To see the other types of publications on this topic, follow the link: Discours rumoral.

Journal articles on the topic 'Discours rumoral'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 35 journal articles for your research on the topic 'Discours rumoral.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Greenwald, Rachel T. "Theological Discourse and Histories of the Shoah." German Politics and Society 20, no. 1 (March 1, 2002): 107–13. http://dx.doi.org/10.3167/104503002782385471.

Full text
Abstract:
Stephen Eric Bronner, A Rumor about the Jews: Reflections on Antisemitism and the Protocols of the Learned Elders of Zion (New York: St. Martin’s Press, 2000)Dan Diner, Beyond the Conceivable: Studies on Germany, Nazism, and the Holocaust (Berkeley: University of California, 2000)
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Laura C., Kenya J. Lucas, and Carl Latkin. "Rumor and gossip: Social discourse on HIV and AIDS." Anthropology & Medicine 6, no. 1 (April 1, 1999): 121–31. http://dx.doi.org/10.1080/13648470.1999.9964577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

EVTUSHENKO, OKSANA A., and ELENA V. YANKINA. "VALUE COMPONENT OF RUMORS AS A GENRE OF INFORMAL COMMUNICATION IN ADMINISTRATIVE DISCOURSE." HUMANITARIAN RESEARCHES 73, no. 1 (2020): 55–62. http://dx.doi.org/10.21672/1818-4936-2020-73-1-055-062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Robinette, Brian D. "II. Flipping the Classroom Inside-Out: A Systematic Theologian Discovers Contemplative Pedagogy." Horizons 46, no. 1 (May 15, 2019): 121–27. http://dx.doi.org/10.1017/hor.2019.4.

Full text
Abstract:
Shortly after receiving tenure in 2009, I hit a brick wall. Having poured so much energy into the tenure process, which included a large-scale book project, I found myself intellectually and emotionally spent. Uninspired and unable to gain traction with another major research project during my post-tenure sabbatical, I felt I was wandering through a desert. I had heard rumors about the “post-tenure blues,” but I somehow imagined myself immune.
APA, Harvard, Vancouver, ISO, and other styles
5

Junaid, Mohamad. "The Price of Blood." Comparative Studies of South Asia, Africa and the Middle East 40, no. 1 (May 1, 2020): 166–79. http://dx.doi.org/10.1215/1089201x-8186159.

Full text
Abstract:
Abstract The discourse of loyalty produces tense predicaments for those living under counterinsurgency regimes. The essay explores this theme by analyzing the case of a Kashmiri woman who found herself in a political drama when she accepted “blood money” from the person accused of causing her husband's death. The woman's decision accompanied moral turmoil in her village, and rumors of her “betrayal” circulated. However, the turmoil threatened to go beyond this localized setting. It brought to fore the fraught implications of “loyalty” shaped by India's occupation in Kashmir, its nationalist staging of Kashmiris as the subversive other, and schisms within Kashmir's historical independence movement. By tracing how rumors of individual betrayal were laced onto narratives of political treason in the case, the essay reveals the counterinsurgency as the operative context of broken intimate and intercommunity relations in which the personal is always at the threshold of becoming intensely public.
APA, Harvard, Vancouver, ISO, and other styles
6

Скрипникова and Natalya Skripnikova. "APPLIED TOOLS IN IMPLEMENTING INFORMATION AND COMMUNICATION TECHNOLOGIES OF AUTHORITIES AND POPULATION FEEDBACK." Central Russian Journal of Social Sciences 10, no. 4 (June 30, 2015): 91–101. http://dx.doi.org/10.12737/11957.

Full text
Abstract:
In the article the author defines basic principles of information and communication interaction in the dialog discourse «power – society», introducing the scheme of information and communication space. On the basis of certain examples the main groups of applied tools of information and communication technologies of authorities and population feedback system alignment are considered. One of the problems of efficient interaction development of "power-society" is considered by the author as information asymmetry, provoking the emergence of rumors filling "semantic gap". The author describes the most common social patterns of interaction between government and public.
APA, Harvard, Vancouver, ISO, and other styles
7

Rocha, Eufémia Vicente. "O imigrante oeste-africano como o indesejável? Acerca do processo de racialização em Cabo Verde." Mediações - Revista de Ciências Sociais 22, no. 1 (September 19, 2017): 105. http://dx.doi.org/10.5433/2176-6665.2017v22n1p105.

Full text
Abstract:
O objectivo deste artigo é reflectir sobre uma “nova realidade” que a sociedade caboverdiana tem conhecido a partir dos anos 1990 no que diz respeito às migrações, especialmente à presença de imigrantes provenientes da África Ocidental. Para o efeito, recorre-se a um conjunto de histórias, rumores e outros materiais que emergiram sobre esses indivíduos, possibilitando alguns discursos aliados às dinâmicas de identidade, diferença e representação. Trata-se, assim, de um trabalho no qual se discorre a respeito de processos de racialização neste contexto imigratório onde tanto o cabo-verdiano como o imigrante oeste-africano se reconhecem racializados.
APA, Harvard, Vancouver, ISO, and other styles
8

Absi, Pascale. "Fighting the witches of the plurinational State. The occult dimension of the conflict between Potosi and Morales government (2015 - 2019)." Población & Sociedad 27, no. 2 (December 1, 2020): 82–104. http://dx.doi.org/10.19137/pys-2020-270205.

Full text
Abstract:
In 2015, while the town of Potosi was beginning its longest blockade in history to denounce lack of public investment, rumor spread that the government was sending witches to stem the discontent. Therefore, a group of healing women decided to organize a counter attack. In October 2019, during the controversial presidential elections, they got back into action. The purpose of th is article is to analyze Bolivia’s former government witchcraft allegations and the responses they brought forward as a political and moral discourse about the State in the context of Evo Morales's declining popularity.
APA, Harvard, Vancouver, ISO, and other styles
9

Bodnaruk, E. V., and T. N. Astakhova. "Corpus Analysis of Evidential Verbs SAGEN and BEHAUPTEN in Modern German-Language Media Discourse." Nauchnyy Dialog, no. 4 (April 30, 2020): 9–26. http://dx.doi.org/10.24224/2227-1295-2020-4-9-26.

Full text
Abstract:
The semantic and morphological features of the evidential verbs of speech sagen (speak) and behaupten (assert), introducing statements with direct, indirect and fragmentary quotes in the German-language media discourse are discussed in the article. The study is based on the material of the Mannheim Corps of the German Language “COSMAS II”. The empirical material is the newspapers “Die Welt”, “Süddeutsche Zeitung”, and “Tageszeitung”. Attention is paid to one of the components of the category of evidentiality - reported evidentiality, which includes the meanings of ‘quotative’ and ‘hearsay’. A classification of the most significant sources of information is proposed. The results of a comparative analysis of the verbs sagen and behaupten are presented. It is concluded that the verb sagen is the most frequent and neutral verb introducing someone else's speech. The authors note that when transmitting indirect and fragmented citation, sagen usually means ‘individual personal quotative’ based on official and reliable sources. It is proved that the verb behaupten is a marked means of direct, indirect and fragmented quotes. It is emphasized that the verb behaupten is possible as an introductory verb when transmitting the meanings ‘generalized quotation’ and ‘rumors’.
APA, Harvard, Vancouver, ISO, and other styles
10

임현량. "Domus Dedaly: Rumor, Ricardian England, and the Conception of Poetic Discourse in The House of Fame." English & American Cultural Studies 14, no. 2 (August 2014): 207–32. http://dx.doi.org/10.15839/eacs.14.2.201408.207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Orlova, O. V., and A. I. Kabankov. "Regulativity of precedent text in the internet discourse (on the material of «Songs about rumors» of Vladimir Vysotsky)." Sibirskiy filologicheskiy zhurnal, no. 2 (March 1, 2017): 271–78. http://dx.doi.org/10.17223/18137083/59/18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ivanova, Svetlana V., and Gulnara Sharifullovna Khakimova. "Celebrity gossip as a genre in English-language mass media discourse." Russian Journal of Linguistics 24, no. 2 (December 15, 2020): 386–418. http://dx.doi.org/10.22363/2687-0088-2020-24-2-386-418.

Full text
Abstract:
The multidimensionality of rumours as part and parcel of mass communication has stipulated the research in their linguistic nature. The present paper studies this specific communication phenomenon and the discursive practices by means of which it is realized across the Anglophone mass media discourse continuum. The theory of discourse-analysis underpinning the present paper predetermines an integrative approach with various methods employed. This approach makes it possible to gain an insight into the complex nature of the object under study. The research is targeted at media rumours, namely celebrity gossip, manifested in on-line versions of the printed press and original web outlets in 2015-2018. The main goal of the research is to reveal specific features of media rumors as a speech genre in the Anglophone media communication. Celebrity gossip texts make up the empiric material for the present study. This aim is achieved via the description of the content and form of the text-type structure supplemented by an application of stylistic analysis. In terms of the topics, the findings demonstrate a wide variety of topoi comprising both public (social interactions) and private spheres of celebrities’ life with an emphasis on privacy, sensationalism and scandalous impropriety as dominant discursive characteristics of the text-type samples under study. The structure of the celebrity gossip discourse is represented by texts in different journalistic forms: from informative genres to feature type variations used by authors as means of constructing celebrity culture. The information of trivial content and questionable validity because of its unverified character is disguised as reports of high testimonial trustworthiness and epistemic value with the help of a variety of language and textual resources. The results of the study enable us to argue that within the mass media communication there exists a specific discourse which is hybrid by nature and non-evidential by verification.
APA, Harvard, Vancouver, ISO, and other styles
13

Ahmad, Tania. "Socialities of Indignation: Denouncing Party Politics in Karachi." Cultural Anthropology 29, no. 2 (May 19, 2014): 411–32. http://dx.doi.org/10.14506/ca29.2.12.

Full text
Abstract:
In May 2007, in the aftermath of city-wide urban unrest mediated by live news television, Karachi residents clamored noisily, using rumors, blogs, and SMS texting to overtly denounce the violence and intimidation ploys of political parties. Their discourse took a particular form: it described the violent tactics of organized politics as repulsive, suggested the moral respectability of avoiding such party politics, and, most important, articulated the impetus to domestic confinement—being compelled to stay at home—as a shared experience. Rather than conflate the discursive content of non-participation with depoliticization, it is important to acknowledge the contingent sociality of recognizing and articulating domestic confinement as a shared experience through the indignant denunciation of political institutions. Such tactics invoke an emergent public that recuperates and politicizes the ordinary in an explicitly moral register.
APA, Harvard, Vancouver, ISO, and other styles
14

Beaver, Daniel C. "“Fruits of Unrulie Multitudes”: Liberty, Popularity, and Meanings of Violence in the English Atlantic, 1623–1625." Journal of British Studies 59, no. 2 (April 2020): 372–95. http://dx.doi.org/10.1017/jbr.2019.284.

Full text
Abstract:
AbstractUsing neglected evidence of organized, state-like, internecine violence among English settlers in New England during the 1620s and 1630s, this essay engages with recent archipelagic approaches to the early modern English public sphere and with studies of the English state and political culture in order to argue for the existence of an important, semipublic Atlantic political discourse during the decades preceding the civil wars in the British Isles. It focuses on the distinctive political dynamics of Atlantic fishing stages during the early seventeenth century and on the violent confrontation between the Dorchester and Plymouth companies in 1625 over the control of the Cape Ann stage on Massachusetts Bay. The rumors, news, and formal reports that flowed from such incidents show how diffuse English ideologies assumed the form of opposed groups, armed and mobilized in the manner of free states, and confirmed fears of such violent episodes as threats to orderly governance in a political society conceived in Atlantic imperial terms. By examining the communication of and responses to this perceived threat during the late 1620s and 1630s, the essay reveals how an Atlantic discourse of “liberty,” “orderly commonweal,” and “popularity” influenced English political culture and policy and the institutions of Atlantic governance before the English Civil War.
APA, Harvard, Vancouver, ISO, and other styles
15

BEN-YISHAI, AYELET. "The Fact of a Rumor: Anthony Trollope's The Eustace Diamonds." Nineteenth-Century Literature 62, no. 1 (June 1, 2007): 88–120. http://dx.doi.org/10.1525/ncl.2007.62.1.88.

Full text
Abstract:
This essay joins recent scholarship on the epistemology of realist fiction by investigating the role of facts in the creation of fiction. Close scrutiny of Anthony Trollope's The Eustace Diamonds (1872) reveals several different processes of fact-making: legal ones as well as nonlegal communal endeavors such as rumor, gossip, and the regulation of propriety. The neat division whereby legal facts belong to the realm of the empirical and the facts of rumor belong to the communal does not hold in the novel, however: underneath the surface of almost any empirical and legal fact are traces and residues of a communal endeavor. The instability of facts and fact-making in the novel prompts a reconsideration of the epistemology of realist form and of novelistic probability: just how are fictional facts determined? Building on Irene Tucker's understanding of probability as a self-conscious reflection of the empirical, the essay argues that the ostensibly empirical epistemology of fictional probability is also a communal one. Moreover, the secular empirical rules of realism are not as stable——or empirical——as we have come to understand them. In the legal realm, this epistemological reconsideration shows how literary realism has drawn on the law not only to ground its famously empirical discourse but also to anchor novelistic truth in a communal endeavor. The Eustace Diamonds thus problematizes not only the production of fact in the novel but also the empiricist, positive-law tradition from which this concept emerged.
APA, Harvard, Vancouver, ISO, and other styles
16

Kwon, K. Hazel, C. Chris Bang, Michael Egnoto, and H. Raghav Rao. "Social media rumors as improvised public opinion: semantic network analyses of twitter discourses during Korean saber rattling 2013." Asian Journal of Communication 26, no. 3 (February 2016): 201–22. http://dx.doi.org/10.1080/01292986.2015.1130157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Chen, Emily, Kristina Lerman, and Emilio Ferrara. "Tracking Social Media Discourse About the COVID-19 Pandemic: Development of a Public Coronavirus Twitter Data Set." JMIR Public Health and Surveillance 6, no. 2 (May 29, 2020): e19273. http://dx.doi.org/10.2196/19273.

Full text
Abstract:
Background At the time of this writing, the coronavirus disease (COVID-19) pandemic outbreak has already put tremendous strain on many countries' citizens, resources, and economies around the world. Social distancing measures, travel bans, self-quarantines, and business closures are changing the very fabric of societies worldwide. With people forced out of public spaces, much of the conversation about these phenomena now occurs online on social media platforms like Twitter. Objective In this paper, we describe a multilingual COVID-19 Twitter data set that we are making available to the research community via our COVID-19-TweetIDs GitHub repository. Methods We started this ongoing data collection on January 28, 2020, leveraging Twitter’s streaming application programming interface (API) and Tweepy to follow certain keywords and accounts that were trending at the time data collection began. We used Twitter’s search API to query for past tweets, resulting in the earliest tweets in our collection dating back to January 21, 2020. Results Since the inception of our collection, we have actively maintained and updated our GitHub repository on a weekly basis. We have published over 123 million tweets, with over 60% of the tweets in English. This paper also presents basic statistics that show that Twitter activity responds and reacts to COVID-19-related events. Conclusions It is our hope that our contribution will enable the study of online conversation dynamics in the context of a planetary-scale epidemic outbreak of unprecedented proportions and implications. This data set could also help track COVID-19-related misinformation and unverified rumors or enable the understanding of fear and panic—and undoubtedly more.
APA, Harvard, Vancouver, ISO, and other styles
18

변은진. "A Study on the People’s Discourse of the Crisis in Joseon via Rumor at the End of the Japanese Occupation." 아시아문화연구 22, no. ll (June 2011): 53–79. http://dx.doi.org/10.34252/acsri.2011.22..003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

罗, 章. "Discourse Governance: A Study on Rumor Governance in Accidents and Disasters—A Case Study of Chongqing Bus Falling into a River." Modern Management 11, no. 01 (2021): 9–17. http://dx.doi.org/10.12677/mm.2021.111002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Воронин, А. Н., Н. Д. Павлова, Т. А. Гребенщикова, Т. А. Кубрак, and И. В. Смирнов. "EVALUATION OF NETWORK COMUNITY SUBJECTIVITY: MATCHING DISCOURSE MARKERS AND RSA INDICATORS." Институт психологии Российской академии наук. Социальная и экономическая психология, no. 2(18) (September 25, 2020): 330–64. http://dx.doi.org/10.38098/ipran.sep.2020.18.2.012.

Full text
Abstract:
Актуальность исследования психологии сетевых сообществ обусловлена все более широким переходом социальной жизни в интернет-пространство. Однако большинство работ, существующих на данный момент, посвящено динамике относительно простых феноменов: эмоциональному заражению и распространению мемов, информационным каскадам в связи с теми или иными событиями, групповой поляризации, распространению слухов и ложной информации. Изучение сложных явлений, таких как коллективная память и социальные представления, относительно редки. Данная статья посвящена изучению субъектности сетевого сообщества как самодетерминированной активности социальной группы, многообразно проявляющейся в различных формах совместной активности. Одной из проблем конкретного психологического исследования является многозначность конструкта «субъектность», индуцированная неопределенностью размера сообщества, что не позволяет использовать характеристики субъектности реальных сообществ, непосредственно связанных с их размером. Другой проблемой является идентификация участников сетевого сообщества, обусловленная их представленностью аккаунтами в сети и связанным с ними контентом. Одним из подходов, частично снимающим указанные проблемы, является анализ коммуникации сетевого сообщества без конкретизации конкретных участников. При этом наиболее релевантной представляется дискурсивная парадигма исследования, а объектом становится пользовательский контент. Оценка субъектности сетевого сообщества в этом случае базируется на проявлении дискурсивных признаков в этом контенте. Параллельно осуществляется его анализ путем последовательного интеллектуального морфологического, синтаксического и семантического анализов с последующим определением частоты встречаемости психолингвистических маркеров в рамках реляционно-ситуационного анализа (РСА), базирующегося на синтаксемном анализе текста и на концепции неоднородных семантических сетей. В статье показано, что сопоставление параметров субъектности и показателей РСА выявило значительное количество (больше 250) соответствий, часть из которых была теоретически предсказана, а часть - объяснима в рамках семантического анализа и сопоставления с психологическими компонентами субъектности сетевых сообществ. The study of online communities' psychology is due to the increasingly complete transition of social life to the Internet space. However, most current research focuses on the dynamics of relatively simple phenomena: emotional contagion and the spread of memes, information cascades in connection with specific events, group polarization, the range of rumors and false information. Research on complex phenomena such as collective memory and social representations is relatively rare. This article is devoted to studying the subjectivity of a network community as a self-determined activity of a social group, which manifests itself in various forms of joint activity. One of the problems of the specific psychological study is the ambiguity of the construct "subjectivity," induced by the uncertainty of the community's size. It does not allow us to use the characteristics of the subjectivity of real communities directly related to their size. Another problem is the identification of the network community's members due to the representation of their accounts and related content. One approach partially solves these problems is to analyze the communication of the network community without specifying specific participants. At the same time, the most appropriate is the discursive paradigm of research, and the object of such study is the user's content. The assessment of the network community's subjectivity, in this case, was based on the manifestation of discursive features in this content. In parallel, it is analyzed by sequential intellectual morphological, syntactic and semantic analyses, followed by determining the frequency of occurrence of psycholinguistic markers in the framework of relational, situational analysis (RSA), based on synataxem analysis of the text and the concept of heterogeneous semantic networks. The evidence has shown that the comparison of subjectivity parameters and RSA indicators revealed a significant number (more than 250) of correspondences. Some of them were theoretically predicted, and some were explained within the framework of semantic analysis and comparison with the psychological components of the network community's subjectivity.
APA, Harvard, Vancouver, ISO, and other styles
21

NOONAN, ALEXANDER. "“What Must Be the Answer of the United States to Such a Proposition?” Anarchist Exclusion and National Security in the United States, 1887–1903." Journal of American Studies 50, no. 2 (February 16, 2016): 347–76. http://dx.doi.org/10.1017/s0021875816000451.

Full text
Abstract:
This article examines the debates around anarchist restriction that shaped the eventual passage of the Immigration Act of 1903 and argues that domestically oriented conceptions of national security are both challenged and constituted by transnational and international processes and currents. While discussions of transnational immigration control became important features of both scholarly discourse and popular debate in the wake of the terrorist attacks of 2001, these discussions were not new. Similar debates about immigration policy, security, and civil liberties shaped discussions between the mid-1880s and early 1900s, when an unprecedented wave of attacks against heads of state fed rumors of wide-ranging conspiracies, and reports of anarchist outrages in cities far and wide spread fear. Anarchist exclusion was far more than an example of a rising nativist tide raising all boats and excluding a widening spectrum of undesirable aliens. Such measures set the foundation for restriction based on political beliefs and associations that, over subsequent decades, would become critical to suppressing political dissent. Consequently, understanding how the fear of anarchist violence helped shape the contours of the domestic and diplomatic debates over anarchist restriction is critical as these old questions of transnational immigration control reemerge.
APA, Harvard, Vancouver, ISO, and other styles
22

Scott, Bede. "Affective Entropy: Cultural Difference and the Decline of Wonder on Ivu'ivu." Novel 53, no. 1 (May 1, 2020): 96–114. http://dx.doi.org/10.1215/00295132-8139357.

Full text
Abstract:
Abstract Situated at the intersection of postcolonialism and affect studies, this essay explores the significance of wonder in Hanya Yanagihara's The People in the Trees (2013). In her novel, Yanagihara provides a detailed account of an anthropological expedition to the remote Micronesian island of Ivu'ivu, where a “lost tribe” is rumored to be living. As is typical of such discovery narratives, the affective response of wonder initially dominates the discourse. Over time, however, this sense of wonder is transformed into the more durable feeling of curiosity, which in turn initiates a dialectical interplay of opposites—bringing together the familiar and the strange, the legible and the opaque, the boring and the fascinating. Although the narrator, Norton Perina, does everything he can to sustain this dialectic, the attenuated form of wonder that drives his curiosity eventually dissipates, giving rise to a debilitating sense of apathy and indifference. This is a process that occurs not once but three times within the narrative—under quite different circumstances in each case. In the first instance, the trajectory belongs to the category of the ethnographic; in the second, it acquires a broader postcolonial significance; and finally, in the novel's tragic conclusion, readers are exposed to its potential psychological consequences, as a displaced sense of “wonder” resurfaces in the pathological form of a pedophilic encounter.
APA, Harvard, Vancouver, ISO, and other styles
23

Martin, Martial. "Fake news et libelles diffamatoires : Discours contre les fausses nouvelles, instrumentalisation des écritures de l’actualité et poétiques burlesques dans la première modernité (1559-1661)." Infox, Fake News et « Nouvelles faulses » : perspectives historiques (XVe – XXe siècles), no. 118 (September 10, 2021): 45–59. http://dx.doi.org/10.7202/1081082ar.

Full text
Abstract:
Free-form satire, emancipated from strictly Horatian / Juvenalian models, and organized around a poetic “I”, distant, critical or even indignant before a changing world, played an important role in the emergence of news writing in Early Modernity, leading to the onset of the periodical press in the 17th century. In order to reflect on the connection between Early Modern information media, and satirical or militant writing, the idiom “fake news”, while seemingly incongruous at first, is in fact particularly useful, as it helps establish a connection with our contemporary practices, such as incorrect news, ideologically-oriented publications, clickbaits, and ironic parodies. By comparing these apparently heterogeneous phenomena, it becomes possible to think, in a coordinated way, about three aspects of the exchanges and hybridization that took place between Early Modern “occasionnels” (short, topical brochures) and “libelles” (satirical or libellous tracts). Like contemporary “fake news”, a term often used by purveyors of equally debatable reports to decry doubtful information produced by the opposing camp, libelles were always entangled in a network of other libelles, ever expending due to the indignation caused by the enemy’s lies. Libelles imitated news writing, feeding on rumors, and led to demystifications that often doubled as critiques of the codes of topicality found in the occasionnels. In certain ways, such criticism contributed to the creation of these codes, by pushing back against them. The forms taken by this satire of ideologically-oriented, or militant news writing went beyond partisan intent; it was sometimes difficult, as it is nowadays on certain satirical websites or social media accounts, to distinguish between activist creative writings, and playful games of wit. At a deeper level, satirical esthetics, whether grotesque (referring to the whole period) or burlesque (referring to its end), could instigate a global exercise of incredulity or unbelief towards the religious and political foundations of the Ancien Régime. On account of such a meta-reflexive dimension, of its great diversity linked to its hybridization of news writings, of its oscillation between partisan and playful humour, depending on the readership’s liking and the publishing industry’s interests, libelle referred to changeable forms quite similar to the fickle realities the moniker fake news refers to nowadays. Conversely, the libelle invites us not to hastily reject one aspect or another of the current network, which might be more homogeneous than it seems at first sight.
APA, Harvard, Vancouver, ISO, and other styles
24

Jackson, Stephen. "Sons of Which Soil? The Language and Politics of Autochthony in Eastern D.R. Congo." African Studies Review 49, no. 2 (September 2006): 95–124. http://dx.doi.org/10.1353/arw.2006.0107.

Full text
Abstract:
Abstract:The recent wars in the DR Congo have led to a marked upsurge in both elite and popular discourse and violence around belonging and exclusion, expressed through the vernacular of “autochthony.” Dangerously flexible in its politics, nervous and paranoid in its language, unmoored from geographic or ethno-cultural specificity, borrowing energy both from present conflicts and deep-seated mythologies of the past, the idea of autochthony has permitted comparatively localized instances of violence in the DRC to inscribe themselves upward into regional, and even continental logics, with dangerous implications for the future. This article analyzes how the “local”/“stranger” duality of autochthony/allochthony expresses itself in the DRC through rumors, political tracts, and speeches and how it draws energy from imprecise overlaps with other powerful, preexisting identity polarities at particular scales of identity and difference: local, provincial, national, regional. Across each, autochthony operates as a loose qualifier, a binary operator: autochthony is adjectival, relational rather than absolute, policing a distinction between in and out, and yet not indicating, in itself, which in/ou t distinction is intended. Thus many speak of “Sons of the Soil,” but of which soil, precisely? The slipperiness between different scales of meaning permits the speaker to leave open multiple interpretations. This indefiniteness is a paradoxical source of the discourse's strength and weakness, suppleness and nervousness, its declarative mood and attendant paranoia.
APA, Harvard, Vancouver, ISO, and other styles
25

Dyrendal, Asbjørn, and Daniel Jolley. "Conspiracy Theories in the Classroom: Problems and Potential Solutions." Religions 11, no. 10 (September 28, 2020): 494. http://dx.doi.org/10.3390/rel11100494.

Full text
Abstract:
Conspiracy narratives and speculative rumors of a conspiracist nature are intermittently popular in youth culture, as well as in political discourse. The general motivations of conspiracy beliefs relate to essential needs (for knowledge, to feel safe and secure, to feel good about oneself and one’s group), but evidence shows these needs are not actually served by conspiracy beliefs. Conspiracy theories tend to be explanations that conflict with best academic knowledge, and belief in them leads to less support for democratic processes and institutions. They play a role in political polarization, and they are used in identity-protective cognition. They may both express and arouse “strong feelings and divide communities and society”. Conspiracy theories as a general topic thus satisfy general criteria for controversial issues. At the same time, they are particularly interesting because they hover between the superficially and the inherently controversial: although in practice often resistant to contradictory evidence, they generally appeal to reason and evidence. While they sometimes are rooted in deep religious and religion-like beliefs, we argue that this makes them good cases for practicing analytical skills that could better serve all the needs above. Since cases and topics can cover the gamut from the subject-related to the cross-curricular and civic behavior, and the skills should be broadly transferable, using conspiracy theories as a topic has a high possible upside. However, conspiracy theories in a school setting have not yet been a topic of much research. This article takes as its starting point interviews with teachers and preliminary investigations of adolescents, before presenting an outline of possible didactic tools for teachers based on the general findings of effective interventions on conspiracy beliefs and related issues.
APA, Harvard, Vancouver, ISO, and other styles
26

Mian, Qaasim, Kasereka Masumbuko Claude, and Michael Hawkes. "1666. Community Beliefs about Ebola and Implications for Disease Control in Eastern Democratic Republic of the Congo." Open Forum Infectious Diseases 6, Supplement_2 (October 2019): S609. http://dx.doi.org/10.1093/ofid/ofz360.1530.

Full text
Abstract:
Abstract Background The current Ebola epidemic in Eastern Democratic Republic of the Congo (DRC) has surpassed 1,300 cases and 800 deaths. Social resistance is a major barrier to control efforts, and invites an exploration of community beliefs around Ebola and its origins. Methods Mixed-methods study, using focus group discussions (FGDs) with key community informants and a 19-item survey questionnaire broadly sampling the outbreak zone. Results Between 4 to 17 August, 2018, we conducted 4 FGDs (20 participants) and surveyed 286 community members across Eastern DRC. FGDs revealed a widespread rumor in Mangina early in the epidemic of two twins bewitched by their aunt after eating her cat, who developed bleeding symptoms and triggered the epidemic. However, this myth appeared to dissipate as the epidemic progressed and biomedical transmission became generally accepted (medical syncretism). In our survey, 6% of respondents endorsed supernatural origins of Ebola. This subgroup did not differ from other respondents in terms of knowledge of biomedical modes of transmission or resistant attitudes toward infection control measures, but was more likely to believe that traditional healers could cure Ebola. Wild animals of the forest were recognized as sources of the Ebola virus by 53% of survey respondents. Our findings suggest that skepticism and/or denial of the biomedical discourse, coupled with and mistrust and fear of ETUs may fuel “underground” transmission of Ebola outside western-style medical facilities, as patients seek care from traditional healers, who are ill-equipped to deal with a highly contagious biohazard. Conclusion A deeper understanding of beliefs around Ebola origins may illuminate strategies to engage communities in control efforts. Disclosures All authors: No reported disclosures.
APA, Harvard, Vancouver, ISO, and other styles
27

Hula, Yevhen, and Alla Osadcha. "Features of the impact of design on the progress of humanity." Aspects of Historical Musicology 21, no. 21 (March 10, 2020): 8–22. http://dx.doi.org/10.34064/khnum2-21.01.

Full text
Abstract:
Background. Within the framework of art-historical discourse, the peculiarities of the influence of design developments and concepts on progress of humanity are considered. Researchers offer ambiguous estimates of this phenomenon, discussions are lasting and different opinions on the issues of influence of design on technological and cultural progress of human society are putting forward. The aim of the paper is to systematize and generalize scientific concepts about the design role in the society progress. Novelty of the research consisting in synthesis of information on features of development of design for the last years in various spheres of culture and social practice defines its practical significance: the Ukrainian educators and art critics can consider the information contained in the article useful to develop new strategy of training in bases of design to non-specialist students. Methodology. Major publications and monographs on the subject have been reviewed. It has been found that terminological judgment of design began with the middle of the XX century, first, within postmodern paradigm. The design as a component of culture correlates with cultural and art traditions, philosophy, ecology and other areas of public and humanitarian knowledge. Hence, the study of the role of design in ensuring progress provides for the wide use of theoretical and methodological tools not only of design theory, but also of other disciplines: art history, cultural studies, social psychology, aesthetics, ecology, etc. The design is considered both as universal and as a national phenomenon. The definitions of design in the works of a number of domestic and foreign authors in the context of its cultural-creative influence are compared. The analysis of design in its connection with artistic creativity is carried out. The components of contemporary design art are determined, the characteristic to the newest manifestations of design is given. Results. The design represents the hierarchical structure expressed by means of а material, space and balance of proportions, contrasts, repetitions (in ornaments, etc.), scale and a form, a size, a color and density, texture and weight, and other. It is possible to consider culture of design as the huge multilayered text, which is written down by different ways in different spheres of culture and art. However the dilemma “art or production” in the sphere of design is inevitable. Design is directly involved in technical progress in material culture and uses the art of planning, invention, modeling as a method, also introducing new object forms (see, for example, Vershinin & Melentyev, 2005: 1001). The design role in culture is connected with creation of esthetically perfect fine environment. At the same time, it is differentiated essentially depending on the region of the world. So, design creativity is reasonably considered a manifestation of project activities and project culture of the 20th century. However, the progressive function of design at the beginning of the 21st century is that design is becoming a way to bridge the gap between technical civilization and spiritual culture, and design projecting is becoming a way of harmonizing human life in a modern environment. The importance of design for the progress of humankind is clearly demonstrated by the modern ecological direction, one of the components of the international movement of “green” design, namely, “environmental” design. This concept implies the creation of products that are compatible with the environment, the reduction and complete elimination of the negative impact on nature through the use of alternative resources and energy, as well as non-toxic materials. Ideally, the design should be in line with the “3R” ecological principle: reduce, reuse, and recycle. The value of design for progress in art can be understood, having only tracked integration of painting, architecture, industrial and graphic design and having seen what the role in tangled process of creation of design is played by contents and a form, which also are the expression of the thought, the point of view and social responsibility of the designers. It is also important to emphasize the role of the designer’s profession, because for many artists design and art is a cultural mission, where life and work are inseparable. Judgments of design in art are formed, proceeding from two types of estimates: symbolical, or associative (external), and formal (internal). Symbolical estimates are mostly subjective and have no relation to design or art per se, being most often based on a habit, rumors, others thought, personal factors, prejudices, misunderstanding, that is on social, psychological, political, financial and even religious factors. Internal assessments concern an esthetics and actually design (appearance of the work of art, its visual quality) regardless of what it personifies. If external estimates belong to contents, then internal – to beauty. The latter is difficult to measure it and here such factors as talent, erudition, taste, susceptibility, experience and visual feeling matter. When determining a role of design in art, it is also necessary to remember that the principles of laconicism, laws of color, a rhythm and even plot equally work in any material, these fundamentals exist out of time, space, the state, school or style. To resume, human progress is largely driven by the positive influences of design concepts. Summarizing the views of Ukrainian and foreign researchers, it can be argued that design as a type of purposeful creative activity of mankind contributes to progress, since: 1) provides support for the development of civilization by creating new and improving known man-made objects; 2) creates an optimal human environment in order to achieve maximum comfort of his existence; 3) contributes to the formation of creative personality traits, its purposeful activity, which is one of the main social tasks. Design acts as an universal phenomenon, which covers different spheres of human activity, being, at the same time, the factor of socio-cultural communication and the basis for personality realization. As the socio-cultural phenomenon, it correlates with understanding of the person as source of intrinsic forces acting like the harmony catalyst in space.
APA, Harvard, Vancouver, ISO, and other styles
28

Marquez, Beatriz Aldana, Apryl A. Williams, Nancy Plankey-Videla, and Selene I. Diaz. "The discourse of deservingness: Racialized framing during rumored ICE raids." Ethnicities, May 29, 2021, 146879682110182. http://dx.doi.org/10.1177/14687968211018215.

Full text
Abstract:
On February 12–14th, 2017, there were rumors of an ICE raid in the small East Texas city of Hometown. Reports that ICE was present circulated on social media platforms and radio stations in the area. Consequently, the Latinx community had high anxiety and fear of deportation and looked to the Spanish speaking radio DJs for information and advice. In this paper, we argue that heighten threats of deportation can accentuate divisions among the Latinx community based on fallacies regarding criminality and immigration. The authors utilized a collection of qualitative data to review the racialized framing that occurs during rumored ICE raids. A discourse of deservingness based on the notion of the “good” versus “bad” immigrant was internalized by vulnerable immigrants to alleviate stress about deportation.
APA, Harvard, Vancouver, ISO, and other styles
29

Cinelli, Matteo, Walter Quattrociocchi, Alessandro Galeazzi, Carlo Michele Valensise, Emanuele Brugnoli, Ana Lucia Schmidt, Paola Zola, Fabiana Zollo, and Antonio Scala. "The COVID-19 social media infodemic." Scientific Reports 10, no. 1 (October 6, 2020). http://dx.doi.org/10.1038/s41598-020-73510-5.

Full text
Abstract:
Abstract We address the diffusion of information about the COVID-19 with a massive data analysis on Twitter, Instagram, YouTube, Reddit and Gab. We analyze engagement and interest in the COVID-19 topic and provide a differential assessment on the evolution of the discourse on a global scale for each platform and their users. We fit information spreading with epidemic models characterizing the basic reproduction number $$R_0$$ R 0 for each social media platform. Moreover, we identify information spreading from questionable sources, finding different volumes of misinformation in each platform. However, information from both reliable and questionable sources do not present different spreading patterns. Finally, we provide platform-dependent numerical estimates of rumors’ amplification.
APA, Harvard, Vancouver, ISO, and other styles
30

Plamper, Jan. "Sounds of February, Smells of October: The Russian Revolution as Sensory Experience." American Historical Review, December 31, 2020. http://dx.doi.org/10.1093/ahr/rhaa575.

Full text
Abstract:
Abstract Temporally speaking, the Russian Revolution of 1917 was not a news item, not even a rumor, but first and foremost a novel sensory impression—gunshots with live ammunition from unusual places, the smell of burnt police files. This article explores the sensory history of the revolution through ego-documents like diaries and memoirs. It tracks in detail how people of various backgrounds in Petrograd and Moscow lived the olfactory class struggles after February and the taste excesses of the post-October “wine pogroms,” how they expressed a new experience of time in a sensory idiom, and how they ultimately became habituated to the new sounds and sights of revolutionary Russia. Historiography is at a propitious moment to move beyond a dichotomy of discourse versus “raw” experience: conjoining the histories of experience, the senses, and the emotions, the article probes what is to be gained from interpreting a world-historical event with a concept of experience as an integrated, multimodal, simultaneous sensory-emotional-cognitive process. Avant-garde artists, contemporaries of the Russian Revolution, foreshadowed such a holistic concept of experience by a century.
APA, Harvard, Vancouver, ISO, and other styles
31

Mohr, Bill. "The Gossip of Ideology." M/C Journal 6, no. 5 (November 1, 2003). http://dx.doi.org/10.5204/mcj.2251.

Full text
Abstract:
A discourse, according to Alan Sekula, is "an arena of information exchange, that is a system of relations between parties engaged in communicative activity."1 Sekula immediately qualifies his definition by pointing out that "the notion of discourse is a notion of limits," and arguing that "it is this limiting function that determines the very possibility of meaning." In the capacity of testing the acceptable limits of any possible subject, jokes often reveal contradictions or ambivalent feelings about the meaning of power relations. This seems especially true about jokes involving sexual or erotic situations. In this paper, I will examine several jokes about sex that I have heard at one point or another, and consider how these jokes reveal the ideological dialogue interwoven in phallogocentric power. For many years I made my living in Los Angeles as a blueprint machine operator in an architectural office and as a typesetter for weekly newspapers. All machines eventually break down, and repair workers are often welcome simply because they provide a different face within the routine. Since repair workers are moving from site to site, they are also in a position to pass on the latest economic rumor about another company, or to repeat a joke that someone has just told them. These jokes can range from a variant of the three-guys-on-an-island routine to a story about the Pope being driven to Yankees Stadium in a limousine. I am not especially good at remembering jokes, but the following one stands out, in part because I was surprised that the repairman felt comfortable enough about the work environment he was in to tell me the joke. In retrospect, I guess he looked at the five-to-one ratio of men to women in the production department and figured that there were equivalent odds in anyone being bothered by telling me the following joke: A man's at a party and he starts talking with a very beautiful woman. After about a half-hour of bantering and chit-chat, the man says, "Would you sleep with me if I gave you ten million dollars?" The woman looks at the man, pauses, and says, "Ten million for one night? Well, yes," she says. "How about a million dollars?" says the man? "Maybe," says the woman. "How about a hundred dollars?" says the man. "No way," says the woman. "What do you think I am? A whore?" "Oh, we've already established that," says the man. "We're just quibbling about the price." The man who told me this joke as he fixed the typesetting equipment I worked on thought this was fairly funny, and I remember trying not to make it look as if I were smiling instead of scowling at what seemed to me a fairly nasty joke. As hostile humor goes, it could perhaps be conceded that it is fairly successful. The effectiveness of the joke aside, what impressed me was the sincerity with which he told the joke. It seemed as though the put-down told some kind of truth that he was not able to find expressed in any other way. The stereotype that the joke is built in is the assumption that all women are mercenary in regards to their sexual behavior: underneath the veneer of sexual attraction is a process of coy bargaining. The joke suggests that men and women might as well drop all pretension that any other motives are at work. In "quibbling about the price," the repair person's joke is attempting to reestablish the exchange of commodities in a capitalist society in terms of gendered domination. At its core, the above joke is meant to attack women who believe that they have any power in their lives other than sexual availability. One crucial aspect of these jokes as thumbnail sketches of domination is that they serve as information that revolves through a culture with the casual insouciance of rumors. At the time, it Did not occur to me to ask the repairman where he had first heard the joke, though he probably would have said from somebody working at the place where he had been. If I had contacted that person, I no doubt would have been referred to yet another person. Even if I had managed to find a print version of the joke, it probably would not have an individual's name attached to it. In circulating without specific attribution in regards to authorship, the anonymity of jokes allows them to function as the gossip of ideology. If, as Alan Sinfield suggests, the point of ideology is to make an explanation of social reality plausible,2 sexual jokes in particular repeat categorical ideas, e.g., all women are basically prostitutes in terms of their sexual agency, and make the implausible believable. If the purpose of ideology is to make the logic of a social system cohere, jokes point up imperfections in the arrangements, and allow us to estimate how much change would have to occur for the flaws in that logic to become acceptable, if not at least somewhat more tolerable. Jokes permit us to express our doubts about the distribution of power or to suppress incipient doubts, and in quelling them, mold the energy of doubt into more acceptable projections of normativity. Given that ideology is fundamentally patriarchal, most sex jokes are about the disproportionate relations of power, control and authority. Male fears about the interminable unreliability of their value as reproductive agents are a large part of the trumpery of social life that provides the foundation for jokes about sex. For men, part of the baggage they lug around as that trumpery is a concern about the size of their penis. Phallic jokes almost always involve an objectification of women. A co-worker at the same newspaper where I heard the first joke told me the following one at the tail end of a fourteen hour shift. I have to confess that I laughed more at this one, and I will not use exhaustion as an excuse. A man is taking a walk with his new wife, and up ahead he sees her first husband walking towards them. As they start to pass each other, the ex-husband says, "Hey, how does it feel to be with used goods?" "Very lovely," replies the new husband, "once I get past the used part." The male gaze in this joke is focused completely on the genitals of all three of the characters. The woman is portrayed as common property, and her worth is only gauged in relationship to the transience of phallic power. The woman in this joke doesn't even get to protest her status, but even when the woman is given the punch line, as in the following joke, the sexual agency at the core of the joke is portrayed as gratifying the ideological assumptions of power and possession. A woman gets into bed with her new husband on their wedding night, and says, "I've got something to tell you, dear." "What's that, sweetheart?" "I want you to be very gentle. I'm still a virgin." "That's can't be possible," the husband says. "You've been married three times before me." "Well," says the wife, "The first husband was a gynecologist, he just like to look at it. The second was a psychiatrist. He just liked to talk about it. The third was a veterinarian. He just coughed up hairballs." I would rate this as a far better joke than the first two, in part because it has a stronger coil of a starting point. Jokes, like poems, have their own peculiar logic, and jokes often work best when they begin with an absurd situation. A woman still being a virgin as she starts her fourth marriage is a blatantly absurd proposition, and yet and yet that which appears to be contradictory is quickly explained by involving the absurd amount of power we cede to those at the top of the masculine pyramid. The first three husbands would all seem to be at the summit of discourse in that they are trained as doctors, and theoretically are potent agents of domination. The absurdity of the joke's initial proposition is a necessary component for pointing up how the contingency of the desire for erotic pleasure meets its limits in the imbalance of power created by male control of professional life. The joke plays out the full ramifications of the power of the male gaze in objectifying women. In contrast, the woman's power in this joke is only in the passivity of her virginity. If the men are not able to have erections, the woman does not assert herself either in that she gives no indication that she enjoyed in the slightest degree the cunnilingus of the poem's final punch line. Perhaps the most insidious part of sexual jokes is that it's very hard to resist their allure. We might regard ourselves as seeing through all the machinations of an interpellative society, and yet in spite of intellectual insights, can find ourselves enjoying humor that is effective only because it is playing off stereotypes of gender and power to which we are very susceptible. A huge number of jokes are about the costs and rewards of sexual power, and to that extent are the jagged nodes of domination. As with gossip, the distortions are repeated one person at a time. The cumulative effect of this circulation is to close off or limit the possibilities of other ways of organizing social life. Jokes, in that sense, contain and control the discourse generated by the doubts that ideology inherently raises. If laughter mutes these doubts, it also springs the traps that power sets for itself and us in maintaining its grip on the comedy of life. Citation reference for this article MLA Style Mohr, Bill. "The Gossip of Ideology" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0311/2-mohr-gossip-of-ideology.html>. APA Style Mohr, B. (2003, Nov 10). The Gossip of Ideology. M/C: A Journal of Media and Culture, 6, <http://www.media-culture.org.au/0311/2-mohr-gossip-of-ideology.html>
APA, Harvard, Vancouver, ISO, and other styles
32

Tuters, Marc, Emilija Jokubauskaitė, and Daniel Bach. "Post-Truth Protest: How 4chan Cooked Up the Pizzagate Bullshit." M/C Journal 21, no. 3 (August 15, 2018). http://dx.doi.org/10.5204/mcj.1422.

Full text
Abstract:
IntroductionOn 4 December 2016, a man entered a Washington, D.C., pizza parlor armed with an AR-15 assault rifle in an attempt to save the victims of an alleged satanic pedophilia ring run by prominent members of the Democratic Party. While the story had already been discredited (LaCapria), at the time of the incident, nearly half of Trump voters were found to give a measure of credence to the same rumors that had apparently inspired the gunman (Frankovic). Was we will discuss here, the bizarre conspiracy theory known as "Pizzagate" had in fact originated a month earlier on 4chan/pol/, a message forum whose very raison d’être is to protest against “political correctness” of the liberal establishment, and which had recently become a hub for “loose coordination” amongst members the insurgent US ‘alt-right’ movement (Hawley 48). Over a period of 25 hours beginning on 3 November 2016, contributors to the /pol/ forum combed through a cache of private e-mails belonging to Hillary Clinton’s campaign manager John Podesta, obtained by Russian hackers (Franceschi-Bicchierai) and leaked by Julian Assange (Wikileaks). In this short time period contributors to the forum thus constructed the basic elements of a narrative that would be amplified by a newly formed “right-wing media network”, in which the “repetition, variation, and circulation” of “repeated falsehoods” may be understood as an “important driver towards a ‘post-truth’ world” (Benkler et al). Heavily promoted by a new class of right-wing pundits on Twitter (Wendling), the case of Pizzagate prompts us to reconsider the presumed progressive valence of social media protest (Zuckerman).While there is literature, both popular and academic, on earlier protest movements associated with 4chan (Stryker; Olson; Coleman; Phillips), there is still a relative paucity of empirical research into the newer forms of alt-right collective action that have emerged from 4chan. And while there have been journalistic exposés tracing the dissemination of the Pizzagate rumors across social media as well as deconstructing its bizarre narrative (Fisher et al.; Aisch; Robb), as of yet there has been no rigorous analysis of the provenance of this particular story. This article thus provides an empirical study of how the Pizzagate conspiracy theory developed out of a particular set of collective action techniques that were in turn shaped by the material affordances of 4chan’s most active message board, the notorious and highly offensive /pol/.Grammatised Collective ActionOur empirical approach is partially inspired by the limited data-scientific literature of 4chan (Bernstein et al.; Hine et al.; Zannettou et al.), and combines close and distant reading techniques to study how the technical design of 4chan ‘grammatises’ new forms of collective action. Our coinage of grammatised collective action is based on the notion of “grammars of action” from the field of critical information studies, which posits the radical idea that innovations in computational systems can also be understood as “ontological advances” (Agre 749), insofar as computation tends to break the flux of human activity into discrete elements. By introducing this concept our intent is not to minimise individual agency, but rather to emphasise the ways in which computational systems can be conceptualised in terms of an individ­ual-milieu dyad where the “individual carries with it a certain inheritance […] animated by all the potentials that characterise [...] the structure of a physical system” (Simondon 306). Our argument is that grammatisation may be thought to create new kinds of niches, or affordances, for new forms of sociality and, crucially, new forms of collective action — in the case of 4chan/pol/, how anonymity and ephemerality may be thought to afford a kind of post-truth protest.Affordance was initially proposed as a means by which to overcome the dualistic tendency, inherited from phenomenology, to bracket the subject from its environment. Thus, affordance is a relational concept “equally a fact of the environment and a fact of behaviour” (Gibson 129). While, in the strictly materialist sense affordances are “always there” (Gibson 132), their capacity to shape action depends upon their discovery and exploitation by particular forms of life that are capable of perceiving them. It is axiomatic within ethology that forms of life can be understood to thrive in their own dynamic, yet in some real sense ontologically distinct, lifeworlds (von Uexküll). Departing from this axiom, affordances can thus be defined, somewhat confusingly but accurately, as an “invariant combination of variables” (Gibson 134). In the case of new media, the same technological object may afford different actions for specific users — for instance, the uses of an online platform appears differently from the perspective of the individual users, businesses, or a developer (Gillespie). Recent literature within the field of new media has sought to engage with this concept of affordance as the methodological basis for attending to “the specificity of platforms” (Bucher and Helmond 242), for example by focussing on how a platform’s affordances may be used as a "mechanism of governance" (Crawford and Gillespie 411), how they may "foster democratic deliberation" (Halpern and Gibbs 1159), and be implicated in the "production of normativity" (Stanfill 1061).As an anonymous and essentially ephemeral peer-produced image-board, 4chan has a quite simple technical design when compared with the dominant social media platforms discussed in the new media literature on affordances. Paradoxically however in the simplicity of their design 4chan boards may be understood to afford rather complex forms of self-expression and of coordinated action amongst their dedicated users, whom refer to themselves as "anons". It has been noted, for example, that the production of provocative Internet memes on 4chan’s /b/ board — the birthplace of Rickrolling — could be understood as a type of "contested cultural capital", whose “media literate” usage allows anons to demonstrate their in-group status in the absence of any persistent reputational capital (Nissenbaum and Shiffman). In order to appreciate how 4chan grammatises action it is thus useful to study its characteristic affordances, the most notable of which is its renowned anonymity. We should thus begin by noting how the design of the site allows anyone to post anything virtually anonymously so long as comments remain on topic for the given board. Indeed, it was this particular affordance that informed the emergence of the collective identity of the hacktivist group “Anonymous”, some ten years before 4chan became publicly associated with the rise of the alt-right.In addition to anonymity the other affordance that makes 4chan particularly unique is ephemerality. As stated, the design of 4chan is quite straightforward. Anons post comments to ongoing threaded discussions, which start with an original post. Threads with the most recent comments appear first in order at the top of a given board, which result in the previous threads getting pushed down the page. Even in the case of the most popular threads 4chan boards only allow a finite number of comments before threads must be purged. As a result of this design, no matter how popular a discussion might be, once having reached the bump-limit threads expire, moving down the front page onto the second and third page either to be temporarily catalogued or else to disappear from the site altogether (see Image 1 for how popular threads on /pol/, represented in red, are purged after reaching the bump-limit).Image 1: 55 minutes of all 4chan/pol/ threads and their positions, sampled every 2 minutes (Hagen)Adding to this ephemerality, general discussion on 4chan is also governed by moderators — this in spite of 4chan’s anarchic reputation — who are uniquely empowered with the ability to effectively kill a thread, or a series of threads. Autosaging, one of the possible techniques available to moderators, is usually only exerted in instances when the discussion is deemed as being off-topic or inappropriate. As a result of the combined affordances, discussions can be extremely rapid and intense — in the case of the creation of Pizzagate, this process took 25 hours (see Tokmetzis for an account based on our research).The combination of 4chan’s unique affordances of anonymity and ephemerality brings us to a third factor that is crucial in order to understand how it is that 4chan anons cooked-up the Pizzagate story: the general thread. This process involves anons combing through previous discussion threads in order to create a new thread that compiles all the salient details on a given topic often archiving this data with services like Pastebin — an online content hosting service usually used to share snippets of code — or Google Docs since the latter tend to be less ephemeral than 4chan.In addition to keeping a conversation alive after a thread has been purged, in the case of Pizzagate we noticed that general threads were crucial to the process of framing those discussions going forward. While multiple general threads might emerge on a given topic, only one will consolidate the ongoing conversation thereby affording significant authority to a single author (as opposed to the anonymous mass) in terms of deciding on which parts of a prior thread to include or exclude. While general threads occur relatively commonly in 4chan, in the case of Pizzagate, this process seemed to take on the form of a real-time collective research effort that we will refer to as bullshit accumulation.The analytic philosopher Harry Frankfurt argues that bullshit is form of knowledge-production that appears unconcerned with objective truth, and as such can be distinguished from misinformation. Frankfurt sees bullshit as “more ambitious” than misinformation defining it as “panoramic rather than particular” since it is also prepared to “fake the context”, which in his estimation makes bullshit a “greater enemy of the truth” than lies (62, 52). Through an investigation into the origins of Pizzagate on /pol/, we thus are able to understand how grammatised collective action assists in the accumulation of bullshit in the service of a kind of post-truth political protest.Bullshit Accumulation4chan has a pragmatic and paradoxical relationship with belief that has be characterised in terms of kind of quasi-religious ironic collectivism (Burton). Because of this "weaponizing [of] irony" (Wilson) it is difficult to objectively determine to what extent anons actually believed that Pizzagate was real, and in a sense it is beside the point. In combination then with the site’s aforementioned affordances, it is this peculiar relationship with the truth which thus makes /pol/ so uniquely productive of bullshit. Image 2: Original pizzagate post on 4chan/pol/When #Pizzagate started trending on Twitter on 4 November 2017, it became clear that much of the narrative, and in particular the ‘pizza connection’, was based on arcane (if not simply ridiculous) interpretations of a cache of e-mails belonging to Hillary Clinton’s campaign manager John Podesta released by Wikileaks during the final weeks of the campaign. While many of the subsequent journalistic exposé would claim that Pizzagate began on 4chan, they did not explore its origins, perhaps because of the fact that 4chan does not consistently archive its threads. Our analysis overcame this obstacle by using a third party archive, Archive4plebs, which allowed us to pinpoint the first instance of a thread (/pol/) that discussed a connection between the keyword “pizza” and the leaked e-mails (Image 2).Image 3: 4chan/pol/ Pizzagate general threadsStarting with the timestamp of the first thread, we identified a total of 18 additional general threads related to the topic of Pizzagate (see Image 3). This establishes a 25-hour timeframe in which the Pizzagate narrative was formed (from Wednesday 2 November 2016, 22:17:20, until Thursday 3 November 2016, 23:24:01). We developed a timeline (Image 4) identifying 13 key moments in the development of the Pizzagate story such as the first attempts at disseminating the narrative to other platforms such as the Reddit forum r/The_Donald a popular forum whose reactionary politics had arguably set the broader tone for the Trump campaign (Heikkila).Image 4: timeline of the birth of Pizzagate. Design by Elena Aversa, information design student at Density Design Lab.The association between the Clinton campaign and pedophilia came from another narrative on 4chan known as ‘Orgy Island’, which alleged the Clintons flew to a secret island for sex tourism aboard a private jet called "Lolita Express" owned by Jeffrey Epstein, an American financier who had served 13 months in prison for soliciting an underage prostitute. As with the Pizzagate story, this narrative also appears to have developed through the shared infrastructure of Pastebin links included in general posts (Pastebin) often alongside Wikileaks links.Image 5: Clues about “pizza” being investigatedOrgy Island and other stories were thus combined together with ‘clues’, many of which were found in the leaked Podesta e-mails, in order to imagine the connections between pedophila and pizza. It was noticed that several of Podesta’s e-mails, for example, mentioned the phrase ‘cheese pizza’ (see Image 5), which on 4chan had long been used as a code word for ‘child pornography’ , the latter which is banned from the site.Image 6: leaked Podesta e-mail from Marina AbramovicIn another leaked e-mail, for example, sent to Podesta from the renowned performance artist Marina Abramovich (see Image 6), a reference to one of her art projects, entitled ‘Spirit Cooking’ — an oblique reference to the mid-century English occultist Aleister Crowley — was interpreted as evidence of Clinton’s involvement in satanic rituals (see Image 7). In the course of this one-day period then, many if not most of the coordinates for the Pizzagate narrative were thus put into place subsequently to be amplified by a new breed of populist social media activists in protest against a corrupt Democratic establishment.Image 7: /pol/ anon’s reaction to the e-mail in Image 6During its initial inception on /pol/, there was the apparent need for visualisations in order make sense of all the data. Quite early on in the process, for example, one anon posted:my brain is exploding trying to organize the connections. Anyone have diagrams of these connections?In response, anons produced numerous conspiratorial visualisations, such as a map featuring all the child-related businesses in the neighbourhood of the D.C. pizza parlor — owned by the boyfriend of the prominent Democratic strategist David Brock — which seemed to have logos of the same general shape as the symbols apparently used by pedophiles, and whose locations seems furthermore to line up in the shape of a satanic pentagram (see Image 8). Such visualisations appear to have served three purposes: they helped anons to identify connections, they helped them circumvent 4chan’s purging process — indeed they were often hosted on third-party sites such as Imgur — and finally they helped anons to ultimately communicate the Pizzagate narrative to a broader audience.Image 8. Anonymously authored Pizzagate map revealing a secret pedophilia network in D.C.By using an inductive approach to categorise the comments in the general threads a set of non-exclusive codes emerged, which can be grouped into five overarching categories: researching, interpreting, soliciting, archiving and publishing. As visualised in Image 9, the techniques used by anons in the genesis of Pizzagate appears as a kind of vernacular rendition of many of the same “digital methods” that we use as Internet researchers. An analysis of these techniques thus helps us to understanding how a grammatised form of collective action arises out of anons’ negotiations with the affordances of 4chan — most notably the constant purging of threads — and how, in special circumstances, this can lead to bullshit accumulation.Image 9: vernacular digital methods on /pol/ ConclusionWhat this analysis ultimately reveals is how 4chan/pol/’s ephemerality affordance contributed to an environment that is remarkably productive of bullshit. As a type of knowledge-accumulation, bullshit confirms preconceived biases through appealing to emotion — this at the expense of the broader shared epistemic principles, an objective notion of “truth” that arguably forms the foundation for public reason in large and complex liberal societies (Lynch). In this sense, the bullshit of Pizzagate resonates with Hannah Arendt’s analysis of totalitarian discourse which nurtures a conspiratorial redefining of emotional truth as “whatever respectable society had hypocritically passed over, or covered with corruption" (49).As right-wing populism establishes itself evermore firmly in many countries in which technocratic liberalism had formerly held sway, the demand for emotionally satisfying post-truth, will surely keep the new online bullshit factories like /pol/ in business. Yet, while the same figures who initially assiduously sought to promote Pizzagate have subsequently tried to distance themselves from the story (Doubeck; Colbourn), Pizzagate continues to live on in certain ‘alternative facts’ communities (Voat).If we conceptualise the notion of a ‘public’ as a local and transient entity that is, above all, defined by its active engagement with a given ‘issue’ (Marres), then perhaps we should consider Pizzagate as representing a new post-truth species of issue-public. Indeed, one could go so far as to argue that, in the era of post-truth, the very ‘reality’ of contemporary issues-publics are increasingly becoming a function of their what communities want to believe. Such a neopragmatist theory might even be used to support the post-truth claim — as produced by the grammatised collective actions of 4chan anons in the course of a single day — that Pizzagate is real!References Agre, Phillip E. “Surveillance and Capture.” The New Media Reader. Eds. Noah Wardrip-Fruin and Nick Montfort. Cambridge, MA: MIT P, 2003 [1994]. 740–60.Aisch, Gregor, Jon Huang, and Cecilia Kang. “Dissecting the #PizzaGate Conspiracy Theories.” New York Times, 10 Dec. 2016. 1 Aug. 2018 <https://www.nytimes.com/interactive/2016/12/10/business/media/pizzagate.html>.Arendt, Hannah. Origins of Totalitarianism. New York: Houghton Mifflin Harcourt, 1968.Benkler, Yochai, Robert Faris, Hal Roberts, and Ethan Zuckerman. “Study: Breitbart-Led Right-Wing Media Ecosystem Altered Broader Media Agenda.” Columbia Journalism Review, 3 Mar. 2017. 1 Aug. 2018 <https://www.cjr.org/analysis/breitbart-media-trump-harvard-study.php>.Bernstein, Michael S., Andres Monroy-Hernandez, Harry Drew, Paul Andre, Katrina Panovich, and Greg Vargas. "4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community.” Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011.Bucher, Taina, and Anne Helmond. “The Affordances of Social Media Platforms.” The SAGE Handbook of Social Media. Eds. Jean Burgess, Thomas Poell, and Alice Marwick. London and New York: SAGE, 2017.Burton, Tara Isabella. “Apocalypse Whatever — Real Life.” Reallifemag, 13 Dec. 2017. 1 Aug. 2018 <http://reallifemag.com/apocalypse-whatever/>.Colburn, Randall. “Celebrate the 1-Year Anniversary of the #Pizzagate Shooting by Getting Mike Cernovich Kicked Off Twitter." AVclub, 4 Dec. 2017. 1 Aug. 2018 <https://www.avclub.com/celebrate-the-1-year-anniversary-of-the-pizzagate-shoo-1820983596>.Coleman, Gabriella. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. New York: Verso, 2014.Crawford, Kate, and Tarleton L. Gillespie. “What Is a Flag For? Social Media Reporting Tools and the Vocabulary of Complaint.” New Media & Society 18.3 (2016): 410-428.Doubeck, James. “Conspiracy Theorist Alex Jones Apologizes For Promoting ‘Pizzagate’.” NPR, 26 Mar. 2017. 1 Aug. 2018 <https://www.npr.org/sections/thetwo-way/2017/03/26/521545788/conspiracy-theorist-alex-jones-apologizes-for-promoting-pizzagate>.Fisher, Marc, John Woodrow Cox, and Peter Hermann. “Pizzagate: From Rumor, to Hashtag, to Gunfire in D.C.” The Washington Post, 6 Dec. 2016. 1 Aug. 2018 <https://www.washingtonpost.com/local/pizzagate-from-rumor-to-hashtag-to-gunfire-in-dc/2016/12/06/4c7def50-bbd4-11e6-94ac-3d324840106c_story.html?utm_term=.ef9c2b1edc2f>.Franceschi-Bicchierai, Lorenzo. “How Hackers Broke into John Podesta and Colin Powell's Gmail Accounts.” Motherboard, 22 Oct. 2016. 1 Aug. 2018 <https://motherboard.vice.com/en_us/article/mg7xjb/how-hackers-broke-into-john-podesta-and-colin-powells-gmail-accounts>.Frankfurt, Harry. On Bullshit. Princeton: Princeton UP, 2005.Frankovic, Kathy. “Belief in Conspiracies Largely Depends on Political Identity.” YouGov, 2016. 1 Aug. 2018 <https://today.yougov.com/topics/politics/articles-reports/2016/12/27/belief-conspiracies-largely-depends-political-iden>.Gibson, James J. The Ecological Approach to Visual Perception. New York: Taylor & Francis, 1986.Gillespie, Tarleton. “The Politics of ‘Platforms’.” New Media & Society 12.3 (2010): 347–64.Halpern, Daniel, and Jennifer Gibbs. “Social Media as a Catalyst for Online Deliberation? Exploring the Affordances of Facebook and YouTube for Political Expression.” Computers in Human Behavior 29.3 (2013): 1159–1168.Hawley, George. Making Sense of the Alt-Right. New York: Columbia UP, 2017.Heikkilä, Nico. “Online Antagonism of the Alt-Right in the 2016 Election.” European Journal of American Studies 12.2 (2017): 1–23.Hagen, Sal. "Rendering Legible the Ephemerality of 4chan/pol/." OILab.eu, 12 Apr. 2018. 1 Aug. 2018 <https://oilab.eu/rendering-legible-the-ephemerality-of-4chanpol/>.Hine, Gabriel, Jeremiah Onaolapo, Emiliano De Cristafora, Niclas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn. “Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web.” 11th International AAAI Conference on Web and Social Media (ICWSM'17). 2017.LaCapria, Kim. "FALSE: Comet Ping Pong Pizzeria Home to Child Abuse Ring Led by Hillary Clinton." Snopes, 21 Nov. 2016. 1 Aug. 2018 <https://www.snopes.com/fact-check/pizzagate-conspiracy/>.Lynch, Michael. P. The Internet of Us: Knowing More and Understanding Less in the Age of Big Data. New York: W.W. Norton & Company, 2016.Marres, Noortje. “The Issues Deserve More Credit.” Social Studies of Science 37.5 (2007): 759–80.Nissenbaum, Asaf, and Limor Shifman. “Internet Memes as Contested Cultural Capital: The Case of 4chan’s /b/ Board.” New Media & Society 19.4 (2015): 483–501.Olson, Parmy. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Back Bay Books, 2013.Pastebin – Epstein's Little Black Book. 9 Mar. 2015. 1 Aug. 2018 <https://pastebin.com/m7FYj73Z>.Phillips, Whitney. This Is Why We Can't Have Nice Things: Mapping the Relationship between Online Trolling and Mainstream Culture. Cambridge MA: MIT P, 2015./Pol/ – Politically Incorrect » Thread #95752720. 2 Nov. 2016. 1 Aug. 2018 <http://archive.4plebs.org/pol/thread/95752720/#95752720>.Robb, Amanda. “Anatomy of a Fake News Scandal: Inside the Web of Conspiracy Theorists, Russian Operatives, Trump Campaigners and Twitter Bots Who Manufactured the “News” that Hillary Clinton Ran a Pizza-Restaurant Child-Sex Ring.” Rolling Stone, 16 Nov. 2017. 1 Aug. 2018 <https://www.rollingstone.com/politics/news/pizzagate-anatomy-of-a-fake-news-scandal-w511904>.Simondon, Gilbert. “Genesis of the Individual.” Incorporations. Eds. Jonathan Crary and Stanford Kwinter. New York: Zone Books, 1992 [1964]. 297–319.Stanfill, Mel. “The Interface as Discourse: the Production of Norms through Web Design.” New Media & Society 17.7 (2014): 1059–74.Stryker, Cole. Epic Win for Anonymous: How 4chan’s Army Conquered the Web. New York: Overlook P, 2011.Tokmetzis, Dimitri. “De Zaak ‘Pizzagate’ – of Hoe Nepnieuws en Complottheorieën Hun Weg Vinden Naar Een Breed Publiek.” De Correspondent, 25 Apr. 2018. 1 Aug. 2018 <https://decorrespondent.nl/7938/de-zaak-pizzagate-of-hoe-nepnieuws-en-complottheorieen-hun-weg-vinden-naar-een-breed-publiek/386556786-1c0b5a60>.Voat.com/v/pizzagate. 1 Aug. 2018 <https://voat.co/v/pizzagate>.Von Uexküll, Joseph. A Foray into the Worlds of Animals and Humans: With a Theory of Meaning. Trans. J.D. ONeil. Minneapolis: U of Minnesota P, 2010 [1934].Wendling, Mike. "The Saga of 'Pizzagate': The Fake Story That Shows How Conspiracy Theories Spread." BBC News, 2 Dec. 2016. 1 Aug. 2018 <https://www.bbc.co.uk/news/blogs-trending-38156985>.Wilson, Jason. “Hiding in Plain Sight: How the ‘Alt-Right’ Is Weaponizing Irony to Spread Fascism.” Guardian, 23 May 2017. 1 Aug. 2018 <https://www.theguardian.com/technology/2017/may/23/alt-right-online-humor-as-a-weapon-facism>.WikiLeaks. "The Podesta Emails – Part 1." 7 Oct. 2016. 1 Aug. 2018 <https://wikileaks.org/podesta-emails/press-release>.Zannettou, Savvas, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Guillermo Suarez-Tangil. “On the Origins of Memes by Means of Fringe Web Communities.” arXiv 1805.12512 (2018): 1–20.Zuckerman, Ethan. “Cute Cats to the Rescue? Participatory Media and Political Expression.” MIT Open Access Journals, 2013. 1 Aug. 2018 <http://ethanzuckerman.com/papers/cutecats2013.pdf>.
APA, Harvard, Vancouver, ISO, and other styles
33

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
34

Muntean, Nick, and Anne Helen Petersen. "Celebrity Twitter: Strategies of Intrusion and Disclosure in the Age of Technoculture." M/C Journal 12, no. 5 (December 13, 2009). http://dx.doi.org/10.5204/mcj.194.

Full text
Abstract:
Being a celebrity sure ain’t what it used to be. Or, perhaps more accurately, the process of maintaining a stable star persona isn’t what it used to be. With the rise of new media technologies—including digital photography and video production, gossip blogging, social networking sites, and streaming video—there has been a rapid proliferation of voices which serve to articulate stars’ personae. This panoply of sanctioned and unsanctioned discourses has brought the coherence and stability of the star’s image into crisis, with an evermore-heightened loop forming recursively between celebrity gossip and scandals, on the one hand, and, on the other, new media-enabled speculation and commentary about these scandals and gossip-pieces. Of course, while no subject has a single meaning, Hollywood has historically expended great energy and resources to perpetuate the myth that the star’s image is univocal. In the present moment, however, studios’s traditional methods for discursive control have faltered, such that celebrities have found it necessary to take matters into their own hands, using new media technologies, particularly Twitter, in an attempt to stabilise that most vital currency of their trade, their professional/public persona. In order to fully appreciate the significance of this new mode of publicity management, and its larger implications for contemporary subjectivity writ large, we must first come to understand the history of Hollywood’s approach to celebrity publicity and image management.A Brief History of Hollywood PublicityThe origins of this effort are nearly as old as Hollywood itself, for, as Richard DeCordova explains, the celebrity scandals of the 1920s threatened to disrupt the economic vitality of the incipient industry such that strict, centralised image control appeared as a necessary imperative to maintain a consistently reliable product. The Fatty Arbuckle murder trial was scandalous not only for its subject matter (a murder suffused with illicit and shadowy sexual innuendo) but also because the event revealed that stars, despite their mediated larger-than-life images, were not only as human as the rest of us, but that, in fact, they were capable of profoundly inhuman acts. The scandal, then, was not so much Arbuckle’s crime, but the negative pall it cast over the Hollywood mythos of glamour and grace. The studios quickly organised an industry-wide regulatory agency (the MPPDA) to counter potentially damaging rhetoric and ward off government intervention. Censorship codes and morality clauses were combined with well-funded publicity departments in an effort that successfully shifted the locus of the star’s extra-filmic discursive construction from private acts—which could betray their screen image—to information which served to extend and enhance the star’s pre-existing persona. In this way, the sanctioned celebrity knowledge sphere became co-extensive with that of commercial culture itself; the star became meaningful only by knowing how she spent her leisure time and the type of make-up she used. The star’s identity was not found via unsanctioned intrusion, but through studio-sanctioned disclosure, made available in the form of gossip columns, newsreels, and fan magazines. This period of relative stability for the star's star image was ultimately quite brief, however, as the collapse of the studio system in the late 1940s and the introduction of television brought about a radical, but gradual, reordering of the star's signifying potential. The studios no longer had the resources or incentive to tightly police star images—the classic age of stardom was over. During this period of change, an influx of alternative voices and publications filled the discursive void left by the demise of the studios’s regimented publicity efforts, with many of these new outlets reengaging older methods of intrusion to generate a regular rhythm of vendible information about the stars.The first to exploit and capitalize on star image instability was Robert Harrison, whose Confidential Magazine became the leading gossip publication of the 1950s. Unlike its fan magazine rivals, which persisted in portraying the stars as morally upright and wholesome, Confidential pledged on the cover of each issue to “tell the facts and name the names,” revealing what had been theretofore “confidential.” In essence, through intrusion, Confidential reasserted scandal as the true core of the star, simultaneously instituting incursion and surveillance as the most direct avenue to the “kernel” of the celebrity subject, obtaining stories through associations with call girls, out-of-work starlettes, and private eyes. As extra-textual discourses proliferated and fragmented, the contexts in which the public encountered the star changed as well. Theatre attendance dropped dramatically, and as the studios sold their film libraries to television, the stars, formerly available only on the big screen and in glamour shots, were now intercut with commercials, broadcast on grainy sets in the domestic space. The integrity—or at least the illusion of integrity—of the star image was forever compromised. As the parameters of renown continued to expand, film stars, formally distinguished from all other performers, migrated to television. The landscape of stardom was re-contoured into the “celebrity sphere,” a space that includes television hosts, musicians, royals, and charismatic politicians. The revamped celebrity “game” was complex, but still playabout: with a powerful agent, a talented publicist, and a check on drinking, drug use, and extra-marital affairs, a star and his or her management team could negotiate a coherent image. Confidential was gone, The National Inquirer was muzzled by libel laws, and People and E.T.—both sheltered within larger media companies—towed the publicists’s line. There were few widely circulated outlets through which unauthorised voices could gain traction. Old-School Stars and New Media Technologies: The Case of Tom CruiseYet with the relentless arrival of various news media technologies beginning in the 1980s and continuing through the present, maintaining tight celebrity image control began to require the services of a phalanx of publicists and handlers. Here, the example of Tom Cruise is instructive: for nearly twenty years, Cruise’s publicity was managed by Pat Kingsley, who exercised exacting control over the star’s image. With the help of seemingly diverse yet essentially similar starring roles, Cruise solidified his image as the cocky, charismatic boy-next-door.The unified Cruise image was made possible by shutting down competing discourses through the relentless, comprehensive efforts of his management company; Kingsley's staff fine-tuned Cruise’s acts of disclosure while simultaneously eliminating the potential for unplanned intrusions, neutralising any potential scandal at its source. Kingsley and her aides performed for Cruise all the functions of a studio publicity department from Hollywood’s Golden Age. Most importantly, Cruise was kept silent on the topic of his controversial religion, Scientology, lest it incite domestic and international backlash. In interviews and off-the-cuff soundbites, Cruise was ostensibly disclosing his true self, and that self remained the dominant reading of what, and who, Cruise “was.” Yet in 2004, Cruise fired Kingsley, replaced her with his own sister (and fellow Scientologist), who had no prior experience in public relations. In essence, he exchanged a handler who understood how to shape star disclosure for one who did not. The events that followed have been widely rehearsed: Cruise avidly pursued Katie Holmes; Cruise jumped for joy on Oprah’s couch; Cruise denounced psychology during a heated debate with Matt Lauer on The Today Show. His attempt at disclosing this new, un-publicist-mediated self became scandalous in and of itself. Cruise’s dismissal of Kingsley, his unpopular (but not necessarily unwelcome) disclosures, and his own massively unchecked ego all played crucial roles in the fall of the Cruise image. While these stumbles might have caused some minor career turmoil in the past, the hyper-echoic, spastically recombinatory logic of the technoculture brought the speed and stakes of these missteps to a new level; one of the hallmarks of the postmodern condition has been not merely an increasing textual self-reflexivity, but a qualitative new leap forward in inter-textual reflexivity, as well (Lyotard; Baudrillard). Indeed, the swift dismantling of Cruise’s long-established image is directly linked to the immediacy and speed of the Internet, digital photography, and the gossip blog, as the reflexivity of new media rendered the safe division between disclosure and intrusion untenable. His couchjumping was turned into a dance remix and circulated on YouTube; Mission Impossible 3 boycotts were organised through a number of different Web forums; gossip bloggers speculated that Cruise had impregnated Holmes using the frozen sperm of Scientology founder L. Ron Hubbard. In the past, Cruise simply filed defamation suits against print publications that would deign to sully his image. Yet the sheer number of sites and voices reproducing this new set of rumors made such a strategy untenable. Ultimately, intrusions into Cruise’s personal life, including the leak of videos intended solely for Scientology recruitment use, had far more traction than any sanctioned Cruise soundbite. Cruise’s image emerged as a hollowed husk of its former self; the sheer amount of material circulating rendered all attempts at P.R., including a Vanity Fair cover story and “reveal” of daughter Suri, ridiculous. His image was fragmented and re-collected into an altered, almost uncanny new iteration. Following the lackluster performance of Mission Impossible 3 and public condemnation by Paramount head Sumner Redstone, Cruise seemed almost pitiable. The New Logic of Celebrity Image ManagementCruise’s travails are expressive of a deeper development which has occurred over the course of the last decade, as the massively proliferating new forms of celebrity discourse (e.g., paparazzi photos, mug shots, cell phone video have further decentered any shiny, polished version of a star. With older forms of media increasingly reorganising themselves according to the aesthetics and logic of new media forms (e.g., CNN featuring regular segments in which it focuses its network cameras upon a computer screen displaying the CNN website), we are only more prone to appreciate “low media” forms of star discourse—reports from fans on discussion boards, photos taken on cell phones—as valid components of the celebrity image. People and E.T. still attract millions, but they are rapidly ceding control of the celebrity industry to their ugly, offensive stepbrothers: TMZ, Us Weekly, and dozens of gossip blogs. Importantly, a publicist may be able to induce a blogger to cover their client, but they cannot convince him to drop a story: if TMZ doesn’t post it, then Perez Hilton certainly will. With TMZ unabashedly offering pay-outs to informants—including those in law enforcement and health care, despite recently passed legislation—a star is never safe. If he or she misbehaves, someone, professional or amateur, will provide coverage. Scandal becomes normalised, and, in so doing, can no longer really function as scandal as such; in an age of around-the-clock news cycles and celebrity-fixated journalism, the only truly scandalising event would be the complete absence of any scandalous reports. Or, as aesthetic theorist Jacques Ranciere puts it; “The complaint is then no longer that images conceal secrets which are no longer such to anyone, but, on the contrary, that they no longer hide anything” (22).These seemingly paradoxical involutions of post-modern celebrity epistemologies are at the core of the current crisis of celebrity, and, subsequently, of celebrities’s attempts to “take back their own paparazzi.” As one might expect, contemporary celebrities have attempted to counter these new logics and strategies of intrusion through a heightened commitment to disclosure, principally through the social networking capabilities of Twitter. Yet, as we will see, not only have the epistemological reorderings of postmodernist technoculture affected the logic of scandal/intrusion, but so too have they radically altered the workings of intrusion’s dialectical counterpart, disclosure.In the 1930s, when written letters were still the primary medium for intimate communication, stars would send lengthy “hand-written” letters to members of their fan club. Of course, such letters were generally not written by the stars themselves, but handwriting—and a star’s signature—signified authenticity. This ritualised process conferred an “aura” of authenticity upon the object of exchange precisely because of its static, recurring nature—exchange of fan mail was conventionally understood to be the primary medium for personal encounters with a celebrity. Within the overall political economy of the studio system, the medium of the hand-written letter functioned to unleash the productive power of authenticity, offering an illusion of communion which, in fact, served to underscore the gulf between the celebrity’s extraordinary nature and the ordinary lives of those who wrote to them. Yet the criterion and conventions through which celebrity personae were maintained were subject to change over time, as new communications technologies, new modes of Hollywood's industrial organization, and the changing realities of commercial media structures all combined to create a constantly moving ground upon which the celebrity tried to affix. The celebrity’s changing conditions are not unique to them alone; rather, they are a highly visible bellwether of changes which are more fundamentally occurring at all levels of culture and subjectivity. Indeed, more than seventy years ago, Walter Benjamin observed that when hand-made expressions of individuality were superseded by mechanical methods of production, aesthetic criteria (among other things) also underwent change, rendering notions of authenticity increasingly indeterminate.Such is the case that in today’s world, hand-written letters seem more contrived or disingenuous than Danny DeVito’s inaugural post to his Twitter account: “I just joined Twitter! I don't really get this site or how it works. My nuts are on fire.” The performative gesture in DeVito’s tweet is eminently clear, just as the semantic value is patently false: clearly DeVito understands “this site,” as he has successfully used it to extend his irreverent funny-little-man persona to the new medium. While the truth claims of his Tweet may be false, its functional purpose—both effacing and reifying the extraordinary/ordinary distinction of celebrity and maintaining DeVito’s celebrity personality as one with which people might identify—is nevertheless seemingly intact, and thus mirrors the instrumental value of celebrity disclosure as performed in older media forms. Twitter and Contemporary TechnocultureFor these reasons and more, considered within the larger context of contemporary popular culture, celebrity tweeting has been equated with the assertion of the authentic celebrity voice; celebrity tweets are regularly cited in newspaper articles and blogs as “official” statements from the celebrity him/herself. With so many mediated voices attempting to “speak” the meaning of the star, the Twitter account emerges as the privileged channel to the star him/herself. Yet the seemingly easy discursive associations of Twitter and authenticity are in fact ideological acts par excellence, as fixations on the indexical truth-value of Twitter are not merely missing the point, but actively distracting from the real issues surrounding the unsteady discursive construction of contemporary celebrity and the “celebretification” of contemporary subjectivity writ large. In other words, while it is taken as axiomatic that the “message” of celebrity Twittering is, as Henry Jenkins suggests, “Here I Am,” this outward epistemological certainty veils the deeply unstable nature of celebrity—and by extension, subjectivity itself—in our networked society.If we understand the relationship between publicity and technoculture to work as Zizek-inspired cultural theorist Jodi Dean suggests, then technologies “believe for us, accessing information even if we cannot” (40), such that technology itself is enlisted to serve the function of ideology, the process by which a culture naturalises itself and attempts to render the notion of totality coherent. For Dean, the psycho-ideological reality of contemporary culture is predicated upon the notion of an ever-elusive “secret,” which promises to reveal us all as part of a unitary public. The reality—that there is no such cohesive collective body—is obscured in the secret’s mystifying function which renders as “a contingent gap what is really the fact of the fundamental split, antagonism, and rupture of politics” (40). Under the ascendancy of the technoculture—Dean's term for the technologically mediated landscape of contemporary communicative capitalism—subjectivity becomes interpellated along an axis blind to the secret of this fundamental rupture. The two interwoven poles of this axis are not unlike structuralist film critics' dialectically intertwined accounts of the scopophilia and scopophobia of viewing relations, simply enlarged from the limited realm of the gaze to encompass the entire range of subjectivity. As such, the conspiratorial mindset is that mode of desire, of lack, which attempts to attain the “secret,” while the celebrity subject is that element of excess without which desire is unthinkable. As one might expect, the paparazzi and gossip sites’s strategies of intrusion have historically operated primarily through the conspiratorial mindset, with endless conjecture about what is “really happening” behind the scenes. Under the intrusive/conspiratorial paradigm, the authentic celebrity subject is always just out of reach—a chance sighting only serves to reinscribe the need for the next encounter where, it is believed, all will become known. Under such conditions, the conspiratorial mindset of the paparazzi is put into overdrive: because the star can never be “fully” known, there can never be enough information about a star, therefore, more information is always needed. Against this relentless intrusion, the celebrity—whose discursive stability, given the constant imperative for newness in commercial culture, is always in danger—risks a semiotic liquidation that will totally displace his celebrity status as such. Disclosure, e.g. Tweeting, emerges as a possible corrective to the endlessly associative logic of the paparazzi’s conspiratorial indset. In other words, through Twitter, the celebrity seeks to arrest meaning—fixing it in place around their own seemingly coherent narrativisation. The publicist’s new task, then, is to convincingly counter such unsanctioned, intrusive, surveillance-based discourse. Stars continue to give interviews, of course, and many regularly pose as “authors” of their own homepages and blogs. Yet as posited above, Twitter has emerged as the most salient means of generating “authentic” celebrity disclosure, simultaneously countering the efforts of the papparazzi, fan mags, and gossip blogs to complicate or rewrite the meaning of the star. The star uses the account—verified, by Twitter, as the “real” star—both as a means to disclose their true interior state of being and to counter erastz narratives circulating about them. Twitter’s appeal for both celebrities and their followers comes from the ostensible spontaneity of the tweets, as the seemingly unrehearsed quality of the communiqués lends the form an immediacy and casualness unmatched by blogs or official websites; the semantic informality typically employed in the medium obscures their larger professional significance for celebrity tweeters. While Twitter’s air of extemporary intimacy is also offered by other social networking platforms, such as MySpace or Facebook, the latter’s opportunities for public feedback (via wall-posts and the like) works counter to the tight image control offered by Twitter’s broadcast-esque model. Additionally, because of the uncertain nature of the tweet release cycle—has Ashton Kutcher sent a new tweet yet?—the voyeuristic nature of the tweet disclosure (with its real-time nature offering a level of synchronic intimacy that letters never could have matched), and the semantically displaced nature of the medium, it is a form of disclosure perfectly attuned to the conspiratorial mindset of the technoculture. As mentioned above, however, the conspiratorial mindset is an unstable subjectivity, insofar as it only exists through a constant oscillation with its twin, the celebrity subjectivity. While we can understand that, for the celebrities, Twitter functions by allowing them a mode for disclosive/celebrity subjectivisation, we have not yet seen how the celebrity itself is rendered conspiratorial through Twitter. Similarly, only the conspiratorial mode of the follower’s subjectivity has thus far been enumerated; the moment of the follower's celebrtification has so far gone unmentioned. Since we have seen that the celebrity function of Twitter is not really about discourse per se, we should instead understand that the ideological value of Twitter comes from the act of tweeting itself, of finding pleasure in being engaged in a techno-social system in which one's participation is recognised. Recognition and participation should be qualified, though, as it is not the fully active type of participation one might expect in say, the electoral politics of a representative democracy. Instead, it is a participation in a sort of epistemological viewing relations, or, as Jodi Dean describes it, “that we understand ourselves as known is what makes us think there is that there is a public that knows us” (122). The fans’ recognition by the celebrity—the way in which they understood themselves as known by the star was once the receipt of a hand-signed letter (and a latent expectation that the celebrity had read the fan’s initial letter); such an exchange conferred to the fan a momentary sense of participation in the celebrity's extraordinary aura. Under Twitter, however, such an exchange does not occur, as that feeling of one-to-one interaction is absent; simply by looking elsewhere on the screen, one can confirm that a celebrity's tweet was received by two million other individuals. The closest a fan can come to that older modality of recognition is by sending a message to the celebrity that the celebrity then “re-tweets” to his broader following. Beyond the obvious levels of technological estrangement involved in such recognition is the fact that the identity of the re-tweeted fan will not be known by the celebrity’s other two million followers. That sense of sharing in the celebrity’s extraordinary aura is altered by an awareness that the very act of recognition largely entails performing one’s relative anonymity in front of the other wholly anonymous followers. As the associative, conspiratorial mindset of the star endlessly searches for fodder through which to maintain its image, fans allow what was previously a personal moment of recognition to be transformed into a public one. That is, the conditions through which one realises one’s personal subjectivity are, in fact, themselves becoming remade according to the logic of celebrity, in which priority is given to the simple fact of visibility over that of the actual object made visible. Against such an opaque cultural transformation, the recent rise of reactionary libertarianism and anti-collectivist sentiment is hardly surprising. ReferencesBaudrillard, Jean. Simulacra and Simulation. Ann Arbor: Michigan UP, 1994.Benjamin, Walter. Illuminations. New York: Harcourt, Brace and World, 1968. Dean, Jodi. Publicity’s Secret: How Technoculture Capitalizes on Democracy. Ithaca: Cornell UP, 2003. DeCordova, Richard. Picture Personalities: The Emergence of the Star System in America. Urbana: University of Illinois Press, 1990. Jenkins, Henry. “The Message of Twitter: ‘Here It Is’ and ‘Here I Am.’” Confessions of an Aca-Fan. 23 Aug. 2009. 15 Sep. 2009 < http://henryjenkins.org/2009/08/the_message_of_twitter.html >.Lyotard, Jean-Francois. The Postmodern Condition: A Report on Knowledge. Minneapolis: Minnesota UP, 1984.Ranciere, Jacques. The Future of the Image. New York: Verso, 2007.
APA, Harvard, Vancouver, ISO, and other styles
35

Zuvela, Danni. "An Interview with the Makers of Value-Added Cinema." M/C Journal 6, no. 3 (June 1, 2003). http://dx.doi.org/10.5204/mcj.2183.

Full text
Abstract:
Things would never be the same again. As sales went through the roof, with some breathless estimates in the region of a 200% increase overnight, marketers practically wet their pants at the phenomenal success of the chocolate bar seen by millions in ET: the Extraterrestrial. That was back in 1982. Though not the first instance of product placement ‘at the movies’, the strategic placement of Reese’s Pieces in ET is often hailed as the triumphant marketing moment heralding the onset of the era of embedded advertising in popular media. Today, much media consumption is characterised by aggressive branding strategies. We’ve all seen ostentatious product wrangling – the unnatural handling of items (especially chocolate bars and bottled drinks) to best display their logo (regardless of considerations of verisimilitude, or even common sense), and ungainly product mentions in dialogue (who can forget the early Jude Law shocker Shopping?) that have passed into the realm of satire. In television and feature filmmaking, props bearing corporate trademarks not only supplement, but often sustain production budgets. Some programs appear to be entirely contrived around such sponsors. Australian commercial television makes no secret of the increasingly non-existent line between ‘entertainment’ and ‘advertising’, though it still purports to describe ‘lifestyle’ shows as ‘reality’ television. With the introduction of technologies like TiVO which enable consumers to skip over ads, the move is from ‘interruptive’ style advertising between programs or segments, to products insinuated in the décor – and increasingly scripts – of programs themselves, with correspondent online shopping opportunities for digital consumers. An entire industry of middle-people – sometimes euphemistically self-described as ‘prop houses’ – has sprung up to service the lucrative product placement industry, orchestrating the insertion of branded products into television and films. The industry has grown to such an extent that it holds an annual backpatting event, the Product Placement Awards, “to commemorate and celebrate product placement” in movies, television shows, music etc. But ‘advertising by stealth’ is not necessarily passively accepted by media consumers – nor media makers. The shoe-horning of brands and their logos into the products of popular culture not only defines the culture industry today, but also characterises much of the resistance to it. ‘Logo-backlash’ is seen as an inevitable response to the incursion of brands into public life, an explicit rejection of the practice of securing consumer mindshare, and subvertisements and billboard liberation activities have been mainstays of culture jamming for decades now. However, criticism of product placement remains highly problematic: when the Center for the Study of Commercialism argued that movies have become “dangerously” saturated with products and suggested that full disclosure in the form of a list, in a film’s credits, of paid product appearances, many noted the counterproductivity of such an approach, arguing that it would only result in further registration – and hence promotion – of the brand. Not everyone subscribes to advertising’s ‘any news is good news’ thesis, however. Peter Conheim and Steve Seidler decided to respond to the behemoth of product placement with a ‘catalogue of sins’. Their new documentary Value Added Cinema meticulously chronicles the appearance of placed products in Hollywood cinema. Here they discuss the film, which is continuing to receive rave reviews in the US and Europe. Danni Zuvela: Can you tell me a little about yourselves? Peter: I’m a musician and filmmaker living in the San Francisco Bay Area who wears too many hats. I play in three performing and recording groups (Mono Pause, Wet Gate, Negativland) and somehow found the time to sit in front of a Mac for six weeks to edit and mix VALUE-ADDED CINEMA. Because Steve is a persuasive salesperson. Steve: I’ve been a curator for the past decade and a half, showing experimental works week after week, month after month, year after year, at the Pacific Film Archive. It was about time to make a tape of my own and Peter was crazy enough to indulge me. DZ: Why product placement? Why do you think it’s important? Where did this documentary come from? S: Steven Spielberg released Minority Report last year and it just raised my hackles. The film actually encourages the world it seems to critique by stressing the inter-relationship of his alleged art with consumerism in the present day and then extending that into a vision of the future within the film itself. In other words, he has already realized the by-product of an alarming dystopia of surveillance, monolithic policing, and capital. That by-product is his film. The rumor mill says that he was reimbursed to the tune of $25 million for the placements. So not only can he not see a constructive path out of dystopia, a path leading toward a more liberating future, he makes millions from his exhausted imagination. What could be more cynical? But Spielberg isn’t alone within the accelerating subsumption of mainstream cinema into the spectacle of pure consumption. He’s just more visible than most. But to consider product placements more directly for a moment: during the past few years, mainstream cinema has been little more than an empty exercise in consumerist viewership. The market-driven incentives that shape films, determining story-lines, exaggerating cultural norms, striving toward particular demographics, whatever, have nothing to do with art or social change and everything to do with profit, pandering, and promulgation. Movies are product placements, the product is a world view of limitless consumption. Value-Added Cinema is about the product-that-announces-itself, the one we recognize as a crystallization of the more encompassing worldview, the sole commodity, spot-lit, adored, assimilated. So why Value-Added Cinema? You’ve got to start somewhere. DZ: Can you tell me a bit about the production process – how did you go about getting the examples you use in the film? Were there any copyright hassles? P: Steve did nearly all of the legwork in that he spent weeks and weeks researching the subject, both on-line and in speaking to people about their recollections of product placement sequences in films they’d seen. He then suffered through close to a hundred films on VHS and DVD, using the fast-forward and cue controls as often as possible, to locate said sequences. We then sat down and started cutting, based at first on groupings Steve had made (a bunch of fast food references, etc.). Using these as a springboard, we quickly realized the narrative potential inherent in all these “narrative film” clips , and before long we were linking sequences and making them refer to one another, sort of allowing a “plot” to evolve. And copyright hassles? Not yet! I say... bring ‘em on! I would be more than happy to fight for the existence of this project, and one of the groups I am in, Negativland, has a rather colourful history of “fair use” battles in the music arena (the most nefarious case, where the band was sued by U2 and their big-label music lawyers over a parody we made happened before I came on board, but there’s been some skirmishes since). We have folks who would be happy to help defend this sort of work in a court of law should the occasion arise. DZ: Can you talk to me about the cultural shift that’s occurred, where the old ‘Acme’ propmaster has been replaced by ‘product peddler’? What is this symptomatic of, and what’s its significance now? S: In the past, privacy existed because there were areas of experience and information that were considered off limits to exploitation. A kind of tacit social contract assumed certain boundaries were in place to keep corporate (and State) meddling at bay and to allow an uncontaminated space for disengaging from culture. Nowadays the violation of boundaries is so egregious it’s hard to be sure that those boundaries in fact exist. Part of that violation has been the encroachment, at every conceivable level, of daily experience by all manner of corporate messages—urinal strainers with logos, coffee jackets with adverts, decals on supermarket floors, temporary tattoos on random pedestrians. Engagement with corporate predation is now foisted on us 24 hours a day. It’s the GPS generation. The corporations want to know where we “are” at all times. Again: in the past there was a certain level of decorum about the sales pitch. That decorum has vanished and in its place is the inter-penetration of all our waking moments by the foghorn of capital. If that foghorn gets loud enough, we’ll never get any sleep. DZ: How do you think product placement affects the integrity of the film? P: Well, that’s definitely a question of the moment, as far as audience reactions to our screenings have been thus far. It really depends on the work itself, doesn’t it? I think we would be highly judgmental, and perhaps quite out of line, if we dismissed out of hand the idea of using actual products in films as some sort of rule. The value of using an actual product to the narrative of a film can’t be discounted automatically because we all know that there are stories to be told in actual, marketed products. Characterizations can develop. If a flustered James Cagney had held up a bottle of Fred’s Cola instead of Pepsi in the climactic shot of One, Two, Three (Billy Wilder’s 1963 Coke-executive comedy), it wouldn’t have resonated very well. And it’s an incredibly memorable moment (and, some might say, a little dig at both cola companies). But when you get into something like i am sam, where Sean Penn’s character not only works inside a Starbucks, and is shown on the job, in uniform and reading their various actual coffee product names aloud, over and over again, but also rides a bus with a huge Nike ad on the side (and the camera tracks along on the ad instead of the bus itself), plus the fact that he got onto that bus underneath an enormous Apple billboard (not shown in our work, actually), or that his lawyer has a can of Tab sitting on an entirely austere, empty table in front of a blank wall and the camera tracks downward for no other discernable purpose than to highlight the Tab can… you can see where I’m going with this. The battle lines are drawn in my mind. PROVE to me the value of any of those product plugs on Penn’s character, or Michelle Pfeiffer’s (his lawyer). DZ: What do you make of the arguments for product placement as necessary to, even enhancing, the verisimilitude of films? Is there a case to be made for brands appearing in a production design because they’re what a character would choose? S: It’s who makes the argument for product placements that’s troublesome. Art that I value is a sort of problem solving machine. It assumes that the culture we currently find ourselves strapped with is flawed and should be altered. Within that context, the “verisimilitude” you speak of would be erected only as a means for critique--not to endorse, venerate, or fortify the status quo. Most Hollywood features are little more than moving catalogs. P: And in the case of Jurassic Park that couldn’t be more explicit – the “fake” products shown in the amusement park gift shop in the film are the actual tie-in products available in stores and in Burger King at that time! Another film I could mention for a totally different reason is The Dark Backward (1991). Apparently due to a particular obsession of the director, the film is riddled with placements, but of totally fake and hilarious products (i.e. Blump’s Squeezable Bacon). Everyone who has seen the film remembers the absurdist products… couldn’t Josie and the Pussycats have followed this format, instead of loading the film with “funny” references to literally every megacorporation imaginable, and have been memorable for it? DZ: What do you think of the retroactive insertion of products into syndicated reruns of programs and films (using digital editing techniques)? Is this a troubling precedent? P: Again, to me the line is totally crossed. There’s no longer any justification to be made because the time and space of the original television show is lost at that point, so any possibility of “commentary” on the times, or development of the character, goes right out the window. Of course I find it a troubling precedent. It’s perhaps somewhat less troubling, but still distressing, to know that billboards on the walls of sports stadiums are being digitally altered, live, during broadcast, so that the products can be subtly switched around. And perhaps most disturbingly, at least here in the states, certain networks and programs have begun cross-dissolving to advertisements from program content, and vice-versa. In other words, since the advertisers are aware that the long-established “blackout” which precedes the start of advertising breaks on TV causes people to tune out, or turn the volume off, or have their newfangled sensing devices “zap” the commercial… so they’re literally integrating the start of the ad with the final frames of the program instead of going black, literally becoming part of the program. And we have heard about more reliance of products WITHIN the programs, but this just takes us right back to TV’s past, where game show contestants sat behind enormous “Pepsodent” adverts pasted right there on the set. History will eat itself… DZ: Could you imagine a way advertisers could work product placement into films where modern products just don’t fit, like set in the past or in alternate universes (Star Wars, LOTR etc)? P: Can’t you? In fact, it’s already happening. Someone told us about the use of products in a recent set-in-the-past epic… but the name of the film is escaping me. S: And if you can’t find a way to insert a product placement in a film than maybe the film won’t get made. The problem is completely solved with films like Star Wars and Lord of the Rings—most of the characters are available in the store as action figures making them de facto placements. In Small Soldiers just about every toy-sized character was, in fact, nicely packaged by Hasbro. DZ: What is the role of the logo in product placement? S: There are the stars, and there are the many supporting roles—the logo is just one of them. We’re hoping to see this category at the next Oscars. P: And categories like “Best Song” are essentially product placement categories already… DZ: I’ve heard about the future of product placement being branding in computer games, interactive shop-at-home television – what other visions of the (branded) future can you imagine? P: The future is now. If you can’t watch a documentary on so-called public television in this country without having text boxes pop up on screen to suggest “related” web sites which “might be of interest” to the viewer, you’re already well on the way to being part of a branded environment. Computer games already have ads built-in, and shop-at-home already seems plenty interactive (and isn’t internet shopping, also?). I think if the various mega-corporations can not only convince people to wear clothing emblazoned with their logo and product name, but so successfully convince us to pay for the privilege of advertising them, then we are already living in a totally branded future. Where else can it go? It may seem a trite statement but, to my mind, wearing an entire Nike outfit is the ultimate. At least the British ad company called Cunning Stunts actually PAYS their human billboards… but those folks have to agree to have the company logo temporarily tattooed onto their foreheads for three hours as they mingle in public. I’m not joking about this. DZ: Is there any response to product placement? How can audiences manage their interactions with these texts? S: Films have been boycotted for culturally heinous content, such as racist and homophobic characters. Why not boycott films because of their commodity content? Or better yet boycott the product for colluding with the filmmakers to invade your peace of mind? What I hope Value-Added Cinema does is sensitize us to the insinuation of the products, so that we critically detect them, rather than passively allow them to pass before us. When that happens, when we’re just insensate recipients of those advertising ploys, we’re lost. DZ: Do you have anything to add to contemporary debates on culture jamming, especially the charge that culture jamming’s political power is limited by its use of logos and signs? Anne Moore has written that detourning ads ends up just re-iterating the logo - “because corporate lifeblood is profit, and profit comes from name recognition”, culture jammers are “trafficking in the same currency as the corporations” – what do you think of this? P: It’s an interesting assertion. But the best culture jams I’ve seen make total mincemeat of the product being parodied; just as you can’t simply discount the use of actual products in films in the context of a narrative, you can’t NOT try to reclaim the use of a brand-name. Maybe it’s a dangerous comparison because “reclaiming” use of the word Coke is not like reclaiming the use of the word “queer”, but there’s something to it, I think. Also, I wear t-shirts with the names of bands I like sometimes (almost always my friends’ bands, but I suppose that’s beside the point). Am I buying into the advertising concept? Yes, to a certain extent, I am. I guess to me it’s about just what you choose to advertise. Or what you choose to parody. DZ: Do you have any other points you’d like to make about product placement, advertising by stealth, branding, mindshare or logos? P: I think what Steve said, that above all we hope with our video to help make people aware of how much they are advertised to, beyond accepting it as a mere annoyance, sums it up. So far, we’ve had some comments at screenings which indicate a willingness of people to want to combat this in their lives, to want to “do something” about the onslaught of product placement surrounding them, in films and elsewhere. Works Cited ET: The Extraterrestrial. Dir. Steven Spielberg. Prod. Kathleen Kennedy & Steven Spielberg, M. Universal Pictures 1982. Shopping. Dir. Paul Anderson. Prod. Jeremy Bolt , M. Concorde Pictures,1993. http://www.cspinet.org/ http://www.productplacementawards.com/ Links http://www.cspinet.org/ http://www.productplacementawards.com/ Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Zuvela, Danni. "An Interview with the Makers of Value-Added Cinema" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0306/03-valueadded.php>. APA Style Zuvela, D. (2003, Jun 19). An Interview with the Makers of Value-Added Cinema. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0306/03-valueadded.php>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography