks that figuratively represent the routes of informational circulation across networked technologies. With its quirky vignettes and episodic narrative progression, MIHMIH closely mirrors Paasonen’s description of microevents and microflow-like movement on social media. The film also features several abrupt and spectacular “microshocks” that interrupt the narrative’s linear flow. For example, there is a running gag about Mary’s cheap and malfunctioning phone frequently exploding in the film while she is on a call. The repetitive explosions provide sudden jolts of deadpan humour. Notably, Mary also mentions how she uses bills of past purchases to document her daily thoughts rather than a notebook to save paper. The tweets are visually represented through the overwhelming accumulation of tiny bills that Mary often struggles to arrange in a coherent pattern. Thamrongrattanarit draws our attention to the fraught materiality of digital memory and microblogging that does not align with neat and orderly narrativisation. By encouraging a constant expression of thoughts within its distinctive character limit, Twitter promotes minimal writing and maximal fragmentation. Paasonen argues that our networked technologies take on a prosthetic function by externalising memory in their databases. This prosthetic reserve of datafied memory is utilised by the algorithmic unconscious of networked media for data mining. Our capacities for simultaneous multichannel attention and distraction are increasingly subsumed by capital’s novel forms of value extraction. Mary’s use of bills to document her diary takes on another “interesting” valence here as Thamrongrattanarit connects the circulation of information on social media with monetary transactions and the accumulation of debt. While memory in common parlance is normally associated with acts of remembrance and commemoration, digital memory refers to an address for storage and retrieval. Wendy Chun argues that software conflates storage with memory as the computer stores files in its memory (Chun). Furthermore, digital memory only endures through ephemeral processes of regeneration and degeneration. Even as our computational devices move towards planned obsolescence, digital memory paradoxically promises perpetual storage. The images of dusty and obsolete computers in MIHMIH recall the materiality of the devices whose databases formerly stored many prosthetic memories. For Wolfgang Ernst, digital archives displace cultural memory from a literary-based narrativised framework to a calculative and mathematical one as digital media environments increasingly control how a culture remembers. As Jussi Parikka notes “we are miniarchivists ourselves in this information society, which could be more aptly called an information management society” (2). While traditional archives required the prudent selection and curation of important objects that will be preserved for future use on a macro temporal scale, the Internet is an agglomerative storage and retrieval database that records information on a micro temporal scale. The proliferation of agglomerative mini archives also create anxieties about clutter where the miniarchivists of the “information-management society” must contend with the effects of our ever-expanding digital trail. It is useful to note how processes of selection and curation that remain central to minimalist decluttering can be connected with the design of a personal archive. Ernst further argues that digital memory cannot be visualised as a place where objects lay in static rest but is better understood as a collection of mini archives in motion that become perceptible because of dynamic signal-based processing. In MIHMIH, memory inscription is associated with the “minimalist” yearbook that Mary was trying to create along with the bills where she documents her tweets/thoughts. At one point, Mary tries to carefully arrange her overflowing bills across her wall in a pattern to make sense of her growing emotional crisis. Yet, she is overwhelmed by the impossibility of this task. Networked media’s storage of prosthetic memory also makes self-representation ambiguous and messy. As a result, Mary’s story does align with cathartic and linear narrativisation but a messy agglomerative database. Happy Old Year: Decluttering to Mend Prosthetic Memories Kylie Cardell argues that the KonMari method connects tidiness to the self-conscious design of a curated personal archive. Marie Kondo associates decluttering with self-representation. "As Kondo is acutely aware, making memories is not simply about recuperating and preserving symbolic objects of the past, but is a future-oriented process that positions subjects in a peculiar way" (Cardell 2). This narrative formation of personal identity involves carefully storing a limited number of physical artefacts that will spark joy for the future self. Yet, we must segregate these affectively charged objects from clutter. Kondo encourages us to make intuitive judgments of conviction by overcoming ambivalent feelings and attachments about the past that are distributed over a wide set of material possessions. Notably, this form of decluttering involves archiving the prosthetic memories that dwell in our (analogue) material possessions. In Happy Old Year, Jean struggles to curate her personal archive as she becomes painfully aware of the memories that reside in her belongings. Interestingly, the film’s Thai title loosely translates as “How to Dump”. Jean has an urgent deadline to declutter her home so that it can be designed into a minimalist home office. Nevertheless, she gradually realises that she cannot coldly “dump” all her things and decides to return some of the borrowed objects to her estranged friends. This form of decluttering helps assuage her guilt about letting go of the past and allows her to (awkwardly and) elegantly honour her prosthetic memories. HOY reverses the clichéd before-after progression of events since we begin with the minimalist home and go back in flashbacks to observe its inundated and messy state. HOY’s after-before narrative along with its peculiar title that substitutes ‘new’ with ‘old’ alludes to the clashing temporalities that Jean is caught up within. She is conflicted between deceptive nostalgic remembrance and her desire to start over with a minimalist-blank slate that is purged of her past regrets. In many remarkable moments, HOY instantiates movement on computational screens to mirror digital media’s dizzying speeds of circulation and storage. Significantly, the film begins with the machinic perspective of a phone screen capturing a set of minimalist designs from a book. Jean refuses to purchase (and store) the whole book since she only requires a few images that can be preserved in her phone’s memory. As noted in the introduction, minimalist organisation can effectively draw on computational storage to declutter physical spaces. In another subplot, Jean is forced to retrieve a photo that she took years ago for a friend. She grudgingly searches through a box of CDs (a cumbersome storage device in the era of clouds) but ultimately finds the image in her ex-boyfriend Aim’s hard disk. As she browses through a folder titled 2013, her hesitant clicks display a montage of happy and intimate moments that the couple shared together. Aim notes how the computer often behaves like a time machine. Unlike Aim, Jean did not carefully organise and store her prosthetic memories and was even willing to discard the box of CDs that were emblematic of defunct and wasteful accumulation. Speaking about how memory is externalised in digital storage, Thamrongrattanarit notes: for me, in the digital era, we just changed the medium, but human relationships stay the same. … It’s just more complicated because we can communicate from a distance, we can store a ton of memories, which couldn’t have ever happened in the past. (emphasis added) When Jean “dumped” Aim to move to Sweden, she blocked him across channels of networked communicational media to avoid any sense of ambient intimacy between them. In digitising our prosthetic memories and maintaining a sense of “connected presence” across social media, micro temporal databases have made it nearly impossible to erase and forget our past actions. Minimalist organisation might help us craft a coherent and stable representation of personal identity through meticulous decluttering. Yet, late-capitalist clutter takes on a different character in our digital archives where the algorithmic unconscious of networked media capitalises on prosthetic storage to make personal identity ambiguous and untidy. It is interesting to note that Jean initially gets in touch with Aim to return his old camera and apologise for their sudden breakup. The camera can record events to “freeze” them in time and space. Later in the film, Jean discovers a happy family photo that makes her reconsider whether she has been too harsh on her father because of how he “dumped” her family. Yet, Jean bitterly finds that her re-evaluation of her material possessions and their dated prosthetic memories is deceptive. In overidentifying with the frozen images and her affectively charged material possessions, she is misled by the overwhelming plenitude of nostalgic remembrance. Ultimately, Jean must “dump” all her things instead of trying to tidy up the jumbled temporal frictions. In the final sequence of HOY, Jean lies to her friend Pink about her relationship with Aim. She states that they are on good terms. Jean then unfriends Aim on Facebook, yet again rupturing any possibility of phatic and ambient intimacy between them. As they sit before her newly emptied house, Pink notes how Jean can do a lot with this expanded space. In a tight close-up, Jean gazes at her empty space with an ambiguous yet pained expression. Her plan to cathartically purge her regrets and fraught memories by recuperating her prosthetic memories failed. With the remnants of her past self expunged as clutter, Jean is left with a set of empty spaces that will eventually resemble the blank slate that we see at the beginning of the film. The new year and blank slate signify a fresh beginning for her future self. However, this reverse transition from a minimalist blank slate to her chaotically inundated childhood home frames a set of deeply equivocal affective sensations. Nonetheless, Jean must mislead Pink to sustain the notion of tidy and narrativised coherence that equivocally masks her fragmented sense of an indefinable loss. Conclusion MIHMIH and HOY explore the unresolvable and conflicting affective tensions that arise in an ecosystem of all-pervasive networked media. Paasonen argues that our ability to control networked technologies concurrently fosters our mundane and prosthetic dependency on them. Both Jean and Mary seek refuge in the simplicity of minimalist design to wrestle control over their overstimulating spaces and to tidy up their personal narratives. It is important to examine contemporary minimalist networks in conjunction with affective formation and aesthetic experience in the era of “total design and internet plenitude”. In an information-management society where prosthetic memories haunt our physical and digital spaces, minimalist decluttering becomes a form of personal archiving that simultaneously empowers unambiguous aesthetic feeling and linear and stable autobiographical representation. The neatness of minimalist decluttering conjugates with an ideal self that can resolve ambivalent affective attachments about the past and have a coherent vision for the future. Yet, we cannot sort the clutter that resides in digital memory’s micro temporal archives and drastically complicates our personal narratives. Significantly, the digital self is not compatible with neat and orderly narrativisation but instead resembles an unstable and agglomerative database. References Cardell, Kylie. “Modern Memory-Making: Marie Kondo, Online Journaling, and the Excavation, Curation, and Control of Personal Digital Data.” a/b: Auto/Biography Studies 32.3 (2017): 499–517. DOI: 10.1080/08989575.2017.1337993. Cheon, Eun Jeong, and Norman Makoto Su. “The Value of Empty Space for Design.” Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018. DOI: 10.1145/3173574.3173623. Ernst, Wolfgang, and Jussi Parikka. Digital Memory and the Archive. U of Minnesota P, 2013. Happy Old Year. Dir. Nawapol Thamrongrattanarit. Happy Ending Film, 2019. Hayles, N. Katherine. “How We Read: Close, Hyper, Machine.” ADE Bulletin (2010): 62-79. DOI: 10.1632/ade.150.62. Kondo, Marie. The Life-Changing Magic of Tidying Up. Ten Speed Press, 2010. Kyong, Chun Wendy Hui. Programmed Visions: Software and Memory. MIT P, 2013. Mankowski, Lukasz. “Interview with Nawapol Thamrongrattanarit: Happy Old Year Is Me in 100% for the First Time.” Asian Movie Pulse, 9 Feb. 2020. <http://asianmoviepulse.com/2020/02/interview-with-nawapol-thamrongrattanarit-2/>. Mary Is Happy, Mary Is Happy. Dir. Nawapol Thamrongrattanarit. Pop Pictures, 2013. Ngai, Sianne. Our Aesthetic Categories: Zany, Cute, Interesting. Harvard UP, 2015. Paasonen, Susanna. Dependent, Distracted, Bored: Affective Formations in Networked Media. MIT P, 2021. Stephens, Paul. The Poetics of Information Overload: From Gertrude Stein to Conceptual Writing. U of Minnesota P, 2015.
APA, Harvard, Vancouver, ISO, and other styles
29

Downing, Brenda, and Alice Cummins. "The Catastrophe of Childhood Rape: Traversing the Landscape between Private Memory and Public Performance." M/C Journal 16, no. 1 (March 19, 2013). http://dx.doi.org/10.5204/mcj.590.

Full text
Abstract:
She lies helpless and fragmented, limbs leaden with story, forced ever further into herself by the viscous shame that suffocates and disables her. Fleshed lips cling to each other, tongue recoils from the sharp taste of the narrative of her body. Within the impotent portal of her mouth, her story sits, an impenetrable oral hymen. — Brenda DowningRape is, without doubt, a catastrophic experience.When rape is experienced in childhood and is also silenced, it can have devastating consequences that carry through to adulthood.In what ways then can the catastrophic memory of silenced childhood rape be coaxed from its hiding place in the female body? How is it possible to make the transition from silenced experience to public articulation? Can creativity fill the body with courage in the face of helplessness and create breath in the suffocating and silencing space of the aftermath? Can creativity help facilitate the personal expression of muted experience?In this paper we will each reflect on the complexities and enabling capacities of the creative and collaborative processes present when negotiating the landscape between the private memory of silenced childhood rape and public articulation and performance. Brenda will retrace the steps of her academic research. She will identify two paths that have taken her from personal and social silence to public voice, and the articulation of her embodied trauma experience through differing modes of creative expression. Alice will reflect on the ways in which preparing Brenda for the journey from articulation and expression to public performance sometimes required moments of freefall full of risk yet also full of creative forces. Images from Brenda’s solo performance aperture will accompany these reflections. aperture is a companion piece to Brenda’s doctoral research and is the creative result of our collaboration.BrendaIn 2008, I completed my feminist and autoethnographic Honours research. This work explored the multiple and significant ramifications of my silenced and silencing experience of childhood rape. Commencing this research as a mature aged woman inevitably involved a movement back through time to revisit 1971, the year of my rape experience, gathering recollections of the aftermath along the way. My memories of the events of that year, folded tight within me since I was eleven years old and enveloped in a shroud of secrecy for decades, had nonetheless been held with full consciousness and silenced in an act of pragmatism that allowed me to function. These were not uncovered or recovered memories; rather they were suppressed and revisited. I didn’t experience a sudden cracking open of lost memory, instead I stepped easily, though not without discomfort, into the archives of my body and reached with outstretched hand. In the gesture, I offered my memories the opportunity to speak, and speak they did.From within my body, stored memories were unleashed and hurled themselves at me. I caught these memories and held them close. I turned them over, set them down, reached again. I reflected, I explored, paused, considered. I sat alongside them. I got angry. I wept. It was as though these embodied memories, these lived subjective experiences, had been crouching impatiently just beneath the surface awaiting release from the repressive silence that had contained them for so many years.But what had helped facilitate this release? Was it simply the opportunity to be immersed in self-reflective and reflexive research? Following the conventionally written academic-style opening chapters of my Honours thesis, sits my autoethnographic chapter. It was no accident of method that I explored my personal experience through creative writing. I didn’t stumble into this medium; I had a compelling and irresistible urge to express my experience creatively. It seemed the only way. When I sat down to write, the sentences were expelled from my body like a series of long-held but desperate exhalations. They emerged as my memories had sat since childhood, blunt, raw and panting, filled with barely-contained energy. They revealed the chaos and disconnection of the body and mind in the aftermath of silenced childhood rape. They disrupted chronology and mirrored shattered identity. Temporally and spatially they were restless birds, unable to perch for too long, nor in one place. Slipping in and out of the first and third person, they struggled to sustain a fixed identity, or perhaps, refused one. Relational threads appeared transparent but were as strong as lines that support the weight of thrashing fish.In the laying down of the multiple layers of my story, I soon realised the writing was serving an additional purpose. It had evolved to become a critical factor in not only the actualisation of my story but also a means of making sense of my experience by locating it within wider familial, social and cultural contexts. The grounding of my experience through reflexivity and the piecing together of my tenuous sense of self became intimately entwined in the creative process. I recorded each evocative exhalation with frantic diligence, as though I mustn’t lose a word. I felt my visibility, my credibility reliant on each syllable and every nuance. I intuitively sensed that the creative re-capturing of my story would liberate my memories from the smothering folds of corporeal darkness in which they had reluctantly huddled and in that liberation, I would also find freedom from the dragging and stultifying weight of their heavy presence. Helene Cixous talks of moments when we are “unwoven weft” (38), when writings or “songs of an unheard-of purity flow through you [...] well up […] surge forth” (39). I’m certain the liberation of story and self I experienced through the creative writing medium, at a point when I too was unwoven weft, gave me the courage to walk in the night shadows of my embodied childhood memories, the light of creativity guiding my way. In making the transition in 2009 from Honours to doctoral research, I carried with me the knowledge that to ignore or pay cursory attention to the materiality of the raped body is to deny its cellular intelligence and its abundant creative reserves. While the researching and writing of my Honours project was deeply satisfying, what emerged for me during that process was an intense desire for a more three-dimensional aesthetic and embodied engagement with my PhD project. I felt the poetics of embodied language and my moving body would satisfy this desire.With the addition of a performance modality I was convinced I could lift the words off the thesis page in order to, literally, bring the information to life. Through performance I knew I could give the bones of the written language of sexual trauma a heartbeat, a pulse, give them breath. I believed a performance held the potential to drape flesh on the words and pump blood through their sentences. I wanted the narrative of sexual trauma to move and sweat, collapse and stand rather than remain in stasis. I wanted the unresolved nature of silenced sexual trauma to permeate the flesh and speak with more than written language. I wanted my raped female body to be fully present. A performance seemed the only way to convey the three-dimensionality of my muted experience. “Performance is a promissory act,” Della Pollock tells us, “not because it can promise possible change but because it catches its participants—often by surprise—in a contract with possibility: with imagining what might be, could be, should be” (2). When I came across these words, I felt certain that I could create for an audience Pollock’s contract with possibility. Through a performance modality a portal would open to the reality of how it is to live with silenced and unresolved sexual trauma. Beyond that portal an invitation would await for others to engage with the difficulties and compromises of this reality through embodied imagination and somatic empathy. A performance, I felt, could act as a physical, emotional and intellectual bridge of communication between those who have experienced sexual violence and those who have not. In the actualisation of this PhD project my role would be multiple. I would take up the position not only of the researcher but also the researched. Through an engagement with the somatic work of Body-Mind Centering® (BMC®), my still traumatised body would become the primary focus of the research. Additionally, I would present this work in the solo performance aperture. My body then, would become the site of somatic inquiry, providing the embodied text for the research, scribing the work in symbolic language and articulating the emotional landscape of the aftermath of my trauma through performance. As Tami Spry notes, “words can construct, but cannot hold the weight of the body” (170). The words of my thesis then would construct my story from the findings of my somatic inquiry as well as shape my research but the performance would hold the weight of my flesh in the embodied articulation of my story. But I couldn’t do this alone.Help arrived in mid-2010, when I was introduced to and entered the world of BMC® and the work of Alice Cummins. At times the BMC® work and the creative development phase of aperture felt a little like attempting a base jump with a parachute that might, or might not open. However, with Alice’s depth of knowledge and experience guiding me, I have taken what has been an extraordinarily profound journey of somatic exploration resulting in personal healing, revelation, illumination and embodied performance. AliceAs a dance artist and somatic movement educator, my teaching and choreography are influenced by post-modern dance practices and feminist philosophy. My interests have engaged me with socio-political concerns and how the poetics of the moving body articulates our humanity. In my somatic movement practice I draw on BMC®, the work of Bonnie Bainbridge Cohen, with whom I studied in Massachusetts, 1995-98. BMC® evolved in the post-modern dance scene of New York City in the early 1970s and belongs to the lineage of moving research pioneered by Rudolph Laban, F.M. Alexander, and Mabel Todd.Bainbridge Cohen writes:Body-Mind Centering® (BMC®) is an ongoing, experiential journey into the alive and changing territory of the body. The explorer is the mind – our thoughts, feelings, energy, soul, and spirit. Through this journey we are led to an understanding of how the mind is expressed through the body in movement. (1)In June 2010 Brenda participated in a three-day BMC® workshop. During an integrative practice of Authentic Movement she experienced pleasure in moving for the first time. This experience was profound for Brenda after a lifetime of repressing sensation and feeling as a way to contain the memory of her rape. To unravel a torment you must begin somewhere. — Louise BourgeoisSo we began.Before embarking on the creative development of performance making it was critical that Brenda did private work with me. Her history was too traumatic to venture into making work from the body without prior therapeutic hands-on work. When trauma has occurred, the tissue holds this frozen as a way to contain the terror. But it lies in wait and erupts unexpectedly when the circumstances stimulate or provoke memory. As BMC® teacher Phoebe Neville (1996) says: “Memory remains in the tissue until we are ready to feel it”. During her two years of private sessions this hands-on work gave Brenda the capacity to feel and helped her develop somatic and personal insight. This provided the leverage for her understanding, and eventually the making involved in the collaborative process. A BMC® hands-on technique I used during the therapeutic process was cellular touch. This dialogue through touch invites the cells to breathe—to receive and process new information. This exchange supported and stabilized Brenda’s nervous system and perceptual response cycles and helped cultivate endurance. Through the BMC® work we created a visceral bond of attachment and trust that allowed risk as provocation towards realization not as re-stimulus and withdrawal. This allowed Brenda to go from a withdrawn physicality to a dynamic performance presence. Without this capacity to be present, we could not have found a vocabulary that might unearth and express her story through embodied performance making. Brenda’s capacity to be “100% available to be seen” (Hay), would allow meaning to touch her audience. I make work with and through the bodymind and for Brenda’s “voice” to be heard I knew she needed to be able to access the intelligence and imaginary life of her body ... to make, to grasp, to reveal her experience. As artistic director of aperture it was my role to discern how the creative met the psychodynamic and became new realisation and transformation. The BMC® philosophy “support precedes change” (Cohen) infused the collaborative process. Our collaboration also involved a constant flow and exchange of ideas, feelings, intuitive responses and imaginings in both verbal and somatic conversation. This process enabled Brenda’s experience of childhood rape to become a way of exposing the silence and silencing that surrounds rape in our culture.One of the specific research skills we practiced in the creative process was Authentic Movement. Developed in the 1950s by Jungian analyst, Mary Starks Whitehouse, it is a practice that relies on moving and being witnessed. As Brenda moved I, as witness, provided the space of containment and safety, both physical and psychological for the moving exploration to occur. It was in the intersubjective space between us that material arose that might otherwise remain held in the tissue. As Starks Whitehouse says: “Movement, to be experienced, has to be ‘found’ in the body, not put on like a dress or a coat […] it is that which can liberate us” (53). This practice gave Brenda the creative and therapeutic space to explore her experience. In crafting the work I guided Brenda’s movement and emotional states through improvisation and experimentation. In paying close attention to the emergent language and meaning of the nuanced moving, I identified moments of creative potential. Risk and provocation, critical to the transformative act of contemporary performance making, was now possible.As Brenda and I moved to performance making, I was unable to maintain the relationship of client/practitioner. Shifting from the clear perimeters of client and practitioner to an arts practice entails risk. I felt I had to choose at specific moments in our work together to step across the line and transgress, though what it is I transgressed I’m now unsure of. I’ve allowed Brenda into my private realm; she’s shared meals with me, met my friends and partner and slept at my studio home. We’ve spent many hours together and the intimacy of the creative process and the material itself forged our friendship as well as the work. I don’t know if this intimacy was necessary to make this work with Brenda. It is what happened. Brenda’s story touched me deeply and I was participating in its evolution. The work is the result of our private work and our creative relationship, coloured by all its variables. Brenda’s experience of being raped as a child is the catastrophe that we mined to make aperture. The ordeal of this experience shaped her life and her relationships. Its aftermath destroyed her capacity to interact in the world with any agency. When someone has lost their voice and their agency how do we help them find it? During a private session in 2010, Brenda experienced re-stimulation of the trauma. This experience became the “aperture” through which Brenda’s healing has come about. She entered the wound and slowly found her voice and her agency. Both literally and metaphorically, Brenda found her self and her story gathered fleshed substance.The making and performing of aperture was a collaborative process made possible through Brenda’s deep desire for healing and understanding. She led and I followed. Sometimes the path felt perilous and yet it was in these moments that I also felt most certain. These were the risks critical for her realization and empowerment. In both the private and the performance work I practiced a state of love that was self-reflexive and dispassionate. In the moments of greatest distress and disturbance I felt a certainty that was irreducible. The dance we were in was one of survival and I felt the certainty of her innate capacity to survive, and my own capacity to follow her. This was not a certainty constructed of ideas but a felt experience based on every skill and nuance I embodied at that moment. I employed my whole life to work with Brenda and the work also moved my life. What I know and don’t yet know is present in aperture. I am privileged to have witnessed Brenda finding her way to “step into the light”, as Antonio Damasio would put it, and move “through a threshold that separates a protected but limiting shelter from the possibility and risk of a world beyond and ahead” (3).ConclusionThe work of traversing the landscape between private memory and public performance has taken us across some difficult terrain. The adoption of a creative approach has been intrinsic to the navigation of this terrain and central to the storying of this catastrophic experience. The creative process has coaxed, shaped and articulated the complexities and sensitivities of this experience in multiple ways, encouraging voice where once there was silence. This story now speaks and moves. ReferencesBainbridge Cohen, Bonnie. Sensing, Feeling, and Action: The Experiential Anatomy of Body-Mind Centering. 2nd ed. Northampton: Contact Editions, 2008. Bourgeouis, Louise. What Is the Shape of This Problem. Detail. 1999 Cixous, Helene. Coming to Writing and Other Essays. Ed. Jenson, Deborah. Cambridge: Harvard U P, 1991. Cohen, Bainbridge. Personal Communication. 28 Jun. 1995.Damasio, Antonio. The Feeling of What Happens. London: Heinemann & Vintage, 2000. Hay, Deborah. Personal Communication. 20 Jul. 1985.Neville, Phoebe. Personal Communication. 4 Jul. 1996.Pollock, Della. "Introduction: Remembering." Remembering: Oral History Performance. Ed. Pollock, Della. Gordonsville: Palgrave Macmillan, 2005. 1-17.Spry, Tami. Body, Paper, Stage: Writing and Performing Autoethnography. Walnut Creek: Left Coast, 2011. Starks Whitehouse, Mary. "Physical Movement and Personality (1963)." Authentic Movement: A Collection of Essays by Mary Starks Whitehouse, Janet Adler & Joan Chodrow. Ed. Pallaro, Patrizia. London: J. Kingsley, 1999. 51-57.
APA, Harvard, Vancouver, ISO, and other styles
30

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography