To see the other types of publications on this topic, follow the link: Cybernetics – United States.

Journal articles on the topic 'Cybernetics – United States'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 35 journal articles for your research on the topic 'Cybernetics – United States.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kline, Ronald. "How disunity matters to the history of cybernetics in the human sciences in the United States, 1940–80." History of the Human Sciences 33, no. 1 (February 2020): 12–35. http://dx.doi.org/10.1177/0952695119872111.

Full text
Abstract:
Rather than assume a unitary cybernetics, I ask how its disunity mattered to the history of the human sciences in the United States from about 1940 to 1980. I compare the work of four prominent social scientists – Herbert Simon, George Miller, Karl Deutsch, and Talcott Parsons – who created cybernetic models in psychology, economics, political science, and sociology with the work of anthropologist Gregory Bateson, and relate their interpretations of cybernetics to those of such well-known cyberneticians as Norbert Wiener, Warren McCulloch, W. Ross Ashby, and Heinz von Foerster. I argue that viewing cybernetics through the lens of disunity – asking what was at stake in choosing a specific cybernetic model – shows the complexity of the relationship between first-order cybernetics and the postwar human sciences, and helps us rethink the history of second-order cybernetics.
APA, Harvard, Vancouver, ISO, and other styles
2

Saepudin, Saepudin. "TEORI LINGUISTIK DAN PSIKOLOGI DALAM PEMBELAJARAN BAHASA." AL-ISHLAH: Jurnal Pendidikan Islam 16, no. 1 (June 20, 2018): 100–118. http://dx.doi.org/10.35905/alishlah.v16i1.738.

Full text
Abstract:
This article discusses several language theories and psychological theories thatinfluence the educator's point of view in teaching languages both mother tongueand second language learners. Among the linguistic theories described arestructuralism theories pioneered by Ferdinand de Saussure in Europe; the firstfigure to do a study of language with scientific principles and codified so that it canbe analyzed using systematic and clear methods. Other figures in this genre areLeonardo Bloomfield, Edward Saphier, Charles Hokait and Charles Fries. Second,the transformational generative theory pioneered by Noam Chomsky, who wasborn in 1928 in Pennsylvania, United States. Psychological theories discussed arethe theories of behaviorism, nativism, cognitivism, functional, constructivism,humanism and cybernetics
APA, Harvard, Vancouver, ISO, and other styles
3

Weintraub, E. Roy. "MCCARTHYISM AND THE MATHEMATIZATION OF ECONOMICS." Journal of the History of Economic Thought 39, no. 4 (October 2, 2017): 571–97. http://dx.doi.org/10.1017/s1053837217000475.

Full text
Abstract:
Historians of the social sciences and historians of economics have come to agree that, in the United States, the 1940s transformation of economics from political economy to economic science was associated with economists’ engagements with other disciplines—e.g., mathematics, statistics, operations research, physics, engineering, cybernetics—during and immediately after World War II. More controversially, some historians have also argued that the transformation was accelerated by economists’ desires to be safe, to seek the protective coloration of mathematics and statistics, during the McCarthy period. This paper argues that that particular claim 1) is generally accepted, but 2) is unsupported by good evidence, and 3) what evidence there is suggests that the claim is false.
APA, Harvard, Vancouver, ISO, and other styles
4

Karanikas, Nektarios, and David Passenier. "The AVAC-COM Communication Model and Taxonomy: Results from Application to Aviation Safety Events." MATEC Web of Conferences 273 (2019): 01008. http://dx.doi.org/10.1051/matecconf/201927301008.

Full text
Abstract:
Communication problems are acknowledged as hazardous eventualities affecting operations negatively. However, a few systematic attempts have been made to understand the pattern of communication issues and their contribution to safety events. In this paper, we present the AVAC-COM communication model and taxonomy based on the cybernetics approach and a literature review. The model elements and taxonomy variables regard the actors, signals, coders, interference, direction and timing, predictability, decoders, and channels. To test the applicability and potential value of the AVAC-COM framework, we analysed 103 safety investigation reports from aviation published between 1997 and 2016 by the respective authorities of Canada, the United States, Australia, the United Kingdom and the Netherlands. The overall results of the 256 cases of communication flaws detected in the reports suggested that these regarded more frequently Human-Media and Human-Human interactions, verbal and local communications as well as unfamiliarity of the receivers with the messages transmitted. Further statistical tests revealed associations of the region, time period, event severity and operations type with various variables of the AVAC-COM taxonomy. Although the findings are only indicative, they showed the potential of the AVAC-COM model and taxonomy to be used to identify strong and weak communication elements and relationships in documented data such as investigation and hazard reports.
APA, Harvard, Vancouver, ISO, and other styles
5

Privalov, Nikolai, and Svetlana Privalova. "Economics and Political economy textbooks: 28 years of interaction." SHS Web of Conferences 97 (2021): 01003. http://dx.doi.org/10.1051/shsconf/20219701003.

Full text
Abstract:
The article analyzes the methodology of modern economic theory. The advantages and disadvantages Of the McConnell and brew economies are analyzed. It is compared with the textbook “Political economy” of the period of the USSR and Soviet Russia. A literature review has shown that many authors are critical of Main stream and are looking for alternative theories and methodologies. The article analyzes the institutional reasons for teaching Economics. Given the growing global crisis of industrial civilization and, in particular, the systemic crisis of its economic and political leader-the United States, the question is raised about the need to create a new type of textbook on economic theory. The article describes the philosophical roots of Economics and Marxist political economy. According to the authors of the article, these two areas of science and education in the twentieth century became examples of a “secular form of religion”, since their ideological orientation prevailed over the scientific content. “Russian Economics” is a textbook for undergraduates that has broader system relationships with other Sciences (sociology, political science, Cybernetics, zoopsychology, etc.) and applies, along with well-known models of Economics, also qualitative methods and models of classical political economy within the framework of a systematic approach. The article describes the methodological principles of a new type of textbook that reflect the basic provisions of traditional European culture and can serve to form the concept of the “third way economy”, as an objectively emerging model of a mixed economy.
APA, Harvard, Vancouver, ISO, and other styles
6

Pérez, B. A., F. Murillo, M. Divo de Sesar, and E. R. Wright. "Occurrence of Fusarium solani on Blueberry in Argentina." Plant Disease 91, no. 8 (August 2007): 1053. http://dx.doi.org/10.1094/pdis-91-8-1053c.

Full text
Abstract:
Blueberry plants with root rot and sudden death symptoms were collected in Concordia, Entre Ríos. Diseased roots were disinfected by immersion in 0.5% NaOCl for 2 min, cut into pieces, transferred to carrot agar (CA), and maintained at 20 ± 2°C and 12 h of near UV light (Philips Black Light lamps TL 40W/08). Conidia were identified with an Olympus BX-51 optical microscope by using a CoolSNAP Pro digital kit with image-pro plus and color digital camera (Media Cybernetics, Inc., Silver Spring, MD). Macroconidia length was variable, 3.9 μm and as much as 29 μm (1 to 5 septa), and microconidia measured 3.8 × 11 μm. Fungal description agrees with Fusarium solani (1). Pathogenicity of the purified isolate was evaluated on 2-month-old plants (cvs. Misty and Sharp Blue). The purified, grayish white isolate was grown on CA for 7 days, and mycelial plugs were placed next to the base of wounded stem and roots immediately below the potting mix soil line. Plants were maintained in the dark at 20 ± 2°C and 90% humidity for 48 h, and then transferred to 12 h of light. Wounded plants with CA plugs served as controls. Dark spots along the stem and root and stem rot appeared 7 to 21 days after inoculation. Controls remained symptomless. The fungus was reisolated from inoculated plants. Fusarium sp. was previously cited (2). To our knowledge, this is the first report of F. solani on blueberry in Argentina. References: (1) C. Booth. Fusarium. Laboratory Guide to the Identification of the Major Species. CMI, Kew, England, 1977. (2) D. F. Farr et al. Fungi on Plants and Plant Products in the United States. The American Phytopathological Society, St. Paul, MN, 1989.
APA, Harvard, Vancouver, ISO, and other styles
7

Massey, Jonathan. "Buckminster Fuller's cybernetic pastoral: the United States Pavilion at Expo 67." Journal of Architecture 11, no. 4 (September 2006): 463–83. http://dx.doi.org/10.1080/13602360601037883.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Massey, Jonathan. "Buckminster Fuller's cybernetic pastoral: the United States Pavilion at Expo 67." Journal of Architecture 21, no. 5 (July 3, 2016): 795–815. http://dx.doi.org/10.1080/13602365.2016.1207433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Polenakovic, Momir, and Goce Spasovski. "Prof. Dimitar Hrisoho, Md, Phd, Founder of Nephrology in the R. N. Macedonia." PRILOZI 41, no. 2 (September 1, 2020): 103–14. http://dx.doi.org/10.2478/prilozi-2020-0039.

Full text
Abstract:
AbstractProf. Dr. Dimitar T. Hrisoho was born on June 11, 1924 in Bitola, R. Macedonia. He died in Struga on September 22, 1986, and was buried in Skopje.He completed primary and secondary education in Bitola. He graduated from the Medical Faculty in Belgrade in 1951 as one of the best students of his generation (average grade of 9.75). In 1953 he was employed at the Internal Clinic of the Medical Faculty in Skopje, where in 1955 he passed the specialist exam in internal medicine. He successfully defended his habilitation “Polyarthritis chronica evolutiva” and his doctoral dissertation “Clinical features of Vitina nephropathy”. The doctoral dissertation indicates that Vitina nephropathy is a new site of the Balkan Endemic Nephropathy entity and that more genetic testing of patients were needed. Based on numerous clinical and scientific researches published in over 200 papers, he was elected a Full Professor of internal medicine at the Medical Faculty of the Ss. Cyril and Methodius University in Skopje in 1971. In 1970, he formed the nephrology section of the Macedonian Medical Association (MMA), which grew into the nephrology Association of MMA. Through the Association, the education of the medical staff from the field of nephrology was performed. He also set up a bio-cybernetics association.He achieved his vision and desire to transfer and apply the achievements of modern nephrology in the diagnosis and treatment of kidney patients in Macedonia at the Clinic of Nephrology of the Medical Faculty in Skopje, which was the first specialized institution established for examination and treatment of kidney patients in the former Yugoslavia and the Balkans. The Clinic educated nephrological staff and examined and treated kidney patients with new methods and drugs that positively affected the development of nephrology as a subspecialty of the internal medicine. D. Hrisoho was actively involved in the introduction of new methods for examination of kidney patients, as well as in the treatment of patients with acute and chronic renal insufficiency with dialysis since 1965. He also participated in the first two kidney transplantations from living donors performed in 1977. He wrote a chapter on “kidney examination”, printed in the book of Prof. A. J. Ignjatovski “Fundamentals of Internal Propedeutics” Part III, published by “Prosvetno delo”, 1963, in Skopje. This is the first text to investigate a patient with kidney disease published in a textbook in R. Macedonia. In 1984 he published the textbook “Clinical Nephrology” printed by the University of the Ss. Cyril and Methodius University in Skopje.Prof. D. Hrisoho organized the First Scientific Meeting of Yugoslav Nephrologists with international participation, from 26 to 28 September 1977, in Struga, R. Macedonia. The meeting was attended by prominent nephrologists from the former Yugoslavia, the Balkans, Europe and the United States, among them: J.S. Cameron from UK, J.L. Funck-Brentano from France, M. Burg and P. Ivanovich from the USA, R. Kluthe from Germany and A. Puchlev from Bulgaria. The scientific meeting was the largest nephrology event until then organized in the former Yugoslavia. The meeting provided an exchange of experiences with world-renowned nephrologists. D. Hrisoho presented the paper Artificial intelligence in nephrology. The author tried to apply bio-cybernetics in nephrology. Prof. D. Hrisoho was Vice Dean of the Medical Faculty in Skopje in the period 1963-1965 and Vice Rector of the University of the Ss. Cyril and Methodius University in Skopje in the period 1974-1975. Prof. Hrisoho was also active in socio-political organizations. For his medical, educational and scientific activities he received several awards and recognitions in the country and abroad. Thus, the work of Prof. D. Hrisoho was permanently embedded in the nephrology of R. Macedonia.
APA, Harvard, Vancouver, ISO, and other styles
10

Usselmann, Rainer. "The Dilemma of Media Art: Cybernetic Serendipity at the ICA London." Leonardo 36, no. 5 (October 2003): 389–96. http://dx.doi.org/10.1162/002409403771048191.

Full text
Abstract:
One year after the 1967 Summer of Love and at a time of considerable political unrest throughout the United States and Europe, Cybernetic Serendipity—The Computer and the Arts opened at the Institute of Contemporary Art in London to much critical and popular acclaim. This paper outlines the conceptual framework of this seminal exhibition and looks at some of the accompanying press reception in order to address a key question: how media art deals with its own historicity and the underlying socioeconomic forces that render it possible. Presented 35 years ago and still paradigmatic for the ever-shifting boundaries between art, technology, commerce and entertainment, Cybernetic Serendipity epitomizes some of the complicated dynamics that delineate the gamut of media art today.
APA, Harvard, Vancouver, ISO, and other styles
11

Vagt, Christina. "Design as aesthetic education: On the politics and aesthetics of learning environments." History of the Human Sciences 33, no. 1 (February 2020): 175–87. http://dx.doi.org/10.1177/0952695119882883.

Full text
Abstract:
The article, speaking from the double perspective of media history and political aesthetics, discusses the impact of behaviourism and early computer technology on the design of learning environments in the United States after the Second World War. By revisiting B. F. Skinner’s approaches to behavioural techniques and cultural engineering, and by showing how these principles were applied first at US design departments, and later to prison education, it argues that cybernetic and behavioural techniques merged in the common field of design and education. Behavioural design of the 1960s and 1970s furthered the cybernetic dream of total control over the world by addressing the learning environment rather than the individual, and operated within a space of possibility that was governed equally by technology and aesthetics. Behavioural design can therefore be understood as a political technology.
APA, Harvard, Vancouver, ISO, and other styles
12

Steg, Doreen Ray, Irving Lazar, and Carolyn Boyce. "A Cybernetic Approach to Early Education." Journal of Educational Computing Research 10, no. 1 (January 1994): 1–27. http://dx.doi.org/10.2190/7r77-bmmc-qp32-18qb.

Full text
Abstract:
Studies investigated the long term achievement of Get-Set children, Philadelphia Head Start, who participated in SCILS, the Self-Controlled Interactive Learning Systems program at the Drexel Early Childhood Center, and who were later enrolled in eighteen Philadelphia public and parochial schools. The original purpose for the program was to find ways of creating an environment to enhance learning, creativity, and exploration. It was assumed that if the above occurred it would be reflected in standardized testing regardless of subject matter. Its premise is that learning involves both the acquisition of skills, training, and the formation of new concepts, going beyond the “given,” education. The proper use of instructional technology is to enable the learner—the child—to acquire skills which can be utilized in new concept formation. The teacher's role then shifts from concentration on training to involvement in education. However, if instructional technology is to be effective in helping students acquire mastery it should incorporate: 1) choice, 2) control by the student, 3) instantaneous dynamic feedback to the student which allows for self-control, self-organization, self-regulation, and self-correction, and 4) enhancement of adapting behavior. Fifty-seven Head Start children who were enrolled in the Drexel Early Childhood Center for an average of 2.54 years were the subject of these studies. Fifty-three of the subjects were followed through the sixth grade, fourteen through the ninth and a small group (all those who could be found) were followed into the tenth and eleventh grades. SCILS children are at or above grade level in reading and reading comprehension with thirty hours of instructional time. Outcomes compared with other Early Intervention Programs, in the United States, since the 1960s, show that with SCILS the Head Start children's achievement reaches the level of average middle-class children.
APA, Harvard, Vancouver, ISO, and other styles
13

Jaeger, Ashlyn. "(Re)Producing Cyborgs: Biomedicalizing Abortion through the Congressional Debate over Fetal Pain." Science, Technology, & Human Values 44, no. 1 (June 20, 2018): 74–96. http://dx.doi.org/10.1177/0162243918783523.

Full text
Abstract:
The scientific and political debate over whether a fetus can experience pain highlights a vital and controversial boundary for governance—the boundary of human life. I use the 2012 and 2013 US federal debates over twenty-week abortion bans (also known as fetal pain laws) to investigate how personhood is constructed in a society transformed by biomedical science and technology in the United States. Although those who support and oppose the bill take different stances on abortion regulation, each relies on biomedical knowledge and risk assessment to substantiate claims. Through content analysis of congressional documents, I find that members of Congress strategically draw on biomedical discourse to manage the boundaries of bodies and construct a universal “at-risk” political subject in need of governmental protection. These findings bring scholarly debates about personhood into the era of biomedicalization by emphasizing the latent process of creating a hybridized subjectivity that I call cybernetic personhood.
APA, Harvard, Vancouver, ISO, and other styles
14

Schneider, Andreas, and Tobias Schröder. "Ideal Types of Leadership as Patterns of Affective Meaning." Social Psychology Quarterly 75, no. 3 (July 5, 2012): 268–87. http://dx.doi.org/10.1177/0190272512446755.

Full text
Abstract:
We propose that macro-level ideal types of leadership, as described in the classic work of Max Weber and reflected in the contemporary management literature, are mirrored in micro-level affective meanings. Within Osgood’s three-dimensional affective space, we identify specific patterns corresponding to leadership styles: people evaluate authoritative/transactional leadership as positive, powerful, and neither passive nor active. Charismatic/transformational leadership is perceived as equally positive and powerful but involves a much higher degree of activity-arousal. Finally, coercive leadership is negative, powerful, and active. Based on Heise’s cybernetic symbolic-interactionist affect control theory, we compare cultural representations of business managers in the United States and Germany at different points in time. We demonstrate a shift from transactional to charismatic leadership in the U.S. manager stereotype and a contrasting consolidation of coercive leadership expectations in Germany. We discuss implications for (1) cross-cultural communication and (2) affective meaning as indicator of social change.
APA, Harvard, Vancouver, ISO, and other styles
15

Leontiev, D. A. "Cultural-Historical Activity Theory in the Framework of the “Functional Paradigm”." Cultural-Historical Psychology 16, no. 2 (2020): 19–24. http://dx.doi.org/10.17759/chp.2020160203.

Full text
Abstract:
The aim of the paper is to highlight the peculiarity of the present state of the Cultural-historical activity theory (CHAT) in psychology, as compared to previous periods of its development in the general context of theory development in psychology. The author sees this peculiarity in that CHAT exemplifies an anti-Aristotelian paradigm which suggests that the actual functioning of living systems cannot be fully deduced from a priori existing morphological and psychological structures. This emphasis unites CHAT with two other influential approaches to the explanation of human conduct, existentialism and the systems approach to autoregulating systems, which can be found from early cybernetics to synergetics and the theory of complexity of our own day. Although they each occupied marginal positions in human sciences in the middle of the last century, all three approaches now find themselves articulating the same message in different words; basic similarities between them allow us to speak of their confluence into what may be called the functional paradigm. The functional paradigm states the primacy of the process, actual functioning, activity, or existence, the absoluteness of uncertainty and changeability, and thus seems to be the most relevant paradigm for the challenges of our times.
APA, Harvard, Vancouver, ISO, and other styles
16

Sharma, Mrityunjay K., Roopashri B. Acharya, Chinmay A. Shukla, and Amol A. Kulkarni. "Assessing the possibilities of designing a unified multistep continuous flow synthesis platform." Beilstein Journal of Organic Chemistry 14 (July 26, 2018): 1917–36. http://dx.doi.org/10.3762/bjoc.14.166.

Full text
Abstract:
The multistep flow synthesis of complex molecules has gained momentum over the last few years. A wide range of reaction types and conditions have been integrated seamlessly on a single platform including in-line separation as well as monitoring. Beyond merely getting considered as ‘flow version’ of conventional ‘one-pot synthesis’, multistep flow synthesis has become the next generation tool for creating libraries of new molecules. Here we give a more ‘engineering’ look at the possibility of developing a ‘unified multistep flow synthesis platform’. A detailed analysis of various scenarios is presented considering 4 different classes of drugs already reported in the literature. The possible complexities that an automated and controlled platform needs to handle are also discussed in detail. Three different design approaches are proposed: (i) one molecule at a time, (ii) many molecules at a time and (iii) cybernetic approach. Each approach would lead to the effortless integration of different synthesis stages and also at different synthesis scales. While one may expect such a platform to operate like a ‘driverless car’ or a ‘robo chemist’ or a ‘transformer’, in reality, such an envisaged system would be much more complex than these examples.
APA, Harvard, Vancouver, ISO, and other styles
17

Appleyard, James. "INTERNATIONAL PERSPECTIVES ON WELL-BEING AND BURNOUT WITHIN HEALTH SYSTEMS." International Journal of Person Centered Medicine 9, no. 1 (April 1, 2021): 11–25. http://dx.doi.org/10.5750/ijpcm.v9i1.960.

Full text
Abstract:
Objectives: To reflect on the present international culture of professional burnout in health care systems and the need for a radical new approach with an increased understanding of a person- and people-centered attitudes in the promotion of training in wellbeing and the prevention and management of burnout among physicians and health care professionals Methods: A literature search worldwide was undertaken for significant research papers on professional education related to burnout with particular reference to both medical staff resilience and health care system factors. Findings: Burnout among doctors is a global phenomenon. The incidence of burnout reported in a selection of studies among pediatric residents and staff are 25% in Argentina, 37% in the United Kingdom, and 70% in Saudi Arabia. In a national survey in the United States where the overall rate was 59% burned out residents reported significantly increased stress, poorer mental health, and decreased empathy, mindfulness, resilience, self-compassion, and confidence in providing compassionate care Three levels of change that should be the focus of training in prevention, health promotion, and stress reduction awareness have been recommended to reduce the risk of burnout: (1) modifying the organizational structure and work processes; (2) improving the fit between the organization and the individual doctor through professional development programs so that better adaption to the work environment occurs; and (3) individual-level actions to reduce stress and poor health symptoms through effective coping and promoting healthy behavior. Discussion: The history of burnout shows important links with increased work complexity. Narrow training interventions such as debriefing after an adverse clinical event have not been found effective. A more comprehensive personcentered approach with a variety of measurable interventions has resulted in a reduction of 50% in the pediatric faculty in one study. A person- and people-centered cybernetic approach is needed with six standards are to establish and sustain a healthy work environment (1) authentic leadership (2) meaningful recognition, (3) skilled communication, (4) true collaboration, (5) effective decision making, and (6) appropriate staffing. Conclusion: With such high levels of burnout, health systems worldwide can be viewed as failing their populations on a grand scale. Only an organizational paradigm change to a person- and people cybernetic centered system that incorporates complexity is adaptive and integrative will a health system be effective in preventing and ameliorating the effects of burnout and reduce the increasingly unaffordable misuse of human resources.
APA, Harvard, Vancouver, ISO, and other styles
18

Lukova-Chuiko, Natalia, Volodymyr Nakonechny, Serhiy Tolyupa, and Ruslana Zyubina. "PROBLEMS OF PROTECTION OF CRITICALLY IMPORTANT INFRASTRUCTURE OBJECTS." Information systems and technologies security, no. 1 (2) (2020): 31–39. http://dx.doi.org/10.17721/ists.2020.1.31-39.

Full text
Abstract:
The paper deals with topical issues related to the protection of critical infrastructure, which depend on the survival of the human community. It is shown that rapid progress in the field of information technology, on the one hand, allows the modern economies of many countries to become inextricably interconnected; interfering with the work of critical infrastructure. The analysis of what are the true causes of such close attention to such objects by cyber terrorists. Top 10 major threats to industrial control systems are presented. The following steps determine the criticality of the infrastructure objects. The following is a list of 11 critical sectors and 37 relevant sub-sectors identified by the European Union. The answer is given to the question with which target countries should develop national strategies for the protection of critical infrastructure objects. A strategy for quantifying the level of security of critical infrastructure against the risk of third-party cybernetic exposure is proposed. The necessity to unite different elements of protection of critical infrastructure objects by states is substantiated. It is important that cybersecurity policies should be central to the protection of critical infrastructure. It is noted that not all national cybersecurity strategies provide the same place and relevance for critical infrastructure. It is noted that when developing a national strategy for the protection of critical infrastructure, it is important to compile a comprehensive list of all relevant national policies. It is concluded that today it is an important tool for the protection of critical infrastructure
APA, Harvard, Vancouver, ISO, and other styles
19

Honório, Thiago Jacobino. "O uso de ciberataques em eleições e as Relações Internacionais | The use of cyberattacks in elections and International Relations." Mural Internacional 9, no. 1 (June 30, 2018): 85–98. http://dx.doi.org/10.12957/rmi.2018.32570.

Full text
Abstract:
Durante a campanha presidencial dos Estados Unidos no ano de 2016 o governo do país acusou agentes de inteligência russa de usarem ataques cibernéticos contra a empresa que produzia softwares que são usados no sistema eleitoral do país. Apesar de interferências em democracias não serem novas, o caso representa uma tendência na qual o meio cibernético torna-se um valioso recurso, pois, com o avanço da tecnologia da informatização os sistemas eleitorais vem se tornando digitalizados acarretando grande vulnerabilidade especialmente para os países em desenvolvimento. O trabalho tem por objetivo expor a questão do uso dos ataques cibernéticos em eleições. Sustenta que haverá uma tendência a este tipo de intervenção como estratégia política de atores internacionais. Como estudo de caso o trabalho irá se basear na eleição dos E.U.A em 2016 e eventos semelhantes no mesmo período.ABSTRACTDuring the United States presidential campaign in 2016, the country's government has accused Russian intelligence agents of using cyber attacks against a company that produces software used in the country's electoral system. Although interference in democracies is not new, the case represents a trend in which the cybernetic medium becomes a valuable resource because the advancement of computer technology electoral systems are becoming digitalised which are causing great vulnerability especially for developing countries. This paper aims to expose the issue of the use of cyber attacks in elections. It sustains that there will be a tendency to this type of intervention as a political strategy of international actors. As a case study the work will be based on the US election in 2016 and similar events in the same period.Palavras-chave: Relações Internacionais; ciberataques; eleiçõesKeywords: International Relations, cyberattacks; elections Recebido em 30 de Janeiro de 2018.
APA, Harvard, Vancouver, ISO, and other styles
20

Hamilton, Sheryl N. "The Charismatic Cultural Life of Cybernetics: Reading Norbert Wiener as Visible Scientist." Canadian Journal of Communication 42, no. 3 (July 28, 2017). http://dx.doi.org/10.22230/cjc.2017v42n3a3205.

Full text
Abstract:
Background Despite cybernetics’ short, incandescent life as a scientific knowledge, it has had an enduring cultural legacy.Analysis This article reads Norbert Wiener, the “father of cybernetics,” as a visible scientist, through an analysis of his media profile, in order to explore cybernetics as a popular culture phenomenon in the United States in the late 1940s and the 1950s.Conclusion and implications Cybernetics emerges in the post-WWII era as a charismatic knowledge whose aura of wonder and future possibility shapes our interpretation of computing technology to this day. RÉSUMÉContexte La cybernétique a eu un impact culturel durable, malgré sa brève vie incandescente à titre de savoir scientifique.Analyse Cet article représente le « père de la cybernétique », Norbert Wiener, comme savant visible, en analysant son profil médiatique afin d’explorer la cybernétique comme phénomène de culture populaire aux États-Unis à la fin des années 40 et pendant les années 50.Conclusion et implications À la suite de la Seconde Guerre mondiale, la cybernétique a émergé comme savoir charismatique dont le caractère merveilleux soulignant les possibilités de l’avenir a influencé notre interprétation de l’informatique jusqu’à aujourd’hui.
APA, Harvard, Vancouver, ISO, and other styles
21

Feast, Luke. "In proportion." FormAkademisk - forskningstidsskrift for design og designdidaktikk 13, no. 2 (January 28, 2020). http://dx.doi.org/10.7577/formakademisk.3367.

Full text
Abstract:
Avoiding the worst impacts of global warming is a matter of systemic change and political will. An easily adaptable political system would be resilient to the effects of climate change, since a government could maintain effective control by implementing incremental changes. However, except for the United Kingdom (UK), Israel and New Zealand, all other states have rigid codified constitutions. Drawing on cybernetics and variety engineering, the study of New Zealand’s constitutional system presented in this article suggests that a rigid codified constitution has merits for addressing long-term problems, such as climate change and sustainable development. Cover image photo: Christoph Strässler
APA, Harvard, Vancouver, ISO, and other styles
22

"Heinz von Foerster’s heuristics course: a factor in the development of second-order cybernetics in the United States." Kybernetes 40, no. 7/8 (August 9, 2011). http://dx.doi.org/10.1108/k.2011.06740gaa.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Haigh, Thomas, and Maria Haigh. "How Information First Became a Thing: Early Developments in the United States and Soviet Union." Proceedings of the Annual Conference of CAIS / Actes du congrès annuel de l'ACSI, October 28, 2013. http://dx.doi.org/10.29173/cais644.

Full text
Abstract:
Until about 1950 usage of the word “information” was inextricably connected with the act of communication. Yet today we are used to thinking of what Michael Buckland called “information as thing.” The paper explores the process by which information was first conceptualized as a thing, which we argue took place among American computer engineers in the early 1950s. The Soviet Union provides a contrasting case, in which a more active, cybernetic concept of information remained dominant within computing culture.Jusqu’à environ 1950, l’utilisation du mot « information » était intimement liée à l’acte de communication. Par contre, de nos jours, nous sommes habitués de penser à ce que Michael Buckland appelle « l’information comme chose » (information as thing). Cette communication explore le processus par lequel l’information a d’abord été conceptualisée comme chose, ce qui, selon nous, s’est produit chez les ingénieurs informatiques aux États-Unis, au début des années 1950. L’Union soviétique offre un contraste intéressant, où un concept d’information plus actif, cybernétique, est demeuré dominant dans la culture informatique.
APA, Harvard, Vancouver, ISO, and other styles
24

"INFORMATION SECURITY AS COMPONENT NATIONAL SECURITY SYSTEMS (INTERNATIONAL AND FOREIGN EXPERIENCE)." Journal of V. N. Karazin Kharkiv National University, Series "Law", no. 29 (2020). http://dx.doi.org/10.26565/2075-1834-2020-29-38.

Full text
Abstract:
The article is devoted to the research of legal and organizational principles of ensuring information security of states in the modern conditions of development of information society. Theoretical approaches to the definition of the essence of «information security» and «national security» are analyzed and their interrelation is proved. The urgency of the chosen topic of scientific research is caused by the fact that confrontation in the information sphere becomes a fundamentally new sphere of competition between the states. The rapid pace of development of information and communication technologies, creation of a global information space has led to many cybernetic threats in important spheres of political, economic, social and cultural life of society. The paper presents the results of the analysis of information security of the state as a factor of influence on the national security of the state as a whole, and thus defines information security as an integral part of national security. Given the magnitude of the global information challenge, the inability to address these issues through the efforts of individual states, the article explores the issue of international cooperation in providing international information security within the United Nations. The contents of the basic international legal acts adopted by the UN General Assembly, which indicate the threats to the international security of the information space and the need for the states to take joint action to counter the challenges in the field. Particular attention is paid to the peculiarities of regional cooperation of states in providing information security within the European Union. It is determined that this area of EU activity is one of the priorities for today. The main EU normative acts are analyzed, which present the European approach to the problem of information security. The general characteristics of the activities of the special bodies of the EU (European Union Agency for Network and Information Security - ENISA, European Cybercrime Centre), whose activities are aimed at providing information security, are given. The article explores the issues of guaranteeing information security of Ukraine and protection of the national information space. The types of real and potential information threats to the information space of Ukraine are revealed, as well as practical recommendations are given on improving the state information policy and creating an effective system of counteracting cyberspace threats. Emphasis is placed on the fact that state information policy should reflect urgent issues that have arisen in the international information and information security sphere. Effective implementation of strategic priorities, basic principles and tasks of the state information security policy requires improvement of legal and organizational mechanisms of information security management.
APA, Harvard, Vancouver, ISO, and other styles
25

"MIGRATIONS AND SECURITY ON THE OLD CONTINENT." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017 ISSUE 19/3 (September 15, 2017): 11–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.3.00.

Full text
Abstract:
It has been two years since the European migrant crisis. In autumn 2015, Europe was flooded by a refugee wave that people neither expected nor imagined. It was a surprise in every way. Modern technology, reputable institutions, and leading global experts from different fields did not anticipate what happened. The European legal order, human rights, the Schengen regime, and the ideas of the West dissolved quickly and left people faced with a naked reality. Where are the refugees now, how many are there, and how do they feel? How did the refugee crisis affect the national security system and the common European defence and security policy? The media rarely reports on this now, two years later. Instead, there is much talk of terrorist attacks in European cities, the UK’s exit from the European Union, the US President, Donald Trump, and the Korean rockets that ruffle the Japanese sea. Years ago, Samuel P. Huntington wrote a book The Clash of Civilizations. It was published in Slovenia in 2005. His assumption was that the main reason for the clash of nations in the future would be their cultural and religious identity. He predicted that the greatest threat would be extreme terrorism. Different ideologies would be replaced by self-oriented individuals, who would no longer be concerned about the common good, but focused on themselves and their benefits. The absence of ideologies would be replaced by a return to ancient traditions. Responses to Huntington's work were very different; some were enthusiastic, others sceptical. We can, however, conclude that his theory, first presented in 1992, was confirmed in the case of the war in the Western Balkans. When the ideology of former Yugoslavia died, the nations and nationalities returned to their roots, which resulted in a war that claimed the lives of many people. Robert D. Kaplan also wrote about the fact that the Western Balkans is a crossroads of different cultures. The most famous of his works is Balkan Ghosts, in which Kaplan examines in detail the historical and cultural turbulence in the immediate neighbourhood of the cradle of Western civilization, which has been the driving force behind the development of the West for the past two thousand years. This issue of Contemporary Military Challenges is therefore interested in what is new on the Old Continent, emphasizing security, defence and the military. In his article Geostrategic Shifts in Contemporary Europe, Uroš Tovornik examines the geostrategic significance of the relationships between France, Germany and the United Kingdom, the countries that shaped the fate of Europe in the past. With the UK's decision to leave the European Union, the former classic geostrategic triangle can now turn into other decisive geostrategic links which could greatly change the Old Continent. József Kis Benedek writes about the consequences of events in North Africa and the Middle East. In the recent past, some authors have wondered whether the Arab Spring would be followed by Arab Winter; however, what followed was the European migrant crisis and the escalation of terrorist attacks in Europe. In his article Challenges Posed to the European Union by the Iraqi, Syrian and Libyan Crises, the author focuses on the participation of foreign fighters in crisis areas, coming from Europe to aid. Economic Intelligence: an Inevitable Choice is the title of an article written by Laris Gaiser. It stresses the urgent need for Slovenia to devote greater attention to this area in order to ensure greater benefits for its citizens. Slovenia has come a long way since 1991, but modern security guidelines stipulate that, besides classic tasks in the intelligence and security field, economic intelligence is also important. What is the situation in Slovenia and what else should we do? For several years, the Slovenian Armed Forces have been involved in the international operation and mission in Bosnia and Herzegovina. Slovenia is accompanied by many other European Union member states, ensuring peace and order in the country. How long will this go on, and how successful are the international security forces in the area? It is this and some other questions that the authors Ivana Boštjančič Pulko, Johanna Suhonen and Kari Sainio try to answer in the article Assessing the Planning and Implementation of the EU Missions and Operations: Case Study of EUFOR Althea in Bosnia and Herzegovina. Cybernetics, cyberspace and cyber attacks are commonly known terms of which much has been heard and read about recently. How well do we really know these terms? Is there a legal basis at the national level and how is this field regulated in the international environment? This is a challenge requiring strategic and concrete answers. One of the possible answers can be found in the article Legality of Low-Intensity Cyber Operations under International Law by Pika Šarf. Military aviation is an integral part of the modern armed forces. Slovenian military aviation is relatively young and has, in its short history, experienced several development phases, both in the field of aeronautics and in the organizational military sense. The quality of cooperation of Slovenian military pilots in international operations, missions, and international military exercises testifies that we are on the right track. But how to proceed? In his article, Characteristics of the Slovenian Armed Forces Air Force: Now and 20 Years in the future, the author Mitja Lipovšek refers to the idea that history is a debate of the past with the present for the future. We wish you an interesting read, and invite you to also participate as authors of articles.
APA, Harvard, Vancouver, ISO, and other styles
26

Diab, Ramon Salim. "Becoming-Infrastructure: Datafication, Deactivation and the Social Credit System." Journal of Critical Library and Information Studies 1, no. 1 (January 31, 2017). http://dx.doi.org/10.24242/jclis.v1i1.19.

Full text
Abstract:
How might critical library and information studies analyze the intersection of information infrastructure and class structure? The emergence of big data through "datafication" rests on the historical process of information and communication technology (ICT) production and distribution. This paper explores the concept of datafication as an integrated component of information infrastructures unfolding within the class structures of capitalism. A critical realist perspective on relational sociology is offered to illustrate how heterogenous data sources are combined and configured to activate materials and bodies into new internal economic class relations of control. My analysis of datafication therefore moves beyond isolated conceptions of "information" and toward the capacity of distributed data sources to extend and deepen class structures. Two recent large scale cases of datafication are analyzed to highlight its causal powers within class structured society. The first case is drawn from a New York Times article concerning the subprime automobile loan market in the United States. The article details the installation of surveillance technologies into the vehicles of people segmented by low credit scores as a condition of exchange for subprime loans. As a result of this exchange, surveillance technologies capture borrower's driving behaviors and locations in real-time data flows. These data flows are analyzed according to interest bearing payment regimes, rendering both vehicle and borrower as manageable assets while conferring onto lenders the power of remote automobile deactivation. This suggests datafication of driving behaviour produces new implications for class conditions when such data are integrated with the structures of the subprime market. The second case detailed in several news articles examines the plan for a large scale top-down cybernetic behavioural programming initiative by the Chinese government termed the "social credit system," built from digital traces of multiple economic and non-economic social behaviours of its citizens. While aspects of this system are currently voluntary, they are expected to become mandatory within five years. Ubiquitous surveillance of digital activity never before combined into a predictive and prescriptive score may be considered a nation-wide disciplinary subsumption of social activity under novel valuation algorithms, integrating previously unwatched or irrelevant external activities into new internal relations determinative of class structured possibilities. The plan for a social credit system appears driven toward developing a seamlessly interconnected national behavioural identity for every Chinese citizen, which may produce structural implications for pre-existing class conditions. I suggest these cases are examples of the need for library and information studies to engage critically with the emerging causal powers of information infrastructures theorized here as deepening capitalism's control of class structures.
APA, Harvard, Vancouver, ISO, and other styles
27

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
28

Burns, Alex. "The Worldflash of a Coming Future." M/C Journal 6, no. 2 (April 1, 2003). http://dx.doi.org/10.5204/mcj.2168.

Full text
Abstract:
History is not over and that includes media history. Jay Rosen (Zelizer & Allan 33) The media in their reporting on terrorism tend to be judgmental, inflammatory, and sensationalistic. — Susan D. Moeller (169) In short, we are directed in time, and our relation to the future is different than our relation to the past. All our questions are conditioned by this asymmetry, and all our answers to these questions are equally conditioned by it. Norbert Wiener (44) The Clash of Geopolitical Pundits America’s geo-strategic engagement with the world underwent a dramatic shift in the decade after the Cold War ended. United States military forces undertook a series of humanitarian interventions from northern Iraq (1991) and Somalia (1992) to NATO’s bombing campaign on Kosovo (1999). Wall Street financial speculators embraced market-oriented globalization and technology-based industries (Friedman 1999). Meanwhile the geo-strategic pundits debated several different scenarios at deeper layers of epistemology and macrohistory including the breakdown of nation-states (Kaplan), the ‘clash of civilizations’ along religiopolitical fault-lines (Huntington) and the fashionable ‘end of history’ thesis (Fukuyama). Media theorists expressed this geo-strategic shift in reference to the ‘CNN Effect’: the power of real-time media ‘to provoke major responses from domestic audiences and political elites to both global and national events’ (Robinson 2). This media ecology is often contrasted with ‘Gateholder’ and ‘Manufacturing Consent’ models. The ‘CNN Effect’ privileges humanitarian and non-government organisations whereas the latter models focus upon the conformist mind-sets and shared worldviews of government and policy decision-makers. The September 11 attacks generated an uncertain interdependency between the terrorists, government officials, and favourable media coverage. It provided a test case, as had the humanitarian interventions (Robinson 37) before it, to test the claim by proponents that the ‘CNN Effect’ had policy leverage during critical stress points. The attacks also revived a long-running debate in media circles about the risk factors of global media. McLuhan (1964) and Ballard (1990) had prophesied that the global media would pose a real-time challenge to decision-making processes and that its visual imagery would have unforeseen psychological effects on viewers. Wark (1994) noted that journalists who covered real-time events including the Wall Street crash (1987) and collapse of the Berlin Wall (1989) were traumatised by their ‘virtual’ geographies. The ‘War on Terror’ as 21st Century Myth Three recent books explore how the 1990s humanitarian interventions and the September 11 attacks have remapped this ‘virtual’ territory with all too real consequences. Piers Robinson’s The CNN Effect (2002) critiques the theory and proposes the policy-media interaction model. Barbie Zelizer and Stuart Allan’s anthology Journalism After September 11 (2002) examines how September 11 affected the journalists who covered it and the implications for news values. Sandra Silberstein’s War of Words (2002) uncovers how strategic language framed the U.S. response to September 11. Robinson provides the contextual background; Silberstein contributes the specifics; and Zelizer and Allan surface broader perspectives. These books offer insights into the social construction of the nebulous War on Terror and why certain images and trajectories were chosen at the expense of other possibilities. Silberstein locates this world-historical moment in the three-week transition between September 11’s aftermath and the U.S. bombings of Afghanistan’s Taliban regime. Descriptions like the ‘War on Terror’ and ‘Axis of Evil’ framed the U.S. military response, provided a conceptual justification for the bombings, and also brought into being the geo-strategic context for other nations. The crucial element in this process was when U.S. President George W. Bush adopted a pedagogical style for his public speeches, underpinned by the illusions of communal symbols and shared meanings (Silberstein 6-8). Bush’s initial address to the nation on September 11 invoked the ambiguous pronoun ‘we’ to recreate ‘a unified nation, under God’ (Silberstein 4). The 1990s humanitarian interventions had frequently been debated in Daniel Hallin’s sphere of ‘legitimate controversy’; however the grammar used by Bush and his political advisers located the debate in the sphere of ‘consensus’. This brief period of enforced consensus was reinforced by the structural limitations of North American media outlets. September 11 combined ‘tragedy, public danger and a grave threat to national security’, Michael Schudson observed, and in the aftermath North American journalism shifted ‘toward a prose of solidarity rather than a prose of information’ (Zelizer & Allan 41). Debate about why America was hated did not go much beyond Bush’s explanation that ‘they hated our freedoms’ (Silberstein 14). Robert W. McChesney noted that alternatives to the ‘war’ paradigm were rarely mentioned in the mainstream media (Zelizer & Allan 93). A new myth for the 21st century had been unleashed. The Cycle of Integration Propaganda Journalistic prose masked the propaganda of social integration that atomised the individual within a larger collective (Ellul). The War on Terror was constructed by geopolitical pundits as a Manichean battle between ‘an “evil” them and a national us’ (Silberstein 47). But the national crisis made ‘us’ suddenly problematic. Resurgent patriotism focused on the American flag instead of Constitutional rights. Debates about military tribunals and the USA Patriot Act resurrected the dystopian fears of a surveillance society. New York City mayor Rudy Guiliani suddenly became a leadership icon and Time magazine awarded him Person of the Year (Silberstein 92). Guiliani suggested at the Concert for New York on 20 October 2001 that ‘New Yorkers and Americans have been united as never before’ (Silberstein 104). Even the series of Public Service Announcements created by the Ad Council and U.S. advertising agencies succeeded in blurring the lines between cultural tolerance, social inclusion, and social integration (Silberstein 108-16). In this climate the in-depth discussion of alternate options and informed dissent became thought-crimes. The American Council of Trustees and Alumni’s report Defending Civilization: How Our Universities are Failing America (2002), which singled out “blame America first” academics, ignited a firestorm of debate about educational curriculums, interpreting history, and the limits of academic freedom. Silberstein’s perceptive analysis surfaces how ACTA assumed moral authority and collective misunderstandings as justification for its interrogation of internal enemies. The errors she notes included presumed conclusions, hasty generalisations, bifurcated worldviews, and false analogies (Silberstein 133, 135, 139, 141). Op-ed columnists soon exposed ACTA’s gambit as a pre-packaged witch-hunt. But newscasters then channel-skipped into military metaphors as the Afghanistan campaign began. The weeks after the attacks New York City sidewalk traders moved incense and tourist photos to make way for World Trade Center memorabilia and anti-Osama shirts. Chevy and Ford morphed September 11 catchphrases (notably Todd Beamer’s last words “Let’s Roll” on Flight 93) and imagery into car advertising campaigns (Silberstein 124-5). American self-identity was finally reasserted in the face of a domestic recession through this wave of vulgar commercialism. The ‘Simulated’ Fall of Elite Journalism For Columbia University professor James Carey the ‘failure of journalism on September 11’ signaled the ‘collapse of the elites of American journalism’ (Zelizer & Allan 77). Carey traces the rise-and-fall of adversarial and investigative journalism from the Pentagon Papers and Watergate through the intermediation of the press to the myopic self-interest of the 1988 and 1992 Presidential campaigns. Carey’s framing echoes the earlier criticisms of Carl Bernstein and Hunter S. Thompson. However this critique overlooks several complexities. Piers Robinson cites Alison Preston’s insight that diplomacy, geopolitics and elite reportage defines itself through the sense of distance from its subjects. Robinson distinguished between two reportage types: distance framing ‘creates emotional distance’ between the viewers and victims whilst support framing accepts the ‘official policy’ (28). The upsurge in patriotism, the vulgar commercialism, and the mini-cycle of memorabilia and publishing all combined to enhance the support framing of the U.S. federal government. Empathy generated for September 11’s victims was tied to support of military intervention. However this closeness rapidly became the distance framing of the Afghanistan campaign. News coverage recycled the familiar visuals of in-progress bombings and Taliban barbarians. The alternative press, peace movements, and social activists then retaliated against this coverage by reinstating the support framing that revealed structural violence and gave voice to silenced minorities and victims. What really unfolded after September 11 was not the demise of journalism’s elite but rather the renegotiation of reportage boundaries and shared meanings. Journalists scoured the Internet for eyewitness accounts and to interview survivors (Zelizer & Allan 129). The same medium was used by others to spread conspiracy theories and viral rumors that numerology predicted the date September 11 or that the “face of Satan” could be seen in photographs of the World Trade Center (Zelizer & Allan 133). Karim H. Karim notes that the Jihad frame of an “Islamic Peril” was socially constructed by media outlets but then challenged by individual journalists who had learnt ‘to question the essentialist bases of her own socialization and placing herself in the Other’s shoes’ (Zelizer & Allan 112). Other journalists forgot that Jihad and McWorld were not separate but two intertwined worldviews that fed upon each other. The September 11 attacks on the Pentagon and the World Trade Center also had deep symbolic resonances for American sociopolitical ideals that some journalists explored through analysis of myths and metaphors. The Rise of Strategic Geography However these renegotiated boundariesof new media, multiperspectival frames, and ‘layered’ depth approaches to issues analysiswere essentially minority reports. The rationalist mode of journalism was soon reasserted through normative appeals to strategic geography. The U.S. networks framed their documentaries on Islam and the Middle East in bluntly realpolitik terms. The documentary “Minefield: The United States and the Muslim World” (ABC, 11 October 2001) made explicit strategic assumptions of ‘the U.S. as “managing” the region’ and ‘a definite tinge of superiority’ (Silberstein 153). ABC and CNN stressed the similarities between the world’s major monotheistic religions and their scriptural doctrines. Both networks limited their coverage of critiques and dissent to internecine schisms within these traditions (Silberstein 158). CNN also created different coverage for its North American and international audiences. The BBC was more cautious in its September 11 coverage and more global in outlook. Three United Kingdom specials – Panorama (Clash of Cultures, BBC1, 21 October 2001), Question Time (Question Time Special, BBC1, 13 September 2001), and “War Without End” (War on Trial, Channel 4, 27 October 2001) – drew upon the British traditions of parliamentary assembly, expert panels, and legal trials as ways to explore the multiple dimensions of the ‘War on Terror’ (Zelizer & Allan 180). These latter debates weren’t value free: the programs sanctioned ‘a tightly controlled and hierarchical agora’ through different containment strategies (Zelizer & Allan 183). Program formats, selected experts and presenters, and editorial/on-screen graphics were factors that pre-empted the viewer’s experience and conclusions. The traditional emphasis of news values on the expert was renewed. These subtle forms of thought-control enabled policy-makers to inform the public whilst inoculating them against terrorist propaganda. However the ‘CNN Effect’ also had counter-offensive capabilities. Osama bin Laden’s videotaped sermons and the al-Jazeera network’s broadcasts undermined the psychological operations maxim that enemies must not gain access to the mindshare of domestic audiences. Ingrid Volkmer recounts how the Los Angeles based National Iranian Television Network used satellite broadcasts to criticize the Iranian leadership and spark public riots (Zelizer & Allan 242). These incidents hint at why the ‘War on Terror’ myth, now unleashed upon the world, may become far more destabilizing to the world system than previous conflicts. Risk Reportage and Mediated Trauma When media analysts were considering the ‘CNN Effect’ a group of social contract theorists including Anthony Giddens, Zygmunt Bauman, and Ulrich Beck were debating, simultaneously, the status of modernity and the ‘unbounded contours’ of globalization. Beck termed this new environment of escalating uncertainties and uninsurable dangers the ‘world risk society’ (Beck). Although they drew upon constructivist and realist traditions Beck and Giddens ‘did not place risk perception at the center of their analysis’ (Zelizer & Allan 203). Instead this was the role of journalist as ‘witness’ to Ballard-style ‘institutionalized disaster areas’. The terrorist attacks on September 11 materialized this risk and obliterated the journalistic norms of detachment and objectivity. The trauma ‘destabilizes a sense of self’ within individuals (Zelizer & Allan 205) and disrupts the image-generating capacity of collective societies. Barbie Zelizer found that the press selection of September 11 photos and witnesses re-enacted the ‘Holocaust aesthetic’ created when Allied Forces freed the Nazi internment camps in 1945 (Zelizer & Allan 55-7). The visceral nature of September 11 imagery inverted the trend, from the Gulf War to NATO’s Kosovo bombings, for news outlets to depict war in detached video-game imagery (Zelizer & Allan 253). Coverage of the September 11 attacks and the subsequent Bali bombings (on 12 October 2002) followed a four-part pattern news cycle of assassinations and terrorism (Moeller 164-7). Moeller found that coverage moved from the initial event to a hunt for the perpetrators, public mourning, and finally, a sense of closure ‘when the media reassert the supremacy of the established political and social order’ (167). In both events the shock of the initial devastation was rapidly followed by the arrest of al Qaeda and Jamaah Islamiyah members, the creation and copying of the New York Times ‘Portraits of Grief’ template, and the mediation of trauma by a re-established moral order. News pundits had clearly studied the literature on bereavement and grief cycles (Kubler-Ross). However the neo-noir work culture of some outlets also fueled bitter disputes about how post-traumatic stress affected journalists themselves (Zelizer & Allan 253). Reconfiguring the Future After September 11 the geopolitical pundits, a reactive cycle of integration propaganda, pecking order shifts within journalism elites, strategic language, and mediated trauma all combined to bring a specific future into being. This outcome reflected the ‘media-state relationship’ in which coverage ‘still reflected policy preferences of parts of the U.S. elite foreign-policy-making community’ (Robinson 129). Although Internet media and non-elite analysts embraced Hallin’s ‘sphere of deviance’ there is no clear evidence yet that they have altered the opinions of policy-makers. The geopolitical segue from September 11 into the U.S.-led campaign against Iraq also has disturbing implications for the ‘CNN Effect’. Robinson found that its mythic reputation was overstated and tied to issues of policy certainty that the theory’s proponents often failed to examine. Media coverage molded a ‘domestic constituency ... for policy-makers to take action in Somalia’ (Robinson 62). He found greater support in ‘anecdotal evidence’ that the United Nations Security Council’s ‘safe area’ for Iraqi Kurds was driven by Turkey’s geo-strategic fears of ‘unwanted Kurdish refugees’ (Robinson 71). Media coverage did impact upon policy-makers to create Bosnian ‘safe areas’, however, ‘the Kosovo, Rwanda, and Iraq case studies’ showed that the ‘CNN Effect’ was unlikely as a key factor ‘when policy certainty exists’ (Robinson 118). The clear implication from Robinson’s studies is that empathy framing, humanitarian values, and searing visual imagery won’t be enough to challenge policy-makers. What remains to be done? Fortunately there are some possibilities that straddle the pragmatic, realpolitik and emancipatory approaches. Today’s activists and analysts are also aware of the dangers of ‘unfreedom’ and un-reflective dissent (Fromm). Peter Gabriel’s organisation Witness, which documents human rights abuses, is one benchmark of how to use real-time media and the video camera in an effective way. The domains of anthropology, negotiation studies, neuro-linguistics, and social psychology offer valuable lessons on techniques of non-coercive influence. The emancipatory tradition of futures studies offers a rich tradition of self-awareness exercises, institution rebuilding, and social imaging, offsets the pragmatic lure of normative scenarios. The final lesson from these books is that activists and analysts must co-adapt as the ‘War on Terror’ mutates into new and terrifying forms. Works Cited Amis, Martin. “Fear and Loathing.” The Guardian (18 Sep. 2001). 1 March 2001 <http://www.guardian.co.uk/Archive/Article/0,4273,4259170,00.php>. Ballard, J.G. The Atrocity Exhibition (rev. ed.). Los Angeles: V/Search Publications, 1990. Beck, Ulrich. World Risk Society. Malden, MA: Polity Press, 1999. Ellul, Jacques. Propaganda: The Formation of Men’s Attitudes. New York: Vintage Books, 1973. Friedman, Thomas. The Lexus and the Olive Tree. New York: Farrar, Straus & Giroux, 1999. Fromm, Erich. Escape from Freedom. New York: Farrar & Rhinehart, 1941. Fukuyama, Francis. The End of History and the Last Man. New York: Free Press, 1992. Huntington, Samuel P. The Clash of Civilizations and the Remaking of World Order. New York: Simon & Schuster, 1996. Kaplan, Robert. The Coming Anarchy: Shattering the Dreams of the Post Cold War. New York: Random House, 2000. Kubler-Ross, Elizabeth. On Death and Dying. London: Tavistock, 1969. McLuhan, Marshall. Understanding Media: The Extensions of Man. London: Routledge & Kegan Paul, 1964. Moeller, Susan D. Compassion Fatigue: How the Media Sell Disease, Famine, War, and Death. New York: Routledge, 1999. Robinson, Piers. The CNN Effect: The Myth of News, Foreign Policy and Intervention. New York: Routledge, 2002. Silberstein, Sandra. War of Words: Language, Politics and 9/11. New York: Routledge, 2002. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wiener, Norbert. Cybernetics: Or Control and Communication in the Animal and the Machine. New York: John Wiley & Sons, 1948. Zelizer, Barbie, and Stuart Allan (eds.). Journalism after September 11. New York: Routledge, 2002. Links http://www.guardian.co.uk/Archive/Article/0 Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Burns, Alex. "The Worldflash of a Coming Future" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0304/08-worldflash.php>. APA Style Burns, A. (2003, Apr 23). The Worldflash of a Coming Future. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0304/08-worldflash.php>
APA, Harvard, Vancouver, ISO, and other styles
29

Caldwell, Nick. "Virtual Domesticity." M/C Journal 3, no. 6 (December 1, 2000). http://dx.doi.org/10.5204/mcj.1885.

Full text
Abstract:
This paper has been constructed in a variety of working environments; some physical, some virtual, some merely perceptual. At an ever increasing rate, both work and leisure for the informationally-overexposed in contemporary, "post-modern" western cultures are taking place in a heterogeneous assemblage of working and living environments. At this point, I want to specifically consider the personal computer as a domestic space, one that mirrors, oddly and specifically, the ways that we relate to our own personal living spaces. I'm considering the domestic because I want to get away from some of the more outlandish configurations of virtual spaces in critical writing. These configurations in such writing tend to suggest that virtual spaces are utopian and transform our relationships with mundane reality. The mirroring I want to talk about is instead an illustration of the way we incorporate the virtual with the real in quite prosaic ways. One of the traditional conceptualisations of the divide between the private and the public sphere is to consider it as a distinction between play and work, although obviously this kind of distinction has the greatest currency when gender roles are highly specified in different spheres (and indeed the notion of culture as a bifurcated structure at all has less currency in postmodernity). The personal computer, being a multi-purpose computational and communication system, is capable of taking on many roles, depending on how its software infrastructure has been furnished. The kinds of distinctions we impose on its use have much stronger interactions at the wider cultural level. In Europe and in countries such as Australia and New Zealand, the so-called "personal home computer" of the 1980s held a much greater sway over the domestic market than it did in the United States, simply because buyers at the time had much less invested in the distinction between machines for work and for play. But shifting working patterns have forced machines that can do the work to go into places where they might not have been accepted before. And the clear distinctions of usage (work vs. play) have begun to blur in quite complex ways. But certain aspects of a computer's function have not quite managed to catch up... Despite the now unremarkable ubiquity of the personal computer in the home, the metaphors for data organisation in modern operating systems are clearly evolved from business office layouts. Discrete packages of information are "files", organised into "folders", "directories", or "drawers". Graphical User Interface (GUI) based operating systems further the metaphor, drawing files as sheets of paper with the corner folded, stored in manilla folders or filing cabinet drawers, which are accessed from a "desktop". These metaphorical associations of data types and programs suit the corporate office environment rather better, it could be argued, than the domestic environment, regardless of whatever actual use the computer is put to at home. I want to parallel two quite distinct and seemingly very different activities, by way of an illustration of how we arrange our data and our personal lives. The first is moving house. The second is re-installing Windows. Long time computer users will know what I'm talking about here, but for other, more fortunate types, I'll explain. The Windows operating system for PCs controls everything about the computer, from the way a piece of software can save data to the hard drive, to making sure the cursor and the mouse are in sync. Before a piece of software, such as a word processor, can be used normally, it must be copied to the hard drive of the computer and made to communicate with the operating system. This, in Windows, involves the operating system registering the location and function of every file that makes the software work. The more programs the user adds, the more this "registry" gets filled up, and the greater the chance that the data held in the registry breaks in some way. Eventually, the operating system grinds to a halt, and the computer seems barely functional. At which point, the only solution is to save all the user's data to a separate location, wipe the contents of the hard drive, and reloading all the software, starting with the operating system. This process is intensely tedious, and occasionally disastrous. Sometimes, programs only work due to very precise and unrepeatable combinations of driver software. Occasionally, the user might forget to back up all their data, and lose important files. Idiosyncratic settings that give the machine a unique personality for the user will invariably vanish. There can be any number of important reasons for moving house, but typically they don't involve the fact that the owner has broken the old one. However, in some way, the house is less fit for residence than it was previously. So it is with a computer re-installation. The level of psychic trauma associated with a move may be far greater than that with a reformat, but it is quantitatively, not qualitatively so. And just as a new house can be a breath of fresh air (even literally), a newly installed operating system will seem to fly through activities that it once wheezed through, even if the underlying hardware is the same. A computer is a domestic space for power-users. It has to be cleaned, maintained, customised and made unique. Like a house, it is a text that has inscribed on it every change and renovation that the occupant has seen fit to implement within it. Although the metaphors of operating systems encourage us to think of data structures as we think of office stationary and equipment, the context of the usage and the attachments we form with these abstract structures colour the way we construct their environments. This is even starting to feed into the design of user interfaces. Music software is increasingly beginning to resemble hi-fi gear in its graphical designs. Image viewers have control panels like VCRs. I don't think that this can be reduced to a notion of form following function. Often these new interfaces actually get in the way of efficient operation of the software. But considered semiotically, they relate very strongly to our patterns of interaction with living environments. Computers are tremendously widespread in western nations, and yet we are in a transitional period. They are colonising domestic spaces, creating new forms of spatiality that are domestic but both physical and virtualised. Moves have been underway for several years to bring this colonisation to an apotheosis, a state of ubiquitous computing, whereby computers become seamlessly and invisibly integrated into all domestic and working environments. Early attempts have included the "WebTV" project, a mostly unsuccessful attempt to turn the TV into an Internet browser. If such a change does come about, it will almost certainly transform the way we interact with our computing technology again, and this time, in unrecognisable ways. References Poole, Steven. Trigger Happy: The Inner Life of Video Games. London: Forth Estate, 2000. Weiser, Mark. "Ubiquitous Computing." 12 Dec. 2000 <http://www.ubiq.com/hypertext/weiser/UbiHome.php>. Citation reference for this article MLA style: Nick Caldwell. "Virtual Domesticity: Renewing the Notion of Cybernetic Living and Working Environments." M/C: A Journal of Media and Culture 3.6 (2000). [your date of access] <http://www.api-network.com/mc/0012/virtual.php>. Chicago style: Nick Caldwell, "Virtual Domesticity: Renewing the Notion of Cybernetic Living and Working Environments," M/C: A Journal of Media and Culture 3, no. 6 (2000), <http://www.api-network.com/mc/0012/virtual.php> ([your date of access]). APA style: Nick Caldwell. (2000) Virtual Domesticity: Renewing the Notion of Cybernetic Living and Working Environments. M/C: A Journal of Media and Culture 3(6). <http://www.api-network.com/mc/0012/virtual.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
30

Burns, Alex. "Oblique Strategies for Ambient Journalism." M/C Journal 13, no. 2 (April 15, 2010). http://dx.doi.org/10.5204/mcj.230.

Full text
Abstract:
Alfred Hermida recently posited ‘ambient journalism’ as a new framework for para- and professional journalists, who use social networks like Twitter for story sources, and as a news delivery platform. Beginning with this framework, this article explores the following questions: How does Hermida define ‘ambient journalism’ and what is its significance? Are there alternative definitions? What lessons do current platforms provide for the design of future, real-time platforms that ‘ambient journalists’ might use? What lessons does the work of Brian Eno provide–the musician and producer who coined the term ‘ambient music’ over three decades ago? My aim here is to formulate an alternative definition of ambient journalism that emphasises craft, skills acquisition, and the mental models of professional journalists, which are the foundations more generally for journalism practices. Rather than Hermida’s participatory media context I emphasise ‘institutional adaptiveness’: how journalists and newsrooms in media institutions rely on craft and skills, and how emerging platforms can augment these foundations, rather than replace them. Hermida’s Ambient Journalism and the Role of Journalists Hermida describes ambient journalism as: “broad, asynchronous, lightweight and always-on communication systems [that] are creating new kinds of interactions around the news, and are enabling citizens to maintain a mental model of news and events around them” (Hermida 2). His ideas appear to have two related aspects. He conceives ambient journalism as an “awareness system” between individuals that functions as a collective intelligence or kind of ‘distributed cognition’ at a group level (Hermida 2, 4-6). Facebook, Twitter and other online social networks are examples. Hermida also suggests that such networks enable non-professionals to engage in ‘communication’ and ‘conversation’ about news and media events (Hermida 2, 7). In a helpful clarification, Hermida observes that ‘para-journalists’ are like the paralegals or non-lawyers who provide administrative support in the legal profession and, in academic debates about journalism, are more commonly known as ‘citizen journalists’. Thus, Hermida’s ambient journalism appears to be: (1) an information systems model of new platforms and networks, and (2) a normative argument that these tools empower ‘para-journalists’ to engage in journalism and real-time commentary. Hermida’s thesis is intriguing and worthy of further discussion and debate. As currently formulated however it risks sharing the blind-spots and contradictions of the academic literature that Hermida cites, which suffers from poor theory-building (Burns). A major reason is that the participatory media context on which Hermida often builds his work has different mental models and normative theories than the journalists or media institutions that are the target of critique. Ambient journalism would be a stronger and more convincing framework if these incorrect assumptions were jettisoned. Others may also potentially misunderstand what Hermida proposes, because the academic debate is often polarised between para-journalists and professional journalists, due to different views about institutions, the politics of knowledge, decision heuristics, journalist training, and normative theoretical traditions (Christians et al. 126; Cole and Harcup 166-176). In the academic debate, para-journalists or ‘citizen journalists’ may be said to have a communitarian ethic and desire more autonomous solutions to journalists who are framed as uncritical and reliant on official sources, and to media institutions who are portrayed as surveillance-like ‘monitors’ of society (Christians et al. 124-127). This is however only one of a range of possible relationships. Sole reliance on para-journalists could be a premature solution to a more complex media ecology. Journalism craft, which does not rely just on official sources, also has a range of practices that already provides the “more complex ways of understanding and reporting on the subtleties of public communication” sought (Hermida 2). Citizen- and para-journalist accounts may overlook micro-studies in how newsrooms adopt technological innovations and integrate them into newsgathering routines (Hemmingway 196). Thus, an examination of the realities of professional journalism will help to cast a better light on how ambient journalism can shape the mental models of para-journalists, and provide more rigorous analysis of news and similar events. Professional journalism has several core dimensions that para-journalists may overlook. Journalism’s foundation as an experiential craft includes guidance and norms that orient the journalist to information, and that includes practitioner ethics. This craft is experiential; the basis for journalism’s claim to “social expertise” as a discipline; and more like the original Linux and Open Source movements which evolved through creative conflict (Sennett 9, 25-27, 125-127, 249-251). There are learnable, transmissible skills to contextually evaluate, filter, select and distil the essential insights. This craft-based foundation and skills informs and structures the journalist’s cognitive witnessing of an event, either directly or via reconstructed, cultivated sources. The journalist publishes through a recognised media institution or online platform, which provides communal validation and verification. There is far more here than the academic portrayal of journalists as ‘gate-watchers’ for a ‘corporatist’ media elite. Craft and skills distinguish the professional journalist from Hermida’s para-journalist. Increasingly, media institutions hire journalists who are trained in other craft-based research methods (Burns and Saunders). Bethany McLean who ‘broke’ the Enron scandal was an investment banker; documentary filmmaker Errol Morris first interviewed serial killers for an early project; and Neil Chenoweth used ‘forensic accounting’ techniques to investigate Rupert Murdoch and Kerry Packer. Such expertise allows the journalist to filter information, and to mediate any influences in the external environment, in order to develop an individualised, ‘embodied’ perspective (Hofstadter 234; Thompson; Garfinkel and Rawls). Para-journalists and social network platforms cannot replace this expertise, which is often unique to individual journalists and their research teams. Ambient Journalism and Twitter Current academic debates about how citizen- and para-journalists may augment or even replace professional journalists can often turn into legitimation battles whether the ‘de facto’ solution is a social media network rather than a media institution. For example, Hermida discusses Twitter, a micro-blogging platform that allows users to post 140-character messages that are small, discrete information chunks, for short-term and episodic memory. Twitter enables users to monitor other users, to group other messages, and to search for terms specified by a hashtag. Twitter thus illustrates how social media platforms can make data more transparent and explicit to non-specialists like para-journalists. In fact, Twitter is suitable for five different categories of real-time information: news, pre-news, rumours, the formation of social media and subject-based networks, and “molecular search” using granular data-mining tools (Leinweber 204-205). In this model, the para-journalist acts as a navigator and “way-finder” to new information (Morville, Findability). Jaron Lanier, an early designer of ‘virtual reality’ systems, is perhaps the most vocal critic of relying on groups of non-experts and tools like Twitter, instead of individuals who have professional expertise. For Lanier, what underlies debates about citizen- and para-journalists is a philosophy of “cybernetic totalism” and “digital Maoism” which exalts the Internet collective at the expense of truly individual views. He is deeply critical of Hermida’s chosen platform, Twitter: “A design that shares Twitter’s feature of providing ambient continuous contact between people could perhaps drop Twitter’s adoration of fragments. We don’t really know, because it is an unexplored design space” [emphasis added] (Lanier 24). In part, Lanier’s objection is traceable back to an unresolved debate on human factors and design in information science. Influenced by the post-war research into cybernetics, J.C.R. Licklider proposed a cyborg-like model of “man-machine symbiosis” between computers and humans (Licklider). In turn, Licklider’s framework influenced Douglas Engelbart, who shaped the growth of human-computer interaction, and the design of computer interfaces, the mouse, and other tools (Engelbart). In taking a system-level view of platforms Hermida builds on the strength of Licklider and Engelbart’s work. Yet because he focuses on para-journalists, and does not appear to include the craft and skills-based expertise of professional journalists, it is unclear how he would answer Lanier’s fears about how reliance on groups for news and other information is superior to individual expertise and judgment. Hermida’s two case studies point to this unresolved problem. Both cases appear to show how Twitter provides quicker and better forms of news and information, thereby increasing the effectiveness of para-journalists to engage in journalism and real-time commentary. However, alternative explanations may exist that raise questions about Twitter as a new platform, and thus these cases might actually reveal circumstances in which ambient journalism may fail. Hermida alludes to how para-journalists now fulfil the earlier role of ‘first responders’ and stringers, in providing the “immediate dissemination” of non-official information about disasters and emergencies (Hermida 1-2; Haddow and Haddow 117-118). Whilst important, this is really a specific role. In fact, disaster and emergency reporting occurs within well-established practices, professional ethics, and institutional routines that may involve journalists, government officials, and professional communication experts (Moeller). Officials and emergency management planners are concerned that citizen- or para-journalism is equated with the craft and skills of professional journalism. The experience of these officials and planners in 2005’s Hurricane Katrina in the United States, and in 2009’s Black Saturday bushfires in Australia, suggests that whilst para-journalists might be ‘first responders’ in a decentralised, complex crisis, they are perceived to spread rumours and potential social unrest when people need reliable information (Haddow and Haddow 39). These terms of engagement between officials, planners and para-journalists are still to be resolved. Hermida readily acknowledges that Twitter and other social network platforms are vulnerable to rumours (Hermida 3-4; Sunstein). However, his other case study, Iran’s 2009 election crisis, further complicates the vision of ambient journalism, and always-on communication systems in particular. Hermida discusses several events during the crisis: the US State Department request to halt a server upgrade, how the Basij’s shooting of bystander Neda Soltan was captured on a mobile phone camera, the spread across social network platforms, and the high-velocity number of ‘tweets’ or messages during the first two weeks of Iran’s electoral uncertainty (Hermida 1). The US State Department was interested in how Twitter could be used for non-official sources, and to inform people who were monitoring the election events. Twitter’s perceived ‘success’ during Iran’s 2009 election now looks rather different when other factors are considered such as: the dynamics and patterns of Tehran street protests; Iran’s clerics who used Soltan’s death as propaganda; claims that Iran’s intelligence services used Twitter to track down and to kill protestors; the ‘black box’ case of what the US State Department and others actually did during the crisis; the history of neo-conservative interest in a Twitter-like platform for strategic information operations; and the Iranian diaspora’s incitement of Tehran student protests via satellite broadcasts. Iran’s 2009 election crisis has important lessons for ambient journalism: always-on communication systems may create noise and spread rumours; ‘mirror-imaging’ of mental models may occur, when other participants have very different worldviews and ‘contexts of use’ for social network platforms; and the new kinds of interaction may not lead to effective intervention in crisis events. Hermida’s combination of news and non-news fragments is the perfect environment for psychological operations and strategic information warfare (Burns and Eltham). Lessons of Current Platforms for Ambient Journalism We have discussed some unresolved problems for ambient journalism as a framework for journalists, and as mental models for news and similar events. Hermida’s goal of an “awareness system” faces a further challenge: the phenomenological limitations of human consciousness to deal with information complexity and ambiguous situations, whether by becoming ‘entangled’ in abstract information or by developing new, unexpected uses for emergent technologies (Thackara; Thompson; Hofstadter 101-102, 186; Morville, Findability, 55, 57, 158). The recursive and reflective capacities of human consciousness imposes its own epistemological frames. It’s still unclear how Licklider’s human-computer interaction will shape consciousness, but Douglas Hofstadter’s experiments with art and video-based group experiments may be suggestive. Hofstadter observes: “the interpenetration of our worlds becomes so great that our worldviews start to fuse” (266). Current research into user experience and information design provides some validation of Hofstadter’s experience, such as how Google is now the ‘default’ search engine, and how its interface design shapes the user’s subjective experience of online search (Morville, Findability; Morville, Search Patterns). Several models of Hermida’s awareness system already exist that build on Hofstadter’s insight. Within the information systems field, on-going research into artificial intelligence–‘expert systems’ that can model expertise as algorithms and decision rules, genetic algorithms, and evolutionary computation–has attempted to achieve Hermida’s goal. What these systems share are mental models of cognition, learning and adaptiveness to new information, often with forecasting and prediction capabilities. Such systems work in journalism areas such as finance and sports that involve analytics, data-mining and statistics, and in related fields such as health informatics where there are clear, explicit guidelines on information and international standards. After a mid-1980s investment bubble (Leinweber 183-184) these systems now underpin the technology platforms of global finance and news intermediaries. Bloomberg LP’s ubiquitous dual-screen computers, proprietary network and data analytics (www.bloomberg.com), and its competitors such as Thomson Reuters (www.thomsonreuters.com and www.reuters.com), illustrate how financial analysts and traders rely on an “awareness system” to navigate global stock-markets (Clifford and Creswell). For example, a Bloomberg subscriber can access real-time analytics from exchanges, markets, and from data vendors such as Dow Jones, NYSE Euronext and Thomson Reuters. They can use portfolio management tools to evaluate market information, to make allocation and trading decisions, to monitor ‘breaking’ news, and to integrate this information. Twitter is perhaps the para-journalist equivalent to how professional journalists and finance analysts rely on Bloomberg’s platform for real-time market and business information. Already, hedge funds like PhaseCapital are data-mining Twitter’s ‘tweets’ or messages for rumours, shifts in stock-market sentiment, and to analyse potential trading patterns (Pritchett and Palmer). The US-based Securities and Exchange Commission, and researchers like David Gelernter and Paul Tetlock, have also shown the benefits of applied data-mining for regulatory market supervision, in particular to uncover analysts who provide ‘whisper numbers’ to online message boards, and who have access to material, non-public information (Leinweber 60, 136, 144-145, 208, 219, 241-246). Hermida’s framework might be developed further for such regulatory supervision. Hermida’s awareness system may also benefit from the algorithms found in high-frequency trading (HFT) systems that Citadel Group, Goldman Sachs, Renaissance Technologies, and other quantitative financial institutions use. Rather than human traders, HFT uses co-located servers and complex algorithms, to make high-volume trades on stock-markets that take advantage of microsecond changes in prices (Duhigg). HFT capabilities are shrouded in secrecy, and became the focus of regulatory attention after several high-profile investigations of traders alleged to have stolen the software code (Bray and Bunge). One public example is Streambase (www.streambase.com), a ‘complex event processing’ (CEP) platform that can be used in HFT, and commercialised from the Project Aurora research collaboration between Brandeis University, Brown University, and Massachusetts Institute of Technology. CEP and HFT may be the ‘killer apps’ of Hermida’s awareness system. Alternatively, they may confirm Jaron Lanier’s worst fears: your data-stream and user-generated content can be harvested by others–for their gain, and your loss! Conclusion: Brian Eno and Redefining ‘Ambient Journalism’ On the basis of the above discussion, I suggest a modified definition of Hermida’s thesis: ‘Ambient journalism’ is an emerging analytical framework for journalists, informed by cognitive, cybernetic, and information systems research. It ‘sensitises’ the individual journalist, whether professional or ‘para-professional’, to observe and to evaluate their immediate context. In doing so, ‘ambient journalism’, like journalism generally, emphasises ‘novel’ information. It can also inform the design of real-time platforms for journalistic sources and news delivery. Individual ‘ambient journalists’ can learn much from the career of musician and producer Brian Eno. His personal definition of ‘ambient’ is “an atmosphere, or a surrounding influence: a tint,” that relies on the co-evolution of the musician, creative horizons, and studio technology as a tool, just as para-journalists use Twitter as a platform (Sheppard 278; Eno 293-297). Like para-journalists, Eno claims to be a “self-educated but largely untrained” musician and yet also a craft-based producer (McFadzean; Tamm 177; 44-50). Perhaps Eno would frame the distinction between para-journalist and professional journalist as “axis thinking” (Eno 298, 302) which is needlessly polarised due to different normative theories, stances, and practices. Furthermore, I would argue that Eno’s worldview was shaped by similar influences to Licklider and Engelbart, who appear to have informed Hermida’s assumptions. These influences include the mathematician and game theorist John von Neumann and biologist Richard Dawkins (Eno 162); musicians Eric Satie, John Cage and his book Silence (Eno 19-22, 162; Sheppard 22, 36, 378-379); and the field of self-organising systems, in particular cyberneticist Stafford Beer (Eno 245; Tamm 86; Sheppard 224). Eno summed up the central lesson of this theoretical corpus during his collaborations with New York’s ‘No Wave’ scene in 1978, of “people experimenting with their lives” (Eno 253; Reynolds 146-147; Sheppard 290-295). Importantly, he developed a personal view of normative theories through practice-based research, on a range of projects, and with different creative and collaborative teams. Rather than a technological solution, Eno settled on a way to encode his craft and skills into a quasi-experimental, transmittable method—an aim of practitioner development in professional journalism. Even if only a “founding myth,” the story of Eno’s 1975 street accident with a taxi, and how he conceived ‘ambient music’ during his hospital stay, illustrates how ambient journalists might perceive something new in specific circumstances (Tamm 131; Sheppard 186-188). More tellingly, this background informed his collaboration with the late painter Peter Schmidt, to co-create the Oblique Strategies deck of aphorisms: aleatory, oracular messages that appeared dependent on chance, luck, and randomness, but that in fact were based on Eno and Schmidt’s creative philosophy and work guidelines (Tamm 77-78; Sheppard 178-179; Reynolds 170). In short, Eno was engaging with the kind of reflective practices that underpin exemplary professional journalism. He was able to encode this craft and skills into a quasi-experimental method, rather than a technological solution. Journalists and practitioners who adopt Hermida’s framework could learn much from the published accounts of Eno’s practice-based research, in the context of creative projects and collaborative teams. In particular, these detail the contexts and choices of Eno’s early ambient music recordings (Sheppard 199-200); Eno’s duels with David Bowie during ‘Sense of Doubt’ for the Heroes album (Tamm 158; Sheppard 254-255); troubled collaborations with Talking Heads and David Byrne (Reynolds 165-170; Sheppard; 338-347, 353); a curatorial, mentor role on U2’s The Unforgettable Fire (Sheppard 368-369); the ‘grand, stadium scale’ experiments of U2’s 1991-93 ZooTV tour (Sheppard 404); the Zorn-like games of Bowie’s Outside album (Eno 382-389); and the ‘generative’ artwork 77 Million Paintings (Eno 330-332; Tamm 133-135; Sheppard 278-279; Eno 435). Eno is clearly a highly flexible maker and producer. Developing such flexibility would ensure ambient journalism remains open to novelty as an analytical framework that may enhance the practitioner development and work of professional journalists and para-journalists alike.Acknowledgments The author thanks editor Luke Jaaniste, Alfred Hermida, and the two blind peer reviewers for their constructive feedback and reflective insights. References Bray, Chad, and Jacob Bunge. “Ex-Goldman Programmer Indicted for Trade Secrets Theft.” The Wall Street Journal 12 Feb. 2010. 17 March 2010 ‹http://online.wsj.com/article/SB10001424052748703382904575059660427173510.html›. Burns, Alex. “Select Issues with New Media Theories of Citizen Journalism.” M/C Journal 11.1 (2008). 17 March 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/view/30›.———, and Barry Saunders. “Journalists as Investigators and ‘Quality Media’ Reputation.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 281-297. 17 March 2010 ‹http://eprints.vu.edu.au/15229/1/CPRF09BurnsSaunders.pdf›.———, and Ben Eltham. “Twitter Free Iran: An Evaluation of Twitter’s Role in Public Diplomacy and Information Operations in Iran’s 2009 Election Crisis.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 298-310. 17 March 2010 ‹http://eprints.vu.edu.au/15230/1/CPRF09BurnsEltham.pdf›. Christians, Clifford G., Theodore Glasser, Denis McQuail, Kaarle Nordenstreng, and Robert A. White. Normative Theories of the Media: Journalism in Democratic Societies. Champaign, IL: University of Illinois Press, 2009. Clifford, Stephanie, and Julie Creswell. “At Bloomberg, Modest Strategy to Rule the World.” The New York Times 14 Nov. 2009. 17 March 2010 ‹http://www.nytimes.com/2009/11/15/business/media/15bloom.html?ref=businessandpagewanted=all›.Cole, Peter, and Tony Harcup. Newspaper Journalism. Thousand Oaks, CA: Sage Publications, 2010. Duhigg, Charles. “Stock Traders Find Speed Pays, in Milliseconds.” The New York Times 23 July 2009. 17 March 2010 ‹http://www.nytimes.com/2009/07/24/business/24trading.html?_r=2andref=business›. Engelbart, Douglas. “Augmenting Human Intellect: A Conceptual Framework, 1962.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era. London: Phaidon Press, 2002. 60-67. Eno, Brian. A Year with Swollen Appendices. London: Faber and Faber, 1996. Garfinkel, Harold, and Anne Warfield Rawls. Toward a Sociological Theory of Information. Boulder, CO: Paradigm Publishers, 2008. Hadlow, George D., and Kim S. Haddow. Disaster Communications in a Changing Media World, Butterworth-Heinemann, Burlington MA, 2009. Hemmingway, Emma. Into the Newsroom: Exploring the Digital Production of Regional Television News. Milton Park: Routledge, 2008. Hermida, Alfred. “Twittering the News: The Emergence of Ambient Journalism.” Journalism Practice 4.3 (2010): 1-12. Hofstadter, Douglas. I Am a Strange Loop. New York: Perseus Books, 2007. Lanier, Jaron. You Are Not a Gadget: A Manifesto. London: Allen Lane, 2010. Leinweber, David. Nerds on Wall Street: Math, Machines and Wired Markets. Hoboken, NJ: John Wiley and Sons, 2009. Licklider, J.C.R. “Man-Machine Symbiosis, 1960.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era, London: Phaidon Press, 2002. 52-59. McFadzean, Elspeth. “What Can We Learn from Creative People? The Story of Brian Eno.” Management Decision 38.1 (2000): 51-56. Moeller, Susan. Compassion Fatigue: How the Media Sell Disease, Famine, War and Death. New York: Routledge, 1998. Morville, Peter. Ambient Findability. Sebastopol, CA: O’Reilly Press, 2005. ———. Search Patterns. Sebastopol, CA: O’Reilly Press, 2010.Pritchett, Eric, and Mark Palmer. ‘Following the Tweet Trail.’ CNBC 11 July 2009. 17 March 2010 ‹http://www.casttv.com/ext/ug0p08›. Reynolds, Simon. Rip It Up and Start Again: Postpunk 1978-1984. London: Penguin Books, 2006. Sennett, Richard. The Craftsman. London: Penguin Books, 2008. Sheppard, David. On Some Faraway Beach: The Life and Times of Brian Eno. London: Orion Books, 2008. Sunstein, Cass. On Rumours: How Falsehoods Spread, Why We Believe Them, What Can Be Done. New York: Farrar, Straus and Giroux, 2009. Tamm, Eric. Brian Eno: His Music and the Vertical Colour of Sound. New York: Da Capo Press, 1995. Thackara, John. In the Bubble: Designing in a Complex World. Boston, MA: The MIT Press, 1995. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Science of Mind. Boston, MA: Belknap Press, 2007.
APA, Harvard, Vancouver, ISO, and other styles
31

Brandt, Marisa Renee. "Cyborg Agency and Individual Trauma: What Ender's Game Teaches Us about Killing in the Age of Drone Warfare." M/C Journal 16, no. 6 (November 6, 2013). http://dx.doi.org/10.5204/mcj.718.

Full text
Abstract:
During the War on Terror, the United States military has been conducting an increasing number of foreign campaigns by remote control using drones—also called unmanned aerial vehicles (UAVs) or remotely piloted vehicles (RPVs)—to extend the reach of military power and augment the technical precision of targeted strikes while minimizing bodily risk to American combatants. Stationed on bases throughout the southwest, operators fly weaponized drones over the Middle East. Viewing the battle zone through a computer screen that presents them with imagery captured from a drone-mounted camera, these combatants participate in war from a safe distance via an interface that resembles a video game. Increasingly, this participation takes the form of targeted killing. Despite their relative physical safety, in 2008 reports began mounting that like boots-on-the-ground combatants, many drone operators seek the services of chaplains or other mental health professionals to deal with the emotional toll of their work (Associated Press; Schachtman). Questions about the nature of the stress or trauma that drone operators experience have become a trope in news coverage of drone warfare (see Bumiller; Bowden; Saleton; Axe). This was exemplified in May 2013, when former Air Force drone pilot Brandon Bryant became a public figure after speaking to National Public Radio about his remorse for participating in targeted killing strikes and his subsequent struggle with post-traumatic stress (PTS) (Greene and McEvers). Stories like Bryant’s express American culture’s struggle to understand the role screen-mediated, remotely controlled killing plays in shifting the location of combatants’s sense of moral agency. That is, their sense of their ability to act based on their own understanding of right and wrong. Historically, one of the primary ways that psychiatry has conceptualized combat trauma has been as combatants’s psychological response losing their sense of moral agency on the battlefield (Lifton).This articleuses the popular science fiction novel Ender's Game as an analytic lens through which to examine the ways that screen-mediated warfare may result in combat trauma by investigating the ways in which it may compromise moral agency. The goal of this analysis is not to describe the present state of drone operators’s experience (see Asaro), but rather to compare and contrast contemporary public discourses on the psychological impact of screen-mediated war with the way it is represented in one of the most influential science fiction novels of all times (The book won the Nebula Award in 1985, the Hugo Award in 1986, and appears on both the Modern Library 100 Best Novels and American Library Association’s “100 Best Books for Teens” lists). In so doing, the paper aims to counter prevalent modes of critical analysis of screen-mediated war that cannot account for drone operators’s trauma. For decades, critics of postmodern warfare have denounced how fighting from inside tanks, the cockpits of planes, or at office desks has removed combatants from the experiences of risk and endangerment that historically characterized war (see Gray; Levidow & Robins). They suggest that screen-mediation enables not only physical but also cognitive and emotional distance from the violence of war-fighting by circumscribing it in a “magic circle.” Virtual worlds scholars adopted the term “magic circle” from cultural historian Johan Huizinga, who described it as the membrane that separates the time and space of game-play from those of real life (Salen and Zimmerman). While military scholars have long recognized that only 2% of soldiers can kill without hesitation (Grossman), critics of “video game wars” suggest that screen-mediation puts war in a magic circle, thereby creating cyborg human-machine assemblages capable of killing in cold blood. In other words, these critics argue that screen-mediated war distributes agency between humans and machines in such a way that human combatants do not feel morally responsible for killing. In contrast, Ender’s Game suggests that even when militaries utilize video game aesthetics to create weapons control interfaces, screen-mediation alone ultimately cannot blur the line between war and play and thereby psychically shield cyborg soldiers from combat trauma.Orson Scott Card’s 1985 novel Ender’s Game—and the 2013 film adaptation—tells the story of a young boy at an elite military academy. Set several decades after a terrible war between humans and an alien race called the buggers, the novel follows the life of a boy named Ender. At age 6, recruiters take Andrew “Ender” Wiggin from his family to begin military training. He excels in all areas and eventually enters officer training. There he encounters a new video game-like simulator in which he commands space ship battalions against increasingly complex configurations of bugger ships. At the novel’s climax, Ender's mentor, war hero Mazer Rackham, brings him to a room crowded with high-ranking military personnel in order to take his final test on the simulator. In order to win Ender opts to launch a massive bomb, nicknamed “Little Doctor”, at the bugger home world. The image on his screen of a ball of space dust where once sat the enemy planet is met by victory cheers. Mazer then informs Ender that since he began officer training, he has been remotely controlling real ships. The video game war was, "Real. Not a game" (Card 297); Ender has exterminated the bugger species. But rather than join the celebration, Ender is devastated to learn he has committed "xenocide." Screen-mediation, the novel shows, can enable people to commit acts that they would otherwise find heinous.US military advisors have used the story to set an agenda for research and development in augmented media. For example, Dr. Michael Macedonia, Chief Technology Officer of the Army Office for Simulation, Training, and Instrumentation told a reporter for the New York Times that Ender's Game "has had a lot of influence on our thinking" about how to use video game-like technologies in military operations (Harmon; Silberman; Mead). Many recent programs to develop and study video game-like military training simulators have been directly inspired by the book and its promise of being able to turn even a six-year-old into a competent combatant through well-structured human-computer interaction (Mead). However, it would appear that the novel’s moral regarding the psychological impact of actual screen-mediated combat did not dissuade military investment in drone warfare. The Air Force began using drones for surveillance during the Gulf War, but during the Global War on Terror they began to be equipped with weapons. By 2010, the US military operated over 7,000 drones, including over 200 weapons-ready Predator and Reaper drones. It now invests upwards of three-billion dollars a year into the drone program (Zucchino). While there are significant differences between contemporary drone warfare and the plot of Ender's Game—including the fact that Ender is a child, that he alone commands a fleet, that he thinks he is playing a game, and that, except for a single weapon of mass destruction, he and his enemies are equally well equipped—for this analysis, I will focus on their most important similarities: both Ender and actual drone operators work on teams for long shifts using video game-like technology to remotely control vehicles in aerial combat against an enemy. After he uses the Little Doctor, Mazer and Graff, Ender's long-time training supervisors, first work to circumvent his guilt by reframing his actions as heroic. “You're a hero, Ender. They've seen what you did, you and the others. I don't think there's a government on Earth that hasn't voted you their highest metal.” “I killed them all, didn't I?” Ender asked. “All who?” asked Graff. “The buggers? That was the idea.” Mazer leaned in close. “That's what the war was for.” “All their queens. So I killed all their children, all of everything.” “They decided that when they attacked us. It wasn't your fault. It's what had to happen.” Ender grabbed Mazer's uniform and hung onto it, pulling him down so they were face to face. “I didn't want to kill them all. I didn't want to kill anybody! I'm not a killer! […] but you made me do it, you tricked me into it!” He was crying. He was out of control. (Card 297–8)The novel up to this point has led us to believe that Ender at the very least understands that what he does in the game will be asked of him in real life. But his traumatic response to learning the truth reveals that he was in the magic circle. When he thinks he is playing a game, succeeding is a matter of ego: he wants to be the best, to live up to the expectations of his trainers that he is humanity’s last hope. When the magic circle is broken, Ender reconsiders his decision to use the Little Doctor. Tactics he could justify to win the game, reframed as real military tactics, threaten his sense of himself as a moral agent. Being told he is a hero provides no solace.Card wrote the novel during the Cold War, when computers were coming to play an increasingly large role in military operations. Historians of military technology have shown that during this time human behavior began to be defined in machine-like, functionalist terms by scientists working on cybernetic systems (see Edwards; Galison; Orr). Human skills were defined as components of large technological systems, such as tanks and anti-aircraft weaponry: a human skill was treated as functionally the same as a machine one. The only issue of importance was how all the components could work together in order to meet strategic goals—a cybernetic problem. The reasons that Mazer and Graff have for lying to Ender suggest that the author believed that as a form of technical augmentation, screen-mediation can be used to evacuate individual moral agency and submit human will to the command of the larger cybernetic system. Issues of displaced agency in the military cyborg assemblage are apparent in the following quote, in which Mazer compares Ender himself to the bomb he used to destroy the bugger home world: “You had to be a weapon, Ender. Like a gun, like the Little Doctor, functioning perfectly but not knowing what you were aimed at. We aimed you. We're responsible. If there was something wrong, we did it” (298). Questions of distributed agency have also surfaced in the drone debates. Government and military leaders have attempted to depersonalize drone warfare by assuring the American public that the list of targets is meticulously researched: drones kill those who we need killed. Drone warfare, media theorist Peter Asaro argues, has “created new and complex forms of human-machine subjectivity” that cannot be understood by considering the agency of the technology alone because it is distributed between humans and machines (25). While our leaders’s decisions about who to kill are central to this new cyborg subjectivity, the operators who fire the weapons nevertheless experience at least a retrospective sense of agency. As phenomenologist John Protevi notes, in the wake of wars fought by modern military networks, many veterans diagnosed with PTS still express guilt and personal responsibility for the outcomes of their participation in killing (Protevi). Mazer and Graff explain that the two qualities that make Ender such a good weapon also create an imperative to lie to him: his compassion and his innocence. For his trainers, compassion means a capacity to truly think like others, friend or foe, and understand their motivations. Graff explains that while his trainers recognized Ender's compassion as an invaluable tool, they also recognized that it would preclude his willingness to kill.It had to be a trick or you couldn't have done it. It's the bind we were in. We had to have a commander with so much empathy that he would think like the buggers, understand them and anticipate them. So much compassion that he could win the love of his underlings and work with them like a perfect machine, as perfect as the buggers. But somebody with that much compassion could never be the killer we needed. Could never go into battle willing to win at all costs. If you knew, you couldn't do it. If you were the kind of person who would do it even if you knew, you could never have understood the buggers well enough. (298)In learning that the game was real, Ender learns that he was not merely coming to understand a programmed simulation of bugger behavior, but their actual psychology. Therefore, his compassion has not only helped him understand the buggers’ military strategy, but also to identify with them.Like Ender, drone operators spend weeks or months following their targets, getting to know them and their routines from a God’s eye perspective. They both also watch the repercussions of their missions on screen. Unlike fighter pilots who drop bombs and fly away, drone operators use high-resolution cameras and fly much closer to the ground both when flying and assessing the results of their strikes. As one drone operator interviewed by the Los Angeles Times explained, "When I flew the B-52, it was at 30,000 to 40,000 feet, and you don't even see the bombs falling … Here, you're a lot closer to the actual fight, or that's the way it seems" (Zucchino). Brookings Institute scholar Peter Singer has argued that in this way screen mediation actually enables a more intimate experience of violence for drone operators than airplane pilots (Singer).The second reason Ender’s trainers give for lying is that they need someone not only compassionate, but also innocent of the horrors of war. The war veteran Mazer explains: “And it had to be a child, Ender,” said Mazer. “You were faster than me. Better than me. I was too old and cautious. Any decent person who knows what warfare is can never go into battle with a whole heart. But you didn't know. We made sure you didn't know" (298). When Ender discovers what he has done, he loses not only his innocence but his sense of himself as a moral agent. After such a trauma, his heart is no longer whole.Actual drone operators are, of course, not kept in a magic circle, innocent of the repercussions of their actions. Nor do they otherwise feel as though they are playing, as several have publicly stated. Instead, they report finding drone work tedious, and some even play video games for fun (Asaro). However, Air Force recruitment advertising makes clear analogies between the skills they desire and those of video game play (Brown). Though the first generations of drone operators were pulled from the ranks of flight pilots, in 2009 the Air Force began training them from the ground. Many drone operators, then, enter the role having no other military service and may come into it believing, on some level, that their work will be play.Recent military studies of drone operators have raised doubts about whether drone operators really experience high rates of trauma, suggesting that the stresses they experience are seated instead in occupational issues like long shifts (Ouma, Chappelle, and Salinas; Chappelle, Psy, and Salinas). But several critics of these studies have pointed out that there is a taboo against speaking about feelings of regret and trauma in the military in general and among drone operators in particular. A PTS diagnosis can end a military career; given the Air Force’s career-focused recruiting emphasis, it makes sense that few would come forward (Dao). Therefore, it is still important to take drone operator PTS seriously and try to understand how screen-mediation augments their experience of killing.While critics worry that warfare mediated by a screen and joystick leads to a “‘Playstation’ mentality towards killing” (Alston 25), Ender's Game presents a theory of remote-control war wherein this technological redistribution of the act of killing does not, in itself, create emotional distance or evacuate the killer’s sense of moral agency. In order to kill, Ender must be distanced from reality as well. While drone operators do not work shielded by the magic circle—and therefore do not experience the trauma of its dissolution—every day when they leave the cyborg assemblage of their work stations and rejoin their families they still have to confront themselves as individual moral agents and bear their responsibility for ending lives. In both these scenarios, a human agent’s combat trauma serves to remind us that even when their bodies are physically safe, war is hell for those who fight. This paper has illustrated how a science fiction story can be used as an analytic lens for thinking through contemporary discourses about human-technology relationships. However, the US military is currently investing in drones that are increasingly autonomous from human operators. This redistribution of agency may reduce incidence of PTS among operators by decreasing their role in, and therefore sense of moral responsibility for, killing (Axe). Reducing mental illness may seem to be a worthwhile goal, but in a world wherein militaries distribute the agency for killing to machines in order to reduce the burden on humans, societies will have to confront the fact that combatants’s trauma cannot be a compass by which to measure the morality of wars. Too often in the US media, the primary stories that Americans are told about the violence of their country’s wars are those of their own combatants—not only about their deaths and physical injuries, but their suicide and PTS. To understand war in such a world, we will need new, post-humanist stories where the cyborg assemblage and not the individual is held accountable for killing and morality is measured in lives taken, not rates of mental illness. ReferencesAlston, Phillip. “Report of the Special Rapporteur on Extrajudicial, Summary, or Arbitrary Executions, Addendum: Study on Targeted Killings.” United Nations Human Rights Council (2010). Asaro, Peter M. “The Labor of Surveillance and Bureaucratized Killing: New Subjectivities of Military Drone Operators”. Social Semiotics 23.2 (2013): 196-22. Associated Press. “Predator Pilots Suffering War Stress.” Military.com 2008. Axe, David. “How to Prevent Drone Pilot PTSD: Blame the ’Bot.” Wired June 2012.Bowden, Mark. “The Killing Machines: How to Think about Drones.” The Atlantic Sep. 2013.Brown, Melissa T. Enlisting Masculinity: The Construction of Gender in US Military Recruiting Advertising during the All-Volunteer Force. London: Oxford University Press, 2012. Bumiller, Elisabeth. “Air Force Drone Operators Report High Levels of Stress.” New York Times 18 Dec. 2011: n. pag. Card, Orson Scott. Ender’s Game. Tom Doherty Associates, Inc., 1985. Chappelle, Wayne, D. Psy, and Amber Salinas. “Psychological Health Screening of Remotely Piloted Aircraft (RPA) Operators and Supporting Units.” Paper presented at the Symposium on Mental Health and Well-Being across the Military Spectrum, Bergen, Norway, 12 April 2011: 1–12. Dao, James. “Drone Pilots Are Found to Get Stress Disorders Much as Those in Combat Do.” New York Times 22 Feb. 2013: n. pag. Edwards, Paul N. The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge: MIT Press, 1997.Galison, Peter. “The Ontology of the Enemy: Norbert Wiener and the Cybernetic Vision.” Critical Inquiry 21.1 (1994): 228.Gray, Chris Hables “Posthuman Soldiers in Postmodern War.” Body & Society 9.4 (2003): 215–226. 27 Nov. 2010.Greene, David, and Kelly McEvers. “Former Air Force Pilot Has Cautionary Tales about Drones.” National Public Radio 10 May 2013.Grossman, David. On Killing. Revised. Boston: Back Bay Books, 2009. Harmon, Amy. “More than Just a Game, But How Close to Reality?” New York Times 3 Apr. 2003: n. pag. Levidow, Les, and Robins. Cyborg Worlds: The Military Information Society. London: Free Association Books, 1989. Lifton, Robert Jay. Home from the War: Vietnam Veterans: Neither Victims nor Executioners. New York: Random House, 1973. Mead, Corey. War Play: Video Games and the Future of Armed Conflict. Boston: Houghton Mifflin Harcourt, 2013. Orr, Jackie. Panic Diaries: A Genealogy of Panic Disorder. Durham: Duke University Press, 2006.Ouma, J.A., W.L. Chappelle, and A. Salinas. Facets of Occupational Burnout among US Air Force Active Duty and National Guard/Reserve MQ-1 Predator and MQ-9 Reaper Operators. Air Force Research Labs Technical Report AFRL-SA-WP-TR-2011-0003. Wright-Patterson AFB, OH: Air Force Research Laboratory. 2011.Protevi, John. “Affect, Agency and Responsibility: The Act of Killing in the Age of Cyborgs.” Phenomenology and the Cognitive Sciences 7.3 (2008): 405–413. Salen, Katie, and Eric Zimmerman. Rules of Play: Game Design Fundamentals. Cambridge, MA: MIT Press, 2003. Saleton, William. “Ghosts in the Machine: Do Remote-Control War Pilots Get Combat Stress?” Slate.com Aug. 2008. Schachtman, Nathan. “Shrinks Help Drone Pilots Cope with Robo-Violence.” Wired Aug. 2008.Silberman, Steve. “The War Room.” Wired Sep. 2004: 1–5.Singer, P.W. Wired for War: The Robotics Revolution and Conflict in the Twenty-First Century. New York: Penguin Press, 2009. Zucchino, David. “Drone Pilots Have Front-Row Seat on War, from Half a World Away.” Los Angeles Times 21 Feb. 2010: n. pag.
APA, Harvard, Vancouver, ISO, and other styles
32

Mesch, Claudia. "Racing Berlin." M/C Journal 3, no. 3 (June 1, 2000). http://dx.doi.org/10.5204/mcj.1845.

Full text
Abstract:
Bracketed by a quotation from famed 1950s West German soccer coach S. Herberger and the word "Ende", the running length of the 1998 film Run Lola Run, directed by Tom Tykwer, is 9 minutes short of the official duration of a soccer match. Berlin has often been represented, in visual art and in cinematic imagery, as the modern metropolis: the Expressionist and Dadaist painters, Walter Ruttmann, Fritz Lang and Rainer Werner Fassbinder all depicted it as the modernising city. Since the '60s artists have staged artworks and performances in the public space of the city which critiqued the cold war order of that space, its institutions, and the hysterical attempt by the German government to erase a divided past after 1990. Run Lola Run depicts its setting, Berlin, as a cyberspace obstacle course or environment usually associated with interactive video and computer games. The eerie emptiness of the Berlin of Run Lola Run -- a fantasy projected onto a city which has been called the single biggest construction site in Europe -- is necessary to keep the protagonist Lola moving at high speed from the West to the East part of town and back again -- another fantasy which is only possible when the city is recast as a virtual environment. In Run Lola Run Berlin is represented as an idealised space of bodily and psychic mobility where the instantaneous technology of cyberspace is physically realised as a utopia of speed. The setting of Run Lola Run is not a playing field but a playing level, to use the parlance of video game technology. Underscored by other filmic devices and technologies, Run Lola Run emulates the kinetics and structures of a virtual, quasi-interactive environment: the Berlin setting of the film is paradoxically rendered as an indeterminate, but also site specific, entertainment complex which hinges upon the high-speed functioning of multiple networks of auto-mobility. Urban mobility as circuitry is performed by the film's super-athletic Lola. Lola is a cyber character; she recalls the 'cyberbabe' Lara Croft, heroine of the Sega Tomb Raider video game series. In Tomb Raider the Croft figure is controlled and manipulated by the interactive player to go through as many levels of play, or virtual environments, as possible. In order for the cyber figure to get to the next level of play she must successfully negotiate as many trap and puzzle mechanisms as possible. Speed in this interactive virtual game results from the skill of an experienced player who has practiced coordinating keyboard commands with figure movements and who is familiar with the obstacles the various environments can present. As is the case with Lara Croft, the figure of Lola in Run Lola Run reverses the traditional gender relations of the action/adventure game and of 'damsel in distress' narratives. Run Lola Run focusses on Lola's race to save her boyfriend from a certain death by obtaining DM 100,000 and delivering it across town in twenty minutes. The film adds the element of the race to the game, a variable not included in Tomb Raider. Tykwer repeats Lola's trajectory from home to the location of her boyfriend Manni thrice in the film, each time ending her quest with a different outcome. As in a video game, Lola can therefore be killed as the game unwinds during one turn of play, and on the next attempt she, and also we as viewers or would-be interactive players, would have learned from her previous 'mistakes' and adjust her actions accordingly. The soundtrack of Run Lola Run underscores the speed and mobility of Berlin by means of the fast/slow/fast rhythm of the film, which proceeds primarily at the pace of techno music. This quick rhythm is syncopated with pauses in the forward-moving action brought on by Lola's superhuman screams or by the death of a protagonist. These events mark the end of one turn of 'play' and the restart of Lola's route. Tykwer visually contrasts Lola's linear mobility and her physical and mental capacity for speed with her boyfriend Manni's centripetal fixity, a marker of his helplessness, throughout the film. Manni, a bagman-in-training for a local mafioso, has to make his desperate phone calls from a single phone booth in the borough of Charlottenburg after he bungles a hand-off of payment money by forgetting it on the U-Bahn (the subway). In a black and white flashback sequence, viewers learn about Manni's ill-fated trip to the Polish border with a shipment of stolen cars. In contrast to his earlier mobility, Manni becomes entrapped in the phone booth as a result of his ineptitude. A spiral store sign close to the phone booth symbolizes Manni's entrapment. Tykwer contrasts this circular form with the lines and grids Lola transverses throughout the film. Where at first Lola is also immobilised after her moped is stolen by an 'unbelieveably fast' thief, her quasi-cybernetic thought process soon restores her movement. Tykwer visualizes Lola's frantic thinking in a series of photographic portraits which indicates her consideration of who she can contact to supply a large sum of money. Lola not only moves but thinks with the fast, even pace of a computer working through a database. Tykwer then repeats overhead shots of gridded pavement which Lola follows as she runs through the filmic frame. The grid, emblem of modernity and structure of the metropolis, the semiconductor, and the puzzles of a virtual environment, is necessary for mobility and speed, and is performed by the figure of Lola. The grid is also apparent in the trajectories of traffic of speeding bikes, subway trains,and airplanes passing overhead, which all parallel Lola's movements in the film. The city/virtual environment is thus an idealised nexus of local, national and global lines of mobility and communication.: -- OR -- Tykwer emphasised the arbitrariness of the setting of Run Lola Run, insisting it could easily have been set in any other urban centre such as New York City or Beijing. At no point does the film make explicit that the space of action is Berlin; in fact the setting of the film is far less significant than the filmic self-reflexivity Tykwer explores in Run Lola Run. Berlin becomes a postmodernist filmic text in which earlier films by Lang, Schlöndorff, von Sternberg and Wenders are cited in intertextual fashion. It is not by chance that the protagonist of Run Lola Run shares the name of Marlene Dietrich's legendary character in von Sternberg's The Blue Angel. The running, late-20th-century Lola reconnects with and gains power from the originary Lola Lola as ur-Star of German cinema. The high overhead shots of Run Lola Run technologically exceed those used by Lang in M in 1931 but still quote his filmic text; the spiral form, placed in a shop window in M, becomes a central image of Run Lola Run in marking the immobile spot that Manni occupies. Repeated several times in the film, Lola's scream bends events, characters and chance to her will and slows the relentless pace of the narrative. This vocal punctuation recalls the equally willful vocalisations of Oskar Matzerath in Schlöndorff's Tin Drum (1979). Tykwer's radical expansions and compressions of time in Run Lola Run rely on the temporal exploitation of the filmic medium. The film stretches 20 minutes of 'real time' in the lives of its two protagonists into the 84 minutes of the film. Tykwer also distills the lives of the film's incidental or secondary characters into a few still images and a few seconds of filmic time in the 'und dann...' [and then...] sequences of all three episodes. For example, Lola's momentary encounter with an employee of her father's bank spins off into two completely different life stories for this woman, both of which are told through four or five staged 'snapshots' which are edited together into a rapid sequence. The higher-speed photography of the snapshot keeps up the frenetic pace of Run Lola Run and causes the narrative to move forward even faster, if only for a few seconds. Tykwer also celebrates the technology of 35 mm film in juxtaposing it to the fuzzy imprecision of video in Run Lola Run. The viewer not only notes how scenes shot on video are less visually beautiful than the 35 mm scenes which feature Lola or Manni, but also that they seem to move at a snail's pace. For example, the video-shot scene in Lola's banker-father's office also represents the boredom of his well-paid but stagnant life; another video sequence visually parallels the slow, shuffling movement of the homeless man Norbert as he discovers Manni's forgotten moneybag on the U-Bahn. Comically, he breaks into a run when he realises what he's found. Where Wim Wenders's Wings of Desire made beautiful cinematographic use of Berlin landmarks like the Siegessäule in black and white 35 mm, Tykwer relegates black and white to flashback sequences within the narrative and rejects the relatively meandering contemplation of Wenders's film in favour of the linear dynamism of urban space in Run Lola Run. -- OR -- Tykwer emphasised the arbitrariness of the setting of Run Lola Run, insisting it could easily have been set in any other urban centre such as New York City or Beijing. Nevertheless he establishes the united Berlin as the specific setting of the film. While Run Lola Run does not explicitly indicate that the space of action is Berlin, viewers are clear of the setting: a repeated establishing shot of the Friedrichstrasse U-Bahn stop, a central commuting street near the Brandenburg Gate in the former East Berlin which has undergone extensive reconstruction since 1990, begins each episode of the film. The play between the locality of Berlin and its role as the universal modernist metropolis is a trope of German cinema famously deployed by Fritz Lang in M, where the setting is also never explicitly revealed but implied by means of the use of the Berlin dialect in the dialogue of the film1. The soundtrack of Run Lola Run underscores the speed and mobility of Berlin by means of the fast/slow/fast rhythm of the film which proceeds primarily at the pace of techno music. Techno is also closely identified with the city of Berlin through its annual Techno Festival, which seems to grow larger with each passing year. Quick techno rhythm is syncopated with pauses in the forward-moving action brought on by Lola's superhuman screams or by the death of a protagonist. Berlin is also made explicit as Tykwer often stages scenes at clearly-marked street intersections which identify particular locations or boroughs thoughout east and west Berlin. The viewer notes that Lola escapes her father's bank during one episode and faces Unter den Linden; several scenes unfold on the banks of the river Spree; Lola sprints between the Altes Museum and the Berlin Cathedral. Manni's participation in a car-theft ring points to the Berlin-focussed activity of actual Eastern European and Russian crime syndicates; the film features an interlude at the Polish border where Manni delivers a shipment of stolen Mercedes to underworld buyers, which has to do with the actual geographic proximity of Berlin to Eastern European countries. Tykwer emphasised the arbitrariness of the setting of Run Lola Run, insisting it could easily have been set in any other urban centre such as New York City or Beijing. Nevertheless he establishes the united Berlin as the specific setting of the film. While Run Lola Run does not explicitly indicate that the space of action is Berlin, viewers are clear of the setting: a repeated establishing shot of the Friedrichstrasse U-Bahn stop, a central commuting street near the Brandenburg Gate in the former East Berlin which has undergone extensive reconstruction since 1990, begins each episode of the film. The play between the locality of Berlin and its role as the universal modernist metropolis is a trope of German cinema famously deployed by Fritz Lang in M, where the setting is also never explicitly revealed but implied by means of the use of the Berlin dialect in the dialogue of the film1. The soundtrack of Run Lola Run underscores the speed and mobility of Berlin by means of the fast/slow/fast rhythm of the film which proceeds primarily at the pace of techno music. Techno is also closely identified with the city of Berlin through its annual Techno Festival, which seems to grow larger with each passing year. Quick techno rhythm is syncopated with pauses in the forward-moving action brought on by Lola's superhuman screams or by the death of a protagonist. Berlin is also made explicit as Tykwer often stages scenes at clearly-marked street intersections which identify particular locations or boroughs thoughout east and west Berlin. The viewer notes that Lola escapes her father's bank during one episode and faces Unter den Linden; several scenes unfold on the banks of the river Spree; Lola sprints between the Altes Museum and the Berlin Cathedral. Manni's participation in a car-theft ring points to the Berlin-focussed activity of actual Eastern European and Russian crime syndicates; the film features an interlude at the Polish border where Manni delivers a shipment of stolen Mercedes to underworld buyers, which has to do with the actual geographic proximity of Berlin to Eastern European countries. Yet the speed of purposeful mobility is demanded in the contemporary united and globalised Berlin; lines of action or direction must be chosen and followed and chance encounters become traps or interruptions. Chance must therefore be minimised in the pursuit of urban speed, mobility, and commications access. In the globalised Berlin, Tykwer compresses chance encounters into individual snapshots of visual data which are viewed in quick succession by the viewer. Where artists such Christo and Sophie Calle had investigated the initial chaos of German reunification in Berlin, Run Lola Run rejects the hyper-contemplative and past-obsessed mood demanded by Christo's wrapping of the Reichstag, or Calle's documentation of the artistic destructions of unification3. Run Lola Run recasts Berlin as a network of fast connections, lines of uninterrupted movement, and productive output. It is therefore perhaps not surprising that Tykwer's idealised and embodied representation of Berlin as Lola has been politically appropriated as a convenient icon by the city's status quo: an icon of the successful reconstruction and rewiring of a united Berlin into a fast global broadband digital telecommunications network4. Footnotes See Edward Dimendberg's excellent discussion of filmic representations of the metropolis in "From Berlin to Bunker Hill: Urban Space, Late Modernity, and Film Noir in Fritz Lang's and Joseph Losey's M." Wide Angle 19.4 (1997): 62-93. This is despite the fact that the temporal parameters of the plot of Run Lola Run forbid the aimlessness central to spazieren (strolling). See Walter Benjamin, "A Berlin Chronicle", in Reflections. Ed. Peter Demetz. Trans. Edmund Jephcott. New York: Schocken, 1986. 3-60. See Sophie Calle, The Detachment. London: G+B Arts International and Arndt & Partner Gallery, n.d. The huge success of Tykwer's film in Germany spawned many red-hair-coiffed Lola imitators in the Berlin populace. The mayor of Berlin sported Lola-esque red hair in a poster which imitated the one for the film, but legal intercession put an end to this trendy political statement. Brian Pendreigh. "The Lolaness of the Long-Distance Runner." The Guardian 15 Oct. 1999. I've relied on William J. Mitchell's cultural history of the late 20th century 'rebuilding' of major cities into connection points in the global telecommunications network, City of Bits: Space, Place, and the Infobahn. Cambridge: MIT P, 1995. Citation reference for this article MLA style: Claudia Mesch. "Racing Berlin: The Games of Run Lola Run." M/C: A Journal of Media and Culture 3.3 (2000). [your date of access] <http://www.api-network.com/mc/0006/speed.php>. Chicago style: Claudia Mesch, "Racing Berlin: The Games of Run Lola Run," M/C: A Journal of Media and Culture 3, no. 3 (2000), <http://www.api-network.com/mc/0006/speed.php> ([your date of access]). APA style: Claudia Mesch. (2000) Racing Berlin: the games of Run Lola run. M/C: A Journal of Media and Culture 3(3). <http://www.api-network.com/mc/0006/speed.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
33

Nunes, Mark, and Cassandra Ozog. "Your (Internet) Connection Is Unstable." M/C Journal 24, no. 3 (June 21, 2021). http://dx.doi.org/10.5204/mcj.2813.

Full text
Abstract:
It has been fifteen months since the World Health Organisation declared the COVID-19 outbreak a global pandemic and the first lockdowns went into effect, dramatically changing the social landscape for millions of individuals worldwide. Overnight, it seemed, Zoom became the default platform for video conferencing, rapidly morphing from brand name to eponymous generic—a verb and a place and mode of being all at once. This nearly ubiquitous transition to remote work and remote play was both unprecedented and entirely anticipated. While teleworking, digital commerce, online learning, and social networking were common fare by 2020, in March of that year telepresence shifted from option to mandate, and Zooming became a daily practice for tens of millions of individuals worldwide. In an era of COVID-19, our relationships and experiences are deeply intertwined with our ability to “Zoom”. This shift resulted in new forms of artistic practice, new modes of pedagogy, and new ways of social organising, but it has also created new forms (and exacerbated existing forms) of exploitation, inequity, social isolation, and precarity. For millions, of course, lockdowns and restrictions had a profound impact that could not be mitigated by the mediated presence offered by way of Zoom and other video conferencing platforms. For those of us fortunate enough to maintain a paycheck and engage in work remotely, Zoom in part highlighted the degree to which a network logic already governed our work and our labour within a neoliberal economy long before the first lockdowns began. In the introduction to The Postmodern Condition: A Report on Knowledge, Lyotard identifies a “logic of maximum performance” that regulates the contemporary moment: a cybernetic framework for understanding what it means to communicate—one that ultimately frames all political, social, and personal interactions within matrices of power laid out in terms of performativity and optimisation (xxiv.) Performativity serves as a foundation for not only how a system operates, but for how all other elements within that system express themselves. Lyotard writes, “even when its rules are in the process of changing and innovations are occurring, even when its dysfunctions (such as strikes, crises, unemployment, or political revolutions) inspire hope and lead to a belief in an alternative, even then what is actually taking place is only an internal readjustment, and its results can be no more than an increase in the system’s ‘viability’” (11-12). One may well add to this list of dysfunctions global pandemics. Zoom, in effect, offered universities, corporations, mass media outlets, and other organisations a platform to “innovate” within an ongoing network logic of performativity: to maintain business as usual in a moment in which nothing was usual, normal, or functional. Zoom foregrounds performativity in other senses as well, to the extent that it provides a space and context for social performance. In The Presentation of Self in Everyday Life, Erving Goffman explores how social actors move through their social environments, managing their identities in response to the space in which they find themselves and the audience (who are also social actors) within those spaces. For Goffman, the social environment provides the primary context for how and why social actors behave the way that they do. Goffman further denotes different spaces where our performances may shift: from public settings to smaller audiences, to private spaces where we can inhabit ourselves without any performance demands. The advent of social media, however, has added new layers to how we understand performance, audience, and public and private social spaces. Indeed, Goffman’s assertion that we are constantly managing our impressions feels particularly accurate when considering the added pressures of managing our identities in multiple social spaces, both face to face and online. Thus, when the world shut down during the COVID-19 pandemic, and all forms of social interactions shifted to digital spaces, the performative demands of working from home became all the more complex in the sharp merging of private and public spaces. Thus, discussions and debates arose regarding proper “Zoom etiquette”, for different settings, and what constituted work-appropriate attire when working from home (a debate that, unsurprisingly, became particularly gendered in nature). Privacy management was a near constant narrative as we began asking, who can be in our spaces? How much of our homes are we required to put on display to other classmates, co-workers, and even our friends? In many ways, the hyper-dependence on Zoom interactions forced an entry into the spaces that we so often kept private, leaving our social performances permanently on display. Prior to COVID-19, the networks of everyday life had already produced rather porous boundaries between public and private life, but for the most part, individuals managed to maintain some sort of partition between domestic, intimate spaces, and their public performances of their professional and civic selves. It was an exception in The Before Times, for example, for a college professor to be interrupted in the midst of his BBC News interview by his children wandering into the room; the suspended possibility of the private erupting in the midst of a public social space (or vice versa) haunts all of our network interactions, yet the exceptionality of these moments speaks to the degree to which we sustained an illusion of two distinct stages for performance in a pre-pandemic era. Now, what was once the exception has become the rule. As millions of individuals found themselves Zooming from home while engaging co-workers, clients, patients, and students in professional interactions, the interpenetration of the public and private became a matter of daily fare. And yes, while early on in the pandemic several newsworthy (or at least meme-worthy) stories circulated widely on mass media and social media alike, serving as teleconferencing cautionary tales—usually involving sex, drugs, or bowel movements—moments of transgressive privacy very much became the norm: we found ourselves, in the midst of the workday, peering into backgrounds of bedrooms and kitchens, examining decorations and personal effects, and sharing in the comings and goings of pets and other family members entering and leaving the frame. Some users opted for background images or made use of blurring effects to “hide the mess” of their daily lives. Others, however, seemed to embrace the blur itself, implicitly or explicitly accepting the everydayness of this new liminality between public and private life. And while we acknowledge the transgressive nature of the incursions of the domestic and the intimate into workplace activities, it is worth noting as well that this incursion likewise takes place in the opposite direction, as spaces once designated as private became de facto workplace settings, and fell under the purview of a whole range of workplace policies that dictated appropriate and inappropriate behaviour. Not least of these intrusions are the literal and ideological apparatuses of surveillance that Zoom and other video conferencing platforms set into motion. In the original conception of the Panopticon, the observer could see the observed, but those being observed could not see their observers. This was meant to instill a sense of constant surveillance, whether the observer was there or not. In Discipline and Punish, Foucault considered those observed through the Panopticon as objects to be observed, with no power to turn the gaze back towards the structures of power that infiltrated their existence with such invasive intent. With Zoom, however, as much as private spaces have been infiltrated by work, school, and even family and friends, those leading classes or meetings may also feel a penetrative gaze by those who observe their professional performances, as many online participants have pushed back against these intrusions with cameras and audio turned off, leaving the performer with an audience of black screens and no indication of real observers behind them or not. In these unstable digital spaces, we vacillate between observed and observer, with the lines between private and public, visible and invisible, utterly blurred. Yet we should not lose sight of the fact that the panoptic power of the platform itself is hardly optic and remains one degree removed from its users, at the level of data extraction, collection, and exchange. In an already data-dependent era, more privacy and personal data has become available than ever before through online monitoring and the constant use of Zoom in work and social interactions. Such incursions of informatic biopower require further consideration within an emerging discussion of digital capital. There has also been the opportunity for these transformative, digital spaces to be used for an invited gaze into artistic and imaginative spaces. The global pandemic hit many industries hard, but in particular, artists and performers, as well as their performance venues, saw a massive loss of space, audiences, and income. Many artists developed performance spaces through online video conferencing in order to maintain their practice and their connection to their audiences, while others developed new curriculums and worked to find accessible ways for community members to participate in online art programming. Thus, though performers may still be faced with black squares as their audience, the invited gaze allows for artistic performances to continue, whether as digital shorts, live streamed music sets, or isolated cast members performing many roles with a reduced cast list. Though the issue of access to the technology and bandwidth needed to partake in these performances and programming is still front of mind, the presentation of artistic performances through Zoom has allowed in many other ways for a larger audience reach, from those who may not live near a performance centre, to others who may not be able to access physical spaces comfortably or safely. The ideology of ongoing productivity and expanded, remote access baked into video conferencing platforms like Zoom is perhaps most apparent in the assumptions of access that accompanied the widespread use of these platforms, particularly in the context of public institutions such as schools. In the United States, free market libertarian think tanks like the Cato Institute have pointed to the end of “Net Neutrality” as a boon for infrastructure investment that led to greater broadband access nationwide (compared to a more heavily regulated industry in Europe). Yet even policy think tanks such as the Information Technology and Innovation Foundation—with its mission to “formulate, evaluate, and promote policy solutions that accelerate innovation and boost productivity to spur growth, opportunity, and progress”—acknowledged that although the U.S. infrastructure supported the massive increase in bandwidth demands as schools and businesses went online, gaps in rural access and affordability barriers for low income users mean that more needs to be done to bring about “a more just and effective broadband network for all Americans”. But calls for greater access are, in effect, supporting this same ideological framework in which greater access presumably equates with greater equity. What the COVID-19 pandemic revealed, we would argue, is the degree to which those most in need of services and support experience the greatest degree of digital precarity, a point that Jenny Kennedy, Indigo Holcombe-James, and Kate Mannell foreground in their piece “Access Denied: How Barriers to Participate on Zoom Impact on Research Opportunity”. As they note, access to data and devices provide a basic threshold for participation, but the ability to deploy these tools and orient oneself toward these sorts of engagements suggests a level of fluency beyond what many high-risk/high-need populations may already possess. Access reveals a disposition toward global networks, and as such signals one’s degree of social capital within a network society—a “state nobility” for the digital age (Bourdieu.) While Zoom became the default platform for a wide range of official and institutional practices, from corporate meetings to college class sessions, we have seen over the past year unanticipated engagements with the platform as well. Zoombombing offers one form of evil media practice that disrupts the dominant performativity logic of Zoom and undermines the assumptions of rational exchange that still drive much of how we understand “effective” communication (Fuller and Goffey). While we may be tempted to dismiss Zoombombing and other forms of “shitposting” as “mere” trollish distractions, doing so does not address the political agency of strategic actions on these platforms that refuse to abide by “an intersubjective recognition that is based on a consensus about values or on mutual understanding” (Habermas 12). Kawsar Ali takes up these tactical uses in “Zoom-ing in on White Supremacy: Zoom-Bombing Anti-Racism Efforts” and explores how alt-right and white supremacist groups have exploited these strategies not only as a means of disruption but as a form of violence against participants. A cluster of articles in this issue take up the question of creative practice and how video conferencing technologies can be adapted to performative uses that were perhaps not intended or foreseen by the platform’s creators. xtine burrough and Sabrina Starnaman offer up one such project in “Epic Hand Washing: Synchronous Participation and Lost Narratives”, which paired live performances of handwashing in domestic spaces with readings from literary texts that commented upon earlier pandemics and plagues. While Zoom presents itself as a tool to keep a neoliberal economy flowing, we see modes of use such as burrough’s and Starnaman’s performative piece that are intentionally playful, at the same time that they attempt to address the lived experiences of lockdown, confinement, and hygienic hypervigilance. Claire Parnell, Andrea Anne Trinidad, and Jodi McAlister explore another form of playful performance through their examination of the #RomanceClass community in the Philippines, and how they adapted their biannual reading and performance events of their community-produced English-language romance fiction. While we may still use comparative terms such as “face-to-face” and “virtual” to distinguish between digitally-mediated and (relatively) unmediated interactions, Parnell et al.’s work highlights the degree to which these technologies of mediation were already a part of this community’s attempt to support and sustain itself. Zoom, then, became the vehicle to produce and share community-oriented kilig, a Filipino term for embodied, romantic affective response. Shaun Wilson’s “Creative Practice through Teleconferencing in the Era of COVID-19” provides another direct reflection on the contemporary moment and the framing aesthetics of Zoom. Through an examination of three works of art produced for screen during the COVID-19 pandemic, including his own project “Fading Light”, Wilson examines how video conferencing platforms create “oscillating” frames that speak to and comment on each other at the same time that they remain discrete and untouched. We have opened and closed this issue with bookends of sorts, bringing to the fore a range of theoretical considerations alongside personal reflections. In our feature article, “Room without Room: Affect and Abjection in the Circuit of Self-Regard”, Ricky Crano examines the degree to which the aesthetics of Zoom, from its glitches to its default self-view, create modes of interaction that drain affect from discourse, leaving its users with an impoverished sense of co-presence. His focus is explicitly on the normative uses of the platform, not the many artistic and experimental misappropriations that the platform likewise offers. He concludes, “it is left to artists and other experimenters to expose and undermine the workings of power in the standard corporate, neoliberal modes of engagement”, which several of the following essays in this issue then take up. And we close with “Embracing Liminality and ‘Staying with the Trouble’ on (and off) Screen”, in which Tania Lewis, Annette Markham, and Indigo Holcombe-James explore two autoethnographic studies, Massive and Microscopic Sensemaking and The Shut-In Worker, to discuss the liminality of our experience of the COVID-19 pandemic, on and off—and in between—Zoom screens. Rather than suggesting a “return to normal” as mask mandates, social distancing, and lockdown restrictions ease, they attempt to “challenge the assumption that stability and certainty is what we now need as a global community … . How can we use the discomfort of liminality to imagine global futures that have radically transformative possibilities?” This final piece in the collection we take to heart, as we consider how we, too, can stay in the trouble, and consider transformative futures. Each of these pieces offers a thoughtful contribution to a burgeoning discussion on what Zooming means to us as academics, teachers, researchers, and community members. Though investigations into the social effects of digital spaces are not new, this moment in time requires careful and critical investigation through the lens of a global pandemic as it intersects with a world that has never been more digital in its presence and social interactions. The articles in this volume bring us to a starting point, but there is much more to cover: issues of disability and accessibility, gender and physical representations, the political economy of digital accessibility, the transformation of learning styles and experiences through a year of online learning, and still more areas of investigation to come. It is our hope that this volume provides a blueprint of sorts for other critical engagements and explorations of how our lives and our digital landscapes have been impacted by COVID-19, regardless of the instability of our connections. We would like to thank all of the contributors and peer reviewers who made this fascinating issue possible, with a special thanks to the Cultural Studies Association New Media and Digital Cultures Working Group, where these conversations started … on Zoom, of course. References Bourdieu, Pierre. The State Nobility. Stanford UP, 1998. Brake, Doug. “Lessons from the Pandemic: Broadband Policy after COVID-19.” Information Technology and Innovation Foundation, 13 July 2020. <http://itif.org/publications/2020/07/13/lessons-pandemic-broadband-policy-after-covid-19>. “Children Interrupt BBC News Interview – BBC News.” BBC News, 10 Mar. 2017. <http://youtu.be/Mh4f9AYRCZY>. Firey, Thomas A. “Telecommuting to Avoid COVID-19? Thank the End of ‘Net Neutrality.’” The Cato Institute, 16 Apr. 2020. <http://www.cato.org/blog/telecommuting-avoid-covid-19-thank-end-net-neutrality>. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Penguin, 2020. Fuller, Matthew, and Andrew Goffey. Evil Media. MIT P, 2012. Goffman, Erving. The Presentation of Self in Everyday Life. Anchor, 2008. Habermas, Jürgen. On the Pragmatics of Social Interaction. Polity, 2001. Lyotard, Jean-François. The Postmodern Condition: A Report on Knowledge. U of Minnesota P, 1984. “WHO Director-General's Opening Remarks at the Media Briefing on COVID-19 – 11 March 2020.” World Health Organization, 11 Mar. 2020. <http://www.who.int/director-general/speeches/detail/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19---11-march-2020>. “Zoom Etiquette: Tips for Better Video Conferences.” Emily Post. <http://emilypost.com/advice/zoom-etiquette-tips-for-better-video-conferences>.
APA, Harvard, Vancouver, ISO, and other styles
34

Kincheloe, Pamela. "Do Androids Dream of Electric Speech? The Construction of Cochlear Implant Identity on American Television and the “New Deaf Cyborg”." M/C Journal 13, no. 3 (June 30, 2010). http://dx.doi.org/10.5204/mcj.254.

Full text
Abstract:
Cyborgs already walk among us. (“Cures to Come” 76) This essay was begun as a reaction to a Hallmark Hall of Fame television movie called Sweet Nothing in My Ear (2008), which follows the lives of two parents, Dan, who is hearing (played by Jeff Daniels), and Laura, who is deaf (Marlee Matlin), as they struggle to make a decision about whether or not to give their 11-year-old son, Adam (late-deafened), a cochlear implant. Dan and Laura represent different perspectives, hearing and deaf perspectives. The film dramatizes the parents’ conflict and negotiation, exposing audiences to both sides of the cochlear implant debate, albeit in a fairly simplistic way. Nevertheless, it represents the lives of deaf people and gives voice to debates about cochlear implants with more accuracy and detail than most film and television dramas. One of the central scenes in the film is what I call the “activation scene”, quite common to cochlear implant narratives. In the scene, the protagonists witness a child having his implant activated or turned on. The depiction is reminiscent of the WATER scene in the film about Helen Keller, The Miracle Worker, employing a sentimental visual rhetoric. First, the two parents are shown seated near the child, clasping their hands as if in prayer. The audiologist, wielder of technology and therefore clearly the authority figure in the scene, types away furiously on her laptop. At the moment of being “turned on,” the child suddenly “hears” his father calling “David! David!” He gazes angelically toward heaven as piano music plays plaintively in the background. The parents all but fall to their knees and the protagonist of the film, Dan, watching through a window, weeps. It is a scene of cure, of healing, of “miracle,” a hyper-sentimentalised portrait of what is in reality often a rather anti-climactic event. It was certainly anti-climactic in my son, Michael’s case. I was taken aback by how this scene was presented and dismayed overall at some of the inaccuracies, small though they were, in the portrayal of cochlear implants in this film. It was, after all, according to the Nielsen ratings, seen by 8 million people. I began to wonder what kinds of misconceptions my son was going to face when he met people whose only exposure to implants was through media representations. Spurred by this question, I started to research other recent portrayals of people with implants on U.S. television in the past ten years, to see how cochlear implant (hereafter referred to as CI) identity has been portrayed by American media. For most of American history, deaf people have been portrayed in print and visual media as exotic “others,” and have long been the subject of an almost morbid cultural fascination. Christopher Krentz suggests that, particularly in the nineteenth century, scenes pairing sentimentality and deafness repressed an innate, Kristevan “abject” revulsion towards deaf people. Those who are deaf highlight and define, through their ‘lack’, the “unmarked” body. The fact of their deafness, understood as lack, conjures up an ideal that it does not attain, the ideal of the so-called “normal” or “whole” body. In recent years, however, the figure of the “deaf as Other” in the media, has shifted from what might be termed the “traditionally” deaf character, to what Brenda Jo Brueggeman (in her recent book Deaf Subjects: Between Identities and Places), calls “the new deaf cyborg” or the deaf person with a cochlear implant (4). N. Katharine Hailes states that cyborgs are now “the stage on which are performed contestations about the body boundaries that have often marked class, ethnic, and cultural differences” (85). In this essay, I claim that the character with a CI, as portrayed in the media, is now not only a strange, “marked” “Other,” but is also a screen upon which viewers project anxieties about technology, demonstrating both fascination fear. In her book, Brueggeman issues a call to action, saying that Deaf Studies must now begin to examine what she calls “implanting rhetorics,” or “the rhetorical relationships between our technologies and our identity” and therefore needs to attend to the construction of “the new deaf cyborg” (18). This short study will serve, I hope, as both a response to that injunction and as a jumping-off point for more in-depth studies of the construction of the CI identity and the implications of these constructions. First, we should consider what a cochlear implant is and how it functions. The National Association of the Deaf in the United States defines the cochlear implant as a device used to help the user perceive sound, i.e., the sensation of sound that is transmitted past the damaged cochlea to the brain. In this strictly sensorineural manner, the implant works: the sensation of sound is delivered to the brain. The stated goal of the implant is for it to function as a tool to enable deaf children to develop language based on spoken communication. (“NAD Position”) The external portion of the implant consists of the following parts: a microphone, which picks up sound from the environment, which is contained in the behind-the-ear device that resembles the standard BTE hearing aid; in this “hearing aid” there is also a speech processor, which selects and arranges sounds picked up by the microphone. The processor transmits signals to the transmitter/receiver, which then converts them into electric impulses. Part of the transmitter sits on the skin and attaches to the inner portion of the transmitter by means of a magnet. The inner portion of the receiver/stimulator sends the impulses down into the electrode array that lies inside the cochlea, which in turn stimulates the auditory nerve, giving the brain the impression of sound (“Cochlear Implants”). According to manufacturer’s statistics, there are now approximately 188,000 people worldwide who have obtained cochlear implants, though the number of these that are in use is not known (Nussbaum). That is what a cochlear implant is. Before we can look at how people with implants are portrayed in the media, before we examine constructions of identity, perhaps we should first ask what constitutes a “real” CI identity? This is, of course, laughable; pinning down a homogeneous CI identity is no more likely than finding a blanket definition of “deaf identity.” For example, at this point in time, there isn’t even a word or term in American culture for someone with an implant. I struggle with how to phrase it in this essay - “implantee?” “recipient?” - there are no neat labels. In the USA you can call a person deaf, Deaf (the “D” representing a specific cultural and political identity), hearing impaired, hard of hearing, and each gradation implies, for better or worse, some kind of subject position. There are no such terms for a person who gets an implant. Are people with implants, as suggested above, just deaf? Deaf? Are they hard of hearing? There is even debate in the ASL community as to what sign should be used to indicate “someone who has a cochlear implant.” If a “CI identity” cannot be located, then perhaps the rhetoric that is used to describe it may be. Paddy Ladd, in Understanding Deaf Culture, does a brilliant job of exploring the various discourses that have surrounded deaf culture throughout history. Stuart Blume borrows heavily from Ladd in his “The Rhetoric and Counter-Rhetoric of a 'Bionic' Technology”, where he points out that an “essential and deliberate feature” of the history of the CI from the 60s onward, was that it was constructed in an overwhelmingly positive light by the mass media, using what Ladd calls the “medical” rhetorical model. That is, that the CI is a kind of medical miracle that promised to cure deafness. Within this model one may find also the sentimental, “missionary” rhetoric that Krentz discusses, what Ladd claims is a revival of the evangelism of the nineteenth-century Oralist movement in America. Indeed, newspaper articles in the 1980s and 90s hailed the implant as a “breakthrough”, a “miracle”; even a quick survey of headlines shows evidence of this: “Upton Boy Can Hear at Last!”, “Girl with a New Song in Her Heart”, “Children Head Queue for Bionic Ears” (Lane). As recently as January 2010, an issue of National Geographic featured on its cover the headline Merging Man and Machine: The Bionic Age. Sure enough, the second photograph in the story is of a child’s bilateral cochlear implant, with the caption “within months of the surgery (the child) spoke the words his hearing parents longed for: Mama and Dada.” “You’re looking at a real bionic kid,” says Johns Hopkins University surgeon John Niparko, proudly (37). To counter this medical/corporate rhetoric of cure, Ladd and Blume claim, the deaf community devised a counter-rhetoric, a discourse in which the CI is not cast in the language of miracle and life, but instead in terms of death, mutilation, and cultural oppression. Here, the implant is depicted as the last in a long line of sadistic experiments using the deaf as guinea pigs. Often the CI is framed in the language of Nazism and genocide as seen in the title of an article in the British Deaf News: “Cochlear Implants: Oralism’s Final Solution.” So, which of these two “implanting rhetorics” is most visible in the current construction of the CI in American television? Is the CI identity presented by rendering people with CIs impossibly positive, happy characters? Is it delineated using the metaphors of the sentimental, of cure, of miracle? Or is the CI identity constructed using the counter-rhetorical references to death, oppression and cultural genocide? One might hypothesize that television, like other media, cultivating as it does the values of the hearing hegemony, would err on the side of promulgating the medicalised, positivist rhetoric of the “cure” for deafness. In an effort to find out, I conducted a general survey of American television shows from 2000 to now that featured characters with CIs. I did not include news shows or documentaries in my survey. Interestingly, some of the earliest television portrayals of CIs appeared in that bastion of American sentimentality, the daytime soap opera. In 2006, on the show “The Young and the Restless”, a “troubled college student who contracted meningitis” received an implant, and in 2007 “All My Children” aired a story arc about a “toddler who becomes deaf after a car crash.” It is interesting to note that both characters were portrayed as “late-deafened”, or suddenly inflicted with the loss of a sense they previously possessed, thus avoiding any whiff of controversy about early implantation. But one expects a hyper-sentimentalised portrayal of just about everything in daytime dramas like this. What is interesting is that when people with CIs have appeared on several “reality” programs, which purport to offer “real,” unadulterated glimpses into people’s lives, the rhetoric is no less sentimentalized than the soaps (perhaps because these shows are no less fabricated). A good example of this is the widely watched and, I think, ironically named show “True Life” which appears on MTV. This is a series that claims to tell the “remarkable real-life stories of young people and the unusual subcultures they inhabit.” In episode 42, “ True Life: I’m Deaf”, part of the show follows a young man, Chris, born deaf and proud of it (his words), who decides to get a cochlear implant because he wants to be involved in the hearing world. Through an interpreter Chris explains that he wants an implant so he can communicate with his friends, talk with girls, and ultimately fulfill his dreams of having a job and getting married (one has to ask: are these things he can’t do without an implant?). The show’s promo asks “how do you go from living a life in total silence to fully understanding the spoken language?” This statement alone contains two elements common to the “miracle” rhetoric, first that the “tragic” deaf victim will emerge from a completely lonely, silent place (not true; most deaf people have some residual hearing, and if you watch the show you see Chris signing, “speaking” voluminously) to seamlessly, miraculously, “fully” joining and understanding the hearing world. Chris, it seems, will only come into full being when he is able to join the hearing world. In this case, the CI will cure what ails him. According to “True Life.” Aside from “soap opera” drama and so-called reality programming, by far the largest dissemination of media constructions of the CI in the past ten years occurred on top-slot prime-time television shows, which consist primarily of the immensely popular genre of the medical and police procedural drama. Most of these shows have at one time or another had a “deaf” episode, in which there is a deaf character or characters involved, but between 2005 and 2008, it is interesting to note that most, if not all of the most popular of these have aired episodes devoted to the CI controversy, or have featured deaf characters with CIs. The shows include: CSI (both Miami and New York), Cold Case, Law and Order (both SVU and Criminal Intent), Scrubs, Gideon’s Crossing, and Bones. Below is a snippet of dialogue from Bones: Zach: {Holding a necklace} He was wearing this.Angela: Catholic boy.Brennan: One by two forceps.Angela {as Brennan pulls a small disc out from behind the victim’s ear} What is that?Brennan: Cochlear implant. Looks like the birds were trying to get it.Angela: That would set a boy apart from the others, being deaf.(Bones, “A Boy in the Tree”, 1.3, 2005) In this scene, the forensics experts are able to describe significant points of this victim’s identity using the only two solid artifacts left in the remains, a crucifix and a cochlear implant. I cite this scene because it serves, I believe, as a neat metaphor for how these shows, and indeed television media in general, are, like the investigators, constantly engaged in the business of cobbling together identity: in this particular case, a cochlear implant identity. It also shows how an audience can cultivate or interpret these kinds of identity constructions, here, the implant as an object serves as a tangible sign of deafness, and from this sign, or clue, the “audience” (represented by the spectator, Angela) immediately infers that the victim was lonely and isolated, “set apart from the others.” Such wrongheaded inferences, frivolous as they may seem coming from the realm of popular culture, have, I believe, a profound influence on the perceptions of larger society. The use of the CI in Bones is quite interesting, because although at the beginning of the show the implant is a key piece of evidence, that which marks and identifies the dead/deaf body, the character’s CI identity proves almost completely irrelevant to the unfolding of the murder-mystery. The only times the CI character’s deafness is emphasized are when an effort is made to prove that the he committed suicide (i.e., if you’re deaf you are therefore “isolated,” and therefore you must be miserable enough to kill yourself). Zak, one of the forensics officers says, “I didn’t talk to anyone in high school and I didn’t kill myself” and another officer comments that the boy was “alienated by culture, by language, and by his handicap” (odd statements, since most deaf children with or without implants have remarkably good language ability). Also, in another strange moment, the victim’s ambassador/mother shows a video clip of the child’s CI activation and says “a person who lived through this miracle would never take his own life” (emphasis mine). A girlfriend, implicated in the murder (the boy is killed because he threatened to “talk”, revealing a blackmail scheme), says “people didn’t notice him because of the way he talked but I liked him…” So at least in this show, both types of “implanting rhetoric” are employed; a person with a CI, though the recipient of a “miracle,” is also perceived as “isolated” and “alienated” and unfortunately, ends up dead. This kind of rather negative portrayal of a person with a CI also appears in the CSI: New York episode ”Silent Night” which aired in 2006. One of two plot lines features Marlee Matlin as the mother of a deaf family. At the beginning of the episode, after feeling some strange vibrations, Matlin’s character, Gina, checks on her little granddaughter, Elizabeth, who is crying hysterically in her crib. She finds her daughter, Alison, dead on the floor. In the course of the show, it is found that a former boyfriend, Cole, who may have been the father of the infant, struggled with and shot Alison as he was trying to kidnap the baby. Apparently Cole “got his hearing back” with a cochlear implant, no longer considered himself Deaf, and wanted the child so that she wouldn’t be raised “Deaf.” At the end of the show, Cole tries to abduct both grandmother and baby at gunpoint. As he has lost his external transmitter, he is unable to understand what the police are trying to tell him and threatens to kill his hostages. He is arrested in the end. In this case, the CI recipient is depicted as a violent, out of control figure, calmed (in this case) only by Matlin’s presence and her ability to communicate with him in ASL. The implication is that in getting the CI, Cole is “killing off” his Deaf identity, and as a result, is mentally unstable. Talking to Matlin, whose character is a stand-in for Deaf culture, is the only way to bring him back to his senses. The October 2007 episode of CSI: Miami entitled “Inside-Out” is another example of the counter-rhetoric at work in the form of another implant corpse. A police officer, trying to prevent the escape of a criminal en route to prison, thinks he has accidentally shot an innocent bystander, a deaf woman. An exchange between the coroner and a CSI goes as follows: (Alexx Woods): “This is as innocent as a victim gets.”(Calleigh Duquesne): “How so?”AW: Check this out.”CD: “I don’t understand. Her head is magnetized? Steel plate?”AW: “It’s a cochlear implant. Helps deaf people to receive and process speech and sounds.”(CSI dramatization) AW VO: “It’s surgically implanted into the inner ear. Consists of a receiver that decodes and transmits to an electrode array sending a signal to the brain.”CD: “Wouldn’t there be an external component?”AW: “Oh, she must have lost it before she was shot.”CD: “Well, that explains why she didn’t get out of there. She had no idea what was going on.” (TWIZ) Based on the evidence, the “sign” of the implant, the investigators are able to identify the victim as deaf, and they infer therefore that she is innocent. It is only at the end of the program that we learn that the deaf “innocent” was really the girlfriend of the criminal, and was on the scene aiding in his escape. So she is at first “as innocent” as they come, and then at the end, she is the most insidious of the criminals in the episode. The writers at least provide a nice twist on the more common deaf-innocent stereotype. Cold Case showcased a CI in the 2008 episode “Andy in C Minor,” in which the case of a 17-year-old deaf boy is reopened. The boy, Andy, had disappeared from his high school. In the investigation it is revealed that his hearing girlfriend, Emma, convinced him to get an implant, because it would help him play the piano, which he wanted to do in order to bond with her. His parents, deaf, were against the idea, and had him promise to break up with Emma and never bring up the CI again. His body is found on the campus, with a cochlear device next to his remains. Apparently Emma had convinced him to get the implant and, in the end, Andy’s father had reluctantly consented to the surgery. It is finally revealed that his Deaf best friend, Carlos, killed him with a blow to the back of the head while he was playing the piano, because he was “afraid to be alone.” This show uses the counter-rhetoric of Deaf genocide in an interesting way. In this case it is not just the CI device alone that renders the CI character symbolically “dead” to his Deaf identity, but it leads directly to his being literally executed by, or in a sense, excommunicated from, Deaf Culture, as it is represented by the character of Carlos. The “House Divided” episode of House (2009) provides the most problematic (or I should say absurd) representation of the CI process and of a CI identity. In the show, a fourteen-year-old deaf wrestler comes into the hospital after experiencing terrible head pain and hearing “imaginary explosions.” Doctors Foreman and Thirteen dutifully serve as representatives of both sides of the “implant debate”: when discussing why House hasn’t mocked the patient for not having a CI, Thirteen says “The patient doesn’t have a CI because he’s comfortable with who he is. That’s admirable.” Foreman says, “He’s deaf. It’s not an identity, it’s a disability.” 13: “It’s also a culture.” F: “Anything I can simulate with $3 earplugs isn’t a culture.” Later, House, talking to himself, thinks “he’s going to go through life deaf. He has no idea what he’s missing.” So, as usual, without permission, he orders Chase to implant a CI in the patient while he is under anesthesia for another procedure (a brain biopsy). After the surgery the team asks House why he did it and he responds, “Why would I give someone their hearing? Ask God the same question you’d get the same answer.” The shows writers endow House’s character, as they usually do, with the stereotypical “God complex” of the medical establishment, but in doing also they play beautifully into the Ladd and Blume’s rhetoric of medical miracle and cure. Immediately after the implant (which the hospital just happened to have on hand) the incision has, miraculously, healed overnight. Chase (who just happens to be a skilled CI surgeon and audiologist) activates the external processor (normally a months-long process). The sound is overwhelming, the boy hears everything. The mother is upset. “Once my son is stable,” the mom says, “I want that THING out of his head.” The patient also demands that the “thing” be removed. Right after this scene, House puts a Bluetooth in his ear so he can talk to himself without people thinking he’s crazy (an interesting reference to how we all are becoming cyborgs, more and more “implanted” with technology). Later, mother and son have the usual touching sentimental scene, where she speaks his name, he hears her voice for the first time and says, “Is that my name? S-E-T-H?” Mom cries. Seth’s deaf girlfriend later tells him she wishes she could get a CI, “It’s a great thing. It will open up a whole new world for you,” an idea he rejects. He hears his girlfriend vocalize, and asks Thirteen if he “sounds like that.” This for some reason clinches his decision about not wanting his CI and, rather than simply take off the external magnet, he rips the entire device right out of his head, which sends him into shock and system failure. Ultimately the team solves the mystery of the boy’s initial ailment and diagnoses him with sarcoidosis. In a final scene, the mother tells her son that she is having them replace the implant. She says it’s “my call.” This show, with its confusing use of both the sentimental and the counter-rhetoric, as well as its outrageous inaccuracies, is the most egregious example of how the CI is currently being constructed on television, but it, along with my other examples, clearly shows the Ladd/Blume rhetoric and counter rhetoric at work. The CI character is on one hand portrayed as an innocent, infantilized, tragic, or passive figure that is the recipient of a medical miracle kindly urged upon them (or forced upon them, as in the case of House). On the other hand, the CI character is depicted in the language of the counter-rhetoric: as deeply flawed, crazed, disturbed or damaged somehow by the incursions onto their Deaf identity, or, in the worst case scenario, they are dead, exterminated. Granted, it is the very premise of the forensic/crime drama to have a victim, and a dead victim, and it is the nature of the police drama to have a “bad,” criminal character; there is nothing wrong with having both good and bad CI characters, but my question is, in the end, why is it an either-or proposition? Why is CI identity only being portrayed in essentialist terms on these types of shows? Why are there no realistic portrayals of people with CIs (and for that matter, deaf people) as the richly varied individuals that they are? These questions aside, if these two types of “implanting rhetoric”, the sentimentalised and the terminated, are all we have at the moment, what does it mean? As I mentioned early in this essay, deaf people, along with many “others,” have long helped to highlight and define the hegemonic “norm.” The apparent cultural need for a Foucauldian “marked body” explains not only the popularity of crime dramas, but it also could explain the oddly proliferant use of characters with cochlear implants in these particular shows. A person with an implant on the side of their head is definitely a more “marked” body than the deaf person with no hearing aid. The CI character is more controversial, more shocking; it’s trendier, “sexier”, and this boosts ratings. But CI characters are, unlike their deaf predecessors, now serving an additional cultural function. I believe they are, as I claim in the beginning of this essay, screens upon which our culture is now projecting repressed anxieties about emergent technology. The two essentialist rhetorics of the cochlear implant, the rhetoric of the sentimental, medical model, and the rhetoric of genocide, ultimately represent our technophilia and our technophobia. The CI character embodies what Debra Shaw terms a current, “ontological insecurity that attends the interface between the human body and the datasphere” (85). We are growing more nervous “as new technologies shape our experiences, they blur the lines between the corporeal and incorporeal, between physical space and virtual space” (Selfe). Technology either threatens the integrity of the self, “the coherence of the body” (we are either dead or damaged) or technology allows us to transcend the limitations of the body: we are converted, “transformed”, the recipient of a happy modern miracle. In the end, I found that representations of CI on television (in the United States) are overwhelmingly sentimental and therefore essentialist. It seems that the conflicting nineteenth century tendency of attraction and revulsion toward the deaf is still, in the twenty-first century, evident. We are still mired in the rhetoric of “cure” and “control,” despite an active Deaf counter discourse that employs the language of the holocaust, warning of the extermination of yet another cultural minority. We are also daily becoming daily more “embedded in cybernetic systems,” with our laptops, emails, GPSs, PDAs, cell phones, Bluetooths, and the likes. We are becoming increasingly engaged in a “necessary relationship with machines” (Shaw 91). We are gradually becoming no longer “other” to the machine, and so our culturally constructed perceptions of ourselves are being threatened. In the nineteenth century, divisions and hierarchies between a white male majority and the “other” (women, African Americans, immigrants, Native Americans) began to blur. Now, the divisions between human and machine, as represented by a person with a CI, are starting to blur, creating anxiety. Perhaps this anxiety is why we are trying, at least in the media, symbolically to ‘cure’ the marked body or kill off the cyborg. Future examinations of the discourse should, I believe, use these media constructions as a lens through which to continue to examine and illuminate the complex subject position of the CI identity, and therefore, perhaps, also explore what the subject position of the post/human identity will be. References "A Boy in a Tree." Patrick Norris (dir.), Hart Hanson (by), Emily Deschanel (perf.). Bones, Fox Network, 7 Sep. 2005. “Andy in C Minor.” Jeannete Szwarc (dir.), Gavin Harris (by), Kathryn Morris (perf.). Cold Case, CBS Network, 30 March 2008. Blume, Stuart. “The Rhetoric and Counter Rhetoric of a “Bionic” Technology.” Science, Technology and Human Values 22.1 (1997): 31-56. Brueggemann, Brenda Jo. Deaf Subjects: Between Identities and Places. New York: New York UP, 2009. “Cochlear Implant Statistics.” ASL-Cochlear Implant Community. Blog. Citing Laurent Le Clerc National Deaf Education Center. Gallaudet University, 18 Mar. 2008. 29 Apr. 2010 ‹http:/ /aslci.blogspot.com/2008/03/cochlear-implant-statistics.html›. “Cures to Come.” Discover Presents the Brain (Spring 2010): 76. Fischman, Josh. “Bionics.” National Geographic Magazine 217 (2010). “House Divided.” Greg Yaitanes (dir.), Matthew V. Lewis (by), Hugh Laurie (perf.). House, Fox Network, 22 Apr. 2009. “Inside-Out.” Gina Lamar (dir.), Anthony Zuiker (by), David Caruso (perf.). CSI: Miami, CBS Network, 8 Oct. 2007. Krentz, Christopher. Writing Deafness: The Hearing Line in Nineteenth-Century American Literature. Chapel Hill: UNC P, 2007. Ladd, Paddy. Understanding Deaf Culture: In Search of Deafhood. Clevedon, UK: Multilingual Matters Limited, 2002. Lane, Harlan. A Journey Into the Deaf-World. San Diego: DawnSignPress, 1996. “NAD Position Statement on the Cochlear Implant.” National Association of the Deaf. 6 Oct. 2000. 29 April 2010 ‹http://www.nad.org/issues/technology/assistive-listening/cochlear-implants›. Nussbaum, Debra. “Manufacturer Information.” Cochlear Implant Information Center. National Deaf Education Center. Gallaudet University. 29 Apr. 2010 < http://clerccenter.gallaudet.edu >. Shaw, Debra. Technoculture: The Key Concepts. Oxford: Berg, 2008. “Silent Night.” Rob Bailey (dir.), Anthony Zuiker (by), Gary Sinise (perf.). CSI: New York, CBS Network, 13 Dec. 2006. “Sweet Nothing in My Ear.” Joseph Sargent (dir.), Stephen Sachs (by), Jeff Daniels (perf.). Hallmark Hall of Fame Production, 20 Apr. 2008. TWIZ TV scripts. CSI: Miami, “Inside-Out.” “What Is the Surgery Like?” FAQ, University of Miami Cochlear Implant Center. 29 Apr. 2010 ‹http://cochlearimplants.med.miami.edu/faq/index.asp›.
APA, Harvard, Vancouver, ISO, and other styles
35

Foith, Michael. "Virtually Witness Augmentation Now: Video Games and the Future of Human Enhancement." M/C Journal 16, no. 6 (November 6, 2013). http://dx.doi.org/10.5204/mcj.729.

Full text
Abstract:
Introduction Ever-enduring advancements in science and technology promise to offer solutions to problems or simply to make life a bit easier. However, not every advancement has only positive effects, but can also have undesired, negative ramifications. This article will take a closer look at Deus Ex: Human Revolution (DXHR), a dystopian video game which promises to put players in the position of deciding whether the science of human enhancement is a way to try to play God, or whether it enables us “to become the Gods we’ve always been striving to be” (Eidos Montreal, “Deus Ex: Human Revolution”). In this article I will argue that DXHR creates a space in which players can virtually witness future technologies for human performance enhancement without the need to alter their own bodies. DXHR is special particularly in two respects: first, the developers have achieved a high credibility and scientific realism of the enhancement technologies depicted in the game which can be described as being “diegetic prototypes” (Kirby, “The Future Is Now ” 43); second, the game directly invites players to reflect upon the impact and morality of human enhancement. It does so through a story in line with the cyberpunk genre, which envisions not only the potential benefits of an emergent technology, but has an even stronger focus on the negative contingencies. The game and its developers foresee a near-future society that is split into two fractions due to human enhancement technologies which come in the form of neuro-implants and mechanical prosthetics; and they foresee a near-future setting in which people are socially and economically forced to undergo enhancement surgery in order to keep up with the augmented competition. DXHR is set in the year 2027 and the player takes control of Adam Jensen, an ex-SWAT police officer who is now the chief of security of Sarif Industries, one of the world's leading biotechnology companies that produce enhancement technologies. Augmented terrorists attack Sarif Industries, abduct the head scientists, and nearly kill Jensen. Jensen merely survives because his boss puts him through enhancement surgery, which replaces many parts of his body with mechanical augmentations. In the course of the game it becomes clear that Jensen has been augmented beyond any life-saving necessity that grants him superhuman abilities and allows him to find and defeat the terrorists, but the augmentations also challenge his humanity. Is Jensen a human, a cyborg, or has he become more machine than man? DXHR grants players the illusion of immersion into a virtual world in which augmentations exist as a matter of fact and in which a certain level of control can be practiced. Players take up the role of a character distinctly more powerful and capable than the person in control, exceeding the limits of human abilities. The superior abilities are a result of scientific and technological advancements implying that every man or woman is able to attain the same abilities by simply acquiring augmentations. Thus, with the help of the playable character, Adam Jensen, the game lets players experience augmentations without any irreparable damages done to their bodies, but the experience will leave a lasting impression on players regarding the science of human enhancement. The experience with augmentations happens through and benefits from the effect of “virtual witnessing”: The technology of virtual witnessing involves the production in a reader’s mind of such an image of an experimental scene as obviates the necessity for either direct witness or replication. Through virtual witnessing the multiplication of witnesses could be, in principle, unlimited. (Shapin and Schaffer 60) In other words, simply by reading about and/or seeing scientific advancements, audiences can witness them without having to be present at the site of creation. The video game, hereby, is itself the medium of virtual witnessing whereby audiences can experience scientific advancements. Nevertheless, the video game is not just about reading or seeing potential future enhancement technologies, but permits players to virtually test-drive augmentations—to actually try out three-dimensionally rendered prototypes on a virtual body. In order to justify this thesis, a couple of things need to be clarified that explain in which ways the virtual witnessing of fictional enhancements in DXHR is a valid claim. Getting into the Game First I want to briefly describe how I investigated the stated issue. I have undertaken an auto-ethnography (Ellis, Adams, and Bochner) of DXHR, which concretely means that I have analytically played DXHR in an explorative fashion (Aarseth) trying to discover as many elements on human enhancement that the game has to offer. This method requires not only close observation of the virtual environment and documentation through field notes and screenshots, but also self-reflection of the actions that I chose to take and that were offered to me in the course of the game. An essential part of analytically playing a game is to be aware that the material requires “the activity of an actual player in order to be accessible for scrutiny” (Iversen), and that the player’s input fundamentally shapes the gaming experience (Juul 42). The meaning of the game is contingent upon the contribution of the player, especially in times in which digital games grant players more and more freedom in terms of narrative construction. In contrast to traditional narrative, the game poses an active challenge to the player which entails the need to become better in relation to the game’s mechanics and hence “studying games … implies interacting with the game rules and exploring the possibilities created by these rules, in addition to studying the graphical codes or the narration that unfolds” (Malliet). It is important to highlight that, although the visual representation of human enhancement technologies has an enormous potential impact on the player’s experience, it is not the only crucial element. Next to the representational shell, the core of the game, i.e. “how game rules and interactions with game objects and other players are structured” (Mäyrä 165), shapes the virtual witnessing of the augmentations in just an important way. Finally, the empirical material that was collected was analyzed and interpreted with the help of close-reading (Bizzocchi and Tanenbaum 395). In addition to the game itself, I have enriched my empirical material with interviews of developers of the game that are partly freely available on the Internet, and with the promotional material such as the trailers and a website (Eidos Montreal, “Sarif Industries”) that was released prior to the game. Sociotechnical Imaginaries In this case study of DXHR I have not only investigated how augmented bodies and enhancement technologies are represented in this specific video game, but also attempted to uncover which “sociotechnical imaginaries” (Jasanoff and Kim) underlie the game and support the virtual witnessing experience. Sociotechnical imaginaries are defined as “collectively imagined forms of social life and social order reflected in the design and fulfillment of nation-specific scientific and/or technological projects” (Jasanoff and Kim 120). The concept appeared to be suitable for this study as it covers and includes “promises, visions and expectations of future possibilities” (Jasanoff and Kim 122) of a technology as well as “implicit understandings of what is good or desirable in the social world writ large” (Jasanoff and Kim 122–23). The game draws upon several imaginaries of human enhancement. For example, the most basic imaginary in the game is that advanced engineered prosthetics and implants will be able to not only remedy dysfunctional parts of the human body, but will be able to upgrade these. Apart from this idea, the two prevailing sociotechnical imaginaries that forward the narrative can be subsumed as the transhumanist and the purist imaginary. The latter views human enhancement, with the help of science and technology, as unnatural and as a threat to humanity particularly through the power that it grants to individuals, while the former transports the opposing view. Transhumanism is: the intellectual and cultural movement that affirms the possibility and desirability of fundamentally improving the human condition through applied reason, especially by developing and making widely available technologies to eliminate aging and to greatly enhance human intellectual, physical, and psychological capacities. (Chrislenko et al.) The transhumanist imaginary in the game views technological development of the body as another step in the human evolution, not as something abhorrent to nature, but a fundamental human quality. Similar ideas can be found in the writings of Sigmund Freud and Arnold Gehlen, who both view the human being’s need to improve as part of its culture. Gehlen described the human as a “Mängelwesen”—a ‘deficient’ creature—who is, in contrast to other species, not specialized to a specific environment, but has the ability to adapt to nearly every situation because of this deficiency (Menne, Trutwin, and Türk). Freud even denoted the human as a “Prothesengott”—a god of prostheses: By means of all his tools, man makes his own organs more perfect—both the motor and the sensory—or else removes the obstacles in the way of their activity. Machinery places gigantic power at his disposal which, like his muscles, he can employ in any direction; ships and aircraft have the effect that neither air nor water can prevent his traversing them. With spectacles he corrects the defects of the lens in his own eyes; with telescopes he looks at far distances; with the microscope he overcomes the limitations in visibility due to the structure of his retina. (Freud 15) Returning to DXHR, how do the sociotechnical imaginaries matter for the player? Primarily, the imaginaries cannot be avoided as they pervade nearly every element in the game, from the main story that hinges upon human enhancement over the many optional side missions, to contextual elements such as a conference on “the next steps in human evolution” (Eidos Montreal, “Deus Ex: Human Revolution”). Most importantly, it impacts the player’s view in a crucial way. Human enhancement technologies are presented as controversial, neither exclusively good nor bad, which require reflection and perhaps even legal regulation. In this way, DXHR can be seen as offering the player a restricted building set of sociotechnical imaginaries of human enhancement, whereby the protagonist, Adam Jensen, becomes the player’s vessel to construct one’s own individual imaginary. In the end the player is forced to choose one of four outcomes to complete the game, and this choice can be quite difficult to make. Anticipation of the Future It is not unusual for video games to feature futuristic technologies that do not exist in the real world, but what makes DXHR distinct from others is that the developers have included an extent of information that goes beyond any game playing necessity (see Figures 1 & 2). Moreover, the information is not fictional but the developers have taken strategic steps to make it credible. Mary DeMarle, the narrative designer, explained at the San Diego Comic-Con in 2011, that a timeline of augmentation was created during the production phase in which the present state of technology was extrapolated into the future. In small incremental steps the developers have anticipated which enhancement technologies might be potentially feasible by the year 2027. Their efforts were supported by the science consultant, Will Rosellini, who voluntarily approached the development team to help. Being a neuroscientist, he could not have been a more fitting candidate for the job as he is actively working and researching in the biotechnology sector. He has co-founded two companies, MicroTransponder Inc., which produces tiny implantable wireless devices to interface with the nervous system to remedy diseases (see Rosellini’s presentation at the 2011 Comic-Con) and Rosellini Scientific, which funds, researches and develops advanced technological healthcare solutions (Rosellini; Rosellini Scientific). Due to the timeline which has been embedded explicitly and implicitly, no augmentation appears as a disembodied technology without history in the game. For example, although the protagonist wears top-notch military arm prostheses that appear very human-like, this prosthesis is depicted as one of the latest iterations and many non-playable characters possess arm prostheses that appear a lot older, cruder and more industrial than those of Jensen. Furthermore, an extensive description employing scientific jargon for each of the augmentations can be read on the augmentation overview screen, which includes details about the material composition and bodily locations of the augmentations. Figure 1: More Info Section of the Cybernetic Arm Prosthesis as it appears in-game (all screenshots taken with permission from Deus Ex: Human Revolution (2011), courtesy of Eidos Montreal) More details are provided through eBooks, which are presented in the form of scientific articles or conference proceedings, for which the explorative gamer is also rewarded with valuable experience points upon finding which are used to activate and upgrade augmentations. The eBooks also reflect the timeline as each eBook is equipped with a year of publication between 2001 and 2022. Despite the fact that these articles have been supposedly written by a fictional character, the information is authentic and taken from actual scientific research papers, whereby some of these articles even include a proper scientific citation. Figure 2: Example of a Darrow eBook The fact that a scientist was involved in the production of the game allows classifying the augmentations as “diegetic prototypes” which are “cinematic depictions of future technologies … that demonstrate to large public audiences a technology’s need, benevolence and viability” (“The Future Is Now” 43). Diegetic prototypes are fictional, on-screen depictions of technologies that do not exist in that form in real life and have been created with the help of a science consultant. They have been placed in movies to allay anxieties and doubts and perhaps to even provoke a longing in audiences to see depicted technologies become reality (Kirby, “The Future Is Now” 43). Of course the aesthetic appearance of the prototypes has an impact on audiences’s desire, and particularly the artificial arms of Jensen that have been designed in an alluring fashion as can be seen in the following figure: Figure 3: Adam Jensen and arm prosthesis An important fact about diegetic prototypes—and about prototypes (see Suchman, Trigg, and Blomberg) in general—is that they are put to specific use and are embedded and presented in an identifiable social context. Technological objects in cinema are at once both completely artificial—all aspects of their depiction are controlled—and normalized as practical objects. Characters treat these technologies as a ‘natural’ part of their landscape and interact with these prototypes as if they are everyday parts of their world. … fictional characters are ‘socializing’ technological artifacts by creating meanings for the audience, ‘which is tantamount to making the artifacts socially relevant’. (Kirby, “Lab Coats” 196) The power of DXHR is that the diegetic prototypes—the augmentations—are not only based on real world scientific developments and contextualized in a virtual social space, but that the player has the opportunity to handle the augmentations. Virtual Testing Virtual witnessing of the not-yet-existent augmentations is supported by scientific descriptions, articles, and the appearance of the technologies in DXHR, but the moral and ethical engagement is established by the player’s ability to actively use the augmentations and by the provision of choice how to use them. As mentioned, most of the augmentations are inactive and must first be activated by accumulating and spending experience points on them. This requires the player to make reflections on the potential usage and how a particular augmentation will lead to the successful completion of a mission. This means that the player has to constantly decide how s/he wants to play the game. Do I want to be able to hack terminals and computers or do I rather prefer getting mission-critical information by confronting people in conversation? Do I want to search for routes where I can avoid enemy detection or do I rather prefer taking the direct route through the enemy lines with heavy guns in hands? This recurring reflection of which augmentation to choose and their continuous usage throughout the game causes the selected augmentations to become valuable and precious to the player because they transform from augmentations into frequently used tools that facilitate challenge and reduce difficulty of certain situations. In addition, the developers have ensured that no matter which approach is taken, it will always lead to success. This way the role-playing elements of the game are accentuated and each player will construct their own version of Jensen. However, it may be argued that DXHR goes beyond mere character building. There is a breadth of information and opinions on human enhancement offered, but also choices that are made invite players to reflect upon the topic of human enhancement. Among the most conspicuous instances in the game, that involve the player’s choice, are the conversations with other non-playable characters. These are events in the game which require the player to choose one out of three responses for Jensen, and hence, these determine to some extent Jensen’s attitude towards human enhancement. Thus, in the course of the game players might discover their own conviction and might compose their own imaginary of human enhancement. Conclusion This article has explored that DXHR enables players to experience augmentations without being modified themselves. The game is filled with various sociotechnical imaginaries of prosthetic and neurological human enhancement technologies. The relevance of these imaginaries is increased by a high degree of credibility as a science consultant has ensured that the fictional augmentations are founded upon real world scientific advancements. The main story, and much of the virtual world, hinge upon the existence and controversy of these sorts of technologies. Finally, the medium ‘videogame’ allows taking control of an individual, who is heavily augmented with diegetic prototypes of future enhancement technologies, and it also allows using and testing the increased abilities in various situations and challenges. All these elements combined enable players to virtually witness not-yet-existent, future augmentations safely in the present without the need to undertake any alterations of their own bodies. This, in addition to the fact that the technologies are depicted in an appealing fashion, may create a desire in players to see these augmentations become reality. Nevertheless, DXHR sparks an important incentive to critically think about the future of human enhancement technologies.References Aarseth, Espen. “Playing Research: Methodological Approaches to Game Analysis.” DAC Conference, Melbourne, 2003. 14 Apr. 2013 ‹http://hypertext.rmit.edu.au/dac/papers/Aarseth.pdf›. Bizzocchi, J., and J. Tanenbaum. “Mass Effect 2: A Case Study in the Design of Game Narrative.” Bulletin of Science, Technology & Society 32.5 (2012): 393-404. Chrislenko, Alexander, et al. “Transhumanist FAQ.” humanity+. 2001. 18 July 2013 ‹http://humanityplus.org/philosophy/transhumanist-faq/#top›. Eidos Montreal. “Deus Ex: Human Revolution.” Square Enix. 2011. PC. ———. “Welcome to Sarif Industries: Envisioning a New Future.” 2011. 14 Apr. 2013 ‹http://www.sarifindustries.com›. Ellis, Carolyn, Tony E. Adams, and Arthur P. Bochner. “Autoethnography: An Overview.” Forum Qualitative Sozialforschung 12.1 (2010): n. pag. 9 July 2013 ‹http://www.qualitative-research.net/index.php/fqs/article/view/1589/3095›. Freud, Sigmund. Civilization and Its Discontents. Aylesbury, England: Chrysoma Associates Limited, 1929. Iversen, Sara Mosberg. “In the Double Grip of the Game: Challenge and Fallout 3.” Game Studies 12.2 (2012): n. pag. 5 Feb. 2013 ‹http://gamestudies.org/1202/articles/in_the_double_grip_of_the_game›. Jasanoff, Sheila, and Sang-Hyun Kim. “Containing the Atom: Sociotechnical Imaginaries and Nuclear Power in the United States and South Korea.” Minerva 47.2 (2009): 119–146. Juul, Jesper. “A Clash between Game and Narrative.” MA thesis. U of Copenhagen, 1999. 29 May 2013 ‹http://www.jesperjuul.net/thesis/›. Kirby, David A. Lab Coats in Hollywood. Cambridge, Massachusetts: MIT Press, 2011. ———. “The Future Is Now : Diegetic Prototypes and the Role of Popular Films in Generating Real-World Technological Development.” Social Studies of Science 40.1 (2010): 41-70. Malliet, Steven. “Adapting the Principles of Ludology to the Method of Video Game Content Analysis Content.” Game Studies 7.1 (2007): n. pag. 28 May 2013 ‹http://gamestudies.org/0701/articles/malliet›. Mäyrä, F. An Introduction to Game Studies. London: Sage, 2008. Menne, Erwin, Werner Trutwin, and Hans J. Türk. Philosophisches Kolleg Band 4 Anthropologie. Düsseldorf: Patmos, 1986. Rosellini, Will, and Mary DeMarle. “Deus Ex: Human Revolution.” Comic Con. San Diego, 2011. Panel. Rosellini Scientific. “Prevent. Restore. Enhance.” 2013. 25 May 2013 ‹http://www.roselliniscientific.com›. Shapin, Steven, and Simon Schaffer. Leviathan and the Air Pump: Hobbes, Boyle and the Experimental Life. Princeton: Princeton University Press, 1985. Suchman, Lucy, Randall Trigg, and Jeanette Blomberg. “Working Artefacts: Ethnomethods of the Prototype.” The British Journal of Sociology 53.2 (2002): 163-79. Image Credits All screenshots taken with permission from Deus Ex: Human Revolution (2011), courtesy of Eidos Montreal.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography